last executing test programs: 6.143280011s ago: executing program 4 (id=2236): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd42"], 0xfdef) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 5.985597034s ago: executing program 4 (id=2241): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xc8, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd42"], 0xfdef) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000), 0xfdef) 5.771667858s ago: executing program 4 (id=2246): perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000c391000000000000b7020000000000008500000095000000b7000000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x2, 0xf7, &(0x7f0000001e40)=""/4107}, 0x4c) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x8000, 0x0, 0xffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r3, 0xffffffffffffffff, 0x20}, 0x57) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r6}, &(0x7f00000004c0), &(0x7f0000000540)=r5}, 0x20) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x800454dd, &(0x7f0000000100)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="00002000000000000000000000c486a6e5000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000071123f000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x34) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r7, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) 5.17745468s ago: executing program 4 (id=2257): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xf, 0xc, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072000000850000000e00000095"], &(0x7f0000000000)='GPL\x00', 0x985ebd8, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="000000004080000000fef401008f3bf0e2000002", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28, @ANYRES64=r0], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000001000000b70400000800000085000000950000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r2}, 0x18) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r4}, 0x10) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) (async) write$cgroup_subtree(r3, &(0x7f0000000140)=ANY=[], 0xfdef) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='signal_generate\x00', r0}, 0x18) (async, rerun: 64) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0e000000040000000400000009"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0, r7}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)) (async, rerun: 64) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) 4.828486717s ago: executing program 4 (id=2261): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=@base={0xb, 0x5, 0x7, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8948, &(0x7f0000000340)={'vlan0\x00', @local}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x5, 0x2a, 0x5}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r2}, &(0x7f0000000200), &(0x7f00000002c0)=r3}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x6) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r5}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004000000"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x80) 4.702681489s ago: executing program 2 (id=2263): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xc8, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce2200182f00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa35f088be"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) 4.593244231s ago: executing program 4 (id=2264): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000240)=ANY=[@ANYRESHEX=r1, @ANYRES8=r0, @ANYRESOCT=r1, @ANYRES64=r1], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x202000, 0x0) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000181200"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r3, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f00000003c0)=[0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x58, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000480), &(0x7f0000000580), 0x8, 0x1b, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x3, 0x3, 0x3, 0x1, 0x5, 0x8}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, 0xf}, 0x94) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f00000000c0)=0x6b67e196, 0x12) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x1, 0xffff, 0x1, 0x7, 0x200, r0, 0x7, '\x00', r4, r6, 0x5, 0x4, 0x3}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000eaffffffffffffff18110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x11, 0x4, 0x4, 0x5}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r8}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) 3.598552761s ago: executing program 2 (id=2269): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xc8, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd42"], 0xfdef) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) 3.498933342s ago: executing program 2 (id=2270): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xc8, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 3.439125414s ago: executing program 2 (id=2272): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b707000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000080), &(0x7f0000000240)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg(0xffffffffffffffff, &(0x7f00000021c0)={&(0x7f0000000400)=@nfc_llcp={0x27, 0x0, 0x1, 0x7, 0x0, 0x2, "c6452efe6e2df9d4806c09bcf13db222aec97839340835eabe7d214bc58c849c7b5680d27a6188ba4280f99a4c820a50737527deeef0d444c3bdd11527d16c", 0x2}, 0x80, &(0x7f0000002140)=[{&(0x7f0000000480)="c05e37723bbe2489be64b6cf7c134dd063e5e34fd681c6582661708a4a319c566a027c365efadea11c07fa424ae627586d8c26b28a75776f71021f3ddce9fb66839dc82b183d576f16aff0cbf7790020dec38a3a9ef44c40b548d54963eaa60b0af5a6e7c60962d0477d5b935e53917de93827d5ca34413b86b60479960d8542c586780712b7428090cda73a194d7ceeafd550beb141adfe9b6f6ca889879c3092ba584b777254597905823c00d2c5277bdb628d2c7b93170199ef00215cce5cb731551278836d24fd55f9d56f0c7322a36dc227a738e2de8eacf2e4dbe5af1baba4c86ea0c6073be263ed95", 0xec}, {&(0x7f0000001080)="25858bde408a5fbcad2d1f3424da448731942d30c37b5ebfe34873e254d62703d615fe38813780e14035536c835988d1d7a54928133f7e3224ff74bb144ab2cabd05cb1a25a68f81c6ffa19b06d87fb3aa43edb43b41129bc13938be0c5afa74c0b1af9818035951e52be7a3fcd389383c6200c33c8732de5bf7672042da2871a241c10611a72d0de4e29a72e638855e131383ce511f19", 0x97}, {&(0x7f00000002c0)="d760a98d71f09aecdb2d41", 0xb}, {&(0x7f0000000580)="058c8af88c50acbd7bc50f5279dd641afb333ea0134afcd49980f4f1364c169356d6ab61e6b519378ded", 0x2a}, {&(0x7f0000001140)="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", 0x1000}], 0x5}, 0x20004040) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/mnt\x00') socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0x1e9f, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x61, 0x7f, 0x86, 0xfffff014}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x10040) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100036c00fe08fff500000200875a65969ff57b00"/48], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x40040004) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r4, 0x40047452, 0xf0ff1f00000000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 2.57040393s ago: executing program 3 (id=2284): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xc8, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 2.569839671s ago: executing program 0 (id=2285): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x3d) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4062, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = gettid() syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/user\x00') syz_open_procfs$namespace(r2, &(0x7f0000000180)='ns/user\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={r1, 0x2000002, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r3}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES16=r3], 0x0, 0x2f0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0x0, 0x0, 0x6, 0x0, 0x100, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x2}, 0x0, 0x2000000, 0xfffffffc, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x7, 0x0, 0x58c5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x9, '\x00', 0x0, 0x0}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x18) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110c23003f) write$cgroup_int(r0, &(0x7f00000002c0)=0x9, 0x12) 2.567574191s ago: executing program 2 (id=2286): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00a4024318e903e4f39a0f1c2c00000068294f", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(0x0, 0x0, 0xffeffffffffffff9, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r4, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1300000004000200080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000980), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x2b, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xbe9c06, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x13, &(0x7f0000000340)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) 2.533954651s ago: executing program 3 (id=2287): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x3d) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4062, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = gettid() syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/user\x00') syz_open_procfs$namespace(r2, &(0x7f0000000180)='ns/user\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={r1, 0x2000002, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r3}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES16=r3], 0x0, 0x2f0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0x0, 0x0, 0x6, 0x0, 0x100, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x2}, 0x0, 0x2000000, 0xfffffffc, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYRES16], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x7, 0x0, 0x58c5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x9, '\x00', 0x0, 0x0}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x18) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110c23003f) write$cgroup_int(r0, &(0x7f00000002c0)=0x9, 0x12) 767.261985ms ago: executing program 2 (id=2288): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000680)}, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d0000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/../file0/../file0/file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000880), 0x12) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x61, 0x2e, 0x2e]}}, 0x0, 0x1e}, 0x28) perf_event_open$cgroup(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x3, 0x2, 0x0, 0x4, 0x21000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000300), 0xa}, 0x4000, 0x8000000000000001, 0x4, 0x3, 0x6, 0x3f, 0x16ae, 0x0, 0x2, 0x0, 0xffff}, r0, 0x1, r1, 0x9) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000080", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00 \x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000030000000200"/28], 0x50) perf_event_open(&(0x7f0000000940)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2d, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000e8000000000040d900008500000023000000850000000f00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000140)='mm_page_alloc\x00', r5}, 0x10) ioctl$TUNGETVNETLE(r3, 0x40047451, &(0x7f0000000180)) 617.190868ms ago: executing program 1 (id=2290): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000700000000000009209500000000000000f7315374ce569ec55869bfbcfa7c4e8f52e6288f2fbc43a3af3c6b881320c24423492f2fc14c9de730f42434dfa11c77edc1f06776d8"], &(0x7f0000000040)='syzkaller\x00'}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000040)='syz1\x00', 0x1ff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffff7a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_kthread_work_queue_work\x00', r5}, 0x10) close(0xffffffffffffffff) 596.055579ms ago: executing program 3 (id=2291): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xc8, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd42"], 