last executing test programs: 10.419935739s ago: executing program 2 (id=2238): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) 8.546286504s ago: executing program 1 (id=2357): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'pim6reg0\x00', 0x2}) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa06"], 0xfdef) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000500) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000900)={'veth1_to_hsr\x00', @broadcast}) (async) close(r2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000002000000000000000000000105000066eb6f66a035"], 0x0, 0x42, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f00000003c0)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x1, {0x4e23, 0x3}}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000180)="0d7aefb30c192c410aba9cde894337f2c2a814428db030f8e7c3448c366b587333c46d12c6f034ebb42d1f60b228acdb57bad12b9489918c9e2acc76e8f6cce2d5901424c73d40bcc0285541a2312ac2e9f7a73c2fa2d221d56c877a70bdde1558f499b96bd7fc748e5e282121ca78b24bf88eb44c9d7ce0916f", 0x7a}, {&(0x7f00000002c0)="8d2063bdce1421b46a69abc7b0e2b4a6dfbd0a77628f0cf13865a758cdfcc25707fac80336e372d914d6274993b1378965b95d36", 0x34}], 0x2, &(0x7f0000000340)="ff2300c635f9f62b7bd03a058602606890850949bc2969f54081d761cd56eef1a811934552f91d71850ebdadba2e9bc75bb6c3c549ae7805ca461b7ff4939495bca96dc3549edb2e2b5d", 0x4a, 0x4}, 0x800) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002002000850000008200000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x41100, 0x24, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000d80)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 8.464190785s ago: executing program 1 (id=2361): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00"/12], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000007b55cb14ae00"], 0x48) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) getpid() perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) 8.463892024s ago: executing program 2 (id=2238): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) 6.642346309s ago: executing program 1 (id=2363): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd020f4c0c8c56147d66527da307bf731fef97861750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3665f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447c2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0000000000000003629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d7b90dfae158b94f50adab988dd8e12b1b56073d0d10f7067c881434af5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf77bfc95769a9294df517d90bdc01e73835efd98ad5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b31592479ecf2392548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbe1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5646ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4766e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec859c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f250057931d828ec78e116ae46c4897e2795b6ff92e9a1f63a6ed8fb4f8f3a6ec4e76f8621e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403f02734137ff47257f164391c673b6071b6ad0f05eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f5589829b6b0679b5d65a81826fc9b38f791c8f1892b51ad65a89bc84646ebf78f5d5d4804d9abb071fd711b5e7cc163b42a6510b8f5ee6747df0b560eabe0499bf1fef7c18bb9f55effa018679845c6598fb78bf1b8d9d9f04a5f6062c2bbb91952755b3f7c948268cb647d0a0bb1286480615941154a01d23734bcafe3b164474e2f2efa77850686ee4541f3e79efa63545a7ae53d5f0c40cc86473f7eb093980bd0d97bb4750128d9c519984c5f731ea259e71b2f12d67ce12e52c283e74594dfc933e625737ed231d61263721d46daf093f770357cd78fe1431aef52b4a0a933f1a5334ad03f3876fc8a8e187f80318427b4c922075cf829e3cc49d71d52137b48e1fb6b05dd1c7b251a7059f0a4b4f3431f67fc65b75c202e43816e34ff41db85bacd77b25242830b788ae1e00"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000}, 0x1e) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x65, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x104800}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000000080)) 6.572713079s ago: executing program 4 (id=2367): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001540)=ANY=[@ANYBLOB="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", @ANYBLOB="e90b25e669e4f64d03e3c0aebaf44e701a2f150f94c4f48222471f429ce5a8579ffe"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x9, 0xb, &(0x7f0000000a00)=ANY=[@ANYBLOB="181300008db986d449611594f55aed6216ef1f33002f99d867453b0baf14ec5071111e6430776540c040e86f559f001318ffbfee1b3670ab9a9c146d8eb5524b0f2305d62b1d71926940c425caced9d7f931a778ff02b7010a344e6927ebe94fb609ab64a3684ac84b973b34da7f06f155dab9e0bee57075", @ANYRES32=r0, @ANYBLOB="0000000000000000185000000d00000000000000000000008500000049000000183b000005000000000000000000000085200000ffffffff950000000000000018000000020000000000000008000000"], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0xc2, &(0x7f0000000580)=""/194, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000740)={0x5, 0x4, 0x8, 0x6}, 0x10, 0x0, r2, 0x6, &(0x7f0000000880)=[r0, r0, r0, r0, 0xffffffffffffffff, r0], &(0x7f00000008c0)=[{0x3, 0x1, 0x2, 0xb}, {0x0, 0x4, 0x4, 0x6}, {0x5, 0x4, 0x7, 0x8}, {0x3, 0x2, 0x5, 0x3}, {0x5, 0x2, 0xb, 0x6}, {0x1, 0x3, 0x5, 0x6}], 0x10, 0xe82, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x200, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x4240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x86a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r3, 0x0, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000db00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000072000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xd, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x72, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x3315}, 0xa000, 0xc8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x95ad}, 0x0, 0x101, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000cc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3, 0x0, @void, @value, @void, @value}, 0x50) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYRES16=r3], 0xfdef) mkdirat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000840), 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000002b00), 0x2, 0x0) 6.524724899s ago: executing program 2 (id=2238): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) 6.48708446s ago: executing program 0 (id=2368): bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000100)={0x1, 0x0}, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x40, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x17, 0xc, 0xfff, 0x1, 0x26100, 0x1, 0xa1, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000006c0000006c000000060000000200000000000012050000000d00000007000085010000000600000000000000000000000f00000002000000ffffff7f0700000001000000020000000002004000060000000b00000005000000080600000c00000005000000ff030000000061616100"], &(0x7f00000001c0)=""/39, 0x8a, 0x27, 0x0, 0xd4, 0x0, @void, @value}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f00000003c0)=[0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x82, &(0x7f0000000480)=[{}, {}, {}, {}, {}], 0x28, 0xfffffffffffffc96, &(0x7f0000000a40), &(0x7f0000000540), 0x8, 0xd2, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={r6, 0x20, &(0x7f00000009c0)={&(0x7f0000000880)=""/122, 0x7a, 0x0, &(0x7f0000000940)=""/80, 0x50}}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000002000000020000003d05000040040000", @ANYRES32, @ANYBLOB="050000000000000035d9af5fcdce39bf794e03659aec9053ad18ea4e96b23037bdece1d068ae88f9b78d4624677a48b78fecace1c7dfc89b66a3fb4d0b0a40a080ac81df1485cf3a710fa9d4c0f2bea54096a302346f23410b682a6eb838c588a500e469282b1e61e6b85958035e1c0d110ba19867ad5e083332af", @ANYRES32=r5, @ANYRES32, @ANYBLOB="05000000050000000400"/28], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0xe, 0x1, 0x8, 0x89, 0x40400, 0x1, 0xfffffff4, '\x00', 0x0, r4, 0x4, 0x0, 0x2, 0x0, @void, @value, @void, @value}, 0x50) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r9}, 0x10) r11 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r10}, 0x8) close(r11) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r8, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r12 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000001c0)='sched_process_wait\x00', r13}, 0x10) r15 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r14}, 0x8) bpf$BPF_GET_MAP_INFO(0x22, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r15, r12, 0x0, r15}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r7}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)={'b', ' *:* ', 'wm\x00'}, 0x9) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000900)="3e26cca5", 0x4}], 0x1}, 0x800) recvmsg$unix(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1}, 0x2002) 4.651719034s ago: executing program 0 (id=2369): bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'lo\x00', 0x20}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000280)='console\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000bc0)={{r2}, &(0x7f0000000b40), &(0x7f0000000b80)='%-010d \x00'}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"/2767], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001200)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff000000000000000000008510000006000000180000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc, @void, @value}, 0x94) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 4.650858264s ago: executing program 1 (id=2370): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00bd6627b80000000000000000000000000000000003d10000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="020000000400000004000000080000000000f800", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x12, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020732600000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000080)='GPL\x00', 0x8000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb0}, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00', 0x200}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8983, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffffffffffc91) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) 4.650020644s ago: executing program 3 (id=2371): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0xe}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000010000000ecd997440000000000050098ef81d4a979f90d73e8f67c061078ee32eeb358ebfaab23128f366e01ffcd028ad71ec72cd6134727897746a108d2593bc4572971a45c8d6075e844cd707abbb63f6520797448212b38e3991c676729e44e13479a57225b1f3386fc72e4aab2"], 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x23, 0x0, &(0x7f0000000100)="3136231767bec3b8a7a36585617341880f7ddaf111a5366a5d6063ede388ecc2d4771e", 0x0, 0xb33f, 0x0, 0x8a, 0x0, &(0x7f00000002c0)="d4eec17d88f0398aa9b09861c96355829b5de128759aa0bc60c1f43261068a0a9ce97d98848fc0549d745b598fe89d46d03264dade7cf9f71a045d65a201fa729e9cb3445a341441373198032a323e530313232f74f4d3c7652b38adf0291d7a53d81eca53fa687b0788d8d476d6ee49a45b69a60d206ecee2f8ebc22cca7cb6f8f6e588c17d28408a76", 0x0, 0x2, 0x0, 0x3}, 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 4.648022634s ago: executing program 4 (id=2372): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x9, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001a80)={r4}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000004000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='freezer.self_freezing\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000008000008500000006000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000880)={{}, 0x0, &(0x7f0000000840)='%pI4 \x00'}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f375"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYRES32=0x1, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x20702, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r6, &(0x7f00000001c0)=ANY=[], 0xfdef) 4.538554825s ago: executing program 4 (id=2373): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1, 0x0, 0x0, @void, @value}, 0x20) socketpair(0xb, 0xa, 0x4, &(0x7f0000000200)) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000400)='FREEZING\x00', 0x9) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00T\x00'/13, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2565], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0x7f, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72", 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 4.492548125s ago: executing program 3 (id=2374): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd63"], 0xfdef) 4.462834025s ago: executing program 2 (id=2238): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.448513481s ago: executing program 0 (id=2375): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00"/12], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf090000000000005509010000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000007b55cb14ae00"], 0x48) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) getpid() perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) 2.447629281s ago: executing program 1 (id=2376): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) close(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_config_ext, 0x0, 0x8, 0x40000}, 0x0, 0x0, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYRES32=r3], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000001}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r4, 0x0, 0x2, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f00000001c0)='cgroup.threads\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) bpf$TOKEN_CREATE(0x24, &(0x7f0000000280)={0x0, r5}, 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000005c0)={0x8000, 0x0}, 0x8) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='mm_page_alloc\x00', r8}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 2.444768751s ago: executing program 3 (id=2377): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000009500000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x2, 0x3}, @func_proto={0x0, 0x0, 0x0, 0xd, 0xc000000}]}}, &(0x7f00000005c0)=""/240, 0x32, 0xf0, 0x1, 0x0, 0x0, @void, @value=0x300}, 0x28) 2.441941321s ago: executing program 4 (id=2378): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000ffff000000007200ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xb, 0xff, 0x2, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r2}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={r2, &(0x7f0000000300), &(0x7f0000000340)=""/55}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x0, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1a, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3, 0x4, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000009500000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x100, @void, @value}, 0x94) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x32040, 0x0) ioctl$TUNGETDEVNETNS(r4, 0x54e3, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r5}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000009dd6f6ab1800000002000000000000000000000203000000000000000000000d0000000c0000"], &(0x7f00000005c0)=""/240, 0x32, 0xf0, 0x1, 0x0, 0x0, @void, @value}, 0x28) 2.423142881s ago: executing program 3 (id=2379): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000f447333de39c7095758218a68bc5142f0cb2229fa6c8b0d7c8126aee6d3def94cd964218564fb1d255bce6cef9bea8322326039744a98eead8c59bc75bb5b42123eef53ae4bc331b0ad09a8efc4175c484ad74df9158ff1882cdd83c97c03a35e91c30a0"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r3}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x8, 0x0}, 0x8) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_tracing={0x1a, 0x12, &(0x7f00000003c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xd}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_fd={0x18, 0x2, 0x1, 0x0, 0x1}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000480)='syzkaller\x00', 0x5, 0x96, &(0x7f0000000800)=""/150, 0x40f00, 0x8, '\x00', 0x0, 0x7582ff1523552f0e, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x4, 0x2}, 0x8, 0x10, 0x0, 0x0, 0xa8b5, r1, 0x3, 0x0, &(0x7f0000000580)=[{0x5, 0x2, 0x7, 0x2}, {0x0, 0x3, 0xc, 0x7}, {0x2, 0x5, 0x5}], 0x10, 0x2, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x14, &(0x7f00000000c0), 0x43) recvmsg$unix(r7, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x11, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {}, {0x85, 0x0, 0x0, 0x33}}]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r10}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r9}, &(0x7f00000002c0), &(0x7f0000000340)=r11}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r5, 0xffffffffffffffff}, &(0x7f0000000680), &(0x7f0000000780)=r5}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d40)={0x6, 0x1f, &(0x7f0000000b00)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x8000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r9}}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @tail_call={{0x18, 0x2, 0x1, 0x0, r12}}], &(0x7f0000000c00)='syzkaller\x00', 0xfffffffb, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c40)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000c80)={0x1, 0x9, 0x8, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000cc0)=[r0], &(0x7f0000000d00), 0x10, 0x0, @void, @value}, 0x94) 2.329041972s ago: executing program 2 (id=2238): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) 298.842587ms ago: executing program 3 (id=2380): bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000100)={0x1, 0x0}, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x40, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x17, 0xc, 0xfff, 0x1, 0x26100, 0x1, 0xa1, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000006c0000006c000000060000000200000000000012050000000d00000007000085010000000600000000000000000000000f00000002000000ffffff7f0700000001000000020000000002004000060000000b00000005000000080600000c00000005000000ff030000000061616100"], &(0x7f00000001c0)=""/39, 