last executing test programs: 7.764927094s ago: executing program 1 (id=870): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r0}, 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x8, 0xc, 0xffffbffb, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x48) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r1, 0x58, &(0x7f0000000300)}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x1, 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r4}, 0x10) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x500, 0x100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.228587544s ago: executing program 1 (id=898): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x47, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x11, 0x2, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0x0, 0xe1, &(0x7f0000000180), &(0x7f0000000340)=""/225, 0x1, 0x0, 0x1d, 0xb0, &(0x7f0000000280)="ea8f21032492b456f5038f31e8f572cddb0d9e84889038290601d95eb5", &(0x7f0000000540)="8aaec3afe68004bd5b2e9a951fe1f3d641d12e28d87356e91856f27f4bf6aa2307e4f88abc0e685d30934810ebec232c3daf5328fe77d0350043e8bc35e1895d525e4ec0cb7f669248429af447a63098bb28b9b26d38113e550fbc26ee0cec91ac736ea34bb06aca81277e4d5d63d87f7dba0954bfbe8e230026f665e7df4e4ce13f280a9d0e35b9b88ae105431656c0cf88cff93039a2fb7b7342162e65c8d428c30baca06bd6fc30c70ba02a92e535", 0x4, 0x0, 0x6}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xaf) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x1000000000200, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x2}, 0xc, 0x0, 0x4, 0x4, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080)={0x0, r0}, 0x8) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x9, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x62, 0x1}, 0x4001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8a, 0xe7c9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (fail_nth: 27) 3.528778031s ago: executing program 0 (id=904): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x4, 0x599, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), 0x0, 0x404, r2, 0x0, 0x1ba8847c99}, 0x38) 3.526848892s ago: executing program 1 (id=906): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40421, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0xa000, 0x726}, 0x200, 0x5, 0xa977, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000280), 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000080000040000000100000020000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) write$cgroup_pid(r4, &(0x7f00000005c0)=r2, 0x12) r5 = openat$cgroup_ro(r3, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r6}, 0x10) write$cgroup_int(r5, &(0x7f0000000040)=0x1, 0x12) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x6, 0x0, 0x599, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r8, 0x0, 0x1ba8847c99}, 0x38) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001408) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x80047456, 0x2000000a) write$cgroup_int(r0, &(0x7f0000000000), 0xfffffd26) 3.366320311s ago: executing program 0 (id=908): r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000180)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r0, &(0x7f0000000300)={'b', ' *:* ', 'w\x00'}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.stat\x00', 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x4, 0x599, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r3, 0x0, 0x1ba8847c99}, 0x38) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000008aaafb0a6c8c32834300"/37], 0x48) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7903009875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b0000000000000000"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r3}, 0x4) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffebe) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1000000004000000080000000778323800000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r2, &(0x7f0000000500)={0x0, 0xfffffffffffffed8, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r9, &(0x7f00000004c0)=ANY=[], 0xfdef) 2.600886668s ago: executing program 4 (id=911): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xffdd) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b80000000000000f30040000000000006002a00", @ANYRES32, @ANYBLOB='\t\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="41000083000000010000000100000000000000"], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000039c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r6, 0x18000000000002a0, 0x38, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f086dd", 0x0, 0x63, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000001c0)=r0, 0x4) ioctl$SIOCSIFHWADDR(r3, 0x8914, 0x0) bpf$MAP_DELETE_ELEM(0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x401, 0x200, 0x0, 0x7, 0x0, 0x103}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@float={0x3}]}, {0x0, [0x5f, 0x2e, 0x5f, 0x0]}}, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r7, 0x47, &(0x7f0000003fc0)}, 0xe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18020000000000000000000f000000008500000018000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r8, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 