0xfdef) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) 586.136209ms ago: executing program 0 (id=2292): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xc8, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce2200182f00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa35f088be"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) 523.75607ms ago: executing program 3 (id=2293): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x11, 0x28, &(0x7f0000000680)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2415}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000300)='syzkaller\x00', 0x2, 0x90, &(0x7f00000007c0)=""/144, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x1, 0xd, 0x3, 0x4}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000380)=[r0], &(0x7f00000004c0)=[{0x1, 0x5, 0x3, 0x4}, {0x3, 0x2, 0x8}, {0x5, 0x2, 0xa, 0xa}, {0x5, 0x3, 0x6}], 0x10, 0x314}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r3, 0x0, 0x4}, 0xffffffffffffffc3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r4, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9b}, 0x94) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)=ANY=[@ANYRES32], 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r6, 0x0}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r6}, &(0x7f0000000040), &(0x7f0000000140)=r7}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) 511.87613ms ago: executing program 0 (id=2294): socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000180)) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/2210], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 299.821264ms ago: executing program 0 (id=2295): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRESOCT=r0, @ANYBLOB="ab21000000000000000007000200000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="10000000040000000800000008000000000000", @ANYBLOB="0000fffffffffffffffffffffffd5f2e"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000900)=@o_path={&(0x7f00000008c0)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x0, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x3}, 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4}, 0x8) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x56}, 0x28) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) 287.290355ms ago: executing program 1 (id=2296): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x0, 0xa, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x61980, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000800", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x11, 0x4, 0x4, 0x2, 0x0, 0x1, 0x4}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x14, &(0x7f0000000bc0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000069006c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r2}, 0xc) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async) r4 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') 282.048195ms ago: executing program 3 (id=2297): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xc8, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce2200182f00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa35f088be"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) 187.911896ms ago: executing program 1 (id=2298): perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x19}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000500)=""/73}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 186.143737ms ago: executing program 3 (id=2299): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000007c0)='T', 0x1}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18}, 0x0) recvmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x10062) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b40200000100000061194c0000000000850000002700000095000000000000009683c8d87699f72fa94f436ec1ff59664e1812f6082c68dc707bb9f12e6c61cd4eae5bf6260e5fea29f5ed7de02389b1920d7a82010a3d38f11ebe70164ac81bbcbe4b1aecaec10000a658e53c437c980bd722d70403e4c52b30b7239c38ea22f0a9919415cfe83e9ff9218b82eb5f84ed89ee56bf5c040713f97dea7437cc0ce0b864ac010b8a0c7348e6a3e4d7ef63bf74855d42530f1b5dfc9deb2b0933b1a3c8fd7e4bf87fa9cc0237c6e266a92f0e986a8c43665827331c824c06a6dfb5127a8ae20e634f787447afecd92b6da2e8ac5bb8463b1a45"], &(0x7f0000000080)='syzkaller\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x5d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='&[&.)\\\x00') ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={r2, 0x58, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000007c0)={0xfffffffb, 0x0}, 0x8) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x18, 0x1d, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x38b1}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@btf_id={0x18, 0xa, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x1, 0x1, 0x0, r2}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xff}}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000900)='GPL\x00', 0x200, 0x4b, &(0x7f0000000940)=""/75, 0x61680, 0x42, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000009c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000a00)={0x0, 0x5, 0xa, 0x3}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000b00)=[r2], &(0x7f0000000b40)=[{0x1, 0x1, 0xa, 0xc}, {0x1, 0x1, 0x2, 0x1}, {0x3, 0x4, 0xf, 0x6}], 0x10, 0x2fa}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x11) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x17, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x3}, [@generic={0x7, 0x5, 0x8, 0x8, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7ff}}]}, &(0x7f00000004c0)='GPL\x00', 0x8, 0x9f, &(0x7f0000000500)=""/159, 0x40f00, 0x5, '\x00', r4, @fallback=0x37, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x2, 0xd, 0x2, 0x5}, 0x10, r5, r6, 0x8, &(0x7f0000000c40)=[r8, r2], &(0x7f0000000c80)=[{0x3, 0x5, 0xb, 0x7}, {0x3, 0x2, 0x8, 0x8}, {0x4, 0x3, 0x0, 0xc}, {0x1, 0x4, 0x5, 0x8}, {0x5, 0x1, 0xc, 0x8}, {0x4, 0x3, 0x10, 0x5}, {0x0, 0x1, 0xd, 0x6}, {0x4, 0x5, 0x6, 0x9}], 0x10, 0x8000}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xb, 0xff, 0x2, 0x9, 0x1}, 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r11, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r12, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781"], 0xfdef) bpf$LINK_DETACH(0x22, &(0x7f00000000c0)=r12, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r13}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r9}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={r9, &(0x7f0000000300), &(0x7f0000000340)=""/55}, 0x20) 139.226818ms ago: executing program 1 (id=2300): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000100b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001240)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x4b) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x80) 122.833968ms ago: executing program 0 (id=2301): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000009bd10000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x5, [@decl_tag={0x3, 0x0, 0x0, 0x11, 0x5, 0x8}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xd, 0x3}, {0x4, 0x1}, {0xd, 0x1}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xb, 0x1}, {0xd, 0x3}, {0x7, 0x3}]}]}, {0x0, [0x5f, 0x61, 0x2e]}}, &(0x7f0000000040)=""/1, 0x75, 0x1, 0x1, 0x1, 0x10000, @value=r2}, 0x28) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x5, 0x6, 0xd, 0x20000, r2, 0x2, '\x00', 0x0, r3, 0x1, 0x3, 0x3, 0x4}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r4, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd020f4c0c8c56147d66527da307bf731fef97861750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3665f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447c2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0000000000000003629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d7b90dfae158b94f50adab988dd8e12b1b56073d0d10f7067c881434af5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf77bfc95769a9294df517d90bdc01e73835efd98ad5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b31592479ecf2392548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbe1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5646ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4766e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec859c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f250057931d828ec78e116ae46c4897e2795b6ff92e9a1f63a6ed8fb4f8f3a6ec4e76f8621e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403f02734137ff47257f164391c673b6071b6ad0f05eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f5589829b6b0679b5d65a81826fc9b38f791c8f1892b51ad65a89bc84646ebf78f5d5d4804d9abb071fd711b5e7cc163b42a6510b8f5ee6747df0b560eabe0499bf1fef7c18bb9f55effa018679845c6598fb78bf1b8d9d9f04a5f6062c2bbb91952755b3f7c948268cb647d0a0bb1286480615941154a01d23734bcafe3b164474e2f2efa77850686ee4541f3e79efa63545a7ae53d5f0c40cc86473f7eb093980bd0d97bb4750128d9c519984c5f731ea259e71b2f12d67ce12e52c283e74594dfc933e625737ed231d61263721d46daf093f770357cd78fe1431aef52b4a0a933f1a5334ad03f3876fc8a8e187f80318427b4c922075cf829e3cc49d71d52137b48e1fb6b05dd1c7b251a7059f0a4b4f3431f67fc65b75c202e43816e34ff41db85bacd77b25242830b788ae1e00"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000}, 0x1e) 4.19392ms ago: executing program 0 (id=2302): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x3d) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4062, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = gettid() syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/user\x00') syz_open_procfs$namespace(r2, &(0x7f0000000180)='ns/user\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={r1, 0x2000002, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r3}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES16=r3], 0x0, 0x2f0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0x0, 0x0, 0x6, 0x0, 0x100, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x2}, 0x0, 0x2000000, 0xfffffffc, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYRES16], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x7, 0x0, 0x58c5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x9, '\x00', 0x0, 0x0}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x18) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110c23003f) write$cgroup_int(r0, &(0x7f00000002c0)=0x9, 0x12) 3.75504ms ago: executing program 1 (id=2303): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xc8, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd42"], 0xfdef) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) 0s ago: executing program 1 (id=2304): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x3d) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4062, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = gettid() syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/user\x00') syz_open_procfs$namespace(r2, &(0x7f0000000180)='ns/user\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={r1, 0x2000002, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r3}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES16=r3], 0x0, 0x2f0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0x0, 0x0, 0x6, 0x0, 0x100, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x2}, 0x0, 0x2000000, 0xfffffffc, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x7, 0x0, 0x58c5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x9, '\x00', 0x0, 0x0}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x18) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110c23003f) write$cgroup_int(r0, &(0x7f00000002c0)=0x9, 0x12) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.208' (ED25519) to the list of known hosts. [ 24.367978][ T30] audit: type=1400 audit(1757743762.344:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.369354][ T273] cgroup: Unknown subsys name 'net' [ 24.390625][ T30] audit: type=1400 audit(1757743762.344:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.417930][ T30] audit: type=1400 audit(1757743762.374:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.418304][ T273] cgroup: Unknown subsys name 'devices' [ 24.563079][ T273] cgroup: Unknown subsys name 'hugetlb' [ 24.568739][ T273] cgroup: Unknown subsys name 'rlimit' [ 24.767881][ T30] audit: type=1400 audit(1757743762.744:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 24.791043][ T30] audit: type=1400 audit(1757743762.744:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 24.815826][ T30] audit: type=1400 audit(1757743762.744:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 24.823351][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 24.847866][ T30] audit: type=1400 audit(1757743762.824:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.874063][ T30] audit: type=1400 audit(1757743762.824:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.903504][ T30] audit: type=1400 audit(1757743762.884:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.904162][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 24.929167][ T30] audit: type=1400 audit(1757743762.884:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.493862][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.500974][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.508442][ T281] device bridge_slave_0 entered promiscuous mode [ 25.516652][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.523735][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.531171][ T281] device bridge_slave_1 entered promiscuous mode [ 25.619936][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.627033][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.634478][ T284] device bridge_slave_0 entered promiscuous mode [ 25.642666][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.649711][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.657152][ T284] device bridge_slave_1 entered promiscuous mode [ 25.693393][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.700497][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.707878][ T283] device bridge_slave_0 entered promiscuous mode [ 25.714992][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.722098][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.729478][ T283] device bridge_slave_1 entered promiscuous mode [ 25.805804][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.812977][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.820351][ T285] device bridge_slave_0 entered promiscuous mode [ 25.827308][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.834457][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.841900][ T285] device bridge_slave_1 entered promiscuous mode [ 25.927231][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.934326][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.941646][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.948675][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.957489][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.964644][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.972180][ T282] device bridge_slave_0 entered promiscuous mode [ 25.979078][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.986391][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.993892][ T282] device bridge_slave_1 entered promiscuous mode [ 26.032670][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.039726][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.047075][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.054127][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.088731][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.095806][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.103176][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.110211][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.145502][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.152567][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.159914][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.166969][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.179308][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.186997][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.194490][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.202184][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.209514][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.216830][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.224073][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.231485][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.239801][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.247286][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.271177][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.279391][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.286546][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.295234][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.319648][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.328024][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.335172][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.347228][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.356789][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.365379][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.372430][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.384591][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.403712][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.411598][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.419815][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.426879][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.434766][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.443147][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.450197][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.457783][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.466088][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.473135][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.480523][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.500644][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.508777][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.517264][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.525355][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.533395][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.541036][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.548482][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.557038][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.565334][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.572468][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.579825][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.588193][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.596309][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.603356][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.629583][ T283] device veth0_vlan entered promiscuous mode [ 26.636422][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 26.644320][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.652701][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.660737][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.669030][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.677277][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.685786][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.693980][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.701036][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.708477][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.717012][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.725354][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.732397][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.739745][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.748274][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.756917][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.764867][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.772837][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.781063][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.791327][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.798809][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.819101][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.827613][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.836191][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.844382][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.852589][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.860710][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.870462][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.878542][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.899971][ T283] device veth1_macvtap entered promiscuous mode [ 26.908958][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.917501][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.925718][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.933319][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.940887][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.948253][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.955846][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.964063][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.972284][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.979854][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.988294][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.996671][ T282] device veth0_vlan entered promiscuous mode [ 27.007607][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.016063][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.024680][ T281] device veth0_vlan entered promiscuous mode [ 27.034880][ T285] device veth0_vlan entered promiscuous mode [ 27.043317][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.051288][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.059261][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.067271][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.075425][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.082948][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.090401][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.097796][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.105872][ T284] device veth0_vlan entered promiscuous mode [ 27.124149][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.132416][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.140747][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.148849][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.157409][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.165899][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.174406][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.183589][ T284] device veth1_macvtap entered promiscuous mode [ 27.192414][ T282] device veth1_macvtap entered promiscuous mode [ 27.211515][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.219919][ T283] request_module fs-gadgetfs succeeded, but still no fs? [ 27.227470][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.236960][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.245267][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.253668][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.278011][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.292443][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.300262][ C1] hrtimer: interrupt took 25769 ns [ 27.302101][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.314245][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.323265][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.331889][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.341744][ T281] device veth1_macvtap entered promiscuous mode [ 27.352143][ T285] device veth1_macvtap entered promiscuous mode [ 27.367866][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.398948][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.407851][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.416353][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.425120][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.433763][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.458567][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.467881][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.476556][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.485128][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.738924][ T356] device veth0_vlan left promiscuous mode [ 27.751714][ T356] device veth0_vlan entered promiscuous mode [ 28.735901][ T378] device sit0 entered promiscuous mode [ 29.725948][ T30] kauditd_printk_skb: 37 callbacks suppressed [ 29.725964][ T30] audit: type=1400 audit(1757743767.704:111): avc: denied { create } for pid=405 comm="syz.2.