0x8a, 0x27, 0x0, 0xd4, 0x0, @void, @value}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f00000003c0)=[0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x82, &(0x7f0000000480)=[{}, {}, {}, {}, {}], 0x28, 0xfffffffffffffc96, &(0x7f0000000a40), &(0x7f0000000540), 0x8, 0xd2, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={r6, 0x20, &(0x7f00000009c0)={&(0x7f0000000880)=""/122, 0x7a, 0x0, &(0x7f0000000940)=""/80, 0x50}}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000002000000020000003d05000040040000", @ANYRES32, @ANYBLOB="050000000000000035d9af5fcdce39bf794e03659aec9053ad18ea4e96b23037bdece1d068ae88f9b78d4624677a48b78fecace1c7dfc89b66a3fb4d0b0a40a080ac81df1485cf3a710fa9d4c0f2bea54096a302346f23410b682a6eb838c588a500e469282b1e61e6b85958035e1c0d110ba19867ad5e083332af", @ANYRES32=r5, @ANYRES32, @ANYBLOB="05000000050000000400"/28], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0xe, 0x1, 0x8, 0x89, 0x40400, 0x1, 0xfffffff4, '\x00', 0x0, r4, 0x4, 0x0, 0x2, 0x0, @void, @value, @void, @value}, 0x50) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r9}, 0x10) r11 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r10}, 0x8) close(r11) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r8, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r12 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000001c0)='sched_process_wait\x00', r13}, 0x10) r15 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r14}, 0x8) bpf$BPF_GET_MAP_INFO(0x22, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r15, r12, 0x0, r15}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r7}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)={'b', ' *:* ', 'wm\x00'}, 0x9) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000900)="3e26cca5", 0x4}], 0x1}, 0x800) recvmsg$unix(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1}, 0x2002) 297.951068ms ago: executing program 4 (id=2381): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10005, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r3}, 0xc) close(r5) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1700000000000000040000000300000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000008445d35de00"/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="17000000000000000084000001"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000004c0)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x10000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe}}]}, 0x0, 0x40000000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r8}, 0x3d) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0xffff, 0x5, 0x2800, r5, 0x10000, '\x00', r4, 0xffffffffffffffff, 0x4, 0x2, 0x3, 0x5, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r9, &(0x7f0000000340), &(0x7f00000005c0)=""/143}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r10}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r6, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r11, 0x0, &(0x7f0000002240)=""/4097}, 0x20) r12 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r12, 0x40042408, r13) 294.710497ms ago: executing program 0 (id=2390): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000400)={0x1b, 0x0, 0x0, 0x10000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000140)={r2, 0x0, 0x0}, 0x20) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014870000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000002c0)='hrtimer_init\x00', r5}, 0x18) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'syzkaller0\x00', 0x7101}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r6, &(0x7f0000000100)=ANY=[@ANYBLOB="1e031800dd5c980128854d4a828e00000000002f"], 0xffdd) 294.290557ms ago: executing program 1 (id=2382): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x1, 0x40000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x1, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x26, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100, 0x2000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080040000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000040000000000000000000000000000000800a0fe0000d1481228c7ba472fd5729e78e9936f02818c560c6f476219e232702e3706d105b5e0"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f00000003c0), 0xa}, 0x0, 0x0, 0x0, 0x4, 0xfff, 0xb722}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28, 0x9, 0xaa, 0xfffff004}, {0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x60, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x60ae0}], 0x318, 0x0, 0xdb0, 0xf5ffffff}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1, 0x21, 0x5, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000240)={{r7}, &(0x7f0000000140), &(0x7f0000000180)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x15, &(0x7f00000005c0)={{r7}, &(0x7f0000000540), 0x0}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f2, &(0x7f0000000080)) syz_clone(0x640c7000, 0x0, 0x2f, 0x0, 0x0, 0x0) 212.031148ms ago: executing program 0 (id=2383): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x9, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001a80)={r4}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000004000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='freezer.self_freezing\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000008000008500000006000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000880)={{}, 0x0, &(0x7f0000000840)='%pI4 \x00'}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f375"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYRES32=0x1, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x20702, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r6, &(0x7f00000001c0)=ANY=[], 0xfdef) 193.090548ms ago: executing program 3 (id=2384): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000080000000500000000000000", @ANYRES32, @ANYBLOB="0000000000000000000010000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000c80)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000017020000f8ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x20, 0x0, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x7, 0x4, 0x100, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r6, &(0x7f0000000040), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x18, 0x200000000000013a, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000200)=ANY=[@ANYRESDEC=r3, @ANYRES32=0x0, @ANYRES64=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r9}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='ext4_insert_range\x00', r8, 0x0, 0x9}, 0x18) 110.710189ms ago: executing program 0 (id=2385): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000f447333de39c7095758218a68bc5142f0cb2229fa6c8b0d7c8126aee6d3def94cd964218564fb1d255bce6cef9bea8322326039744a98eead8c59bc75bb5b42123eef53ae4bc331b0ad09a8efc4175c484ad74df9158ff1882cdd83c97c03a35e91c30a0"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r3}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x8, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_tracing={0x1a, 0x12, &(0x7f00000003c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xd}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_fd={0x18, 0x2, 0x1, 0x0, 0x1}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000480)='syzkaller\x00', 0x5, 0x96, &(0x7f0000000800)=""/150, 0x40f00, 0x8, '\x00', 0x0, 0x7582ff1523552f0e, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x4, 0x2}, 0x8, 0x10, 0x0, 0x0, 0xa8b5, r1, 0x3, 0x0, &(0x7f0000000580)=[{0x5, 0x2, 0x7, 0x2}, {0x0, 0x3, 0xc, 0x7}, {0x2, 0x5, 0x5}], 0x10, 0x2, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x14, &(0x7f00000000c0), 0x43) recvmsg$unix(r6, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x11, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {}, {0x85, 0x0, 0x0, 0x33}}]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r10}, 0x10) close(r7) 45.548879ms ago: executing program 2 (id=2238): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 4 (id=2386): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0xd, &(0x7f0000000000)=@raw=[@map_val={0x18, 0x9, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xa}], &(0x7f0000000080)='GPL\x00', 0xffff0001, 0xc4, &(0x7f00000000c0)=""/196, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000001c0)=[0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x4, 0x1, 0x5}, {0x0, 0x3, 0x5, 0x4}, {0x5, 0x2, 0x0, 0x8}, {0x2, 0x5, 0x0, 0xc}, {0x4, 0x1, 0x10, 0x4}, {0x0, 0x3, 0x10, 0x4}, {0x5, 0x5, 0xf}], 0x10, 0x4, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x27, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x77, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000006c0)={0x0, 0xc000, 0x10}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{0x1, 0xffffffffffffffff}, &(0x7f0000000880), &(0x7f00000008c0)=r0}, 0x20) (async, rerun: 64) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000009c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000940), &(0x7f0000000980)='%-5lx \x00'}, 0x20) (rerun: 64) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x1, 0x14, &(0x7f0000000700)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x400}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x253bc3e2}}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffb}, @map_fd={0x18, 0x1, 0x1, 0x0, r3}, @exit], &(0x7f00000007c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x62, '\x00', r1, @fallback=0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000840)={0x5, 0x4, 0x80, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000a00)=[r4, r5], &(0x7f0000000a40)=[{0x3, 0x5, 0x3, 0xc}], 0x10, 0xd, @void, @value}, 0x94) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000b40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x6, [@enum64={0x4, 0x4, 0x0, 0x13, 0x1, 0xc, [{0x7, 0x9, 0xfffffffc}, {0xd, 0xc0, 0x9825}, {0x4, 0x1, 0x7f}, {0x6, 0xec79, 0x5}]}]}, {0x0, [0x2e, 0x2e, 0x61, 0x30]}}, &(0x7f0000000bc0), 0x5a, 0x0, 0x1, 0x5, 0x0, @void, @value}, 0x28) (async, rerun: 64) close(r0) (async, rerun: 64) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000000e40)={&(0x7f0000000c80)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x2}}, 0x10, &(0x7f0000000d80)=[{&(0x7f0000000cc0)="9c3cc5c09694818a44b2d9743a03a0c6e2482c4cb49d8b18d04b8fb9cb9edfe864877e01637c2828bbb83ba32f5148cf8d90fc271ad0908d995f206b2cd5a4990ee76a999642", 0x46}, {&(0x7f0000000d40)="3325e04bf70c7b7745402f9d39c08867eb4346383a", 0x15}], 0x2, &(0x7f0000000dc0)="42d97f90cdf0414855c4dee8c9bd69a23b2c71ed8a920770fbd7b76cb8585dc4fffe5e43262a8a07d3fd65ef6417a81e59f9b00169c59fcada02329de036406de195900bb49e05781191c69e947a2c3917e0e9ea936afb1558788e19", 0x5c, 0x4000}, 0x8000) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ec0)={&(0x7f0000000e80)='f2fs_issue_flush\x00', r0, 0x0, 0xd692}, 0x18) r10 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz0\x00', 0x200002, 0x0) (async) r11 = perf_event_open$cgroup(&(0x7f0000001000)={0x5, 0x80, 0x6, 0x40, 0x2, 0x1, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000fc0), 0x14}, 0x100d80, 0x4c2c, 0xc, 0x9, 0x2, 0x4, 0x101, 0x0, 0x8000, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x8, r9, 0x9) perf_event_open$cgroup(&(0x7f0000000f00)={0x0, 0x80, 0x4, 0x6, 0x2, 0x8, 0x0, 0x6, 0x4020a, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x800, 0x4, @perf_config_ext={0x3ff, 0x3}, 0x600, 0x7, 0x9, 0x9, 0x0, 0x7fffffff, 0x9, 0x0, 0xde, 0x0, 0x100}, r10, 0x2, r11, 0x4) (async) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000001080), 0x4000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001100)={&(0x7f00000010c0)='afs_silly_rename\x00', r6, 0x0, 0x670}, 0x18) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r11, 0x40042408, r10) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000001140)=@bloom_filter={0x1e, 0x2, 0x2, 0x3, 0x8544, r5, 0x2, '\x00', r1, 0xffffffffffffffff, 0x5, 0x2, 0x1, 0x5, @value=r7, @void, @void, @value}, 0x50) (async) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001200)={&(0x7f00000011c0)='rxrpc_receive\x00', r10, 0x0, 0x5}, 0x18) ioctl$TUNGETDEVNETNS(r12, 0x54e3, 0x0) (async) r15 = syz_clone(0x20880000, &(0x7f0000001300)="5f2100e9eb9d3cc2bc4b319c75e996214a99cd5b943d9e123de4ab", 0x1b, &(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)="5ea82d0baf0d02e4ffcfd92a0439402885118889897141aedcde5e5780ada168f68e84c57f609718ced46047079067201b7a6ac6718f41a8a88977e10550a1bde414ab5d4b78a8fea3960d0b30f14822c328e66a8b54ed1b1be956f85eff3f469f5d45d3a6d64e021035f7235b2cb07818f46994dbd74eee60951bbd1e20a70d91a035fb5acf6423cfdd08032d47e6fe5615ec3970b6eb9f488823d641bf6347eac0c5") perf_event_open(&(0x7f0000001280)={0x4, 0x80, 0x4, 0x60, 0x8, 0x0, 0x0, 0x3, 0xb0000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000001240), 0x2}, 0x108060, 0x4, 0x8, 0x9, 0xb, 0x8, 0x3, 0x0, 0x225800, 0x0, 0x4}, r15, 0xffffffffffffffff, r14, 0x8) r16 = openat$cgroup(r10, &(0x7f0000001480)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r16, &(0x7f00000014c0)='cgroup.max.depth\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x6, 0x1, 0xb60d, 0x6, 0x1000, r3, 0x1, '\x00', r1, r7, 0x3, 0x0, 0x4, 0x0, @void, @value, @void, @value}, 0x50) (async) r17 = openat$tun(0xffffffffffffff9c, &(0x7f0000001580), 0x210400, 0x0) ioctl$SIOCSIFHWADDR(r17, 0x8924, &(0x7f00000015c0)={'wlan1\x00', @broadcast}) (async) r18 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001900)={0x11, 0x1b, &(0x7f0000001640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000000}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r13}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_val={0x18, 0xda25be8429733083, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x3}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000001740)='syzkaller\x00', 0x5, 0xaa, &(0x7f0000001780)=""/170, 0x40f00, 0x46, '\x00', r1, 0x0, r7, 0x8, &(0x7f0000001840)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000001880)=[{0x3, 0x4, 0xc, 0x1}, {0x1, 0x4, 0xb, 0x7}, {0x4, 0x5, 0xa, 0x9}, {0x5, 0x5, 0x3, 0x2}, {0x5, 0x3, 0xe, 0x1}, {0x3, 0x5, 0xe, 0x4}, {0x3, 0x2, 0xa, 0x1}, {0x0, 0x4, 0x4, 0x1}], 0x10, 0xc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000019c0)={&(0x7f0000001600)='siox_get_data\x00', r18, 0x0, 0x7fffffffffffffff}, 0x18) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.153' (ED25519) to the list of known hosts. [ 21.846405][ T30] audit: type=1400 audit(1742298455.202:66): avc: denied { integrity } for pid=278 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 21.870534][ T30] audit: type=1400 audit(1742298455.222:67): avc: denied { mounton } for pid=278 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.871992][ T278] cgroup: Unknown subsys name 'net' [ 21.894299][ T30] audit: type=1400 audit(1742298455.222:68): avc: denied { mount } for pid=278 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.921622][ T30] audit: type=1400 audit(1742298455.252:69): avc: denied { unmount } for pid=278 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.921950][ T278] cgroup: Unknown subsys name 'devices' [ 22.127197][ T278] cgroup: Unknown subsys name 'hugetlb' [ 22.133238][ T278] cgroup: Unknown subsys name 'rlimit' [ 22.333962][ T30] audit: type=1400 audit(1742298455.682:70): avc: denied { setattr } for pid=278 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.358414][ T30] audit: type=1400 audit(1742298455.682:71): avc: denied { mounton } for pid=278 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.385887][ T30] audit: type=1400 audit(1742298455.682:72): avc: denied { mount } for pid=278 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.386862][ T281] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 22.418468][ T30] audit: type=1400 audit(1742298455.772:73): avc: denied { relabelto } for pid=281 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.448642][ T30] audit: type=1400 audit(1742298455.772:74): avc: denied { write } for pid=281 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.484139][ T30] audit: type=1400 audit(1742298455.832:75): avc: denied { read } for pid=278 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.510960][ T278] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.086979][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.093855][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.101799][ T288] device bridge_slave_0 entered promiscuous mode [ 23.109570][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.116473][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.123839][ T288] device bridge_slave_1 entered promiscuous mode [ 23.204882][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.212002][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.219581][ T290] device bridge_slave_0 entered promiscuous mode [ 23.233700][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.240657][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.247905][ T292] device bridge_slave_0 entered promiscuous mode [ 23.254712][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.261869][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.269312][ T292] device bridge_slave_1 entered promiscuous mode [ 23.275656][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.282496][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.290680][ T290] device bridge_slave_1 entered promiscuous mode [ 23.298336][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.305232][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.312663][ T289] device bridge_slave_0 entered promiscuous mode [ 23.333965][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.341661][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.349927][ T289] device bridge_slave_1 entered promiscuous mode [ 23.404433][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.411396][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.418722][ T291] device bridge_slave_0 entered promiscuous mode [ 23.439862][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.446938][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.456020][ T291] device bridge_slave_1 entered promiscuous mode [ 23.617863][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.624712][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.632610][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.639490][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.653916][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.660799][ T288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.678916][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.685787][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.692878][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.700247][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.715975][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.723765][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.730977][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.738895][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.754662][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.761661][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.769715][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.776850][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.807051][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.815831][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.823577][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.830964][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.838343][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.845981][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.853083][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.860336][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.867466][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.875969][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.883310][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.902961][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.916848][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.925918][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.934060][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.941153][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.948564][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.957024][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.963952][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.994349][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.002613][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.011283][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.019494][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.026922][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.034383][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.042468][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.050743][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.057590][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.064818][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.088214][ T288] device veth0_vlan entered promiscuous mode [ 24.106053][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.114126][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.121030][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.128840][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.137136][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.143963][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.151453][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.159678][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.168068][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.176535][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.184146][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.191519][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.199413][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.207687][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.215876][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.222789][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.230733][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.240691][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.249343][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.258101][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.266107][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.274162][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.296851][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.305151][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.313134][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.321130][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.328901][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.337995][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.346743][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.356425][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.364721][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.372260][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.380597][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.389059][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.397010][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.406443][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.414817][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.422522][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.449061][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.457916][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.467074][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.479739][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.489385][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.498774][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.507298][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.515222][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.527470][ T288] device veth1_macvtap entered promiscuous mode [ 24.536418][ T289] device veth0_vlan entered promiscuous mode [ 24.549092][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.556966][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.564812][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.572902][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.581698][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.589336][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.598990][ T290] device veth0_vlan entered promiscuous mode [ 24.609662][ T289] device veth1_macvtap entered promiscuous mode [ 24.616734][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.625397][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.633554][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.642895][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.651051][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.663240][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.671767][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.682304][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.691561][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.707073][ T290] device veth1_macvtap entered promiscuous mode [ 24.720404][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.729806][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.738644][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.747459][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.755974][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.763463][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.772561][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.781077][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.789572][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.799481][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.808121][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.820292][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.828691][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.841764][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.850548][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.859363][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.878504][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.887726][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.888248][ T288] request_module fs-gadgetfs succeeded, but still no fs? [ 24.896498][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.912750][ T292] device veth0_vlan entered promiscuous mode [ 24.920312][ T291] device veth0_vlan entered promiscuous mode [ 24.930230][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.938453][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.954430][ T292] device veth1_macvtap entered promiscuous mode [ 24.975969][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.004045][ T291] device veth1_macvtap entered promiscuous mode [ 25.022153][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.033870][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.053291][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.061999][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.070568][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.079425][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.095021][ C0] hrtimer: interrupt took 34990 ns [ 25.110565][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.136880][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.166470][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.018369][ T346] device bridge0 entered promiscuous mode [ 26.165389][ T353] device wg2 entered promiscuous mode [ 26.331508][ T343] device syzkaller0 entered promiscuous mode [ 26.380611][ T364] device sit0 entered promiscuous mode [ 26.424979][ T363] device sit0 left promiscuous mode [ 27.390821][ T30] kauditd_printk_skb: 42 callbacks suppressed [ 27.390839][ T30] audit: type=1400 audit(1742298460.742:118): avc: denied { cpu } for pid=389 comm="syz.1.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 27.446506][ T387] device syzkaller0 entered promiscuous mode [ 27.493978][ T30] audit: type=1400 audit(1742298460.792:119): avc: denied { read } for pid=391 comm="syz.0.21" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.587740][ T30] audit: type=1400 audit(1742298460.792:120): avc: denied { open } for pid=391 comm="syz.0.21" path="/dev/ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.619813][ T401] device tunl0 entered promiscuous mode [ 27.636090][ T30] audit: type=1400 audit(1742298460.802:121): avc: denied { ioctl } for pid=391 comm="syz.0.21" path="/dev/ppp" dev="devtmpfs" ino=150 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.662141][ T30] audit: type=1400 audit(1742298460.992:122): avc: denied { create } for pid=394 comm="syz.2.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 27.684966][ T30] audit: type=1400 audit(1742298461.012:123): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 28.141389][ T415] device wg2 entered promiscuous mode [ 28.270530][ T409] device syzkaller0 entered promiscuous mode [ 28.357556][ T424] device sit0 entered promiscuous mode [ 28.535509][ T424] syz.3.28 (424) used greatest stack depth: 21528 bytes left [ 29.411842][ T30] audit: type=1400 audit(1742298462.762:124): avc: denied { create } for pid=454 comm="syz.3.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 29.450829][ T455] syz.3.39[455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.453114][ T455] syz.3.39[455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.558642][ T453] device syzkaller0 entered promiscuous mode [ 29.626050][ T448] device tunl0 entered promiscuous mode [ 29.852006][ T455] device pim6reg1 entered promiscuous mode [ 30.191228][ T467] device bridge0 entered promiscuous mode [ 30.276273][ T30] audit: type=1400 audit(1742298463.632:125): avc: denied { create } for pid=466 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 30.495859][ T472] device sit0 entered promiscuous mode [ 30.522031][ T465] syz.3.51 (465) used greatest stack depth: 21464 bytes left [ 30.647303][ T475] device wg2 entered promiscuous mode [ 31.313078][ T496] device tunl0 entered promiscuous mode [ 31.672676][ T510] syz.0.53[510] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.682410][ T510] syz.0.53[510] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.757053][ T30] audit: type=1400 audit(1742298465.112:126): avc: denied { create } for pid=514 comm="syz.2.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 32.166103][ T30] audit: type=1400 audit(1742298465.522:127): avc: denied { create } for pid=522 comm="syz.4.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 32.417834][ T539] device syzkaller0 entered promiscuous mode [ 32.674498][ T548] ref_ctr_offset mismatch. inode: 0x4b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 32.801199][ T548] GPL: port 1(erspan0) entered blocking state [ 32.810995][ T548] GPL: port 1(erspan0) entered disabled state [ 32.823624][ T548] device erspan0 entered promiscuous mode [ 32.846451][ T546] GPL: port 1(erspan0) entered blocking state [ 32.852618][ T546] GPL: port 1(erspan0) entered forwarding state [ 33.057989][ T575] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.065348][ T575] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.119631][ T575] device bridge_slave_1 left promiscuous mode [ 33.135208][ T575] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.144392][ T575] device bridge_slave_0 left promiscuous mode [ 33.164126][ T575] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.684783][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 33.684801][ T30] audit: type=1400 audit(1742298467.032:131): avc: denied { create } for pid=602 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 34.460779][ T630] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.470061][ T630] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.527703][ T630] device bridge0 left promiscuous mode [ 34.651377][ T640] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 34.978450][ T657] bond_slave_1: mtu less than device minimum [ 35.655582][ T685] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.663419][ T685] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.691137][ T685] device bridge0 left promiscuous mode [ 35.713538][ T685] device bridge_slave_1 left promiscuous mode [ 35.741744][ T685] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.772275][ T685] device bridge_slave_0 left promiscuous mode [ 35.802537][ T685] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.033716][ T30] audit: type=1400 audit(1742298469.382:132): avc: denied { create } for pid=694 comm="syz.2.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 36.567249][ T713] device syzkaller0 entered promiscuous mode [ 36.887808][ T721] device syzkaller0 entered promiscuous mode [ 36.923397][ T723] device wg2 left promiscuous mode [ 37.434864][ T729] device wg2 entered promiscuous mode [ 37.705237][ T743] bond_slave_1: mtu less than device minimum [ 37.845519][ T751] device bridge_slave_1 left promiscuous mode [ 37.851660][ T751] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.926823][ T751] device bridge_slave_0 left promiscuous mode [ 37.964798][ T751] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.351905][ T765] device wg2 left promiscuous mode [ 38.421270][ T765] device wg2 entered promiscuous mode [ 39.009483][ T30] audit: type=1400 audit(1742298472.362:133): avc: denied { write } for pid=781 comm="syz.0.127" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 39.341017][ T790] device wg2 entered promiscuous mode [ 39.688949][ T806] device syzkaller0 entered promiscuous mode [ 39.891957][ T818] device syzkaller0 entered promiscuous mode [ 40.023191][ T831] device pim6reg1 entered promiscuous mode [ 40.085106][ T30] audit: type=1400 audit(1742298473.432:134): avc: denied { create } for pid=830 comm="syz.1.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 40.141354][ T844] device wg2 left promiscuous mode [ 40.194887][ T845] device syzkaller0 left promiscuous mode [ 40.250015][ T844] device wg2 entered promiscuous mode [ 40.277658][ T30] audit: type=1400 audit(1742298473.632:135): avc: denied { create } for pid=848 comm="syz.2.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 40.385284][ T30] audit: type=1400 audit(1742298473.632:136): avc: denied { setopt } for pid=848 comm="syz.2.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 41.048669][ T30] audit: type=1400 audit(1742298474.402:137): avc: denied { write } for pid=860 comm="syz.0.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 41.141311][ T30] audit: type=1400 audit(1742298474.402:138): avc: denied { read } for pid=860 comm="syz.0.