2.473898408s ago: executing program 0 (id=913): r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x10, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0b000000050009000000010000000000000000008ea5fad62d550f33451ad204000000278b1f974f4fe832ef67d6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000008000000000000000000000181100", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x4, 0x0, 0x0, 0x504}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0x1, 0x12) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000002c0)={'veth1_to_hsr\x00', @multicast}) bpf$MAP_CREATE(0x2000000000000000, 0x0, 0x0) socketpair(0x2, 0x3, 0x1, &(0x7f0000000300)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x41aa1000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000e200001000300000000000007010000080700007500fcff0000000095000000d3031a00041f8ea47c2eb2b7639c2ad3a4c89eb40634ab9b5ade7978eb59ff70cd62adbe9c31865cf39dc9e93813d9433f34dad576b1897b3533f883f9e873d9c435ab89afdd4ff0c24c0053f1721e9dc694f461734e10ea76584696317ca540336bc0e60e7d6d44484e01102b1c830d2630c393275594"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x300, 0xed}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @tracing, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x92f5e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x6d) 2.384835358s ago: executing program 2 (id=915): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000010000000000000000000000850000009e000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001000000800000006b508f4c23f46b4f3112a9de26d639483935fc2d9ad8d75a4da0e426964fa31781fcc5f68c48f6da7bb011d5ead9c01612ba6a47ceae5d45e71849c35694d8041fa200"/100, @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0x10, &(0x7f00000002c0)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xb}, @alu={0x4, 0x0, 0x5, 0x9, 0xa, 0x20}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffff8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffa}, @map_val={0x18, 0x5, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xf}], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 2.247600258s ago: executing program 2 (id=916): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r3, 0xf, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) (fail_nth: 1) 2.203650917s ago: executing program 4 (id=917): sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, 0x0, 0x38}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00', r1}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080)={0x0, r2}, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1b, 0x0, 0x0, 0x8002, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0)={r4}, 0x69) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r5}, &(0x7f0000000000), &(0x7f0000000200)}, 0x20) 1.983161736s ago: executing program 4 (id=919): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r2}, 0x10) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x40, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_config_ext={0x2, 0xe68a}, 0x10210, 0x88, 0x100000, 0x0, 0x800003, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f00000004c0)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305829, &(0x7f0000000040)=0xfdfd) 1.696749115s ago: executing program 1 (id=920): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r2}, 0x10) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x40, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_config_ext={0x2, 0xe68a}, 0x10210, 0x88, 0x100000, 0x0, 0x800003, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f00000004c0)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305829, &(0x7f0000000040)=0xfdfd) 1.658364595s ago: executing program 2 (id=921): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x5b) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x0, 0xfffffdb9, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000001080)={0x0, 0x80, 0xf6, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xffffffffffffff00, 0x3ca3}, 0x1882a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001680)={0x11, 0x3, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20}}, &(0x7f0000001640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) socketpair(0x10, 0x0, 0x14, &(0x7f0000000400)) r6 = openat$cgroup_type(r3, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_type(r6, &(0x7f0000000280), 0x9) openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@fallback=r0, 0x4, 0x1, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000000440), &(0x7f0000000480)=[0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r7}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r8 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)={[{0x2d, 'hugetlb'}, {0x2d, 'cpu'}, {0x2d, 'cpuacct'}, {0x2b, 'rdma'}]}, 