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 30.367514][ T414] device pim6reg1 entered promiscuous mode [ 30.608415][ T30] audit: type=1400 audit(1757743768.584:112): avc: denied { create } for pid=430 comm="syz.3.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 31.044184][ T30] audit: type=1400 audit(1757743768.614:113): avc: denied { cpu } for pid=426 comm="syz.2.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 31.372246][ T433] device syzkaller0 entered promiscuous mode [ 31.522576][ T30] audit: type=1400 audit(1757743769.504:114): avc: denied { tracepoint } for pid=449 comm="syz.0.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 31.807668][ T30] audit: type=1400 audit(1757743769.784:115): avc: denied { write } for pid=452 comm="syz.2.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 33.413206][ T30] audit: type=1400 audit(1757743771.394:116): avc: denied { append } for pid=479 comm="syz.0.43" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 33.629116][ T484] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 38.705653][ T550] device pim6reg1 entered promiscuous mode [ 42.704989][ T605] device veth0_vlan left promiscuous mode [ 42.760904][ T605] device veth0_vlan entered promiscuous mode [ 44.992389][ T645] device sit0 entered promiscuous mode [ 46.046640][ T660] device veth1_macvtap left promiscuous mode [ 46.100730][ T660] device macsec0 entered promiscuous mode [ 46.478735][ T704] syz.3.121[704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.478803][ T704] syz.3.121[704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.478781][ T703] syz.3.121[703] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.532341][ T30] audit: type=1400 audit(1757743784.504:117): avc: denied { read } for pid=700 comm="syz.3.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 47.120358][ T738] device pim6reg1 entered promiscuous mode [ 47.416735][ T740] device veth0_vlan left promiscuous mode [ 47.537124][ T740] device veth0_vlan entered promiscuous mode [ 47.928713][ T784] device pim6reg1 entered promiscuous mode [ 48.166462][ T792] device sit0 entered promiscuous mode [ 48.714121][ T30] audit: type=1400 audit(1757743786.694:118): avc: denied { create } for pid=825 comm="syz.2.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 50.011689][ T873] device sit0 entered promiscuous mode [ 50.288642][ T853] syz.0.170 (853) used greatest stack depth: 22048 bytes left [ 51.808271][ T30] audit: type=1400 audit(1757743789.784:119): avc: denied { relabelfrom } for pid=927 comm="syz.4.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 51.974500][ T30] audit: type=1400 audit(1757743789.814:120): avc: denied { relabelto } for pid=927 comm="syz.4.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 52.241586][ T30] audit: type=1400 audit(1757743790.224:121): avc: denied { create } for pid=942 comm="syz.0.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 52.809865][ T974] device syzkaller0 entered promiscuous mode [ 53.364162][ T30] audit: type=1400 audit(1757743791.344:122): avc: denied { create } for pid=1041 comm="syz.2.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 53.972931][ T1059] device veth0_vlan left promiscuous mode [ 53.979002][ T1059] device veth0_vlan entered promiscuous mode [ 54.017194][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 54.085284][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 54.110921][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 55.282278][ T1092] syz.4.251 (1092) used obsolete PPPIOCDETACH ioctl [ 55.717763][ T30] audit: type=1400 audit(1757743793.694:123): avc: denied { create } for pid=1119 comm="syz.4.260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 55.808284][ T1118] device pim6reg1 entered promiscuous mode [ 57.792534][ T1158] device sit0 left promiscuous mode [ 57.884599][ T1166] device syzkaller0 entered promiscuous mode [ 59.708925][ T30] audit: type=1400 audit(1757743797.684:124): avc: denied { create } for pid=1208 comm="syz.0.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 61.134174][ T1262] device pim6reg1 entered promiscuous mode [ 61.220290][ T30] audit: type=1400 audit(1757743799.194:125): avc: denied { create } for pid=1259 comm="syz.3.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 61.247744][ T1270] device syzkaller0 entered promiscuous mode [ 63.161832][ T1281] device pim6reg1 entered promiscuous mode [ 64.156622][ T1308] GPL: port 1(erspan0) entered blocking state [ 64.165398][ T1308] GPL: port 1(erspan0) entered disabled state [ 64.172134][ T1308] device erspan0 entered promiscuous mode [ 65.368670][ T1321] device wg2 entered promiscuous mode [ 65.699678][ T1342] device veth0_vlan left promiscuous mode [ 65.726785][ T1353] syz.3.347 uses obsolete (PF_INET,SOCK_PACKET) [ 65.756393][ T30] audit: type=1400 audit(1757743803.734:126): avc: denied { create } for pid=1350 comm="syz.3.347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 65.786964][ T1342] device veth0_vlan entered promiscuous mode [ 67.600561][ T1386] device syzkaller0 entered promiscuous mode [ 67.748241][ T30] audit: type=1400 audit(1757743805.724:127): avc: denied { create } for pid=1385 comm="syz.2.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 70.031840][ T30] audit: type=1400 audit(1757743808.004:128): avc: denied { create } for pid=1458 comm="syz.0.382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 70.165701][ T1484] syz.3.390[1484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.167761][ T1484] syz.3.390[1484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.566177][ T30] audit: type=1400 audit(1757743809.544:129): avc: denied { create } for pid=1537 comm="syz.0.408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 73.513277][ T1644] device pim6reg1 entered promiscuous mode [ 74.431216][ T1725] device pim6reg1 entered promiscuous mode [ 75.680926][ T1775] syz.2.480[1775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.681002][ T1775] syz.2.480[1775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.112009][ T1860] syz.1.517[1860] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.124161][ T1860] syz.1.517[1860] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.597357][ T1910] FAULT_INJECTION: forcing a failure. [ 79.597357][ T1910] name failslab, interval 1, probability 0, space 0, times 1 [ 79.624107][ T1910] CPU: 0 PID: 1910 Comm: syz.3.537 Not tainted syzkaller #0 [ 79.631442][ T1910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 79.641530][ T1910] Call Trace: [ 79.644837][ T1910] [ 79.647799][ T1910] __dump_stack+0x21/0x30 [ 79.652160][ T1910] dump_stack_lvl+0xee/0x150 [ 79.656883][ T1910] ? show_regs_print_info+0x20/0x20 [ 79.662131][ T1910] ? avc_has_perm_noaudit+0x2f4/0x460 [ 79.667536][ T1910] dump_stack+0x15/0x20 [ 79.671707][ T1910] should_fail+0x3c1/0x510 [ 79.676155][ T1910] __should_failslab+0xa4/0xe0 [ 79.680971][ T1910] should_failslab+0x9/0x20 [ 79.685493][ T1910] slab_pre_alloc_hook+0x3b/0xe0 [ 79.690471][ T1910] ? __alloc_skb+0xe0/0x740 [ 79.695007][ T1910] kmem_cache_alloc+0x44/0x260 [ 79.699789][ T1910] __alloc_skb+0xe0/0x740 [ 79.704133][ T1910] alloc_skb_with_frags+0xa8/0x620 [ 79.709266][ T1910] sock_alloc_send_pskb+0x853/0x980 [ 79.714483][ T1910] ? is_bpf_text_address+0x177/0x190 [ 79.719877][ T1910] ? __kernel_text_address+0xa0/0x100 [ 79.725267][ T1910] ? sock_kzfree_s+0x60/0x60 [ 79.729957][ T1910] ? stack_trace_save+0x98/0xe0 [ 79.734826][ T1910] tun_get_user+0x4e6/0x33c0 [ 79.739599][ T1910] ? __kasan_unpoison_object_data+0x20/0x20 [ 79.745512][ T1910] ? kmem_cache_free+0x100/0x320 [ 79.750463][ T1910] ? __x64_sys_openat+0x136/0x160 [ 79.755503][ T1910] ? x64_sys_call+0x219/0x9a0 [ 79.760209][ T1910] ? tun_do_read+0x1c40/0x1c40 [ 79.764996][ T1910] ? kstrtouint_from_user+0x1a0/0x200 [ 79.770381][ T1910] ? kstrtol_from_user+0x260/0x260 [ 79.775504][ T1910] ? bpf_get_current_comm+0x44/0xa0 [ 79.780716][ T1910] ? avc_policy_seqno+0x1b/0x70 [ 79.785582][ T1910] ? selinux_file_permission+0x2aa/0x510 [ 79.791407][ T1910] tun_chr_write_iter+0x1eb/0x2e0 [ 79.796459][ T1910] vfs_write+0x802/0xf70 [ 79.800719][ T1910] ? file_end_write+0x1b0/0x1b0 [ 79.805590][ T1910] ? __fget_files+0x2c4/0x320 [ 79.810289][ T1910] ? __fdget_pos+0x1f7/0x380 [ 79.814896][ T1910] ? ksys_write+0x71/0x240 [ 79.819341][ T1910] ksys_write+0x140/0x240 [ 79.823692][ T1910] ? __ia32_sys_read+0x90/0x90 [ 79.828484][ T1910] ? debug_smp_processor_id+0x17/0x20 [ 79.833881][ T1910] __x64_sys_write+0x7b/0x90 [ 79.838478][ T1910] x64_sys_call+0x8ef/0x9a0 [ 79.842990][ T1910] do_syscall_64+0x4c/0xa0 [ 79.847418][ T1910] ? clear_bhb_loop+0x50/0xa0 [ 79.852108][ T1910] ? clear_bhb_loop+0x50/0xa0 [ 79.856791][ T1910] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 79.862783][ T1910] RIP: 0033:0x7fef3a178ba9 [ 79.867209][ T1910] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 79.886843][ T1910] RSP: 002b:00007fef38be1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 79.895353][ T1910] RAX: ffffffffffffffda RBX: 00007fef3a3bffa0 RCX: 00007fef3a178ba9 [ 79.903417][ T1910] RDX: 000000000000fdef RSI: 0000200000000980 RDI: 00000000000000c8 [ 79.911386][ T1910] RBP: 00007fef38be1090 R08: 0000000000000000 R09: 0000000000000000 [ 79.919357][ T1910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 79.927324][ T1910] R13: 00007fef3a3c0038 R14: 00007fef3a3bffa0 R15: 00007ffc193ddea8 [ 79.935302][ T1910] [ 80.204186][ T1920] FAULT_INJECTION: forcing a failure. [ 80.204186][ T1920] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 80.220622][ T1920] CPU: 1 PID: 1920 Comm: syz.0.549 Not tainted syzkaller #0 [ 80.227967][ T1920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 80.238052][ T1920] Call Trace: [ 80.241345][ T1920] [ 80.244284][ T1920] __dump_stack+0x21/0x30 [ 80.248620][ T1920] dump_stack_lvl+0xee/0x150 [ 80.253213][ T1920] ? show_regs_print_info+0x20/0x20 [ 80.258409][ T1920] ? stack_trace_save+0x98/0xe0 [ 80.263264][ T1920] dump_stack+0x15/0x20 [ 80.267422][ T1920] should_fail+0x3c1/0x510 [ 80.271842][ T1920] should_fail_alloc_page+0x55/0x80 [ 80.277045][ T1920] prepare_alloc_pages+0x156/0x600 [ 80.282164][ T1920] ? __alloc_pages_bulk+0xab0/0xab0 [ 80.287387][ T1920] __alloc_pages+0x10a/0x440 [ 80.291976][ T1920] ? prep_new_page+0x110/0x110 [ 80.296777][ T1920] kmalloc_order+0x4c/0x160 [ 80.301405][ T1920] ? alloc_skb_with_frags+0xa8/0x620 [ 80.306690][ T1920] kmalloc_order_trace+0x18/0xb0 [ 80.311629][ T1920] __kmalloc_track_caller+0x198/0x2c0 [ 80.317969][ T1920] ? kmem_cache_alloc+0xf7/0x260 [ 80.322913][ T1920] ? alloc_skb_with_frags+0xa8/0x620 [ 80.328202][ T1920] __alloc_skb+0x21a/0x740 [ 80.332621][ T1920] alloc_skb_with_frags+0xa8/0x620 [ 80.337864][ T1920] sock_alloc_send_pskb+0x853/0x980 [ 80.343155][ T1920] ? is_bpf_text_address+0x177/0x190 [ 80.348583][ T1920] ? __kernel_text_address+0xa0/0x100 [ 80.354330][ T1920] ? sock_kzfree_s+0x60/0x60 [ 80.358935][ T1920] ? stack_trace_save+0x98/0xe0 [ 80.363797][ T1920] tun_get_user+0x4e6/0x33c0 [ 80.368398][ T1920] ? __kasan_unpoison_object_data+0x20/0x20 [ 80.374330][ T1920] ? kmem_cache_free+0x100/0x320 [ 80.379361][ T1920] ? __x64_sys_openat+0x136/0x160 [ 80.384393][ T1920] ? x64_sys_call+0x219/0x9a0 [ 80.389080][ T1920] ? tun_do_read+0x1c40/0x1c40 [ 80.393851][ T1920] ? kstrtouint_from_user+0x1a0/0x200 [ 80.399224][ T1920] ? kstrtol_from_user+0x260/0x260 [ 80.404340][ T1920] ? putname+0x111/0x160 [ 80.408585][ T1920] ? bpf_get_current_comm+0x44/0xa0 [ 80.413792][ T1920] ? avc_policy_seqno+0x1b/0x70 [ 80.418661][ T1920] ? selinux_file_permission+0x2aa/0x510 [ 80.424300][ T1920] tun_chr_write_iter+0x1eb/0x2e0 [ 80.429330][ T1920] vfs_write+0x802/0xf70 [ 80.433578][ T1920] ? file_end_write+0x1b0/0x1b0 [ 80.438429][ T1920] ? __fget_files+0x2c4/0x320 [ 80.443115][ T1920] ? __fdget_pos+0x1f7/0x380 [ 80.447704][ T1920] ? ksys_write+0x71/0x240 [ 80.452120][ T1920] ksys_write+0x140/0x240 [ 80.456452][ T1920] ? __ia32_sys_read+0x90/0x90 [ 80.461214][ T1920] ? debug_smp_processor_id+0x17/0x20 [ 80.466595][ T1920] __x64_sys_write+0x7b/0x90 [ 80.471186][ T1920] x64_sys_call+0x8ef/0x9a0 [ 80.475692][ T1920] do_syscall_64+0x4c/0xa0 [ 80.480118][ T1920] ? clear_bhb_loop+0x50/0xa0 [ 80.484798][ T1920] ? clear_bhb_loop+0x50/0xa0 [ 80.489477][ T1920] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 80.495378][ T1920] RIP: 0033:0x7f32f08e5ba9 [ 80.499796][ T1920] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 80.519405][ T1920] RSP: 002b:00007f32ef34e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 80.527825][ T1920] RAX: ffffffffffffffda RBX: 00007f32f0b2cfa0 RCX: 00007f32f08e5ba9 [ 80.535833][ T1920] RDX: 000000000000fdef RSI: 0000200000000980 RDI: 00000000000000c8 [ 80.543804][ T1920] RBP: 00007f32ef34e090 R08: 0000000000000000 R09: 0000000000000000 [ 80.551781][ T1920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 80.559754][ T1920] R13: 00007f32f0b2d038 R14: 00007f32f0b2cfa0 R15: 00007ffe33d5eb18 [ 80.567818][ T1920] [ 80.655313][ T1932] syz.1.542[1932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.655409][ T1932] syz.1.542[1932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.123997][ T1952] FAULT_INJECTION: forcing a failure. [ 81.123997][ T1952] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 81.261383][ T1952] CPU: 0 PID: 1952 Comm: syz.0.554 Not tainted syzkaller #0 [ 81.268771][ T1952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 81.278851][ T1952] Call Trace: [ 81.282155][ T1952] [ 81.285109][ T1952] __dump_stack+0x21/0x30 [ 81.289554][ T1952] dump_stack_lvl+0xee/0x150 [ 81.294174][ T1952] ? show_regs_print_info+0x20/0x20 [ 81.299401][ T1952] dump_stack+0x15/0x20 [ 81.303578][ T1952] should_fail+0x3c1/0x510 [ 81.308024][ T1952] should_fail_usercopy+0x1a/0x20 [ 81.313079][ T1952] _copy_from_iter+0x21a/0x1050 [ 81.318038][ T1952] ? __kasan_check_write+0x14/0x20 [ 81.323182][ T1952] ? skb_set_owner_w+0x24d/0x370 [ 81.328192][ T1952] ? copy_mc_pipe_to_iter+0x770/0x770 [ 81.333588][ T1952] ? __kernel_text_address+0xa0/0x100 [ 81.339007][ T1952] ? check_stack_object+0x81/0x140 [ 81.344148][ T1952] ? __kasan_check_read+0x11/0x20 [ 81.349185][ T1952] ? __check_object_size+0x2f4/0x3c0 [ 81.354495][ T1952] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 81.360237][ T1952] ? skb_put+0x10e/0x1f0 [ 81.364482][ T1952] tun_get_user+0xc3c/0x33c0 [ 81.369075][ T1952] ? __kasan_unpoison_object_data+0x20/0x20 [ 81.374972][ T1952] ? kmem_cache_free+0x100/0x320 [ 81.379916][ T1952] ? __x64_sys_openat+0x136/0x160 [ 81.384945][ T1952] ? x64_sys_call+0x219/0x9a0 [ 81.389623][ T1952] ? tun_do_read+0x1c40/0x1c40 [ 81.394392][ T1952] ? kstrtouint_from_user+0x1a0/0x200 [ 81.399772][ T1952] ? kstrtol_from_user+0x260/0x260 [ 81.404893][ T1952] ? putname+0x111/0x160 [ 81.409140][ T1952] ? avc_policy_seqno+0x1b/0x70 [ 81.413992][ T1952] ? selinux_file_permission+0x2aa/0x510 [ 81.419632][ T1952] tun_chr_write_iter+0x1eb/0x2e0 [ 81.424661][ T1952] vfs_write+0x802/0xf70 [ 81.428909][ T1952] ? file_end_write+0x1b0/0x1b0 [ 81.433765][ T1952] ? __fget_files+0x2c4/0x320 [ 81.438447][ T1952] ? __fdget_pos+0x1f7/0x380 [ 81.443039][ T1952] ? ksys_write+0x71/0x240 [ 81.447545][ T1952] ksys_write+0x140/0x240 [ 81.451874][ T1952] ? __ia32_sys_read+0x90/0x90 [ 81.456637][ T1952] ? debug_smp_processor_id+0x17/0x20 [ 81.462015][ T1952] __x64_sys_write+0x7b/0x90 [ 81.466607][ T1952] x64_sys_call+0x8ef/0x9a0 [ 81.471112][ T1952] do_syscall_64+0x4c/0xa0 [ 81.475532][ T1952] ? clear_bhb_loop+0x50/0xa0 [ 81.480211][ T1952] ? clear_bhb_loop+0x50/0xa0 [ 81.484888][ T1952] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 81.490802][ T1952] RIP: 0033:0x7f32f08e5ba9 [ 81.495220][ T1952] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 81.514835][ T1952] RSP: 002b:00007f32ef34e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 81.523249][ T1952] RAX: ffffffffffffffda RBX: 00007f32f0b2cfa0 RCX: 00007f32f08e5ba9 [ 81.531231][ T1952] RDX: 000000000000fdef RSI: 0000200000000980 RDI: 00000000000000c8 [ 81.539202][ T1952] RBP: 00007f32ef34e090 R08: 0000000000000000 R09: 0000000000000000 [ 81.547195][ T1952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.555253][ T1952] R13: 00007f32f0b2d038 R14: 00007f32f0b2cfa0 R15: 00007ffe33d5eb18 [ 81.563252][ T1952] [ 82.238444][ T1990] FAULT_INJECTION: forcing a failure. [ 82.238444][ T1990] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 82.261421][ T1990] CPU: 0 PID: 1990 Comm: syz.2.566 Not tainted syzkaller #0 [ 82.268748][ T1990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 82.278817][ T1990] Call Trace: [ 82.282107][ T1990] [ 82.285051][ T1990] __dump_stack+0x21/0x30 [ 82.289402][ T1990] dump_stack_lvl+0xee/0x150 [ 82.294018][ T1990] ? show_regs_print_info+0x20/0x20 [ 82.299246][ T1990] dump_stack+0x15/0x20 [ 82.303419][ T1990] should_fail+0x3c1/0x510 [ 82.307852][ T1990] should_fail_usercopy+0x1a/0x20 [ 82.312894][ T1990] _copy_to_user+0x20/0x90 [ 82.317335][ T1990] simple_read_from_buffer+0xe9/0x160 [ 82.322726][ T1990] proc_fail_nth_read+0x19a/0x210 [ 82.327778][ T1990] ? proc_fault_inject_write+0x2f0/0x2f0 [ 82.333462][ T1990] ? security_file_permission+0x83/0xa0 [ 82.339034][ T1990] ? proc_fault_inject_write+0x2f0/0x2f0 [ 82.344701][ T1990] vfs_read+0x282/0xbe0 [ 82.348890][ T1990] ? kernel_read+0x1f0/0x1f0 [ 82.353494][ T1990] ? __kasan_check_write+0x14/0x20 [ 82.358640][ T1990] ? mutex_lock+0x95/0x1a0 [ 82.363135][ T1990] ? wait_for_completion_killable_timeout+0x10/0x10 [ 82.369756][ T1990] ? __fget_files+0x2c4/0x320 [ 82.374461][ T1990] ? __fdget_pos+0x2d2/0x380 [ 82.379070][ T1990] ? ksys_read+0x71/0x240 [ 82.383432][ T1990] ksys_read+0x140/0x240 [ 82.387694][ T1990] ? vfs_write+0xf70/0xf70 [ 82.392138][ T1990] ? debug_smp_processor_id+0x17/0x20 [ 82.397534][ T1990] __x64_sys_read+0x7b/0x90 [ 82.402091][ T1990] x64_sys_call+0x96d/0x9a0 [ 82.406620][ T1990] do_syscall_64+0x4c/0xa0 [ 82.411067][ T1990] ? clear_bhb_loop+0x50/0xa0 [ 82.415790][ T1990] ? clear_bhb_loop+0x50/0xa0 [ 82.420485][ T1990] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 82.426396][ T1990] RIP: 0033:0x7fbaa836d5bc [ 82.430823][ T1990] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 82.450566][ T1990] RSP: 002b:00007fbaa6dd7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 82.459015][ T1990] RAX: ffffffffffffffda RBX: 00007fbaa85b5fa0 RCX: 00007fbaa836d5bc [ 82.467001][ T1990] RDX: 000000000000000f RSI: 00007fbaa6dd70a0 RDI: 0000000000000006 [ 82.474982][ T1990] RBP: 00007fbaa6dd7090 R08: 0000000000000000 R09: 0000000000000000 [ 82.482972][ T1990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 82.490963][ T1990] R13: 00007fbaa85b6038 R14: 00007fbaa85b5fa0 R15: 00007ffdbc07c3c8 [ 82.498952][ T1990] [ 83.655780][ T30] audit: type=1400 audit(1757743821.634:130): avc: denied { create } for pid=2056 comm="syz.3.586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 83.720321][ T30] audit: type=1400 audit(1757743821.694:131): avc: denied { create } for pid=2056 comm="syz.3.586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 84.197335][ T2099] device wg2 entered promiscuous mode [ 85.370224][ C0] sched: RT throttling activated [ 86.679916][ T2132] ±ÿ: renamed from bond_slave_0 [ 86.705386][ T2135] device pim6reg1 left promiscuous mode [ 87.156583][ T2148] device pim6reg1 entered promiscuous mode [ 90.736281][ T2272] device sit0 left promiscuous mode [ 90.815962][ T2278] device sit0 entered promiscuous mode [ 90.861631][ T2279] device pim6reg1 entered promiscuous mode [ 97.730262][ T30] audit: type=1400 audit(1757743835.704:132): avc: denied { create } for pid=2390 comm="syz.2.701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 97.787145][ T30] audit: type=1400 audit(1757743835.764:133): avc: denied { create } for pid=2392 comm="syz.0.702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 98.355679][ T30] audit: type=1400 audit(1757743836.334:134): avc: denied { associate } for pid=2427 comm="syz.0.715" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 98.387297][ T2428] device pim6reg1 entered promiscuous mode [ 98.975855][ T2503] device veth0_vlan left promiscuous mode [ 98.983950][ T2503] device veth0_vlan entered promiscuous mode [ 98.991656][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 99.021002][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 99.072184][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 99.093864][ T2509] device wg2 entered promiscuous mode [ 100.124307][ T30] audit: type=1400 audit(1757743838.104:135): avc: denied { attach_queue } for pid=2555 comm="syz.4.759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 101.201495][ T2600] ÿÿÿÿÿÿ: renamed from vlan1 [ 104.730687][ T2712] device sit0 left promiscuous mode [ 104.767262][ T2712] device sit0 entered promiscuous mode [ 105.262502][ T2720] syz.4.822[2720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.262600][ T2720] syz.4.822[2720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.103447][ T2815] device pim6reg1 entered promiscuous mode [ 109.890708][ T2835] device sit0 left promiscuous mode [ 109.903357][ T2842] device pim6reg1 left promiscuous mode [ 112.282202][ T2907] device pim6reg1 entered promiscuous mode [ 112.408790][ T2911] device syzkaller0 entered promiscuous mode [ 113.928813][ T2958] device sit0 left promiscuous mode [ 114.023069][ T2958] device sit0 entered promiscuous mode [ 117.321692][ T3009] device team_slave_1 entered promiscuous mode [ 117.355006][ T30] audit: type=1400 audit(1757743855.334:136): avc: denied { create } for pid=3008 comm="syz.4.927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 117.446951][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 117.455306][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 119.989403][ T3099] device team_slave_1 entered promiscuous mode [ 120.026586][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 120.061188][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 120.570395][ T3123] device pim6reg1 entered promiscuous mode [ 121.061133][ T3180] device team_slave_1 entered promiscuous mode [ 121.067722][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 121.080659][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 125.236374][ T30] audit: type=1400 audit(1757743863.214:137): avc: denied { create } for pid=3259 comm="syz.4.1012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 127.462941][ T3316] device syzkaller0 entered promiscuous mode [ 128.870294][ T3339] device wg2 entered promiscuous mode [ 129.584697][ T3366] -1: renamed from syzkaller0 [ 132.612633][ T3429] device sit0 entered promiscuous mode [ 133.922421][ T3446] device wg2 left promiscuous mode [ 134.136716][ T3474] device sit0 left promiscuous mode [ 134.947125][ T3489] device wg2 entered promiscuous mode [ 136.124180][ T3534] device pim6reg1 entered promiscuous mode [ 136.132954][ T3531] device wg2 left promiscuous mode [ 136.224410][ T3535] device wg2 entered promiscuous mode [ 136.318829][ T3541] device syzkaller0 entered promiscuous mode [ 137.222071][ T3580] device sit0 entered promiscuous mode [ 137.482712][ T3590] FAULT_INJECTION: forcing a failure. [ 137.482712][ T3590] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 137.576857][ T3590] CPU: 1 PID: 3590 Comm: syz.3.1129 Not tainted syzkaller #0 [ 137.584297][ T3590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 137.594471][ T3590] Call Trace: [ 137.597776][ T3590] [ 137.600723][ T3590] __dump_stack+0x21/0x30 [ 137.605105][ T3590] dump_stack_lvl+0xee/0x150 [ 137.609757][ T3590] ? show_regs_print_info+0x20/0x20 [ 137.614981][ T3590] ? vfs_write+0xc17/0xf70 [ 137.619536][ T3590] dump_stack+0x15/0x20 [ 137.623714][ T3590] should_fail+0x3c1/0x510 [ 137.628149][ T3590] should_fail_usercopy+0x1a/0x20 [ 137.633280][ T3590] _copy_from_user+0x20/0xd0 [ 137.637891][ T3590] __sys_bpf+0x233/0x730 [ 137.642147][ T3590] ? bpf_link_show_fdinfo+0x310/0x310 [ 137.647550][ T3590] ? debug_smp_processor_id+0x17/0x20 [ 137.652950][ T3590] __x64_sys_bpf+0x7c/0x90 [ 137.657394][ T3590] x64_sys_call+0x4b9/0x9a0 [ 137.661920][ T3590] do_syscall_64+0x4c/0xa0 [ 137.666370][ T3590] ? clear_bhb_loop+0x50/0xa0 [ 137.671075][ T3590] ? clear_bhb_loop+0x50/0xa0 [ 137.675784][ T3590] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 137.681700][ T3590] RIP: 0033:0x7fef3a178ba9 [ 137.686136][ T3590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.705906][ T3590] RSP: 002b:00007fef38be1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 137.714352][ T3590] RAX: ffffffffffffffda RBX: 00007fef3a3bffa0 RCX: 00007fef3a178ba9 [ 137.722449][ T3590] RDX: 0000000000000080 RSI: 0000200000002ac0 RDI: 0000000000000005 [ 137.730432][ T3590] RBP: 00007fef38be1090 R08: 0000000000000000 R09: 0000000000000000 [ 137.738409][ T3590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 137.746386][ T3590] R13: 00007fef3a3c0038 R14: 00007fef3a3bffa0 R15: 00007ffc193ddea8 [ 137.754371][ T3590] [ 138.079894][ T3601] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 138.164564][ T3601] device syzkaller0 entered promiscuous mode [ 140.473079][ T3628] FAULT_INJECTION: forcing a failure. [ 140.473079][ T3628] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 140.473805][ T3626] device syzkaller0 entered promiscuous mode [ 140.486307][ T3628] CPU: 0 PID: 3628 Comm: syz.3.1142 Not tainted syzkaller #0 [ 140.499754][ T3628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 140.509819][ T3628] Call Trace: [ 140.513115][ T3628] [ 140.516046][ T3628] __dump_stack+0x21/0x30 [ 140.520383][ T3628] dump_stack_lvl+0xee/0x150 [ 140.524982][ T3628] ? show_regs_print_info+0x20/0x20 [ 140.530275][ T3628] dump_stack+0x15/0x20 [ 140.534430][ T3628] should_fail+0x3c1/0x510 [ 140.538853][ T3628] should_fail_usercopy+0x1a/0x20 [ 140.543881][ T3628] strncpy_from_user+0x24/0x2e0 [ 140.548747][ T3628] bpf_prog_load+0x1b8/0x1550 [ 140.553426][ T3628] ? __kasan_check_write+0x14/0x20 [ 140.558540][ T3628] ? proc_fail_nth_write+0x17a/0x1f0 [ 140.563840][ T3628] ? map_freeze+0x360/0x360 [ 140.568372][ T3628] ? selinux_bpf+0xc7/0xf0 [ 140.572786][ T3628] ? security_bpf+0x82/0xa0 [ 140.577329][ T3628] __sys_bpf+0x4c3/0x730 [ 140.581567][ T3628] ? bpf_link_show_fdinfo+0x310/0x310 [ 140.586939][ T3628] ? debug_smp_processor_id+0x17/0x20 [ 140.592319][ T3628] __x64_sys_bpf+0x7c/0x90 [ 140.596746][ T3628] x64_sys_call+0x4b9/0x9a0 [ 140.601250][ T3628] do_syscall_64+0x4c/0xa0 [ 140.605668][ T3628] ? clear_bhb_loop+0x50/0xa0 [ 140.610348][ T3628] ? clear_bhb_loop+0x50/0xa0 [ 140.615023][ T3628] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 140.620915][ T3628] RIP: 0033:0x7fef3a178ba9 [ 140.625333][ T3628] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 140.644940][ T3628] RSP: 002b:00007fef38be1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 140.653376][ T3628] RAX: ffffffffffffffda RBX: 00007fef3a3bffa0 RCX: 00007fef3a178ba9 [ 140.661350][ T3628] RDX: 0000000000000080 RSI: 0000200000002ac0 RDI: 0000000000000005 [ 140.669341][ T3628] RBP: 00007fef38be1090 R08: 0000000000000000 R09: 0000000000000000 [ 140.677311][ T3628] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 140.685316][ T3628] R13: 00007fef3a3c0038 R14: 00007fef3a3bffa0 R15: 00007ffc193ddea8 [ 140.693300][ T3628] [ 141.248128][ T3655] device syzkaller0 entered promiscuous mode [ 143.291480][ T3679] FAULT_INJECTION: forcing a failure. [ 143.291480][ T3679] name failslab, interval 1, probability 0, space 0, times 0 [ 143.374758][ T3679] CPU: 0 PID: 3679 Comm: syz.1.1158 Not tainted syzkaller #0 [ 143.382192][ T3679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 143.392272][ T3679] Call Trace: [ 143.395566][ T3679] [ 143.398515][ T3679] __dump_stack+0x21/0x30 [ 143.402867][ T3679] dump_stack_lvl+0xee/0x150 [ 143.407483][ T3679] ? show_regs_print_info+0x20/0x20 [ 143.412711][ T3679] ? 0xffffffffa0028ab0 [ 143.416883][ T3679] ? is_bpf_text_address+0x177/0x190 [ 143.422198][ T3679] dump_stack+0x15/0x20 [ 143.426378][ T3679] should_fail+0x3c1/0x510 [ 143.430811][ T3679] __should_failslab+0xa4/0xe0 [ 143.435599][ T3679] should_failslab+0x9/0x20 [ 143.440118][ T3679] slab_pre_alloc_hook+0x3b/0xe0 [ 143.445083][ T3679] kmem_cache_alloc_trace+0x48/0x270 [ 143.450392][ T3679] ? __get_vm_area_node+0x11d/0x350 [ 143.455610][ T3679] __get_vm_area_node+0x11d/0x350 [ 143.460648][ T3679] __vmalloc_node_range+0xdf/0xaf0 [ 143.465782][ T3679] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 143.471349][ T3679] ? selinux_capset+0xf0/0xf0 [ 143.476042][ T3679] ? _kstrtoull+0x3c0/0x4d0 [ 143.480563][ T3679] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 143.486125][ T3679] __vmalloc+0x79/0x90 [ 143.490207][ T3679] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 143.495777][ T3679] bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 143.501178][ T3679] bpf_prog_alloc+0x1f/0x1e0 [ 143.505798][ T3679] bpf_prog_load+0x7c3/0x1550 [ 143.510497][ T3679] ? __kasan_check_write+0x14/0x20 [ 143.515641][ T3679] ? map_freeze+0x360/0x360 [ 143.520179][ T3679] ? selinux_bpf+0xc7/0xf0 [ 143.524607][ T3679] ? security_bpf+0x82/0xa0 [ 143.529154][ T3679] __sys_bpf+0x4c3/0x730 [ 143.533411][ T3679] ? bpf_link_show_fdinfo+0x310/0x310 [ 143.538802][ T3679] __x64_sys_bpf+0x7c/0x90 [ 143.543235][ T3679] x64_sys_call+0x4b9/0x9a0 [ 143.547751][ T3679] do_syscall_64+0x4c/0xa0 [ 143.552186][ T3679] ? clear_bhb_loop+0x50/0xa0 [ 143.556879][ T3679] ? clear_bhb_loop+0x50/0xa0 [ 143.561609][ T3679] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 143.567526][ T3679] RIP: 0033:0x7f69d969dba9 [ 143.571956][ T3679] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 143.591578][ T3679] RSP: 002b:00007f69d8106038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 143.600155][ T3679] RAX: ffffffffffffffda RBX: 00007f69d98e4fa0 RCX: 00007f69d969dba9 [ 143.608155][ T3679] RDX: 0000000000000080 RSI: 0000200000002ac0 RDI: 0000000000000005 [ 143.616145][ T3679] RBP: 00007f69d8106090 R08: 0000000000000000 R09: 0000000000000000 [ 143.624133][ T3679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 143.632118][ T3679] R13: 00007f69d98e5038 R14: 00007f69d98e4fa0 R15: 00007ffcc38ee4e8 [ 143.640112][ T3679] [ 143.651921][ T3679] syz.1.1158: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz1,mems_allowed=0 [ 143.676980][ T3679] CPU: 1 PID: 3679 Comm: syz.1.1158 Not tainted syzkaller #0 [ 143.684405][ T3679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 143.694490][ T3679] Call Trace: [ 143.697801][ T3679] [ 143.700746][ T3679] __dump_stack+0x21/0x30 [ 143.705092][ T3679] dump_stack_lvl+0xee/0x150 [ 143.709701][ T3679] ? show_regs_print_info+0x20/0x20 [ 143.714916][ T3679] ? pr_cont_kernfs_name+0xe3/0xf0 [ 143.720042][ T3679] dump_stack+0x15/0x20 [ 143.724207][ T3679] warn_alloc+0x1b0/0x1d0 [ 143.728538][ T3679] ? __should_failslab+0xa4/0xe0 [ 143.733593][ T3679] ? zone_watermark_ok_safe+0x270/0x270 [ 143.739154][ T3679] ? __get_vm_area_node+0x11d/0x350 [ 143.744364][ T3679] ? __get_vm_area_node+0x33e/0x350 [ 143.749604][ T3679] __vmalloc_node_range+0x152/0xaf0 [ 143.755042][ T3679] ? selinux_capset+0xf0/0xf0 [ 143.759726][ T3679] ? _kstrtoull+0x3c0/0x4d0 [ 143.764240][ T3679] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 143.769787][ T3679] __vmalloc+0x79/0x90 [ 143.773900][ T3679] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 143.779448][ T3679] bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 143.784825][ T3679] bpf_prog_alloc+0x1f/0x1e0 [ 143.789778][ T3679] bpf_prog_load+0x7c3/0x1550 [ 143.794458][ T3679] ? __kasan_check_write+0x14/0x20 [ 143.799574][ T3679] ? map_freeze+0x360/0x360 [ 143.804088][ T3679] ? selinux_bpf+0xc7/0xf0 [ 143.808508][ T3679] ? security_bpf+0x82/0xa0 [ 143.813017][ T3679] __sys_bpf+0x4c3/0x730 [ 143.817261][ T3679] ? bpf_link_show_fdinfo+0x310/0x310 [ 143.822650][ T3679] __x64_sys_bpf+0x7c/0x90 [ 143.827076][ T3679] x64_sys_call+0x4b9/0x9a0 [ 143.831607][ T3679] do_syscall_64+0x4c/0xa0 [ 143.836041][ T3679] ? clear_bhb_loop+0x50/0xa0 [ 143.840721][ T3679] ? clear_bhb_loop+0x50/0xa0 [ 143.845414][ T3679] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 143.851337][ T3679] RIP: 0033:0x7f69d969dba9 [ 143.855755][ T3679] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 143.875448][ T3679] RSP: 002b:00007f69d8106038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 143.883873][ T3679] RAX: ffffffffffffffda RBX: 00007f69d98e4fa0 RCX: 00007f69d969dba9 [ 143.891888][ T3679] RDX: 0000000000000080 RSI: 0000200000002ac0 RDI: 0000000000000005 [ 143.899864][ T3679] RBP: 00007f69d8106090 R08: 0000000000000000 R09: 0000000000000000 [ 143.907835][ T3679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 143.915804][ T3679] R13: 00007f69d98e5038 R14: 00007f69d98e4fa0 R15: 00007ffcc38ee4e8 [ 143.923784][ T3679] [ 143.927870][ T3679] Mem-Info: [ 143.959981][ T3679] active_anon:34 inactive_anon:8482 isolated_anon:0 [ 143.959981][ T3679] active_file:20237 inactive_file:6465 isolated_file:0 [ 143.959981][ T3679] unevictable:0 dirty:174 writeback:0 [ 143.959981][ T3679] slab_reclaimable:7877 slab_unreclaimable:75724 [ 143.959981][ T3679] mapped:29243 shmem:163 pagetables:629 bounce:0 [ 143.959981][ T3679] kernel_misc_reclaimable:0 [ 143.959981][ T3679] free:1532681 free_pcp:26921 free_cma:0 [ 144.029753][ T3679] Node 0 active_anon:136kB inactive_anon:33868kB active_file:80956kB inactive_file:25852kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:117092kB dirty:728kB writeback:0kB shmem:652kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5388kB pagetables:2500kB all_unreclaimable? no [ 144.069881][ T3679] DMA32 free:2978772kB min:62612kB low:78264kB high:93916kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2982952kB mlocked:0kB bounce:0kB free_pcp:4180kB local_pcp:0kB free_cma:0kB [ 144.101504][ T3679] lowmem_reserve[]: 0 3941 3941 [ 144.106466][ T3679] Normal free:3152392kB min:84840kB low:106048kB high:127256kB reserved_highatomic:0KB active_anon:136kB inactive_anon:33884kB active_file:80956kB inactive_file:25852kB unevictable:0kB writepending:736kB present:5242880kB managed:4036096kB mlocked:0kB bounce:0kB free_pcp:103488kB local_pcp:51092kB free_cma:0kB [ 144.237607][ T3679] lowmem_reserve[]: 0 0 0 [ 144.270862][ T3679] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2978772kB [ 144.775406][ T3679] Normal: 2771*4kB (UME) 1860*8kB (UME) 769*16kB (UME) 462*32kB (UME) 214*64kB (UME) 51*128kB (UME) 25*256kB (UM) 15*512kB (UM) 12*1024kB (UM) 1*2048kB (M) 745*4096kB (M) = 3153212kB [ 144.798104][ T3679] 27390 total pagecache pages [ 144.803053][ T3679] 0 pages in swap cache [ 144.807295][ T3679] Swap cache stats: add 0, delete 0, find 0/0 [ 144.813713][ T3679] Free swap = 124996kB [ 144.818021][ T3679] Total swap = 124996kB [ 144.838193][ T3679] 2097051 pages RAM [ 144.846469][ T3679] 0 pages HighMem/MovableOnly [ 144.890390][ T3679] 342289 pages reserved [ 144.912465][ T3679] 0 pages cma reserved [ 147.430781][ T3768] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.438189][ T3768] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.519390][ T3770] device sit0 entered promiscuous mode [ 155.883251][ T3893] device syzkaller0 entered promiscuous mode [ 156.170347][ T3898] device sit0 left promiscuous mode [ 156.182695][ T3899] device sit0 entered promiscuous mode [ 156.455061][ T3922] device veth1_macvtap left promiscuous mode [ 156.461140][ T3922] device macsec0 entered promiscuous mode [ 159.514884][ T4010] device wg2 left promiscuous mode [ 159.725185][ T4010] device wg2 entered promiscuous mode [ 159.913227][ T4026] device sit0 left promiscuous mode [ 159.972646][ T30] audit: type=1400 audit(1757743897.954:138): avc: denied { create } for pid=4025 comm="syz.1.1275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 161.958933][ T4056] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.966311][ T4056] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.465258][ T30] audit: type=1400 audit(1757743907.444:139): avc: denied { ioctl } for pid=4120 comm="syz.1.1303" path="socket:[29231]" dev="sockfs" ino=29231 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 172.087332][ T4163] GPL: port 1(erspan0) entered blocking state [ 172.117620][ T4163] GPL: port 1(erspan0) entered disabled state [ 172.158754][ T4163] device erspan0 entered promiscuous mode [ 172.925614][ T4190] device macsec0 left promiscuous mode [ 172.939199][ T4194] device sit0 left promiscuous mode [ 173.027187][ T4190] device vlan1 entered promiscuous mode [ 173.040283][ T4194] device sit0 entered promiscuous mode [ 173.171240][ T4207] syz.4.1339[4207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.173208][ T4207] syz.4.1339[4207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.497278][ T4215] GPL: port 1(erspan0) entered blocking state [ 173.524720][ T4215] GPL: port 1(erspan0) entered disabled state [ 173.599408][ T4215] device erspan0 entered promiscuous mode [ 173.899312][ T4219] GPL: port 1(erspan0) entered blocking state [ 173.905465][ T4219] GPL: port 1(erspan0) entered forwarding state [ 174.007763][ T4227] GPL: port 1(erspan0) entered blocking state [ 174.034400][ T4227] GPL: port 1(erspan0) entered disabled state [ 174.050801][ T4227] device erspan0 entered promiscuous mode [ 174.638745][ T4257] device wg2 left promiscuous mode [ 174.749870][ T30] audit: type=1400 audit(1757743912.724:140): avc: denied { create } for pid=4243 comm="syz.2.1353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 176.166164][ T4296] device syzkaller0 entered promiscuous mode [ 177.581968][ T4317] device pim6reg1 entered promiscuous mode [ 177.786796][ T4342] syz.3.1387[4342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.786879][ T4342] syz.3.1387[4342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.601515][ T30] audit: type=1400 audit(1757743917.584:141): avc: denied { create } for pid=4383 comm="syz.0.1404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 179.675549][ T4384] device syzkaller0 entered promiscuous mode [ 181.944000][ T4423] FAULT_INJECTION: forcing a failure. [ 181.944000][ T4423] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 181.957210][ T4423] CPU: 0 PID: 4423 Comm: syz.4.1419 Not tainted syzkaller #0 [ 181.964697][ T4423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 181.974776][ T4423] Call Trace: [ 181.978071][ T4423] [ 181.981017][ T4423] __dump_stack+0x21/0x30 [ 181.985372][ T4423] dump_stack_lvl+0xee/0x150 [ 181.989995][ T4423] ? show_regs_print_info+0x20/0x20 [ 181.995225][ T4423] dump_stack+0x15/0x20 [ 181.999406][ T4423] should_fail+0x3c1/0x510 [ 182.003859][ T4423] should_fail_usercopy+0x1a/0x20 [ 182.008913][ T4423] _copy_from_user+0x20/0xd0 [ 182.013544][ T4423] __sys_bpf+0x233/0x730 [ 182.017816][ T4423] ? bpf_link_show_fdinfo+0x310/0x310 [ 182.023229][ T4423] ? bpf_trace_run2+0xb5/0x1b0 [ 182.028031][ T4423] ? debug_smp_processor_id+0x17/0x20 [ 182.033435][ T4423] __x64_sys_bpf+0x7c/0x90 [ 182.037880][ T4423] x64_sys_call+0x4b9/0x9a0 [ 182.042404][ T4423] do_syscall_64+0x4c/0xa0 [ 182.046990][ T4423] ? clear_bhb_loop+0x50/0xa0 [ 182.051698][ T4423] ? clear_bhb_loop+0x50/0xa0 [ 182.056406][ T4423] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 182.062325][ T4423] RIP: 0033:0x7ff4302e0ba9 [ 182.066767][ T4423] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 182.086514][ T4423] RSP: 002b:00007ff42ed49038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 182.094958][ T4423] RAX: ffffffffffffffda RBX: 00007ff430527fa0 RCX: 00007ff4302e0ba9 [ 182.102951][ T4423] RDX: 0000000000000080 RSI: 0000200000002ac0 RDI: 0000000000000005 [ 182.110946][ T4423] RBP: 00007ff42ed49090 R08: 0000000000000000 R09: 0000000000000000 [ 182.118936][ T4423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 182.126927][ T4423] R13: 00007ff430528038 R14: 00007ff430527fa0 R15: 00007ffc6e7b6e08 [ 182.134922][ T4423] [ 183.309484][ T4439] syz.3.1425[4439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.309559][ T4439] syz.3.1425[4439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.441649][ T4445] device pim6reg1 left promiscuous mode [ 183.769848][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.806118][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 183.814471][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 183.825621][ T4465] device pim6reg1 entered promiscuous mode [ 183.842135][ T4465] device sit0 left promiscuous mode [ 183.882400][ T4467] FAULT_INJECTION: forcing a failure. [ 183.882400][ T4467] name failslab, interval 1, probability 0, space 0, times 0 [ 183.929664][ T4467] CPU: 1 PID: 4467 Comm: syz.4.1434 Not tainted syzkaller #0 [ 183.937131][ T4467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 183.947220][ T4467] Call Trace: [ 183.950532][ T4467] [ 183.953476][ T4467] __dump_stack+0x21/0x30 [ 183.957830][ T4467] dump_stack_lvl+0xee/0x150 [ 183.962443][ T4467] ? show_regs_print_info+0x20/0x20 [ 183.967663][ T4467] ? 0xffffffffa00289d8 [ 183.971860][ T4467] ? is_bpf_text_address+0x177/0x190 [ 183.977171][ T4467] dump_stack+0x15/0x20 [ 183.981355][ T4467] should_fail+0x3c1/0x510 [ 183.985793][ T4467] __should_failslab+0xa4/0xe0 [ 183.990839][ T4467] should_failslab+0x9/0x20 [ 183.995368][ T4467] slab_pre_alloc_hook+0x3b/0xe0 [ 184.000328][ T4467] kmem_cache_alloc_trace+0x48/0x270 [ 184.005669][ T4467] ? __get_vm_area_node+0x11d/0x350 [ 184.010898][ T4467] __get_vm_area_node+0x11d/0x350 [ 184.015948][ T4467] __vmalloc_node_range+0xdf/0xaf0 [ 184.021088][ T4467] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 184.026670][ T4467] ? selinux_capset+0xf0/0xf0 [ 184.031384][ T4467] ? _kstrtoull+0x3c0/0x4d0 [ 184.035908][ T4467] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 184.041469][ T4467] __vmalloc+0x79/0x90 [ 184.045555][ T4467] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 184.051122][ T4467] bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 184.056521][ T4467] bpf_prog_alloc+0x1f/0x1e0 [ 184.061139][ T4467] bpf_prog_load+0x7c3/0x1550 [ 184.065837][ T4467] ? map_freeze+0x360/0x360 [ 184.070364][ T4467] ? selinux_bpf+0xc7/0xf0 [ 184.074799][ T4467] ? security_bpf+0x82/0xa0 [ 184.079337][ T4467] __sys_bpf+0x4c3/0x730 [ 184.083602][ T4467] ? bpf_link_show_fdinfo+0x310/0x310 [ 184.088990][ T4467] ? bpf_trace_run2+0xb5/0x1b0 [ 184.093772][ T4467] ? __bpf_trace_sys_enter+0x62/0x70 [ 184.099063][ T4467] __x64_sys_bpf+0x7c/0x90 [ 184.103473][ T4467] x64_sys_call+0x4b9/0x9a0 [ 184.107972][ T4467] do_syscall_64+0x4c/0xa0 [ 184.112387][ T4467] ? clear_bhb_loop+0x50/0xa0 [ 184.117064][ T4467] ? clear_bhb_loop+0x50/0xa0 [ 184.121751][ T4467] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 184.127664][ T4467] RIP: 0033:0x7ff4302e0ba9 [ 184.132091][ T4467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 184.151710][ T4467] RSP: 002b:00007ff42ed49038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 184.160120][ T4467] RAX: ffffffffffffffda RBX: 00007ff430527fa0 RCX: 00007ff4302e0ba9 [ 184.168088][ T4467] RDX: 0000000000000080 RSI: 0000200000002ac0 RDI: 0000000000000005 [ 184.176056][ T4467] RBP: 00007ff42ed49090 R08: 0000000000000000 R09: 0000000000000000 [ 184.184131][ T4467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 184.192101][ T4467] R13: 00007ff430528038 R14: 00007ff430527fa0 R15: 00007ffc6e7b6e08 [ 184.200205][ T4467] [ 184.213585][ T4467] syz.4.1434: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz4,mems_allowed=0 [ 184.235034][ T4467] CPU: 1 PID: 4467 Comm: syz.4.1434 Not tainted syzkaller #0 [ 184.242462][ T4467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 184.252894][ T4467] Call Trace: [ 184.256208][ T4467] [ 184.259151][ T4467] __dump_stack+0x21/0x30 [ 184.263511][ T4467] dump_stack_lvl+0xee/0x150 [ 184.268125][ T4467] ? show_regs_print_info+0x20/0x20 [ 184.273358][ T4467] ? pr_cont_kernfs_name+0xe3/0xf0 [ 184.278503][ T4467] dump_stack+0x15/0x20 [ 184.282690][ T4467] warn_alloc+0x1b0/0x1d0 [ 184.287035][ T4467] ? __should_failslab+0xa4/0xe0 [ 184.291981][ T4467] ? zone_watermark_ok_safe+0x270/0x270 [ 184.297532][ T4467] ? __get_vm_area_node+0x11d/0x350 [ 184.302739][ T4467] ? __get_vm_area_node+0x33e/0x350 [ 184.307946][ T4467] __vmalloc_node_range+0x152/0xaf0 [ 184.313146][ T4467] ? selinux_capset+0xf0/0xf0 [ 184.317837][ T4467] ? _kstrtoull+0x3c0/0x4d0 [ 184.322345][ T4467] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 184.327921][ T4467] __vmalloc+0x79/0x90 [ 184.331998][ T4467] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 184.337542][ T4467] bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 184.342917][ T4467] bpf_prog_alloc+0x1f/0x1e0 [ 184.347512][ T4467] bpf_prog_load+0x7c3/0x1550 [ 184.352195][ T4467] ? map_freeze+0x360/0x360 [ 184.356706][ T4467] ? selinux_bpf+0xc7/0xf0 [ 184.361122][ T4467] ? security_bpf+0x82/0xa0 [ 184.365624][ T4467] __sys_bpf+0x4c3/0x730 [ 184.369870][ T4467] ? bpf_link_show_fdinfo+0x310/0x310 [ 184.375241][ T4467] ? bpf_trace_run2+0xb5/0x1b0 [ 184.380043][ T4467] ? __bpf_trace_sys_enter+0x62/0x70 [ 184.385332][ T4467] __x64_sys_bpf+0x7c/0x90 [ 184.389751][ T4467] x64_sys_call+0x4b9/0x9a0 [ 184.394258][ T4467] do_syscall_64+0x4c/0xa0 [ 184.398679][ T4467] ? clear_bhb_loop+0x50/0xa0 [ 184.403361][ T4467] ? clear_bhb_loop+0x50/0xa0 [ 184.408046][ T4467] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 184.413950][ T4467] RIP: 0033:0x7ff4302e0ba9 [ 184.418369][ T4467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 184.437985][ T4467] RSP: 002b:00007ff42ed49038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 184.446400][ T4467] RAX: ffffffffffffffda RBX: 00007ff430527fa0 RCX: 00007ff4302e0ba9 [ 184.454372][ T4467] RDX: 0000000000000080 RSI: 0000200000002ac0 RDI: 0000000000000005 [ 184.462432][ T4467] RBP: 00007ff42ed49090 R08: 0000000000000000 R09: 0000000000000000 [ 184.470406][ T4467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 184.478500][ T4467] R13: 00007ff430528038 R14: 00007ff430527fa0 R15: 00007ffc6e7b6e08 [ 184.486481][ T4467] [ 184.510014][ T4467] Mem-Info: [ 184.514509][ T4467] active_anon:34 inactive_anon:8535 isolated_anon:0 [ 184.514509][ T4467] active_file:22300 inactive_file:5762 isolated_file:0 [ 184.514509][ T4467] unevictable:0 dirty:215 writeback:0 [ 184.514509][ T4467] slab_reclaimable:7912 slab_unreclaimable:76837 [ 184.514509][ T4467] mapped:29320 shmem:163 pagetables:667 bounce:0 [ 184.514509][ T4467] kernel_misc_reclaimable:0 [ 184.514509][ T4467] free:1534514 free_pcp:23051 free_cma:0 [ 184.569216][ T4467] Node 0 active_anon:136kB inactive_anon:34140kB active_file:89200kB inactive_file:23048kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:117280kB dirty:860kB writeback:0kB shmem:652kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5332kB pagetables:2768kB all_unreclaimable? no [ 184.600845][ T4467] DMA32 free:2978772kB min:62612kB low:78264kB high:93916kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2982952kB mlocked:0kB bounce:0kB free_pcp:4180kB local_pcp:4180kB free_cma:0kB [ 184.660510][ T4467] lowmem_reserve[]: 0 3941 3941 [ 184.665500][ T4467] Normal free:3159284kB min:84840kB low:106048kB high:127256kB reserved_highatomic:0KB active_anon:136kB inactive_anon:34276kB active_file:89200kB inactive_file:23048kB unevictable:0kB writepending:860kB present:5242880kB