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 41.194425][ T868] device pim6reg1 entered promiscuous mode [ 41.651005][ T887] device veth1_macvtap left promiscuous mode [ 41.704014][ T887] device macsec0 entered promiscuous mode [ 41.803348][ T873] syz.1.151 (873) used greatest stack depth: 21336 bytes left [ 41.860102][ T892] device wg2 left promiscuous mode [ 41.956241][ T893] device wg2 entered promiscuous mode [ 43.072091][ T924] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.079669][ T924] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.157469][ T924] device bridge_slave_1 left promiscuous mode [ 43.168678][ T924] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.181944][ T924] device bridge_slave_0 left promiscuous mode [ 43.192549][ T924] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.995235][ T30] audit: type=1400 audit(1742298478.342:139): avc: denied { append } for pid=982 comm="syz.0.183" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 45.543370][ T1006] syz.3.193[1006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.543452][ T1006] syz.3.193[1006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.148078][ T1032] device sit0 left promiscuous mode [ 46.233479][ T1037] device sit0 entered promiscuous mode [ 46.548731][ T1053] device syzkaller0 entered promiscuous mode [ 47.506155][ T1055] syz.1.204 (1055) used greatest stack depth: 21080 bytes left [ 48.633123][ T1105] device pim6reg1 entered promiscuous mode [ 48.695472][ T1109] tap0: tun_chr_ioctl cmd 1074812118 [ 49.309758][ T1136] device pim6reg1 entered promiscuous mode [ 49.999955][ T30] audit: type=1400 audit(1742298483.352:140): avc: denied { create } for pid=1154 comm="syz.2.231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 50.189545][ T1163] device syzkaller0 entered promiscuous mode [ 52.214997][ C0] sched: RT throttling activated [ 53.417925][ T30] audit: type=1400 audit(1742298486.772:141): avc: denied { create } for pid=1189 comm="syz.4.240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 54.008526][ T1215] device syzkaller0 entered promiscuous mode [ 54.269647][ T1236] device veth1_macvtap left promiscuous mode [ 54.589254][ T30] audit: type=1400 audit(1742298487.942:142): avc: denied { create } for pid=1247 comm="syz.4.254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 54.968673][ T1248] device syzkaller0 entered promiscuous mode [ 55.323236][ T1281] device pim6reg1 entered promiscuous mode [ 55.942658][ T30] audit: type=1400 audit(1742298489.292:143): avc: denied { write } for pid=1337 comm="syz.2.281" name="cgroup.subtree_control" dev="cgroup2" ino=276 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 56.064014][ T30] audit: type=1400 audit(1742298489.342:144): avc: denied { open } for pid=1337 comm="syz.2.281" path="" dev="cgroup2" ino=276 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 56.090357][ T30] audit: type=1400 audit(1742298489.412:145): avc: denied { tracepoint } for pid=1340 comm="syz.4.282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 57.111597][ T30] audit: type=1400 audit(1742298490.462:146): avc: denied { create } for pid=1375 comm="syz.0.293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 57.144045][ T1374] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.152421][ T1374] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.170675][ T1379] device bridge_slave_1 left promiscuous mode [ 57.183005][ T1379] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.206204][ T1379] device bridge_slave_0 left promiscuous mode [ 57.227199][ T1379] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.711645][ T1415] device veth1_macvtap left promiscuous mode [ 57.863559][ T1419] device veth1_macvtap entered promiscuous mode [ 57.895336][ T1419] device macsec0 entered promiscuous mode [ 58.327717][ T30] audit: type=1400 audit(1742298491.682:147): avc: denied { create } for pid=1442 comm="syz.0.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 58.426085][ T30] audit: type=1400 audit(1742298491.762:148): avc: denied { create } for pid=1446 comm="syz.2.313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 59.527451][ T1485] device veth0_vlan left promiscuous mode [ 59.540194][ T1485] device veth0_vlan entered promiscuous mode [ 59.568349][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.642181][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 59.653721][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 60.636134][ T30] audit: type=1400 audit(1742298493.992:149): avc: denied { create } for pid=1526 comm="syz.1.339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 61.133670][ T30] audit: type=1400 audit(1742298494.482:150): avc: denied { ioctl } for pid=1554 comm="syz.4.346" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 61.776931][ T1574] device veth1_macvtap left promiscuous mode [ 64.309113][ T1650] syz.4.372 (1650) used greatest stack depth: 20888 bytes left [ 65.342509][ T1712] device veth0_vlan left promiscuous mode [ 65.372500][ T1712] device veth0_vlan entered promiscuous mode [ 68.187979][ T30] audit: type=1400 audit(1742298501.542:151): avc: denied { create } for pid=1824 comm="syz.1.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 68.612283][ T30] audit: type=1400 audit(1742298501.962:152): avc: denied { create } for pid=1844 comm="syz.3.428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 69.037972][ T1869] Â: renamed from pim6reg1 [ 69.526796][ T1908] device sit0 left promiscuous mode [ 70.039390][ T1951] device wg2 left promiscuous mode [ 70.823953][ T1982] bond_slave_1: mtu less than device minimum [ 71.022202][ T1993] device sit0 entered promiscuous mode [ 71.686637][ T2019] syz.3.476[2019] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.686721][ T2019] syz.3.476[2019] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.907203][ T2034] device syzkaller0 entered promiscuous mode [ 72.854494][ T2071] device syzkaller0 entered promiscuous mode [ 73.194611][ T2075] device pim6reg1 entered promiscuous mode [ 73.290415][ T2078] device sit0 left promiscuous mode [ 73.359472][ T2078] device sit0 entered promiscuous mode [ 74.873722][ T2127] device veth1_macvtap left promiscuous mode [ 75.881139][ T2157] device syzkaller0 entered promiscuous mode [ 76.084656][ T2168] device pim6reg1 entered promiscuous mode [ 76.569758][ T2197] device syzkaller0 entered promiscuous mode [ 76.762160][ T2204] device pim6reg1 entered promiscuous mode [ 77.031621][ T2213] device syzkaller0 entered promiscuous mode [ 77.599163][ T2231] ref_ctr_offset mismatch. inode: 0x25a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 77.896292][ T2248] device veth0_vlan left promiscuous mode [ 77.956089][ T2248] device veth0_vlan entered promiscuous mode [ 79.364250][ T2321] device pim6reg1 entered promiscuous mode [ 79.793829][ T2345] device wg2 left promiscuous mode [ 79.889820][ T2353] device wg2 entered promiscuous mode [ 80.013274][ T2358] syz.4.576[2358] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.013351][ T2358] syz.4.576[2358] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.520791][ T2378] device wg2 left promiscuous mode [ 80.723030][ T2378] device wg2 entered promiscuous mode [ 81.068863][ T2388] device syzkaller0 entered promiscuous mode [ 81.611007][ T2408] device pim6reg1 entered promiscuous mode [ 82.138472][ T2447] device syzkaller0 entered promiscuous mode [ 82.660703][ T30] audit: type=1400 audit(1742298516.012:153): avc: denied { create } for pid=2465 comm="syz.1.607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 83.094406][ T2481] device pim6reg1 entered promiscuous mode [ 83.637283][ T30] audit: type=1400 audit(1742298516.992:154): avc: denied { ioctl } for pid=2486 comm="syz.1.624" path="socket:[23866]" dev="sockfs" ino=23866 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 83.841136][ T2491] device sit0 left promiscuous mode [ 84.026252][ T2502] device wg2 left promiscuous mode [ 84.222361][ T2522] device wg2 entered promiscuous mode [ 85.367132][ T2573] device sit0 entered promiscuous mode [ 85.815502][ T2608] device sit0 left promiscuous mode [ 85.918619][ T2608] device sit0 entered promiscuous mode [ 87.159206][ T2673] device syzkaller0 entered promiscuous mode [ 91.211078][ T2785] device sit0 entered promiscuous mode [ 92.736736][ T2867] device syzkaller0 entered promiscuous mode [ 92.746817][ T30] audit: type=1400 audit(1742298526.102:155): avc: denied { create } for pid=2863 comm="syz.2.731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 92.774256][ T2865] bond_slave_1: mtu less than device minimum [ 92.843785][ T2868] bond_slave_1: mtu less than device minimum [ 93.055794][ T2885] device syzkaller0 entered promiscuous mode [ 94.046585][ T2930] device pim6reg1 entered promiscuous mode [ 94.575482][ T2952] device pim6reg1 entered promiscuous mode [ 95.102690][ T2978] device pim6reg1 entered promiscuous mode [ 95.710464][ T2997] tap0: tun_chr_ioctl cmd 2147767521 [ 95.825652][ T3008] device pim6reg1 entered promiscuous mode [ 96.083863][ T3018] device syzkaller0 entered promiscuous mode [ 96.672741][ T3047] device sit0 left promiscuous mode [ 96.787149][ T3058] device sit0 entered promiscuous mode [ 97.539948][ T3085] device pim6reg1 entered promiscuous mode [ 98.153519][ T30] audit: type=1400 audit(1742298531.502:156): avc: denied { create } for pid=3146 comm="syz.1.819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 98.210682][ T30] audit: type=1400 audit(1742298531.562:157): avc: denied { append } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 98.257233][ T30] audit: type=1400 audit(1742298531.562:158): avc: denied { open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 98.303787][ T30] audit: type=1400 audit(1742298531.562:159): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 99.010993][ T3203] device sit0 left promiscuous mode [ 99.306664][ T30] audit: type=1400 audit(1742298532.662:160): avc: denied { create } for pid=3221 comm="syz.0.839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 99.452633][ T3224] device sit0 entered promiscuous mode [ 100.410202][ T3297] device veth0_vlan left promiscuous mode [ 100.438939][ T3297] device veth0_vlan entered promiscuous mode [ 100.544317][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.553220][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.575697][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.635957][ T3310] device veth0_vlan left promiscuous mode [ 100.655274][ T3310] device veth0_vlan entered promiscuous mode [ 100.687089][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.708569][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.721145][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.797826][ T3313] bond_slave_1: mtu less than device minimum [ 101.768376][ T30] audit: type=1400 audit(1742298534.762:161): avc: denied { create } for pid=3320 comm="syz.3.867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 101.866911][ T30] audit: type=1400 audit(1742298535.192:162): avc: denied { create } for pid=3331 comm="syz.2.870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 102.116001][ T3341] device wg2 entered promiscuous mode [ 105.624115][ T30] audit: type=1400 audit(1742298538.972:163): avc: denied { create } for pid=3491 comm="syz.1.921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 106.356057][ T3525] device veth0_vlan left promiscuous mode [ 106.389625][ T3525] device veth0_vlan entered promiscuous mode [ 106.435314][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 106.456214][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 106.496552][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 109.621028][ T3654] syz.3.971[3654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.621154][ T3654] syz.3.971[3654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.550512][ T3706] device veth0_vlan left promiscuous mode [ 111.771090][ T3706] device veth0_vlan entered promiscuous mode [ 111.839126][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 111.860796][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 111.889411][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.035266][ T3729] device sit0 entered promiscuous mode [ 112.645356][ T3749] syz.3.1004[3749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.645438][ T3749] syz.3.1004[3749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.074809][ T3768] device veth0_vlan left promiscuous mode [ 113.178811][ T3768] device veth0_vlan entered promiscuous mode [ 113.257129][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 113.275968][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 113.287840][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 113.953342][ T3801] FAULT_INJECTION: forcing a failure. [ 113.953342][ T3801] name failslab, interval 1, probability 0, space 0, times 1 [ 113.971593][ T3801] CPU: 0 PID: 3801 Comm: syz.3.1024 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 113.981414][ T3801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 113.991477][ T3801] Call Trace: [ 113.996847][ T3801] [ 113.999961][ T3801] dump_stack_lvl+0x151/0x1c0 [ 114.005404][ T3801] ? io_uring_drop_tctx_refs+0x190/0x190 [ 114.011397][ T3801] dump_stack+0x15/0x20 [ 114.015990][ T3801] should_fail+0x3c6/0x510 [ 114.020448][ T3801] __should_failslab+0xa4/0xe0 [ 114.025186][ T3801] ? getname_flags+0xba/0x520 [ 114.030134][ T3801] should_failslab+0x9/0x20 [ 114.034800][ T3801] slab_pre_alloc_hook+0x37/0xd0 [ 114.041282][ T3801] ? getname_flags+0xba/0x520 [ 114.045981][ T3801] kmem_cache_alloc+0x44/0x250 [ 114.051263][ T3801] getname_flags+0xba/0x520 [ 114.055690][ T3801] getname+0x19/0x20 [ 114.059553][ T3801] do_sys_openat2+0xd7/0x820 [ 114.064199][ T3801] ? wait_for_completion_killable_timeout+0x10/0x10 [ 114.070800][ T3801] ? __mutex_lock_slowpath+0x10/0x10 [ 114.077144][ T3801] ? do_sys_open+0x220/0x220 [ 114.082532][ T3801] ? __kasan_check_write+0x14/0x20 [ 114.087659][ T3801] ? ksys_write+0x260/0x2c0 [ 114.091945][ T3801] ? exc_page_fault+0x47a/0x7f0 [ 114.096766][ T3801] __x64_sys_openat+0x243/0x290 [ 114.101562][ T3801] ? __ia32_sys_open+0x270/0x270 [ 114.106698][ T3801] ? debug_smp_processor_id+0x17/0x20 [ 114.112051][ T3801] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 114.118488][ T3801] ? exit_to_user_mode_prepare+0x39/0xa0 [ 114.124168][ T3801] x64_sys_call+0x6bf/0x9a0 [ 114.128954][ T3801] do_syscall_64+0x3b/0xb0 [ 114.133194][ T3801] ? clear_bhb_loop+0x35/0x90 [ 114.139441][ T3801] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 114.145552][ T3801] RIP: 0033:0x7f8e776aa169 [ 114.149972][ T3801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 114.170127][ T3801] RSP: 002b:00007f8e75d14038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 114.179855][ T3801] RAX: ffffffffffffffda RBX: 00007f8e778c2fa0 RCX: 00007f8e776aa169 [ 114.189257][ T3801] RDX: 00000000001c1341 RSI: 0000400000000040 RDI: ffffffffffffff9c [ 114.197635][ T3801] RBP: 00007f8e75d14090 R08: 0000000000000000 R09: 0000000000000000 [ 114.206156][ T3801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 114.214322][ T3801] R13: 0000000000000001 R14: 00007f8e778c2fa0 R15: 00007ffd4f4a53c8 [ 114.223145][ T3801] [ 115.135111][ T30] audit: type=1400 audit(1742298548.482:164): avc: denied { create } for pid=3864 comm="syz.3.1044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 115.549329][ T3909] FAULT_INJECTION: forcing a failure. [ 115.549329][ T3909] name failslab, interval 1, probability 0, space 0, times 0 [ 115.605080][ T3909] CPU: 0 PID: 3909 Comm: syz.2.1059 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 115.615850][ T3909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 115.625746][ T3909] Call Trace: [ 115.629080][ T3909] [ 115.631845][ T3909] dump_stack_lvl+0x151/0x1c0 [ 115.636453][ T3909] ? io_uring_drop_tctx_refs+0x190/0x190 [ 115.642149][ T3909] dump_stack+0x15/0x20 [ 115.646671][ T3909] should_fail+0x3c6/0x510 [ 115.651039][ T3909] __should_failslab+0xa4/0xe0 [ 115.655658][ T3909] ? getname_flags+0xba/0x520 [ 115.660301][ T3909] should_failslab+0x9/0x20 [ 115.665345][ T3909] slab_pre_alloc_hook+0x37/0xd0 [ 115.670231][ T3909] ? getname_flags+0xba/0x520 [ 115.674835][ T3909] kmem_cache_alloc+0x44/0x250 [ 115.679705][ T3909] getname_flags+0xba/0x520 [ 115.684232][ T3909] getname+0x19/0x20 [ 115.688186][ T3909] do_sys_openat2+0xd7/0x820 [ 115.692581][ T3909] ? wait_for_completion_killable_timeout+0x10/0x10 [ 115.699388][ T3909] ? __mutex_lock_slowpath+0x10/0x10 [ 115.704600][ T3909] ? do_sys_open+0x220/0x220 [ 115.709108][ T3909] ? __kasan_check_write+0x14/0x20 [ 115.714315][ T3909] ? ksys_write+0x260/0x2c0 [ 115.718660][ T3909] ? exc_page_fault+0x47a/0x7f0 [ 115.723554][ T3909] __x64_sys_openat+0x243/0x290 [ 115.728214][ T3909] ? __ia32_sys_open+0x270/0x270 [ 115.733286][ T3909] ? debug_smp_processor_id+0x17/0x20 [ 115.739321][ T3909] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 115.745322][ T3909] ? exit_to_user_mode_prepare+0x39/0xa0 [ 115.751037][ T3909] x64_sys_call+0x6bf/0x9a0 [ 115.755346][ T3909] do_syscall_64+0x3b/0xb0 [ 115.759580][ T3909] ? clear_bhb_loop+0x35/0x90 [ 115.764354][ T3909] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 115.770348][ T3909] RIP: 0033:0x7f1e9d7b6169 [ 115.775200][ T3909] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 115.795650][ T3909] RSP: 002b:00007f1e9be20038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 115.804161][ T3909] RAX: ffffffffffffffda RBX: 00007f1e9d9cefa0 RCX: 00007f1e9d7b6169 [ 115.812229][ T3909] RDX: 0000000000020f42 RSI: 0000400000000040 RDI: ffffffffffffff9c [ 115.820302][ T3909] RBP: 00007f1e9be20090 R08: 0000000000000000 R09: 0000000000000000 [ 115.828284][ T3909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.836095][ T3909] R13: 0000000000000001 R14: 00007f1e9d9cefa0 R15: 00007ffef700b528 [ 115.844092][ T3909] [ 115.857385][ T30] audit: type=1400 audit(1742298549.212:165): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 115.935621][ T30] audit: type=1400 audit(1742298549.212:166): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 116.025168][ T30] audit: type=1400 audit(1742298549.212:167): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 116.550496][ T3963] FAULT_INJECTION: forcing a failure. [ 116.550496][ T3963] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 116.644799][ T3963] CPU: 0 PID: 3963 Comm: syz.3.1079 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 116.654552][ T3963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 116.667181][ T3963] Call Trace: [ 116.670480][ T3963] [ 116.673738][ T3963] dump_stack_lvl+0x151/0x1c0 [ 116.678326][ T3963] ? io_uring_drop_tctx_refs+0x190/0x190 [ 116.684141][ T3963] dump_stack+0x15/0x20 [ 116.688448][ T3963] should_fail+0x3c6/0x510 [ 116.692794][ T3963] should_fail_usercopy+0x1a/0x20 [ 116.698100][ T3963] strncpy_from_user+0x24/0x2d0 [ 116.702879][ T3963] ? kmem_cache_alloc+0xf5/0x250 [ 116.707911][ T3963] getname_flags+0xf2/0x520 [ 116.712506][ T3963] getname+0x19/0x20 [ 116.716212][ T3963] do_sys_openat2+0xd7/0x820 [ 116.720724][ T3963] ? wait_for_completion_killable_timeout+0x10/0x10 [ 116.727387][ T3963] ? __mutex_lock_slowpath+0x10/0x10 [ 116.733020][ T3963] ? do_sys_open+0x220/0x220 [ 116.738379][ T3963] ? __kasan_check_write+0x14/0x20 [ 116.743419][ T3963] ? ksys_write+0x260/0x2c0 [ 116.747926][ T3963] ? exc_page_fault+0x47a/0x7f0 [ 116.752914][ T3963] __x64_sys_openat+0x243/0x290 [ 116.757861][ T3963] ? __ia32_sys_open+0x270/0x270 [ 116.762717][ T3963] ? debug_smp_processor_id+0x17/0x20 [ 116.769441][ T3963] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 116.775663][ T3963] ? exit_to_user_mode_prepare+0x39/0xa0 [ 116.782510][ T3963] x64_sys_call+0x6bf/0x9a0 [ 116.786850][ T3963] do_syscall_64+0x3b/0xb0 [ 116.791204][ T3963] ? clear_bhb_loop+0x35/0x90 [ 116.795730][ T3963] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 116.801805][ T3963] RIP: 0033:0x7f8e776aa169 [ 116.806225][ T3963] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 116.825931][ T3963] RSP: 002b:00007f8e75d14038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 116.834465][ T3963] RAX: ffffffffffffffda RBX: 00007f8e778c2fa0 RCX: 00007f8e776aa169 [ 116.843508][ T3963] RDX: 0000000000020f42 RSI: 0000400000000040 RDI: ffffffffffffff9c [ 116.851579][ T3963] RBP: 00007f8e75d14090 R08: 0000000000000000 R09: 0000000000000000 [ 116.859834][ T3963] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 116.869004][ T3963] R13: 0000000000000001 R14: 00007f8e778c2fa0 R15: 00007ffd4f4a53c8 [ 116.876895][ T3963] [ 116.936025][ T3974] ref_ctr_offset mismatch. inode: 0x479 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 117.237233][ T3988] device sit0 left promiscuous mode [ 117.384410][ T3989] device sit0 entered promiscuous mode [ 117.526064][ T4008] FAULT_INJECTION: forcing a failure. [ 117.526064][ T4008] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 117.568354][ T4008] CPU: 0 PID: 4008 Comm: syz.4.1093 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 117.578145][ T4008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 117.589025][ T4008] Call Trace: [ 117.592122][ T4008] [ 117.594896][ T4008] dump_stack_lvl+0x151/0x1c0 [ 117.600376][ T4008] ? io_uring_drop_tctx_refs+0x190/0x190 [ 117.606852][ T4008] dump_stack+0x15/0x20 [ 117.611159][ T4008] should_fail+0x3c6/0x510 [ 117.615801][ T4008] should_fail_usercopy+0x1a/0x20 [ 117.622095][ T4008] strncpy_from_user+0x24/0x2d0 [ 117.626906][ T4008] ? kmem_cache_alloc+0xf5/0x250 [ 117.632657][ T4008] getname_flags+0xf2/0x520 [ 117.637017][ T4008] getname+0x19/0x20 [ 117.641466][ T4008] do_sys_openat2+0xd7/0x820 [ 117.646414][ T4008] ? wait_for_completion_killable_timeout+0x10/0x10 [ 117.652835][ T4008] ? __mutex_lock_slowpath+0x10/0x10 [ 117.659421][ T4008] ? do_sys_open+0x220/0x220 [ 117.664025][ T4008] ? __kasan_check_write+0x14/0x20 [ 117.669196][ T4008] ? ksys_write+0x260/0x2c0 [ 117.673524][ T4008] ? exc_page_fault+0x47a/0x7f0 [ 117.678535][ T4008] __x64_sys_openat+0x243/0x290 [ 117.683300][ T4008] ? __ia32_sys_open+0x270/0x270 [ 117.688895][ T4008] ? debug_smp_processor_id+0x17/0x20 [ 117.694550][ T4008] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 117.702895][ T4008] ? exit_to_user_mode_prepare+0x39/0xa0 [ 117.708537][ T4008] x64_sys_call+0x6bf/0x9a0 [ 117.713954][ T4008] do_syscall_64+0x3b/0xb0 [ 117.718475][ T4008] ? clear_bhb_loop+0x35/0x90 [ 117.723280][ T4008] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 117.729674][ T4008] RIP: 0033:0x7f04ba36f169 [ 117.734248][ T4008] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 117.756207][ T4008] RSP: 002b:00007f04b89d9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 117.766453][ T4008] RAX: ffffffffffffffda RBX: 00007f04ba587fa0 RCX: 00007f04ba36f169 [ 117.777861][ T4008] RDX: 0000000000020f42 RSI: 0000400000000040 RDI: ffffffffffffff9c [ 117.787414][ T4008] RBP: 00007f04b89d9090 R08: 0000000000000000 R09: 0000000000000000 [ 117.796896][ T4008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 117.806032][ T4008] R13: 0000000000000001 R14: 00007f04ba587fa0 R15: 00007ffddc4f6078 [ 117.814733][ T4008] [ 117.994280][ T4027] bond_slave_1: mtu less than device minimum [ 118.130523][ T4040] device sit0 left promiscuous mode [ 119.738590][ T4082] FAULT_INJECTION: forcing a failure. [ 119.738590][ T4082] name failslab, interval 1, probability 0, space 0, times 0 [ 119.752993][ T4082] CPU: 0 PID: 4082 Comm: syz.3.1116 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 119.763338][ T4082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 119.773394][ T4082] Call Trace: [ 119.776830][ T4082] [ 119.779792][ T4082] dump_stack_lvl+0x151/0x1c0 [ 119.784742][ T4082] ? io_uring_drop_tctx_refs+0x190/0x190 [ 119.790298][ T4082] dump_stack+0x15/0x20 [ 119.794648][ T4082] should_fail+0x3c6/0x510 [ 119.800081][ T4082] __should_failslab+0xa4/0xe0 [ 119.804686][ T4082] ? security_file_alloc+0x29/0x120 [ 119.810145][ T4082] should_failslab+0x9/0x20 [ 119.815010][ T4082] slab_pre_alloc_hook+0x37/0xd0 [ 119.820047][ T4082] ? security_file_alloc+0x29/0x120 [ 119.825246][ T4082] kmem_cache_alloc+0x44/0x250 [ 119.829856][ T4082] security_file_alloc+0x29/0x120 [ 119.835208][ T4082] __alloc_file+0xb2/0x2a0 [ 119.839496][ T4082] alloc_empty_file+0x95/0x180 [ 119.844478][ T4082] path_openat+0xfe/0x2f40 [ 119.849057][ T4082] ? stack_trace_snprint+0xf0/0xf0 [ 119.854467][ T4082] ? kmem_cache_free+0x115/0x330 [ 119.860066][ T4082] ? __kasan_slab_alloc+0xc3/0xe0 [ 119.866481][ T4082] ? __kasan_slab_alloc+0xb1/0xe0 [ 119.872072][ T4082] ? slab_post_alloc_hook+0x53/0x2c0 [ 119.877892][ T4082] ? kmem_cache_alloc+0xf5/0x250 [ 119.882742][ T4082] ? getname_flags+0xba/0x520 [ 119.887291][ T4082] ? getname+0x19/0x20 [ 119.892630][ T4082] ? do_sys_openat2+0xd7/0x820 [ 119.897365][ T4082] ? __x64_sys_openat+0x243/0x290 [ 119.902314][ T4082] ? x64_sys_call+0x6bf/0x9a0 [ 119.907052][ T4082] ? do_syscall_64+0x3b/0xb0 [ 119.912338][ T4082] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 119.919770][ T4082] ? do_filp_open+0x460/0x460 [ 119.924369][ T4082] do_filp_open+0x21c/0x460 [ 119.928790][ T4082] ? vfs_tmpfile+0x2c0/0x2c0 [ 119.933235][ T4082] do_sys_openat2+0x13f/0x820 [ 119.937989][ T4082] ? wait_for_completion_killable_timeout+0x10/0x10 [ 119.945552][ T4082] ? __mutex_lock_slowpath+0x10/0x10 [ 119.951552][ T4082] ? do_sys_open+0x220/0x220 [ 119.956329][ T4082] ? __kasan_check_write+0x14/0x20 [ 119.963113][ T4082] ? ksys_write+0x260/0x2c0 [ 119.967688][ T4082] ? exc_page_fault+0x47a/0x7f0 [ 119.972657][ T4082] __x64_sys_openat+0x243/0x290 [ 119.977654][ T4082] ? __ia32_sys_open+0x270/0x270 [ 119.982756][ T4082] ? debug_smp_processor_id+0x17/0x20 [ 119.988045][ T4082] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 119.994120][ T4082] ? exit_to_user_mode_prepare+0x39/0xa0 [ 119.999603][ T4082] x64_sys_call+0x6bf/0x9a0 [ 120.004008][ T4082] do_syscall_64+0x3b/0xb0 [ 120.008359][ T4082] ? clear_bhb_loop+0x35/0x90 [ 120.012873][ T4082] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 120.019109][ T4082] RIP: 0033:0x7f8e776aa169 [ 120.023352][ T4082] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 120.044049][ T4082] RSP: 002b:00007f8e75d14038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 120.052271][ T4082] RAX: ffffffffffffffda RBX: 00007f8e778c2fa0 RCX: 00007f8e776aa169 [ 120.060321][ T4082] RDX: 0000000000020f42 RSI: 0000400000000040 RDI: ffffffffffffff9c [ 120.068183][ T4082] RBP: 00007f8e75d14090 R08: 0000000000000000 R09: 0000000000000000 [ 120.076063][ T4082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 120.084131][ T4082] R13: 0000000000000001 R14: 00007f8e778c2fa0 R15: 00007ffd4f4a53c8 [ 120.092401][ T4082] [ 120.569648][ T4125] FAULT_INJECTION: forcing a failure. [ 120.569648][ T4125] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 120.624903][ T4125] CPU: 1 PID: 4125 Comm: syz.4.1132 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 120.634732][ T4125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 120.644891][ T4125] Call Trace: [ 120.648017][ T4125] [ 120.650787][ T4125] dump_stack_lvl+0x151/0x1c0 [ 120.655306][ T4125] ? io_uring_drop_tctx_refs+0x190/0x190 [ 120.660813][ T4125] dump_stack+0x15/0x20 [ 120.664946][ T4125] should_fail+0x3c6/0x510 [ 120.669468][ T4125] should_fail_usercopy+0x1a/0x20 [ 120.674447][ T4125] _copy_to_user+0x20/0x90 [ 120.678693][ T4125] simple_read_from_buffer+0xc7/0x150 [ 120.683902][ T4125] proc_fail_nth_read+0x1a3/0x210 [ 120.688759][ T4125] ? proc_fault_inject_write+0x390/0x390 [ 120.694226][ T4125] ? fsnotify_perm+0x269/0x5b0 [ 120.698919][ T4125] ? security_file_permission+0x86/0xb0 [ 120.704292][ T4125] ? proc_fault_inject_write+0x390/0x390 [ 120.709855][ T4125] vfs_read+0x27d/0xd40 [ 120.714111][ T4125] ? kernel_read+0x1f0/0x1f0 [ 120.718528][ T4125] ? __kasan_check_write+0x14/0x20 [ 120.723476][ T4125] ? mutex_lock+0xb6/0x1e0 [ 120.727727][ T4125] ? wait_for_completion_killable_timeout+0x10/0x10 [ 120.734148][ T4125] ? __fdget_pos+0x2e7/0x3a0 [ 120.738574][ T4125] ? ksys_read+0x77/0x2c0 [ 120.742739][ T4125] ksys_read+0x199/0x2c0 [ 120.746829][ T4125] ? exc_page_fault+0x47a/0x7f0 [ 120.751507][ T4125] ? vfs_write+0x1110/0x1110 [ 120.755933][ T4125] ? debug_smp_processor_id+0x17/0x20 [ 120.761227][ T4125] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 120.767129][ T4125] __x64_sys_read+0x7b/0x90 [ 120.771466][ T4125] x64_sys_call+0x28/0x9a0 [ 120.775762][ T4125] do_syscall_64+0x3b/0xb0 [ 120.779972][ T4125] ? clear_bhb_loop+0x35/0x90 [ 120.784486][ T4125] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 120.790214][ T4125] RIP: 0033:0x7f04ba36db7c [ 120.794480][ T4125] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 120.814108][ T4125] RSP: 002b:00007f04b89d9030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 120.822552][ T4125] RAX: ffffffffffffffda RBX: 00007f04ba587fa0 RCX: 00007f04ba36db7c [ 120.830467][ T4125] RDX: 000000000000000f RSI: 00007f04b89d90a0 RDI: 0000000000000003 [ 120.838272][ T4125] RBP: 00007f04b89d9090 R08: 0000000000000000 R09: 0000000000000000 [ 120.846206][ T4125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 120.854100][ T4125] R13: 0000000000000001 R14: 00007f04ba587fa0 R15: 00007ffddc4f6078 [ 120.862113][ T4125] [ 124.017438][ T4258] device veth0_vlan left promiscuous mode [ 124.030468][ T4258] device veth0_vlan entered promiscuous mode [ 124.067690][ T702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 124.076376][ T702] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 124.084354][ T702] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 125.811253][ T30] audit: type=1400 audit(1742298559.162:168): avc: denied { create } for pid=4326 comm="syz.1.1202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 127.630296][ T4410] device sit0 left promiscuous mode [ 127.856454][ T4411] device sit0 entered promiscuous mode [ 128.762179][ T30] audit: type=1400 audit(1742298562.112:169): avc: denied { create } for pid=4475 comm="syz.0.1249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 129.094454][ T4493] device sit0 entered promiscuous mode [ 130.393620][ T4536] FAULT_INJECTION: forcing a failure. [ 130.393620][ T4536] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 130.551302][ T4538] device sit0 entered promiscuous mode [ 130.622052][ T4536] CPU: 1 PID: 4536 Comm: syz.0.1269 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 130.632844][ T4536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 130.643873][ T4536] Call Trace: [ 130.647253][ T4536] [ 130.650118][ T4536] dump_stack_lvl+0x151/0x1c0 [ 130.654981][ T4536] ? io_uring_drop_tctx_refs+0x190/0x190 [ 130.660706][ T4536] ? 0xffffffffa002a000 [ 130.666383][ T4536] dump_stack+0x15/0x20 [ 130.670691][ T4536] should_fail+0x3c6/0x510 [ 130.675082][ T4536] should_fail_alloc_page+0x5a/0x80 [ 130.680633][ T4536] prepare_alloc_pages+0x15c/0x700 [ 130.685764][ T4536] ? __alloc_pages_bulk+0xd80/0xd80 [ 130.691070][ T4536] __alloc_pages+0x18c/0x8f0 [ 130.697172][ T4536] ? prep_new_page+0x110/0x110 [ 130.701863][ T4536] shmem_alloc_and_acct_page+0x4bd/0xa80 [ 130.707708][ T4536] ? shmem_swapin_page+0x1680/0x1680 [ 130.712887][ T4536] ? xas_start+0x333/0x3f0 [ 130.718540][ T4536] ? xas_load+0x2a9/0x2d0 [ 130.722657][ T4536] ? pagecache_get_page+0xdc2/0xeb0 [ 130.728172][ T4536] ? page_cache_prev_miss+0x410/0x410 [ 130.733380][ T4536] shmem_getpage_gfp+0x1388/0x23c0 [ 130.738502][ T4536] ? shmem_getpage+0xa0/0xa0 [ 130.743350][ T4536] ? fault_in_safe_writeable+0x240/0x240 [ 130.749760][ T4536] ? kasan_set_track+0x5d/0x70 [ 130.754591][ T4536] ? kasan_set_free_info+0x23/0x40 [ 130.759487][ T4536] ? ____kasan_slab_free+0x126/0x160 [ 130.764774][ T4536] ? __kasan_slab_free+0x11/0x20 [ 130.769729][ T4536] ? kmem_cache_free+0x115/0x330 [ 130.775924][ T4536] shmem_write_begin+0xca/0x1b0 [ 130.781811][ T4536] generic_perform_write+0x2de/0x750 [ 130.788355][ T4536] ? __mark_inode_dirty+0x26b/0xa50 [ 130.794587][ T4536] ? grab_cache_page_write_begin+0xa0/0xa0 [ 130.800243][ T4536] ? file_remove_privs+0x610/0x610 [ 130.806004][ T4536] ? rwsem_write_trylock+0x153/0x340 [ 130.811069][ T4536] ? rwsem_mark_wake+0x770/0x770 [ 130.816004][ T4536] __generic_file_write_iter+0x25b/0x4b0 [ 130.821713][ T4536] generic_file_write_iter+0xaf/0x1c0 [ 130.827256][ T4536] vfs_write+0xd5d/0x1110 [ 130.831472][ T4536] ? file_end_write+0x1c0/0x1c0 [ 130.836437][ T4536] ? mutex_lock+0xb6/0x1e0 [ 130.841797][ T4536] ? wait_for_completion_killable_timeout+0x10/0x10 [ 130.848805][ T4536] ? __fdget_pos+0x2e7/0x3a0 [ 130.853336][ T4536] ? ksys_write+0x77/0x2c0 [ 130.857892][ T4536] ksys_write+0x199/0x2c0 [ 130.862219][ T4536] ? __ia32_sys_read+0x90/0x90 [ 130.867147][ T4536] ? debug_smp_processor_id+0x17/0x20 [ 130.873165][ T4536] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 130.879173][ T4536] __x64_sys_write+0x7b/0x90 [ 130.884076][ T4536] x64_sys_call+0x2f/0x9a0 [ 130.888595][ T4536] do_syscall_64+0x3b/0xb0 [ 130.893202][ T4536] ? clear_bhb_loop+0x35/0x90 [ 130.898539][ T4536] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 130.904826][ T4536] RIP: 0033:0x7f2d46c18169 [ 130.909102][ T4536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 130.931395][ T4536] RSP: 002b:00007f2d45282038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 130.940300][ T4536] RAX: ffffffffffffffda RBX: 00007f2d46e30fa0 RCX: 00007f2d46c18169 [ 130.948765][ T4536] RDX: 000000000000ee8a RSI: 0000400000000680 RDI: 0000000000000003 [ 130.956908][ T4536] RBP: 00007f2d45282090 R08: 0000000000000000 R09: 0000000000000000 [ 130.965011][ T4536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 130.973131][ T4536] R13: 0000000000000000 R14: 00007f2d46e30fa0 R15: 00007ffd34d9a2c8 [ 130.981078][ T4536] [ 131.848696][ T4591] FAULT_INJECTION: forcing a failure. [ 131.848696][ T4591] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 131.867317][ T4591] CPU: 0 PID: 4591 Comm: syz.0.1289 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 131.878558][ T4591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 131.889884][ T4591] Call Trace: [ 131.894061][ T4591] [ 131.899463][ T4591] dump_stack_lvl+0x151/0x1c0 [ 131.904603][ T4591] ? io_uring_drop_tctx_refs+0x190/0x190 [ 131.911815][ T4591] ? __kasan_check_read+0x11/0x20 [ 131.917602][ T4591] dump_stack+0x15/0x20 [ 131.921663][ T4591] should_fail+0x3c6/0x510 [ 131.926052][ T4591] should_fail_usercopy+0x1a/0x20 [ 131.932339][ T4591] copy_page_from_iter_atomic+0x423/0x10e0 [ 131.938721][ T4591] ? pipe_zero+0x4e0/0x4e0 [ 131.943964][ T4591] ? kasan_set_track+0x5d/0x70 [ 131.948826][ T4591] ? kasan_set_free_info+0x23/0x40 [ 131.956035][ T4591] ? ____kasan_slab_free+0x126/0x160 [ 131.961495][ T4591] ? __kasan_slab_free+0x11/0x20 [ 131.967441][ T4591] ? kmem_cache_free+0x115/0x330 [ 131.973337][ T4591] generic_perform_write+0x360/0x750 [ 131.979781][ T4591] ? __mark_inode_dirty+0x26b/0xa50 [ 131.985148][ T4591] ? grab_cache_page_write_begin+0xa0/0xa0 [ 131.990792][ T4591] ? file_remove_privs+0x610/0x610 [ 131.996227][ T4591] ? rwsem_write_trylock+0x153/0x340 [ 132.001469][ T4591] ? rwsem_mark_wake+0x770/0x770 [ 132.008457][ T4591] __generic_file_write_iter+0x25b/0x4b0 [ 132.014285][ T4591] generic_file_write_iter+0xaf/0x1c0 [ 132.020485][ T4591] vfs_write+0xd5d/0x1110 [ 132.025379][ T4591] ? file_end_write+0x1c0/0x1c0 [ 132.030779][ T4591] ? mutex_lock+0xb6/0x1e0 [ 132.035231][ T4591] ? wait_for_completion_killable_timeout+0x10/0x10 [ 132.042173][ T4591] ? __fdget_pos+0x2e7/0x3a0 [ 132.047475][ T4591] ? ksys_write+0x77/0x2c0 [ 132.051980][ T4591] ksys_write+0x199/0x2c0 [ 132.056611][ T4591] ? __ia32_sys_read+0x90/0x90 [ 132.063026][ T4591] ? debug_smp_processor_id+0x17/0x20 [ 132.068599][ T4591] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 132.074628][ T4591] __x64_sys_write+0x7b/0x90 [ 132.079271][ T4591] x64_sys_call+0x2f/0x9a0 [ 132.084376][ T4591] do_syscall_64+0x3b/0xb0 [ 132.091390][ T4591] ? clear_bhb_loop+0x35/0x90 [ 132.095974][ T4591] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 132.101869][ T4591] RIP: 0033:0x7f2d46c18169 [ 132.106780][ T4591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 132.127995][ T4591] RSP: 002b:00007f2d45282038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 132.138001][ T4591] RAX: ffffffffffffffda RBX: 00007f2d46e30fa0 RCX: 00007f2d46c18169 [ 132.146368][ T4591] RDX: 000000000000ee8a RSI: 0000400000000680 RDI: 0000000000000003 [ 132.155903][ T4591] RBP: 00007f2d45282090 R08: 0000000000000000 R09: 0000000000000000 [ 132.163796][ T4591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 132.174648][ T4591] R13: 