managed:4036096kB mlocked:0kB bounce:0kB free_pcp:87480kB local_pcp:44292kB free_cma:0kB [ 184.695179][ T4467] lowmem_reserve[]: 0 0 0 [ 184.699621][ T4467] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2978772kB [ 184.715573][ T4467] Normal: 2915*4kB (UME) 1823*8kB (UME) 953*16kB (UME) 163*32kB (UME) 284*64kB (UME) 89*128kB (UME) 31*256kB (UM) 18*512kB (UM) 12*1024kB (UM) 1*2048kB (M) 745*4096kB (M) = 3159284kB [ 184.733874][ T4467] 28225 total pagecache pages [ 184.738573][ T4467] 0 pages in swap cache [ 184.742907][ T4467] Swap cache stats: add 0, delete 0, find 0/0 [ 184.796085][ T4467] Free swap = 124996kB [ 184.800425][ T4467] Total swap = 124996kB [ 184.804602][ T4467] 2097051 pages RAM [ 184.890259][ T4467] 0 pages HighMem/MovableOnly [ 184.894982][ T4467] 342289 pages reserved [ 184.899149][ T4467] 0 pages cma reserved [ 187.018891][ T4498] device pim6reg1 left promiscuous mode [ 189.737378][ T4590] device syzkaller0 entered promiscuous mode [ 191.448800][ T4620] device veth1_macvtap left promiscuous mode [ 191.455334][ T4620] device macsec0 entered promiscuous mode [ 193.264487][ T4676] bridge0: port 3(veth0_macvtap) entered blocking state [ 193.305871][ T4676] bridge0: port 3(veth0_macvtap) entered disabled state [ 193.358033][ T4676] device veth0_macvtap entered promiscuous mode [ 193.402113][ T4676] bridge0: port 3(veth0_macvtap) entered blocking state [ 193.409324][ T4676] bridge0: port 3(veth0_macvtap) entered forwarding state [ 194.957219][ T30] audit: type=1400 audit(1757743932.934:142): avc: denied { ioctl } for pid=4710 comm="syz.2.1527" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 197.346775][ T4761] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 197.457179][ T4761] device syzkaller0 entered promiscuous mode [ 198.027595][ T30] audit: type=1400 audit(1757743936.004:143): avc: denied { create } for pid=4783 comm="syz.0.1550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 203.030674][ T30] audit: type=1400 audit(1757743941.004:144): avc: denied { create } for pid=4941 comm="syz.0.1612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 204.744228][ T30] audit: type=1400 audit(1757743942.724:145): avc: denied { create } for pid=4993 comm="syz.2.1633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 205.176839][ T30] audit: type=1400 audit(1757743943.154:146): avc: denied { read } for pid=5032 comm="syz.2.1649" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 205.320790][ T30] audit: type=1400 audit(1757743943.154:147): avc: denied { open } for pid=5032 comm="syz.2.1649" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 205.414914][ T5055] device sit0 entered promiscuous mode [ 207.530244][ T30] audit: type=1400 audit(1757743945.504:148): avc: denied { create } for pid=5106 comm="syz.2.1673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 207.614413][ T5099] device syzkaller0 entered promiscuous mode [ 209.384900][ T5124] device pim6reg1 entered promiscuous mode [ 209.890553][ T5136] device sit0 left promiscuous mode [ 209.914831][ T5135] device sit0 entered promiscuous mode [ 211.737411][ T5159] device syzkaller0 entered promiscuous mode [ 211.929721][ T5159] device syzkaller0 left promiscuous mode [ 212.135305][ T5172] device veth0_vlan left promiscuous mode [ 212.146580][ T5172] device veth0_vlan entered promiscuous mode [ 212.200260][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 212.230649][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 212.244483][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 215.272044][ T5224] device wg2 entered promiscuous mode [ 216.689733][ T5259] device syzkaller0 entered promiscuous mode [ 218.138355][ T5324] device sit0 left promiscuous mode [ 218.277670][ T5324] device sit0 entered promiscuous mode [ 218.638897][ T5344] device pim6reg1 entered promiscuous mode [ 220.142710][ T5448] device sit0 entered promiscuous mode [ 222.981531][ T5488] device sit0 entered promiscuous mode [ 223.174015][ T5490] device wg2 left promiscuous mode [ 224.032910][ T5514] device sit0 left promiscuous mode [ 224.069046][ T5512] device sit0 entered promiscuous mode [ 226.812448][ T5582] device syzkaller0 entered promiscuous mode [ 226.821478][ T5581] device wg2 left promiscuous mode [ 226.984553][ T5583] device syzkaller0 entered promiscuous mode [ 227.570141][ T5623] device wg2 left promiscuous mode [ 228.311899][ T5658] ip6_vti0: mtu greater than device maximum [ 228.588952][ T5686] bond_slave_1: mtu less than device minimum [ 228.693179][ T5695] device syzkaller0 entered promiscuous mode [ 229.230095][ T30] audit: type=1400 audit(1757743967.204:149): avc: denied { setattr } for pid=5723 comm="syz.2.1909" path="pipe:[14587]" dev="pipefs" ino=14587 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 229.471158][ T5728] syz.4.1910[5728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.581663][ T5745] device wg2 entered promiscuous mode [ 230.766704][ T5774] device sit0 left promiscuous mode [ 230.821371][ T5774] device sit0 entered promiscuous mode [ 232.224113][ T5788] device syzkaller0 entered promiscuous mode [ 232.412080][ T5831] device pim6reg1 left promiscuous mode [ 233.354941][ T5834] device wg2 entered promiscuous mode [ 233.374094][ T5841] device wg2 left promiscuous mode [ 233.536776][ T5841] device veth0_vlan left promiscuous mode [ 233.548900][ T5841] device veth0_vlan entered promiscuous mode [ 234.361255][ T760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 234.370602][ T760] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 234.378318][ T760] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 234.692219][ T5879] device wg2 left promiscuous mode [ 234.777457][ T5888] device wg2 entered promiscuous mode [ 235.944378][ T5924] device wg2 left promiscuous mode [ 236.034046][ T30] audit: type=1400 audit(1757743974.014:150): avc: denied { create } for pid=5947 comm="syz.4.1992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 236.044324][ T5936] device syzkaller0 entered promiscuous mode [ 236.075055][ T5924] device wg2 entered promiscuous mode [ 236.229570][ T5959] ip6_vti0: mtu less than device minimum [ 237.245411][ T5995] device wg2 entered promiscuous mode [ 237.766542][ T6051] device wg2 left promiscuous mode [ 238.173694][ T6051] device wg2 entered promiscuous mode [ 240.211666][ T6126] device syzkaller0 entered promiscuous mode [ 240.519088][ T6149] device syzkaller0 entered promiscuous mode [ 240.677756][ T6160] device pim6reg1 entered promiscuous mode [ 241.732632][ T6197] FAULT_INJECTION: forcing a failure. [ 241.732632][ T6197] name failslab, interval 1, probability 0, space 0, times 0 [ 241.750229][ T6197] CPU: 0 PID: 6197 Comm: syz.1.2078 Not tainted syzkaller #0 [ 241.757663][ T6197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 241.767731][ T6197] Call Trace: [ 241.771024][ T6197] [ 241.773970][ T6197] __dump_stack+0x21/0x30 [ 241.778315][ T6197] dump_stack_lvl+0xee/0x150 [ 241.782912][ T6197] ? show_regs_print_info+0x20/0x20 [ 241.788123][ T6197] ? kasan_set_track+0x5b/0x70 [ 241.792926][ T6197] ? kasan_set_free_info+0x23/0x40 [ 241.798044][ T6197] ? ____kasan_slab_free+0x125/0x160 [ 241.803338][ T6197] ? __kasan_slab_free+0x11/0x20 [ 241.808280][ T6197] ? slab_free_freelist_hook+0xc2/0x190 [ 241.813841][ T6197] dump_stack+0x15/0x20 [ 241.818008][ T6197] should_fail+0x3c1/0x510 [ 241.822429][ T6197] __should_failslab+0xa4/0xe0 [ 241.827197][ T6197] should_failslab+0x9/0x20 [ 241.831702][ T6197] slab_pre_alloc_hook+0x3b/0xe0 [ 241.836648][ T6197] __kmalloc+0x6d/0x2c0 [ 241.840819][ T6197] ? bpf_test_init+0x100/0x1c0 [ 241.845599][ T6197] bpf_test_init+0x100/0x1c0 [ 241.850202][ T6197] bpf_prog_test_run_skb+0x193/0x1150 [ 241.855586][ T6197] ? __kasan_check_write+0x14/0x20 [ 241.860788][ T6197] ? fput_many+0x15a/0x1a0 [ 241.865213][ T6197] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 241.871120][ T6197] bpf_prog_test_run+0x3d5/0x620 [ 241.876059][ T6197] ? bpf_prog_query+0x230/0x230 [ 241.880914][ T6197] ? selinux_bpf+0xce/0xf0 [ 241.885344][ T6197] ? security_bpf+0x82/0xa0 [ 241.889851][ T6197] __sys_bpf+0x52c/0x730 [ 241.894094][ T6197] ? bpf_link_show_fdinfo+0x310/0x310 [ 241.899469][ T6197] ? debug_smp_processor_id+0x17/0x20 [ 241.904850][ T6197] __x64_sys_bpf+0x7c/0x90 [ 241.909269][ T6197] x64_sys_call+0x4b9/0x9a0 [ 241.913772][ T6197] do_syscall_64+0x4c/0xa0 [ 241.918190][ T6197] ? clear_bhb_loop+0x50/0xa0 [ 241.922874][ T6197] ? clear_bhb_loop+0x50/0xa0 [ 241.927553][ T6197] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 241.933446][ T6197] RIP: 0033:0x7f69d969dba9 [ 241.937865][ T6197] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 241.957661][ T6197] RSP: 002b:00007f69d8106038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 241.966082][ T6197] RAX: ffffffffffffffda RBX: 00007f69d98e4fa0 RCX: 00007f69d969dba9 [ 241.974059][ T6197] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 241.982031][ T6197] RBP: 00007f69d8106090 R08: 0000000000000000 R09: 0000000000000000 [ 241.990038][ T6197] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 241.998007][ T6197] R13: 00007f69d98e5038 R14: 00007f69d98e4fa0 R15: 00007ffcc38ee4e8 [ 242.005992][ T6197] [ 242.011261][ T6199] device pim6reg1 entered promiscuous mode [ 242.277038][ T6246] FAULT_INJECTION: forcing a failure. [ 242.277038][ T6246] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 243.139959][ T6246] CPU: 0 PID: 6246 Comm: syz.0.2095 Not tainted syzkaller #0 [ 243.147390][ T6246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 243.157552][ T6246] Call Trace: [ 243.160859][ T6246] [ 243.163813][ T6246] __dump_stack+0x21/0x30 [ 243.168178][ T6246] dump_stack_lvl+0xee/0x150 [ 243.172800][ T6246] ? show_regs_print_info+0x20/0x20 [ 243.178070][ T6246] dump_stack+0x15/0x20 [ 243.182267][ T6246] should_fail+0x3c1/0x510 [ 243.186711][ T6246] should_fail_usercopy+0x1a/0x20 [ 243.191751][ T6246] _copy_from_user+0x20/0xd0 [ 243.196359][ T6246] bpf_test_init+0x13d/0x1c0 [ 243.200958][ T6246] bpf_prog_test_run_skb+0x193/0x1150 [ 243.206341][ T6246] ? __kasan_check_write+0x14/0x20 [ 243.211454][ T6246] ? fput_many+0x15a/0x1a0 [ 243.215872][ T6246] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 243.221778][ T6246] bpf_prog_test_run+0x3d5/0x620 [ 243.226735][ T6246] ? bpf_prog_query+0x230/0x230 [ 243.231594][ T6246] ? selinux_bpf+0xce/0xf0 [ 243.236021][ T6246] ? security_bpf+0x82/0xa0 [ 243.240528][ T6246] __sys_bpf+0x52c/0x730 [ 243.244772][ T6246] ? bpf_link_show_fdinfo+0x310/0x310 [ 243.250151][ T6246] ? debug_smp_processor_id+0x17/0x20 [ 243.255533][ T6246] __x64_sys_bpf+0x7c/0x90 [ 243.259948][ T6246] x64_sys_call+0x4b9/0x9a0 [ 243.264455][ T6246] do_syscall_64+0x4c/0xa0 [ 243.268878][ T6246] ? clear_bhb_loop+0x50/0xa0 [ 243.273575][ T6246] ? clear_bhb_loop+0x50/0xa0 [ 243.278258][ T6246] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 243.284154][ T6246] RIP: 0033:0x7f32f08e5ba9 [ 243.288573][ T6246] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 243.308180][ T6246] RSP: 002b:00007f32ef34e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 243.316592][ T6246] RAX: ffffffffffffffda RBX: 00007f32f0b2cfa0 RCX: 00007f32f08e5ba9 [ 243.324565][ T6246] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 243.332537][ T6246] RBP: 00007f32ef34e090 R08: 0000000000000000 R09: 0000000000000000 [ 243.340507][ T6246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 243.348483][ T6246] R13: 00007f32f0b2d038 R14: 00007f32f0b2cfa0 R15: 00007ffe33d5eb18 [ 243.356463][ T6246] [ 243.480897][ T6273] syz.2.2105[6273] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.480998][ T6273] syz.2.2105[6273] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.845471][ T6337] device wg2 left promiscuous mode [ 244.991277][ T6337] device wg2 entered promiscuous mode [ 246.678140][ T6368] device wg2 left promiscuous mode [ 248.451801][ T6411] device wg2 left promiscuous mode serialport: Connection terminated to allow system upgrade. Please reconnect at your convenience.