0000000000000000 R14: 00007f2d46e30fa0 R15: 00007ffd34d9a2c8 [ 132.184890][ T4591] [ 132.341606][ T4589] device sit0 left promiscuous mode [ 132.516946][ T4593] device sit0 entered promiscuous mode [ 133.060598][ T4632] FAULT_INJECTION: forcing a failure. [ 133.060598][ T4632] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 133.075026][ T4632] CPU: 0 PID: 4632 Comm: syz.2.1302 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 133.085417][ T4632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 133.095650][ T4632] Call Trace: [ 133.098771][ T4632] [ 133.101646][ T4632] dump_stack_lvl+0x151/0x1c0 [ 133.106380][ T4632] ? io_uring_drop_tctx_refs+0x190/0x190 [ 133.112682][ T4632] ? __kasan_check_read+0x11/0x20 [ 133.117716][ T4632] dump_stack+0x15/0x20 [ 133.123161][ T4632] should_fail+0x3c6/0x510 [ 133.128019][ T4632] should_fail_usercopy+0x1a/0x20 [ 133.134125][ T4632] copy_page_from_iter_atomic+0x423/0x10e0 [ 133.141299][ T4632] ? pipe_zero+0x4e0/0x4e0 [ 133.147733][ T4632] generic_perform_write+0x360/0x750 [ 133.157274][ T4632] ? __mark_inode_dirty+0x26b/0xa50 [ 133.163291][ T4632] ? grab_cache_page_write_begin+0xa0/0xa0 [ 133.169615][ T4632] ? file_remove_privs+0x610/0x610 [ 133.174974][ T4632] ? rwsem_write_trylock+0x153/0x340 [ 133.180268][ T4632] ? rwsem_mark_wake+0x770/0x770 [ 133.185910][ T4632] __generic_file_write_iter+0x25b/0x4b0 [ 133.192097][ T4632] generic_file_write_iter+0xaf/0x1c0 [ 133.199395][ T4632] vfs_write+0xd5d/0x1110 [ 133.203994][ T4632] ? file_end_write+0x1c0/0x1c0 [ 133.208859][ T4632] ? mutex_lock+0xb6/0x1e0 [ 133.213878][ T4632] ? wait_for_completion_killable_timeout+0x10/0x10 [ 133.221528][ T4632] ? __fdget_pos+0x2e7/0x3a0 [ 133.225990][ T4632] ? ksys_write+0x77/0x2c0 [ 133.231710][ T4632] ksys_write+0x199/0x2c0 [ 133.235874][ T4632] ? __ia32_sys_read+0x90/0x90 [ 133.240557][ T4632] ? debug_smp_processor_id+0x17/0x20 [ 133.246299][ T4632] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 133.253291][ T4632] __x64_sys_write+0x7b/0x90 [ 133.257827][ T4632] x64_sys_call+0x2f/0x9a0 [ 133.263662][ T4632] do_syscall_64+0x3b/0xb0 [ 133.268713][ T4632] ? clear_bhb_loop+0x35/0x90 [ 133.274511][ T4632] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 133.280268][ T4632] RIP: 0033:0x7f1e9d7b6169 [ 133.285032][ T4632] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 133.306739][ T4632] RSP: 002b:00007f1e9be20038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 133.315061][ T4632] RAX: ffffffffffffffda RBX: 00007f1e9d9cefa0 RCX: 00007f1e9d7b6169 [ 133.323634][ T4632] RDX: 000000000000ee8a RSI: 0000400000000680 RDI: 0000000000000003 [ 133.332457][ T4632] RBP: 00007f1e9be20090 R08: 0000000000000000 R09: 0000000000000000 [ 133.340546][ T4632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 133.349827][ T4632] R13: 0000000000000000 R14: 00007f1e9d9cefa0 R15: 00007ffef700b528 [ 133.359707][ T4632] [ 133.754919][ T4665] device wg2 left promiscuous mode [ 133.774939][ T4669] FAULT_INJECTION: forcing a failure. [ 133.774939][ T4669] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 133.791792][ T4669] CPU: 0 PID: 4669 Comm: syz.0.1315 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 133.803665][ T4669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 133.816230][ T4669] Call Trace: [ 133.819343][ T4669] [ 133.822138][ T4669] dump_stack_lvl+0x151/0x1c0 [ 133.826642][ T4669] ? io_uring_drop_tctx_refs+0x190/0x190 [ 133.832307][ T4669] ? __kasan_check_read+0x11/0x20 [ 133.837980][ T4669] dump_stack+0x15/0x20 [ 133.842071][ T4669] should_fail+0x3c6/0x510 [ 133.848235][ T4669] should_fail_usercopy+0x1a/0x20 [ 133.853266][ T4669] copy_page_from_iter_atomic+0x423/0x10e0 [ 133.861839][ T4669] ? pipe_zero+0x4e0/0x4e0 [ 133.866127][ T4669] generic_perform_write+0x360/0x750 [ 133.871286][ T4669] ? __mark_inode_dirty+0x26b/0xa50 [ 133.876805][ T4669] ? grab_cache_page_write_begin+0xa0/0xa0 [ 133.885316][ T4669] ? file_remove_privs+0x610/0x610 [ 133.891815][ T4669] ? rwsem_write_trylock+0x153/0x340 [ 133.898583][ T4669] ? rwsem_mark_wake+0x770/0x770 [ 133.903429][ T4669] __generic_file_write_iter+0x25b/0x4b0 [ 133.910035][ T4669] generic_file_write_iter+0xaf/0x1c0 [ 133.916201][ T4669] vfs_write+0xd5d/0x1110 [ 133.920457][ T4669] ? file_end_write+0x1c0/0x1c0 [ 133.925147][ T4669] ? mutex_lock+0xb6/0x1e0 [ 133.929603][ T4669] ? wait_for_completion_killable_timeout+0x10/0x10 [ 133.937367][ T4669] ? __fdget_pos+0x2e7/0x3a0 [ 133.942306][ T4669] ? ksys_write+0x77/0x2c0 [ 133.946700][ T4669] ksys_write+0x199/0x2c0 [ 133.951198][ T4669] ? __ia32_sys_read+0x90/0x90 [ 133.956416][ T4669] ? debug_smp_processor_id+0x17/0x20 [ 133.962586][ T4669] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 133.968889][ T4669] __x64_sys_write+0x7b/0x90 [ 133.973816][ T4669] x64_sys_call+0x2f/0x9a0 [ 133.978241][ T4669] do_syscall_64+0x3b/0xb0 [ 133.982603][ T4669] ? clear_bhb_loop+0x35/0x90 [ 133.987578][ T4669] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 133.993690][ T4669] RIP: 0033:0x7f2d46c18169 [ 133.999397][ T4669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 134.022576][ T4669] RSP: 002b:00007f2d45282038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 134.035041][ T4669] RAX: ffffffffffffffda RBX: 00007f2d46e30fa0 RCX: 00007f2d46c18169 [ 134.046181][ T4669] RDX: 000000000000ee8a RSI: 0000400000000680 RDI: 0000000000000003 [ 134.054552][ T4669] RBP: 00007f2d45282090 R08: 0000000000000000 R09: 0000000000000000 [ 134.064219][ T4669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 134.075543][ T4669] R13: 0000000000000000 R14: 00007f2d46e30fa0 R15: 00007ffd34d9a2c8 [ 134.087254][ T4669] [ 135.219167][ T4713] device sit0 left promiscuous mode [ 135.450015][ T4719] device sit0 entered promiscuous mode [ 136.302927][ T4749] device lo entered promiscuous mode [ 137.744626][ T4819] device veth0_vlan left promiscuous mode [ 137.831410][ T4819] device veth0_vlan entered promiscuous mode [ 138.344450][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 138.397143][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 138.406135][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 138.933459][ T4862] device sit0 left promiscuous mode [ 139.039875][ T4867] device sit0 entered promiscuous mode [ 139.853687][ T4889] syz.3.1382[4889] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.853777][ T4889] syz.3.1382[4889] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.258746][ T4916] device sit0 left promiscuous mode [ 140.428747][ T4918] device sit0 entered promiscuous mode [ 143.136299][ T5048] device sit0 left promiscuous mode [ 143.181589][ T5048] device sit0 entered promiscuous mode [ 144.694350][ T5188] syz.1.1475[5188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.694427][ T5188] syz.1.1475[5188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.857147][ T5192] syz.3.1477 uses obsolete (PF_INET,SOCK_PACKET) [ 146.301672][ T5307] device wg2 entered promiscuous mode [ 147.508527][ T30] audit: type=1400 audit(1742298580.862:170): avc: denied { create } for pid=5363 comm="syz.0.1522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 147.646638][ T5374] device wg2 left promiscuous mode [ 147.688269][ T5374] device wg2 entered promiscuous mode [ 147.731700][ T5374] bond_slave_1: mtu less than device minimum [ 149.955545][ T5449] device sit0 left promiscuous mode [ 150.037721][ T5455] device sit0 entered promiscuous mode [ 150.713800][ T5496] device sit0 left promiscuous mode [ 150.741753][ T5496] device sit0 entered promiscuous mode [ 153.116307][ T5591] syz.3.1599[5591] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.116387][ T5591] syz.3.1599[5591] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.444836][ T5631] device veth0_vlan left promiscuous mode [ 154.528603][ T5631] device veth0_vlan entered promiscuous mode [ 154.669529][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 154.682927][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 154.724193][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 156.207249][ T5700] ref_ctr_offset mismatch. inode: 0x76f offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 156.341034][ T5700] GPL: port 1(erspan0) entered blocking state [ 156.359419][ T5700] GPL: port 1(erspan0) entered disabled state [ 156.377355][ T5700] device erspan0 entered promiscuous mode [ 156.470439][ T5694] GPL: port 1(erspan0) entered blocking state [ 156.476774][ T5694] GPL: port 1(erspan0) entered forwarding state [ 156.600195][ T5718] device wg2 left promiscuous mode [ 156.661450][ T5718] device wg2 entered promiscuous mode [ 156.694157][ T5725] device wg2 entered promiscuous mode [ 157.425072][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 159.599370][ T5842] device wg2 left promiscuous mode [ 159.668651][ T5848] device wg2 entered promiscuous mode [ 160.967017][ T5897] device sit0 left promiscuous mode [ 161.231765][ T5912] device veth0_vlan left promiscuous mode [ 161.248260][ T5912] device veth0_vlan entered promiscuous mode [ 161.266926][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 161.285660][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 161.325618][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 162.746388][ T5971] device sit0 left promiscuous mode [ 162.842296][ T30] audit: type=1400 audit(1742298596.192:171): avc: denied { create } for pid=5987 comm="syz.3.1728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 162.975203][ T6001] FAULT_INJECTION: forcing a failure. [ 162.975203][ T6001] name failslab, interval 1, probability 0, space 0, times 0 [ 162.998172][ T6001] CPU: 0 PID: 6001 Comm: syz.3.1732 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 163.007937][ T6001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 163.018052][ T6001] Call Trace: [ 163.021173][ T6001] [ 163.023953][ T6001] dump_stack_lvl+0x151/0x1c0 [ 163.028464][ T6001] ? io_uring_drop_tctx_refs+0x190/0x190 [ 163.033937][ T6001] dump_stack+0x15/0x20 [ 163.037924][ T6001] should_fail+0x3c6/0x510 [ 163.042178][ T6001] __should_failslab+0xa4/0xe0 [ 163.046784][ T6001] ? __alloc_skb+0xbe/0x550 [ 163.051201][ T6001] should_failslab+0x9/0x20 [ 163.055541][ T6001] slab_pre_alloc_hook+0x37/0xd0 [ 163.060317][ T6001] ? __alloc_skb+0xbe/0x550 [ 163.064654][ T6001] kmem_cache_alloc+0x44/0x250 [ 163.069253][ T6001] ? __kasan_slab_free+0x11/0x20 [ 163.074027][ T6001] __alloc_skb+0xbe/0x550 [ 163.078201][ T6001] inet_netconf_notify_devconf+0x173/0x220 [ 163.083846][ T6001] inetdev_event+0x79d/0x10a0 [ 163.088348][ T6001] ? devinet_exit_net+0x230/0x230 [ 163.093210][ T6001] ? up_read+0x5d/0x220 [ 163.097207][ T6001] raw_notifier_call_chain+0x8c/0xf0 [ 163.102326][ T6001] unregister_netdevice_many+0xe0a/0x17c0 [ 163.107897][ T6001] ? kasan_save_stack+0x3b/0x60 [ 163.112568][ T6001] ? fput_many+0xef/0x1b0 [ 163.116733][ T6001] ? alloc_netdev_mqs+0xc90/0xc90 [ 163.121593][ T6001] ? x64_sys_call+0x3d/0x9a0 [ 163.126190][ T6001] ? locks_remove_posix+0x610/0x610 [ 163.131244][ T6001] ? __kasan_check_read+0x11/0x20 [ 163.136087][ T6001] unregister_netdevice_queue+0x2e6/0x350 [ 163.141640][ T6001] ? wait_for_completion_killable_timeout+0x10/0x10 [ 163.148070][ T6001] ? list_netdevice+0x4c0/0x4c0 [ 163.152794][ T6001] ppp_release+0xed/0x1e0 [ 163.156914][ T6001] ? ppp_open+0x70/0x70 [ 163.160907][ T6001] __fput+0x228/0x8c0 [ 163.164731][ T6001] ____fput+0x15/0x20 [ 163.168546][ T6001] task_work_run+0x129/0x190 [ 163.172972][ T6001] exit_to_user_mode_loop+0xc4/0xe0 [ 163.178003][ T6001] exit_to_user_mode_prepare+0x5a/0xa0 [ 163.183309][ T6001] syscall_exit_to_user_mode+0x26/0x160 [ 163.188777][ T6001] do_syscall_64+0x47/0xb0 [ 163.193032][ T6001] ? clear_bhb_loop+0x35/0x90 [ 163.197593][ T6001] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 163.203272][ T6001] RIP: 0033:0x7f8e776aa169 [ 163.207626][ T6001] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 163.227158][ T6001] RSP: 002b:00007f8e75d14038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 163.235666][ T6001] RAX: 0000000000000000 RBX: 00007f8e778c2fa0 RCX: 00007f8e776aa169 [ 163.243481][ T6001] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 163.251287][ T6001] RBP: 00007f8e75d14090 R08: 0000000000000000 R09: 0000000000000000 [ 163.259099][ T6001] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 163.266908][ T6001] R13: 0000000000000000 R14: 00007f8e778c2fa0 R15: 00007ffd4f4a53c8 [ 163.274735][ T6001] [ 163.754417][ T6013] device wg2 left promiscuous mode [ 164.378843][ T6037] FAULT_INJECTION: forcing a failure. [ 164.378843][ T6037] name failslab, interval 1, probability 0, space 0, times 0 [ 164.435348][ T6037] CPU: 1 PID: 6037 Comm: syz.3.1744 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 164.445533][ T6037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 164.455426][ T6037] Call Trace: [ 164.458546][ T6037] [ 164.461323][ T6037] dump_stack_lvl+0x151/0x1c0 [ 164.466082][ T6037] ? io_uring_drop_tctx_refs+0x190/0x190 [ 164.471573][ T6037] dump_stack+0x15/0x20 [ 164.475550][ T6037] should_fail+0x3c6/0x510 [ 164.479921][ T6037] __should_failslab+0xa4/0xe0 [ 164.484506][ T6037] should_failslab+0x9/0x20 [ 164.489239][ T6037] slab_pre_alloc_hook+0x37/0xd0 [ 164.493978][ T6037] ? inet_netconf_notify_devconf+0x173/0x220 [ 164.499790][ T6037] __kmalloc_track_caller+0x6c/0x2c0 [ 164.504997][ T6037] ? inet_netconf_notify_devconf+0x173/0x220 [ 164.510817][ T6037] ? inet_netconf_notify_devconf+0x173/0x220 [ 164.516640][ T6037] __alloc_skb+0x10c/0x550 [ 164.521010][ T6037] inet_netconf_notify_devconf+0x173/0x220 [ 164.526777][ T6037] inetdev_event+0x79d/0x10a0 [ 164.531276][ T6037] ? devinet_exit_net+0x230/0x230 [ 164.536174][ T6037] ? up_read+0x5d/0x220 [ 164.540128][ T6037] raw_notifier_call_chain+0x8c/0xf0 [ 164.545249][ T6037] unregister_netdevice_many+0xe0a/0x17c0 [ 164.550804][ T6037] ? kasan_save_stack+0x3b/0x60 [ 164.555492][ T6037] ? fput_many+0xef/0x1b0 [ 164.559838][ T6037] ? alloc_netdev_mqs+0xc90/0xc90 [ 164.564690][ T6037] ? locks_remove_posix+0x610/0x610 [ 164.570042][ T6037] ? __kasan_check_read+0x11/0x20 [ 164.574902][ T6037] unregister_netdevice_queue+0x2e6/0x350 [ 164.580456][ T6037] ? wait_for_completion_killable_timeout+0x10/0x10 [ 164.586880][ T6037] ? list_netdevice+0x4c0/0x4c0 [ 164.591574][ T6037] ppp_release+0xed/0x1e0 [ 164.595734][ T6037] ? ppp_open+0x70/0x70 [ 164.599792][ T6037] __fput+0x228/0x8c0 [ 164.603548][ T6037] ____fput+0x15/0x20 [ 164.607372][ T6037] task_work_run+0x129/0x190 [ 164.611798][ T6037] exit_to_user_mode_loop+0xc4/0xe0 [ 164.616830][ T6037] exit_to_user_mode_prepare+0x5a/0xa0 [ 164.622114][ T6037] syscall_exit_to_user_mode+0x26/0x160 [ 164.627584][ T6037] do_syscall_64+0x47/0xb0 [ 164.631834][ T6037] ? clear_bhb_loop+0x35/0x90 [ 164.636436][ T6037] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 164.642178][ T6037] RIP: 0033:0x7f8e776aa169 [ 164.646417][ T6037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 164.665881][ T6037] RSP: 002b:00007f8e75d14038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 164.674100][ T6037] RAX: 0000000000000000 RBX: 00007f8e778c2fa0 RCX: 00007f8e776aa169 [ 164.681921][ T6037] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 164.689808][ T6037] RBP: 00007f8e75d14090 R08: 0000000000000000 R09: 0000000000000000 [ 164.697618][ T6037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 164.705433][ T6037] R13: 0000000000000000 R14: 00007f8e778c2fa0 R15: 00007ffd4f4a53c8 [ 164.713254][ T6037] [ 165.245732][ T6059] device wg2 entered promiscuous mode [ 165.925662][ T6079] FAULT_INJECTION: forcing a failure. [ 165.925662][ T6079] name failslab, interval 1, probability 0, space 0, times 0 [ 166.034787][ T6079] CPU: 1 PID: 6079 Comm: syz.2.1759 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 166.044692][ T6079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 166.054584][ T6079] Call Trace: [ 166.057717][ T6079] [ 166.060483][ T6079] dump_stack_lvl+0x151/0x1c0 [ 166.064996][ T6079] ? io_uring_drop_tctx_refs+0x190/0x190 [ 166.070468][ T6079] dump_stack+0x15/0x20 [ 166.074568][ T6079] should_fail+0x3c6/0x510 [ 166.078823][ T6079] __should_failslab+0xa4/0xe0 [ 166.083414][ T6079] ? __alloc_skb+0xbe/0x550 [ 166.087753][ T6079] should_failslab+0x9/0x20 [ 166.092091][ T6079] slab_pre_alloc_hook+0x37/0xd0 [ 166.096866][ T6079] ? __alloc_skb+0xbe/0x550 [ 166.101207][ T6079] kmem_cache_alloc+0x44/0x250 [ 166.105805][ T6079] ? __kasan_slab_free+0x11/0x20 [ 166.110581][ T6079] __alloc_skb+0xbe/0x550 [ 166.114756][ T6079] inet6_netconf_notify_devconf+0xdd/0x190 [ 166.120393][ T6079] addrconf_ifdown+0x17cd/0x1ae0 [ 166.125246][ T6079] ? __kasan_check_write+0x14/0x20 [ 166.130197][ T6079] ? addrconf_cleanup+0x1b0/0x1b0 [ 166.135052][ T6079] ? mutex_unlock+0xb2/0x260 [ 166.139482][ T6079] ? __mutex_lock_slowpath+0x10/0x10 [ 166.144601][ T6079] ? _raw_spin_lock+0xa4/0x1b0 [ 166.149202][ T6079] ? _raw_spin_trylock_bh+0x190/0x190 [ 166.154933][ T6079] addrconf_notify+0x37d/0xdd0 [ 166.159529][ T6079] ? mirred_device_event+0x1c5/0x210 [ 166.164649][ T6079] raw_notifier_call_chain+0x8c/0xf0 [ 166.169770][ T6079] unregister_netdevice_many+0xe0a/0x17c0 [ 166.175338][ T6079] ? kasan_save_stack+0x3b/0x60 [ 166.180020][ T6079] ? fput_many+0xef/0x1b0 [ 166.184176][ T6079] ? alloc_netdev_mqs+0xc90/0xc90 [ 166.189043][ T6079] ? x64_sys_call+0x3d/0x9a0 [ 166.193464][ T6079] ? locks_remove_posix+0x610/0x610 [ 166.198502][ T6079] ? __kasan_check_read+0x11/0x20 [ 166.203358][ T6079] unregister_netdevice_queue+0x2e6/0x350 [ 166.208913][ T6079] ? wait_for_completion_killable_timeout+0x10/0x10 [ 166.215334][ T6079] ? list_netdevice+0x4c0/0x4c0 [ 166.220024][ T6079] ppp_release+0xed/0x1e0 [ 166.224189][ T6079] ? ppp_open+0x70/0x70 [ 166.228182][ T6079] __fput+0x228/0x8c0 [ 166.232140][ T6079] ____fput+0x15/0x20 [ 166.235946][ T6079] task_work_run+0x129/0x190 [ 166.240375][ T6079] exit_to_user_mode_loop+0xc4/0xe0 [ 166.245412][ T6079] exit_to_user_mode_prepare+0x5a/0xa0 [ 166.250693][ T6079] syscall_exit_to_user_mode+0x26/0x160 [ 166.256075][ T6079] do_syscall_64+0x47/0xb0 [ 166.260327][ T6079] ? clear_bhb_loop+0x35/0x90 [ 166.264845][ T6079] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 166.270569][ T6079] RIP: 0033:0x7f1e9d7b6169 [ 166.274862][ T6079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 166.294264][ T6079] RSP: 002b:00007f1e9be20038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 166.302704][ T6079] RAX: 0000000000000000 RBX: 00007f1e9d9cefa0 RCX: 00007f1e9d7b6169 [ 166.310510][ T6079] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 166.318337][ T6079] RBP: 00007f1e9be20090 R08: 0000000000000000 R09: 0000000000000000 [ 166.326129][ T6079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 166.333939][ T6079] R13: 0000000000000000 R14: 00007f1e9d9cefa0 R15: 00007ffef700b528 [ 166.342111][ T6079] [ 166.705722][ T6114] device wg2 left promiscuous mode [ 167.073302][ T6121] FAULT_INJECTION: forcing a failure. [ 167.073302][ T6121] name failslab, interval 1, probability 0, space 0, times 0 [ 167.109433][ T6121] CPU: 0 PID: 6121 Comm: syz.1.1774 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 167.119623][ T6121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 167.129835][ T6121] Call Trace: [ 167.132956][ T6121] [ 167.135875][ T6121] dump_stack_lvl+0x151/0x1c0 [ 167.140521][ T6121] ? io_uring_drop_tctx_refs+0x190/0x190 [ 167.146222][ T6121] dump_stack+0x15/0x20 [ 167.150200][ T6121] should_fail+0x3c6/0x510 [ 167.154470][ T6121] __should_failslab+0xa4/0xe0 [ 167.159149][ T6121] ? __alloc_skb+0xbe/0x550 [ 167.163620][ T6121] should_failslab+0x9/0x20 [ 167.167969][ T6121] slab_pre_alloc_hook+0x37/0xd0 [ 167.172890][ T6121] ? __alloc_skb+0xbe/0x550 [ 167.177214][ T6121] kmem_cache_alloc+0x44/0x250 [ 167.181817][ T6121] ? __kasan_slab_free+0x11/0x20 [ 167.186586][ T6121] __alloc_skb+0xbe/0x550 [ 167.190753][ T6121] inet6_netconf_notify_devconf+0xdd/0x190 [ 167.196418][ T6121] addrconf_ifdown+0x17cd/0x1ae0 [ 167.201443][ T6121] ? __kasan_check_write+0x14/0x20 [ 167.206379][ T6121] ? addrconf_cleanup+0x1b0/0x1b0 [ 167.211435][ T6121] ? mutex_unlock+0xb2/0x260 [ 167.215865][ T6121] ? __mutex_lock_slowpath+0x10/0x10 [ 167.221092][ T6121] ? _raw_spin_lock+0xa4/0x1b0 [ 167.225692][ T6121] ? _raw_spin_trylock_bh+0x190/0x190 [ 167.231162][ T6121] addrconf_notify+0x37d/0xdd0 [ 167.235776][ T6121] ? mirred_device_event+0x1c5/0x210 [ 167.241011][ T6121] raw_notifier_call_chain+0x8c/0xf0 [ 167.246146][ T6121] unregister_netdevice_many+0xe0a/0x17c0 [ 167.251903][ T6121] ? kasan_save_stack+0x3b/0x60 [ 167.256694][ T6121] ? fput_many+0xef/0x1b0 [ 167.260862][ T6121] ? alloc_netdev_mqs+0xc90/0xc90 [ 167.265713][ T6121] ? x64_sys_call+0x3d/0x9a0 [ 167.270139][ T6121] ? locks_remove_posix+0x610/0x610 [ 167.275173][ T6121] ? __kasan_check_read+0x11/0x20 [ 167.280031][ T6121] unregister_netdevice_queue+0x2e6/0x350 [ 167.285594][ T6121] ? wait_for_completion_killable_timeout+0x10/0x10 [ 167.292014][ T6121] ? list_netdevice+0x4c0/0x4c0 [ 167.296706][ T6121] ppp_release+0xed/0x1e0 [ 167.301159][ T6121] ? ppp_open+0x70/0x70 [ 167.305147][ T6121] __fput+0x228/0x8c0 [ 167.308960][ T6121] ____fput+0x15/0x20 [ 167.312898][ T6121] task_work_run+0x129/0x190 [ 167.317321][ T6121] exit_to_user_mode_loop+0xc4/0xe0 [ 167.322362][ T6121] exit_to_user_mode_prepare+0x5a/0xa0 [ 167.327676][ T6121] syscall_exit_to_user_mode+0x26/0x160 [ 167.333027][ T6121] do_syscall_64+0x47/0xb0 [ 167.337283][ T6121] ? clear_bhb_loop+0x35/0x90 [ 167.341803][ T6121] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 167.347520][ T6121] RIP: 0033:0x7f3e091cd169 [ 167.351772][ T6121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 167.371214][ T6121] RSP: 002b:00007f3e07837038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 167.379454][ T6121] RAX: 0000000000000000 RBX: 00007f3e093e5fa0 RCX: 00007f3e091cd169 [ 167.387267][ T6121] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 167.395081][ T6121] RBP: 00007f3e07837090 R08: 0000000000000000 R09: 0000000000000000 [ 167.403030][ T6121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 167.410828][ T6121] R13: 0000000000000000 R14: 00007f3e093e5fa0 R15: 00007ffca6f253c8 [ 167.418739][ T6121] [ 169.717154][ T6177] FAULT_INJECTION: forcing a failure. [ 169.717154][ T6177] name failslab, interval 1, probability 0, space 0, times 0 [ 169.855002][ T6177] CPU: 1 PID: 6177 Comm: syz.3.1789 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 169.864746][ T6177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 169.874647][ T6177] Call Trace: [ 169.877761][ T6177] [ 169.880539][ T6177] dump_stack_lvl+0x151/0x1c0 [ 169.885109][ T6177] ? io_uring_drop_tctx_refs+0x190/0x190 [ 169.890551][ T6177] dump_stack+0x15/0x20 [ 169.894511][ T6177] should_fail+0x3c6/0x510 [ 169.898771][ T6177] __should_failslab+0xa4/0xe0 [ 169.903364][ T6177] ? __alloc_skb+0xbe/0x550 [ 169.907708][ T6177] should_failslab+0x9/0x20 [ 169.912062][ T6177] slab_pre_alloc_hook+0x37/0xd0 [ 169.916818][ T6177] ? __alloc_skb+0xbe/0x550 [ 169.921158][ T6177] kmem_cache_alloc+0x44/0x250 [ 169.925758][ T6177] __alloc_skb+0xbe/0x550 [ 169.930008][ T6177] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 169.935130][ T6177] unregister_netdevice_many+0xea2/0x17c0 [ 169.940684][ T6177] ? kasan_save_stack+0x3b/0x60 [ 169.945370][ T6177] ? fput_many+0xef/0x1b0 [ 169.949533][ T6177] ? alloc_netdev_mqs+0xc90/0xc90 [ 169.954395][ T6177] ? x64_sys_call+0x3d/0x9a0 [ 169.958825][ T6177] ? locks_remove_posix+0x610/0x610 [ 169.963863][ T6177] ? __kasan_check_read+0x11/0x20 [ 169.968718][ T6177] unregister_netdevice_queue+0x2e6/0x350 [ 169.974275][ T6177] ? wait_for_completion_killable_timeout+0x10/0x10 [ 169.980700][ T6177] ? list_netdevice+0x4c0/0x4c0 [ 169.985416][ T6177] ppp_release+0xed/0x1e0 [ 169.989549][ T6177] ? ppp_open+0x70/0x70 [ 169.993539][ T6177] __fput+0x228/0x8c0 [ 169.997370][ T6177] ____fput+0x15/0x20 [ 170.001178][ T6177] task_work_run+0x129/0x190 [ 170.005621][ T6177] exit_to_user_mode_loop+0xc4/0xe0 [ 170.010637][ T6177] exit_to_user_mode_prepare+0x5a/0xa0 [ 170.015930][ T6177] syscall_exit_to_user_mode+0x26/0x160 [ 170.021320][ T6177] do_syscall_64+0x47/0xb0 [ 170.025565][ T6177] ? clear_bhb_loop+0x35/0x90 [ 170.030075][ T6177] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 170.035803][ T6177] RIP: 0033:0x7f8e776aa169 [ 170.040061][ T6177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 170.059587][ T6177] RSP: 002b:00007f8e75d14038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 170.067836][ T6177] RAX: 0000000000000000 RBX: 00007f8e778c2fa0 RCX: 00007f8e776aa169 [ 170.075648][ T6177] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 170.083462][ T6177] RBP: 00007f8e75d14090 R08: 0000000000000000 R09: 0000000000000000 [ 170.091273][ T6177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 170.099078][ T6177] R13: 0000000000000000 R14: 00007f8e778c2fa0 R15: 00007ffd4f4a53c8 [ 170.106997][ T6177] [ 170.896239][ T6226] FAULT_INJECTION: forcing a failure. [ 170.896239][ T6226] name failslab, interval 1, probability 0, space 0, times 0 [ 170.918397][ T6226] CPU: 0 PID: 6226 Comm: syz.0.1804 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 170.928139][ T6226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 170.938031][ T6226] Call Trace: [ 170.941153][ T6226] [ 170.943934][ T6226] dump_stack_lvl+0x151/0x1c0 [ 170.948646][ T6226] ? io_uring_drop_tctx_refs+0x190/0x190 [ 170.954190][ T6226] dump_stack+0x15/0x20 [ 170.958178][ T6226] should_fail+0x3c6/0x510 [ 170.962430][ T6226] __should_failslab+0xa4/0xe0 [ 170.967037][ T6226] should_failslab+0x9/0x20 [ 170.971370][ T6226] slab_pre_alloc_hook+0x37/0xd0 [ 170.976152][ T6226] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 170.981445][ T6226] __kmalloc_track_caller+0x6c/0x2c0 [ 170.986561][ T6226] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 170.991851][ T6226] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 170.997146][ T6226] __alloc_skb+0x10c/0x550 [ 171.001399][ T6226] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 171.006520][ T6226] unregister_netdevice_many+0xea2/0x17c0 [ 171.012073][ T6226] ? kasan_save_stack+0x3b/0x60 [ 171.016759][ T6226] ? fput_many+0xef/0x1b0 [ 171.020922][ T6226] ? alloc_netdev_mqs+0xc90/0xc90 [ 171.025781][ T6226] ? x64_sys_call+0x3d/0x9a0 [ 171.030210][ T6226] ? locks_remove_posix+0x610/0x610 [ 171.035249][ T6226] ? __kasan_check_read+0x11/0x20 [ 171.040121][ T6226] unregister_netdevice_queue+0x2e6/0x350 [ 171.045663][ T6226] ? wait_for_completion_killable_timeout+0x10/0x10 [ 171.052082][ T6226] ? list_netdevice+0x4c0/0x4c0 [ 171.056771][ T6226] ppp_release+0xed/0x1e0 [ 171.061105][ T6226] ? ppp_open+0x70/0x70 [ 171.065099][ T6226] __fput+0x228/0x8c0 [ 171.068922][ T6226] ____fput+0x15/0x20 [ 171.072742][ T6226] task_work_run+0x129/0x190 [ 171.077167][ T6226] exit_to_user_mode_loop+0xc4/0xe0 [ 171.082200][ T6226] exit_to_user_mode_prepare+0x5a/0xa0 [ 171.087842][ T6226] syscall_exit_to_user_mode+0x26/0x160 [ 171.093222][ T6226] do_syscall_64+0x47/0xb0 [ 171.097473][ T6226] ? clear_bhb_loop+0x35/0x90 [ 171.101987][ T6226] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 171.107715][ T6226] RIP: 0033:0x7f2d46c18169 [ 171.111972][ T6226] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 171.131682][ T6226] RSP: 002b:00007f2d45282038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 171.139913][ T6226] RAX: 0000000000000000 RBX: 00007f2d46e30fa0 RCX: 00007f2d46c18169 [ 171.147723][ T6226] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 171.155536][ T6226] RBP: 00007f2d45282090 R08: 0000000000000000 R09: 0000000000000000 [ 171.163344][ T6226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 171.171161][ T6226] R13: 0000000000000000 R14: 00007f2d46e30fa0 R15: 00007ffd34d9a2c8 [ 171.179084][ T6226] [ 171.348539][ T6248] device sit0 left promiscuous mode [ 171.388243][ T6251] device sit0 entered promiscuous mode [ 172.262149][ T6286] FAULT_INJECTION: forcing a failure. [ 172.262149][ T6286] name failslab, interval 1, probability 0, space 0, times 0 [ 172.356085][ T6286] CPU: 1 PID: 6286 Comm: syz.1.1825 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 172.365910][ T6286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 172.375813][ T6286] Call Trace: [ 172.378923][ T6286] [ 172.381705][ T6286] dump_stack_lvl+0x151/0x1c0 [ 172.386219][ T6286] ? io_uring_drop_tctx_refs+0x190/0x190 [ 172.391683][ T6286] ? kernfs_put+0x392/0x520 [ 172.396025][ T6286] dump_stack+0x15/0x20 [ 172.400016][ T6286] should_fail+0x3c6/0x510 [ 172.404270][ T6286] __should_failslab+0xa4/0xe0 [ 172.408866][ T6286] should_failslab+0x9/0x20 [ 172.413206][ T6286] slab_pre_alloc_hook+0x37/0xd0 [ 172.417983][ T6286] kmem_cache_alloc_trace+0x48/0x270 [ 172.423102][ T6286] ? kobject_uevent_env+0x269/0x700 [ 172.428151][ T6286] kobject_uevent_env+0x269/0x700 [ 172.432997][ T6286] kobject_uevent+0x1f/0x30 [ 172.437337][ T6286] __kobject_del+0xee/0x300 [ 172.441848][ T6286] kobject_put+0x1cc/0x260 [ 172.446110][ T6286] net_rx_queue_update_kobjects+0x418/0x490 [ 172.451836][ T6286] netdev_unregister_kobject+0x10a/0x260 [ 172.457312][ T6286] unregister_netdevice_many+0x1295/0x17c0 [ 172.462952][ T6286] ? alloc_netdev_mqs+0xc90/0xc90 [ 172.467798][ T6286] ? x64_sys_call+0x3d/0x9a0 [ 172.472227][ T6286] ? locks_remove_posix+0x610/0x610 [ 172.477263][ T6286] ? __kasan_check_read+0x11/0x20 [ 172.482121][ T6286] unregister_netdevice_queue+0x2e6/0x350 [ 172.487692][ T6286] ? wait_for_completion_killable_timeout+0x10/0x10 [ 172.494098][ T6286] ? list_netdevice+0x4c0/0x4c0 [ 172.498790][ T6286] ppp_release+0xed/0x1e0 [ 172.502952][ T6286] ? ppp_open+0x70/0x70 [ 172.506944][ T6286] __fput+0x228/0x8c0 [ 172.510765][ T6286] ____fput+0x15/0x20 [ 172.514579][ T6286] task_work_run+0x129/0x190 [ 172.519017][ T6286] exit_to_user_mode_loop+0xc4/0xe0 [ 172.524043][ T6286] exit_to_user_mode_prepare+0x5a/0xa0 [ 172.529335][ T6286] syscall_exit_to_user_mode+0x26/0x160 [ 172.534719][ T6286] do_syscall_64+0x47/0xb0 [ 172.538968][ T6286] ? clear_bhb_loop+0x35/0x90 [ 172.543481][ T6286] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 172.549208][ T6286] RIP: 0033:0x7f3e091cd169 [ 172.553465][ T6286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 172.572906][ T6286] RSP: 002b:00007f3e07837038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 172.581147][ T6286] RAX: 0000000000000000 RBX: 00007f3e093e5fa0 RCX: 00007f3e091cd169 [ 172.588968][ T6286] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 172.596768][ T6286] RBP: 00007f3e07837090 R08: 0000000000000000 R09: 0000000000000000 [ 172.604678][ T6286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 172.612488][ T6286] R13: 0000000000000000 R14: 00007f3e093e5fa0 R15: 00007ffca6f253c8 [ 172.620309][ T6286] [ 173.516374][ T6357] FAULT_INJECTION: forcing a failure. [ 173.516374][ T6357] name failslab, interval 1, probability 0, space 0, times 0 [ 173.548987][ T6357] CPU: 1 PID: 6357 Comm: syz.0.1842 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 173.558728][ T6357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 173.568625][ T6357] Call Trace: [ 173.571746][ T6357] [ 173.574528][ T6357] dump_stack_lvl+0x151/0x1c0 [ 173.579040][ T6357] ? io_uring_drop_tctx_refs+0x190/0x190 [ 173.584511][ T6357] dump_stack+0x15/0x20 [ 173.588497][ T6357] should_fail+0x3c6/0x510 [ 173.592753][ T6357] __should_failslab+0xa4/0xe0 [ 173.597354][ T6357] ? __alloc_skb+0xbe/0x550 [ 173.601775][ T6357] should_failslab+0x9/0x20 [ 173.606116][ T6357] slab_pre_alloc_hook+0x37/0xd0 [ 173.610889][ T6357] ? __alloc_skb+0xbe/0x550 [ 173.615236][ T6357] kmem_cache_alloc+0x44/0x250 [ 173.619828][ T6357] __alloc_skb+0xbe/0x550 [ 173.623991][ T6357] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 173.629157][ T6357] unregister_netdevice_many+0xea2/0x17c0 [ 173.635190][ T6357] ? kasan_save_stack+0x3b/0x60 [ 173.639872][ T6357] ? fput_many+0xef/0x1b0 [ 173.644044][ T6357] ? alloc_netdev_mqs+0xc90/0xc90 [ 173.649074][ T6357] ? x64_sys_call+0x3d/0x9a0 [ 173.653499][ T6357] ? locks_remove_posix+0x610/0x610 [ 173.658541][ T6357] ? __kasan_check_read+0x11/0x20 [ 173.663399][ T6357] unregister_netdevice_queue+0x2e6/0x350 [ 173.668953][ T6357] ? wait_for_completion_killable_timeout+0x10/0x10 [ 173.675373][ T6357] ? list_netdevice+0x4c0/0x4c0 [ 173.680061][ T6357] ppp_release+0xed/0x1e0 [ 173.684225][ T6357] ? ppp_open+0x70/0x70 [ 173.688223][ T6357] __fput+0x228/0x8c0 [ 173.692044][ T6357] ____fput+0x15/0x20 [ 173.695855][ T6357] task_work_run+0x129/0x190 [ 173.700286][ T6357] exit_to_user_mode_loop+0xc4/0xe0 [ 173.705323][ T6357] exit_to_user_mode_prepare+0x5a/0xa0 [ 173.710613][ T6357] syscall_exit_to_user_mode+0x26/0x160 [ 173.715993][ T6357] do_syscall_64+0x47/0xb0 [ 173.720899][ T6357] ? clear_bhb_loop+0x35/0x90 [ 173.725410][ T6357] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 173.731303][ T6357] RIP: 0033:0x7f2d46c18169 [ 173.735562][ T6357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 173.754992][ T6357] RSP: 002b:00007f2d45282038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 173.763235][ T6357] RAX: 0000000000000000 RBX: 00007f2d46e30fa0 RCX: 00007f2d46c18169 [ 173.771049][ T6357] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 173.778859][ T6357] RBP: 00007f2d45282090 R08: 0000000000000000 R09: 0000000000000000 [ 173.786668][ T6357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 173.794480][ T6357] R13: 0000000000000000 R14: 00007f2d46e30fa0 R15: 00007ffd34d9a2c8 [ 173.802384][ T6357] [ 174.018538][ T6375] syz.3.1849[6375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.018645][ T6375] syz.3.1849[6375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.065466][ T6376] device sit0 left promiscuous mode [ 175.147524][ T6405] FAULT_INJECTION: forcing a failure. [ 175.147524][ T6405] name failslab, interval 1, probability 0, space 0, times 0 [ 175.170397][ T6405] CPU: 1 PID: 6405 Comm: syz.0.1857 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 175.180317][ T6405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 175.190211][ T6405] Call Trace: [ 175.193332][ T6405] [ 175.196119][ T6405] dump_stack_lvl+0x151/0x1c0 [ 175.200628][ T6405] ? io_uring_drop_tctx_refs+0x190/0x190 [ 175.206100][ T6405] dump_stack+0x15/0x20 [ 175.210082][ T6405] should_fail+0x3c6/0x510 [ 175.214432][ T6405] __should_failslab+0xa4/0xe0 [ 175.219027][ T6405] ? __alloc_skb+0xbe/0x550 [ 175.223362][ T6405] should_failslab+0x9/0x20 [ 175.227703][ T6405] slab_pre_alloc_hook+0x37/0xd0 [ 175.232479][ T6405] ? __alloc_skb+0xbe/0x550 [ 175.236813][ T6405] kmem_cache_alloc+0x44/0x250 [ 175.241419][ T6405] __alloc_skb+0xbe/0x550 [ 175.245582][ T6405] alloc_uevent_skb+0x80/0x230 [ 175.250192][ T6405] kobject_uevent_net_broadcast+0x188/0x590 [ 175.256185][ T6405] kobject_uevent_env+0x525/0x700 [ 175.263401][ T6405] kobject_uevent+0x1f/0x30 [ 175.267726][ T6405] __kobject_del+0xee/0x300 [ 175.272054][ T6405] kobject_put+0x1cc/0x260 [ 175.276322][ T6405] net_rx_queue_update_kobjects+0x418/0x490 [ 175.282040][ T6405] netdev_unregister_kobject+0x10a/0x260 [ 175.287507][ T6405] unregister_netdevice_many+0x1295/0x17c0 [ 175.293412][ T6405] ? alloc_netdev_mqs+0xc90/0xc90 [ 175.298265][ T6405] ? locks_remove_posix+0x610/0x610 [ 175.303300][ T6405] ? __kasan_check_read+0x11/0x20 [ 175.308157][ T6405] unregister_netdevice_queue+0x2e6/0x350 [ 175.313728][ T6405] ? wait_for_completion_killable_timeout+0x10/0x10 [ 175.320144][ T6405] ? list_netdevice+0x4c0/0x4c0 [ 175.324828][ T6405] ppp_release+0xed/0x1e0 [ 175.329000][ T6405] ? ppp_open+0x70/0x70 [ 175.332979][ T6405] __fput+0x228/0x8c0 [ 175.336813][ T6405] ____fput+0x15/0x20 [ 175.340620][ T6405] task_work_run+0x129/0x190 [ 175.345055][ T6405] exit_to_user_mode_loop+0xc4/0xe0 [ 175.350081][ T6405] exit_to_user_mode_prepare+0x5a/0xa0 [ 175.355372][ T6405] syscall_exit_to_user_mode+0x26/0x160 [ 175.360754][ T6405] do_syscall_64+0x47/0xb0 [ 175.365011][ T6405] ? clear_bhb_loop+0x35/0x90 [ 175.369520][ T6405] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 175.375246][ T6405] RIP: 0033:0x7f2d46c18169 [ 175.379503][ T6405] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 175.399123][ T6405] RSP: 002b:00007f2d45282038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 175.407361][ T6405] RAX: 0000000000000000 RBX: 00007f2d46e30fa0 RCX: 00007f2d46c18169 [ 175.415174][ T6405] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 175.423068][ T6405] RBP: 00007f2d45282090 R08: 0000000000000000 R09: 0000000000000000 [ 175.430881][ T6405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 175.438689][ T6405] R13: 0000000000000000 R14: 00007f2d46e30fa0 R15: 00007ffd34d9a2c8 [ 175.446512][ T6405] [ 176.299212][ T6458] FAULT_INJECTION: forcing a failure. [ 176.299212][ T6458] name failslab, interval 1, probability 0, space 0, times 0 [ 176.312005][ T6458] CPU: 1 PID: 6458 Comm: syz.3.1875 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 176.321723][ T6458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 176.331615][ T6458] Call Trace: [ 176.334739][ T6458] [ 176.337557][ T6458] dump_stack_lvl+0x151/0x1c0 [ 176.342034][ T6458] ? io_uring_drop_tctx_refs+0x190/0x190 [ 176.347502][ T6458] dump_stack+0x15/0x20 [ 176.351496][ T6458] should_fail+0x3c6/0x510 [ 176.355743][ T6458] __should_failslab+0xa4/0xe0 [ 176.360340][ T6458] should_failslab+0x9/0x20 [ 176.364682][ T6458] slab_pre_alloc_hook+0x37/0xd0 [ 176.369455][ T6458] ? alloc_uevent_skb+0x80/0x230 [ 176.374228][ T6458] __kmalloc_track_caller+0x6c/0x2c0 [ 176.379347][ T6458] ? alloc_uevent_skb+0x80/0x230 [ 176.384122][ T6458] ? alloc_uevent_skb+0x80/0x230 [ 176.388896][ T6458] __alloc_skb+0x10c/0x550 [ 176.393148][ T6458] alloc_uevent_skb+0x80/0x230 [ 176.397747][ T6458] kobject_uevent_net_broadcast+0x188/0x590 [ 176.403479][ T6458] kobject_uevent_env+0x525/0x700 [ 176.408341][ T6458] kobject_uevent+0x1f/0x30 [ 176.412676][ T6458] __kobject_del+0xee/0x300 [ 176.417015][ T6458] kobject_put+0x1cc/0x260 [ 176.421271][ T6458] net_rx_queue_update_kobjects+0x418/0x490 [ 176.427001][ T6458] netdev_unregister_kobject+0x10a/0x260 [ 176.432466][ T6458] unregister_netdevice_many+0x1295/0x17c0 [ 176.438111][ T6458] ? alloc_netdev_mqs+0xc90/0xc90 [ 176.442965][ T6458] ? x64_sys_call+0x3d/0x9a0 [ 176.447393][ T6458] ? locks_remove_posix+0x610/0x610 [ 176.452431][ T6458] ? __kasan_check_read+0x11/0x20 [ 176.457286][ T6458] unregister_netdevice_queue+0x2e6/0x350 [ 176.462843][ T6458] ? wait_for_completion_killable_timeout+0x10/0x10 [ 176.469698][ T6458] ? list_netdevice+0x4c0/0x4c0 [ 176.474388][ T6458] ppp_release+0xed/0x1e0 [ 176.478551][ T6458] ? ppp_open+0x70/0x70 [ 176.482545][ T6458] __fput+0x228/0x8c0 [ 176.486383][ T6458] ____fput+0x15/0x20 [ 176.490210][ T6458] task_work_run+0x129/0x190 [ 176.494606][ T6458] exit_to_user_mode_loop+0xc4/0xe0 [ 176.499728][ T6458] exit_to_user_mode_prepare+0x5a/0xa0 [ 176.505020][ T6458] syscall_exit_to_user_mode+0x26/0x160 [ 176.510405][ T6458] do_syscall_64+0x47/0xb0 [ 176.514653][ T6458] ? clear_bhb_loop+0x35/0x90 [ 176.519179][ T6458] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 176.524904][ T6458] RIP: 0033:0x7f8e776aa169 [ 176.529153][ T6458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 176.548679][ T6458] RSP: 002b:00007f8e75d14038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 176.556920][ T6458] RAX: 0000000000000000 RBX: 00007f8e778c2fa0 RCX: 00007f8e776aa169 [ 176.564733][ T6458] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 176.572558][ T6458] RBP: 00007f8e75d14090 R08: 0000000000000000 R09: 0000000000000000 [ 176.580354][ T6458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 176.588165][ T6458] R13: 0000000000000000 R14: 00007f8e778c2fa0 R15: 00007ffd4f4a53c8 [ 176.596420][ T6458] [ 176.926149][ T6498] FAULT_INJECTION: forcing a failure. [ 176.926149][ T6498] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 176.939511][ T6498] CPU: 0 PID: 6498 Comm: syz.3.1889 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 176.949224][ T6498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 176.959119][ T6498] Call Trace: [ 176.962239][ T6498] [ 176.965023][ T6498] dump_stack_lvl+0x151/0x1c0 [ 176.969535][ T6498] ? io_uring_drop_tctx_refs+0x190/0x190 [ 176.975001][ T6498] ? kmem_cache_free+0x115/0x330 [ 176.979771][ T6498] ? kasan_set_track+0x5d/0x70 [ 176.984371][ T6498] ? kasan_set_free_info+0x23/0x40 [ 176.989320][ T6498] dump_stack+0x15/0x20 [ 176.993327][ T6498] should_fail+0x3c6/0x510 [ 176.997573][ T6498] should_fail_usercopy+0x1a/0x20 [ 177.002430][ T6498] strncpy_from_user+0x24/0x2d0 [ 177.007117][ T6498] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 177.013030][ T6498] strncpy_from_user_nofault+0x73/0x150 [ 177.018398][ T6498] bpf_probe_read_user_str+0x2a/0x70 [ 177.023521][ T6498] bpf_prog_78f9c3f13797e2ae+0x35/0x464 [ 177.028896][ T6498] bpf_trace_run3+0x11e/0x250 [ 177.033416][ T6498] ? bpf_trace_run2+0x210/0x210 [ 177.038100][ T6498] ? kernfs_put+0x392/0x520 [ 177.042440][ T6498] ? debug_smp_processor_id+0x17/0x20 [ 177.047644][ T6498] ? kasan_quarantine_put+0x34/0x1a0 [ 177.052767][ T6498] ? kmem_cache_free+0x115/0x330 [ 177.057543][ T6498] ? kernfs_put+0x392/0x520 [ 177.061881][ T6498] __bpf_trace_kmem_cache_free+0x99/0xc0 [ 177.067349][ T6498] ? kernfs_put+0x392/0x520 [ 177.071687][ T6498] __traceiter_kmem_cache_free+0x32/0x50 [ 177.077155][ T6498] kmem_cache_free+0x30e/0x330 [ 177.081765][ T6498] ? kernfs_put+0x392/0x520 [ 177.086097][ T6498] kernfs_put+0x392/0x520 [ 177.090264][ T6498] kernfs_remove_by_name_ns+0xf4/0x160 [ 177.095555][ T6498] sysfs_remove_group+0x10c/0x2a0 [ 177.100424][ T6498] sysfs_remove_groups+0x56/0xb0 [ 177.105189][ T6498] __kobject_del+0x9b/0x300 [ 177.109528][ T6498] kobject_put+0x1cc/0x260 [ 177.113792][ T6498] net_rx_queue_update_kobjects+0x418/0x490 [ 177.119514][ T6498] netdev_unregister_kobject+0x10a/0x260 [ 177.124984][ T6498] unregister_netdevice_many+0x1295/0x17c0 [ 177.130625][ T6498] ? alloc_netdev_mqs+0xc90/0xc90 [ 177.135480][ T6498] ? locks_remove_posix+0x610/0x610 [ 177.140525][ T6498] ? __kasan_check_read+0x11/0x20 [ 177.145387][ T6498] unregister_netdevice_queue+0x2e6/0x350 [ 177.150932][ T6498] ? wait_for_completion_killable_timeout+0x10/0x10 [ 177.157365][ T6498] ? list_netdevice+0x4c0/0x4c0 [ 177.162153][ T6498] ppp_release+0xed/0x1e0 [ 177.166294][ T6498] ? ppp_open+0x70/0x70 [ 177.170386][ T6498] __fput+0x228/0x8c0 [ 177.174200][ T6498] ____fput+0x15/0x20 [ 177.178011][ T6498] task_work_run+0x129/0x190 [ 177.182521][ T6498] exit_to_user_mode_loop+0xc4/0xe0 [ 177.187646][ T6498] exit_to_user_mode_prepare+0x5a/0xa0 [ 177.192938][ T6498] syscall_exit_to_user_mode+0x26/0x160 [ 177.198320][ T6498] do_syscall_64+0x47/0xb0 [ 177.202573][ T6498] ? clear_bhb_loop+0x35/0x90 [ 177.207083][ T6498] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 177.212820][ T6498] RIP: 0033:0x7f8e776aa169 [ 177.217847][ T6498] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 177.237562][ T6498] RSP: 002b:00007f8e75d14038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 177.246310][ T6498] RAX: 0000000000000000 RBX: 00007f8e778c2fa0 RCX: 00007f8e776aa169 [ 177.254184][ T6498] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 177.262873][ T6498] RBP: 00007f8e75d14090 R08: 0000000000000000 R09: 0000000000000000 [ 177.270798][ T6498] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 177.278701][ T6498] R13: 0000000000000000 R14: 00007f8e778c2fa0 R15: 00007ffd4f4a53c8 [ 177.286519][ T6498] [ 177.467209][ T6509] device sit0 left promiscuous mode [ 177.649572][ T6513] device sit0 entered promiscuous mode [ 178.388611][ T6546] FAULT_INJECTION: forcing a failure. [ 178.388611][ T6546] name failslab, interval 1, probability 0, space 0, times 0 [ 178.428986][ T6546] CPU: 1 PID: 6546 Comm: syz.1.1903 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 178.438738][ T6546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 178.448650][ T6546] Call Trace: [ 178.451752][ T6546] [ 178.454531][ T6546] dump_stack_lvl+0x151/0x1c0 [ 178.459041][ T6546] ? io_uring_drop_tctx_refs+0x190/0x190 [ 178.464507][ T6546] ? exit_to_user_mode_loop+0xc4/0xe0 [ 178.469912][ T6546] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 178.475795][ T6546] dump_stack+0x15/0x20 [ 178.480324][ T6546] should_fail+0x3c6/0x510 [ 178.484907][ T6546] __should_failslab+0xa4/0xe0 [ 178.489504][ T6546] should_failslab+0x9/0x20 [ 178.493843][ T6546] slab_pre_alloc_hook+0x37/0xd0 [ 178.498615][ T6546] __kmalloc+0x6d/0x2c0 [ 178.502607][ T6546] ? kobject_get_path+0xbc/0x1f0 [ 178.507388][ T6546] kobject_get_path+0xbc/0x1f0 [ 178.511986][ T6546] kobject_uevent_env+0x27f/0x700 [ 178.516848][ T6546] kobject_uevent+0x1f/0x30 [ 178.521270][ T6546] __kobject_del+0xee/0x300 [ 178.525610][ T6546] kobject_put+0x1cc/0x260 [ 178.529861][ T6546] netdev_queue_update_kobjects+0x390/0x400 [ 178.535586][ T6546] ? net_rx_queue_update_kobjects+0x46f/0x490 [ 178.541494][ T6546] netdev_unregister_kobject+0x117/0x260 [ 178.546959][ T6546] unregister_netdevice_many+0x1295/0x17c0 [ 178.552605][ T6546] ? alloc_netdev_mqs+0xc90/0xc90 [ 178.557461][ T6546] ? locks_remove_posix+0x610/0x610 [ 178.562496][ T6546] ? __kasan_check_read+0x11/0x20 [ 178.567355][ T6546] unregister_netdevice_queue+0x2e6/0x350 [ 178.572906][ T6546] ? wait_for_completion_killable_timeout+0x10/0x10 [ 178.579330][ T6546] ? list_netdevice+0x4c0/0x4c0 [ 178.584020][ T6546] ppp_release+0xed/0x1e0 [ 178.588286][ T6546] ? ppp_open+0x70/0x70 [ 178.592793][ T6546] __fput+0x228/0x8c0 [ 178.596626][ T6546] ____fput+0x15/0x20 [ 178.600430][ T6546] task_work_run+0x129/0x190 [ 178.604861][ T6546] exit_to_user_mode_loop+0xc4/0xe0 [ 178.609894][ T6546] exit_to_user_mode_prepare+0x5a/0xa0 [ 178.615187][ T6546] syscall_exit_to_user_mode+0x26/0x160 [ 178.620572][ T6546] do_syscall_64+0x47/0xb0 [ 178.624822][ T6546] ? clear_bhb_loop+0x35/0x90 [ 178.629337][ T6546] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 178.635064][ T6546] RIP: 0033:0x7f3e091cd169 [ 178.639321][ T6546] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 178.658758][ T6546] RSP: 002b:00007f3e07837038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 178.666998][ T6546] RAX: 0000000000000000 RBX: 00007f3e093e5fa0 RCX: 00007f3e091cd169 [ 178.674813][ T6546] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 178.682709][ T6546] RBP: 00007f3e07837090 R08: 0000000000000000 R09: 0000000000000000 [ 178.690523][ T6546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 178.698330][ T6546] R13: 0000000000000000 R14: 00007f3e093e5fa0 R15: 00007ffca6f253c8 [ 178.706153][ T6546] [ 179.392712][ T6580] device veth0_vlan left promiscuous mode [ 179.441532][ T6580] device veth0_vlan entered promiscuous mode [ 179.521191][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 179.545748][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 179.569130][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 179.975642][ T6623] device wg2 left promiscuous mode [ 181.639841][ T6764] syz.4.1969[6764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.639926][ T6764] syz.4.1969[6764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.640386][ T6760] device veth0_vlan left promiscuous mode [ 181.700454][ T6760] device veth0_vlan entered promiscuous mode [ 181.776596][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 181.792290][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 181.817555][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 182.512206][ T6825] ªªªªªª: renamed from vlan0 [ 182.956826][ T6847] @0ÿ: renamed from bond_slave_0 [ 183.379506][ T6877] device veth1_macvtap left promiscuous mode [ 185.778287][ T6989] device veth0_vlan left promiscuous mode [ 185.929462][ T6989] device veth0_vlan entered promiscuous mode [ 185.986401][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 186.012635][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.040517][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 187.399957][ T7040] device veth0_vlan left promiscuous mode [ 187.422069][ T7040] device veth0_vlan entered promiscuous mode [ 187.491673][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 187.500211][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 187.507357][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 189.858689][ T7128] ref_ctr_offset mismatch. inode: 0x8bd offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 189.932169][ T7133] GPL: port 1(erspan0) entered blocking state [ 189.995049][ T7133] GPL: port 1(erspan0) entered disabled state [ 190.001694][ T7133] device erspan0 entered promiscuous mode [ 190.024745][ T7136] GPL: port 1(erspan0) entered blocking state [ 190.030714][ T7136] GPL: port 1(erspan0) entered forwarding state [ 190.182124][ T7138] ip6_vti0: mtu greater than device maximum [ 191.026396][ T7162] FAULT_INJECTION: forcing a failure. [ 191.026396][ T7162] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 191.073232][ T7162] CPU: 1 PID: 7162 Comm: syz.3.2106 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 191.082973][ T7162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 191.092867][ T7162] Call Trace: [ 191.095988][ T7162] [ 191.098835][ T7162] dump_stack_lvl+0x151/0x1c0 [ 191.103275][ T7162] ? io_uring_drop_tctx_refs+0x190/0x190 [ 191.108835][ T7162] dump_stack+0x15/0x20 [ 191.112833][ T7162] should_fail+0x3c6/0x510 [ 191.117079][ T7162] should_fail_usercopy+0x1a/0x20 [ 191.121937][ T7162] _copy_from_user+0x20/0xd0 [ 191.126368][ T7162] __sys_bpf+0x1e9/0x760 [ 191.130456][ T7162] ? fput_many+0x160/0x1b0 [ 191.134880][ T7162] ? bpf_link_show_fdinfo+0x300/0x300 [ 191.140292][ T7162] ? debug_smp_processor_id+0x17/0x20 [ 191.145476][ T7162] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 191.151382][ T7162] __x64_sys_bpf+0x7c/0x90 [ 191.155630][ T7162] x64_sys_call+0x87f/0x9a0 [ 191.159968][ T7162] do_syscall_64+0x3b/0xb0 [ 191.164224][ T7162] ? clear_bhb_loop+0x35/0x90 [ 191.168735][ T7162] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 191.174463][ T7162] RIP: 0033:0x7f8e776aa169 [ 191.178718][ T7162] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 191.198160][ T7162] RSP: 002b:00007f8e75d14038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 191.206422][ T7162] RAX: ffffffffffffffda RBX: 00007f8e778c2fa0 RCX: 00007f8e776aa169 [ 191.214217][ T7162] RDX: 0000000000000028 RSI: 0000400000000080 RDI: 0000000000000012 [ 191.222028][ T7162] RBP: 00007f8e75d14090 R08: 0000000000000000 R09: 0000000000000000 [ 191.229840][ T7162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 191.237650][ T7162] R13: 0000000000000000 R14: 00007f8e778c2fa0 R15: 00007ffd4f4a53c8 [ 191.245553][ T7162] [ 191.614674][ T7175] device wg2 entered promiscuous mode [ 193.024748][ T7239] syz.1.2131[7239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.024853][ T7239] syz.1.2131[7239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.344558][ T7283] device wg2 left promiscuous mode [ 194.537766][ T7283] device wg2 entered promiscuous mode [ 195.491031][ T7319] device veth0_vlan left promiscuous mode [ 195.557939][ T7319] device veth0_vlan entered promiscuous mode [ 195.765342][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 195.783680][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 195.806850][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 199.543284][ T7496] bond_slave_1: mtu less than device minimum [ 200.354574][ T292] syz-executor (292) used greatest stack depth: 20720 bytes left [ 201.997914][ T315] GPL: port 1(erspan0) entered disabled state [ 202.026018][ T315] device erspan0 left promiscuous mode [ 202.037883][ T315] GPL: port 1(erspan0) entered disabled state [ 202.238449][ T315] device veth0_vlan left promiscuous mode [ 204.495036][ T7697] device veth0_vlan left promiscuous mode [ 204.506498][ T7697] device veth0_vlan entered promiscuous mode [ 204.514812][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.525970][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 204.552750][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 208.092957][ T7784] ref_ctr_offset mismatch. inode: 0x98c offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 212.483438][ T7866] ÿÿÿÿÿÿ: renamed from vlan1 [ 212.562265][ T7861] ref_ctr_offset mismatch. inode: 0xa7a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 215.750022][ T7911] syz.1.2350[7911] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.768500][ T7911] syz.1.2350[7911] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.978974][ T7907] ref_ctr_offset mismatch. inode: 0x903 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 219.384105][ T7950] device wg2 left promiscuous mode [ 219.459993][ T7950] device wg2 entered promiscuous mode [ 227.990871][ T30] audit: type=1400 audit(1742298661.342:172): avc: denied { create } for pid=8069 comm="syz.3.2384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=2 req=2238 state=3 status=67 (errno 9: Bad file descriptor) [ 228.316161][ T291] syz-executor (291) used greatest stack depth: 20688 bytes left [ 228.355363][ T290] syz-executor (290) used greatest stack depth: 20320 bytes left [ 229.349070][ T10] GPL: port 1(erspan0) entered disabled state [ 229.357063][ T10] GPL: port 1(erspan0) entered disabled state [ 229.363916][ T10] device erspan0 left promiscuous mode [ 229.369592][ T10] GPL: port 1(erspan0) entered disabled state [ 229.378598][ T10] device erspan0 left promiscuous mode [ 229.383874][ T10] GPL: port 1(erspan0) entered disabled state [ 229.709050][ T10] device veth0_vlan left promiscuous mode