0x1d) syz_clone(0x24084200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40)) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000a40)=ANY=[@ANYBLOB="9feb01001800000000000000ae010000ae010000050000000400000006000084080b00000f000000020000000000008007001be135420000080000000600000005000000ff7f00000f000000010000007bfc00000500000005000000030000000200000004000000010000000600000008000004020000000d00000005000000000000001000000003000000030000000400000001000000ffff00000e00000003000010050000000502000000000000060000000900000002000000030000000e0000000200000000000080070000000300000003000000090000000300000604000000000000"], &(0x7f0000000880)=""/196, 0x1cd, 0xc4, 0xfffffffd, 0x7ff, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="2cb90b8bbe12111385977635132c441153c548ff02", @ANYRES64=r8, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00O/'], 0x50) 1.653015256s ago: executing program 3 (id=922): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x5, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000", @ANYRES64=r0, @ANYBLOB="e060fe6f6bd6c88008fc3e7e3cd10ab5b5c116b61f28b9021ac50c1897d3eb15ef881f1fa5591f163dadb17c5641c549e004c88930beeb680b7a469a2a1261472b35f244e28e1800c06372e0f6a6d2f230595303b581cb00e560f255f220910f48cbca42357c0db331085c6e9c613387c7c1feac5eaa5d365d38e78bb04d0c6a9c88b4b2c1be7b3e7a96e9127dcda6842f6314ca5b44025aba37f6dae9ba33f8e6c2946c37ccb7509c971a26c7e16b584e3525b8d0ae07e26d161deba27616efbc400ce020b80799a24bf5e368ae3d8e7535d62c1324407ebd775c5f015ba9d8de54ff59085f2c", @ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES32=r0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='tlb_flush\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r3, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000200)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r6, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="74243de8e4941c0328d4e23c14e67a4233fdd055f21daa5df6f78d8dccd3cdafffced73299f2f5a68bda738e66f5eceb1a4058a8430a9c12b74f25581cb754eee0acee470146aca5c6f8466e595acc28a4e60ed59e8a78e7747099fe5c46af40cbb8c71905037f9c05cdf34b9766571161a23d3ff596b8566200b2724a09dc192052cb8c0dc6dc3140abdf51dca4", @ANYRESOCT=r0, @ANYRES64=r1, @ANYRESDEC=0x0, @ANYRES16=r0, @ANYBLOB="4b5155fd144a2847e8a2233a08b885a2e888469e12c6c679af9ba08364948deafb2708137fdc5dd96aaef4fdd179343c2fb0d81cbb928110cd5df70dfb0cbf103c88b7fa359a4a068efdf9b7dcfc02f02caa3964816854d7bae53ff95d17f40cd582c27293cd70faee68669662192618ac5c4868e12af35a38184e7eeb1e06a8", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00'}, 0x10) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002940)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r4, @ANYBLOB="faffffffb441d49e39f6c1c500"/28, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="050000000300"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000002f40)={0xc, 0xa, &(0x7f0000002c80)=ANY=[@ANYBLOB="18004e1187c8425482b9486f836f4b1c1d3f02abedb444c0a365ee10b164f5d0164b9810b67a3034cc269a7ddb799dade716e8a16a66c22e35aab27c8d9809a8fb63e64ac0848de25accda50af0ae27d71dd3122b4e95625c4d287fafc969f0a938b213e337e759d82b16f13680fec6d65772f9657e5b91b93d00942077f7523629ff03320a7beceb3998dbb00a42754eb6f0d3603c8629d9dd010164f6bf6313b7eee15de9d854e", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000b9ce0000000000000100000085200000020000008520000005000000185000000600"/72], &(0x7f00000004c0)='GPL\x00', 0xfffffffa, 0x0, 0x0, 0x41000, 0x35, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x8, &(0x7f0000002c00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000002c40)={0x3, 0xe, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000002e80)=[r7, r0], &(0x7f0000002ec0)=[{0x1, 0x5, 0x4, 0x6}, {0x4, 0x5, 0x3, 0x4}, {0x1, 0x5, 0x5, 0x5}, {0x2, 0x5, 0x3, 0x5}, {0x0, 0x2, 0x1, 0x8}, {0x0, 0x3, 0x4, 0xb}, {0x2, 0x5, 0x3, 0x1}], 0x10, 0x200, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r9, &(0x7f0000000080)='cgroup.kill\x00', 0x275a, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000040)={'bridge_slave_1\x00', @random="70d370117ddb"}) openat$cgroup_ro(r9, &(0x7f0000000180)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) 1.597726886s ago: executing program 3 (id=923): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0x0, @ANYRES64], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d", @ANYRES64=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='page_pool_state_release\x00', r0}, 0x10) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000a000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000080)={r1, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4}, 0x50) 1.543890415s ago: executing program 3 (id=924): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000020000003c0000003c000000020000000000000002000084ffffffff0000000003000000000000000000000002000000000000000000000000000002030000000000000000000002"], 0x0, 0x56, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) 1.543115995s ago: executing program 4 (id=925): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYRESHEX], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x18, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='mmap_lock_acquire_returned\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xb, 0x8, 0xb, 0x80000000, 0x40041, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000002c0)='mm_compaction_end\x00', r1, 0x0, 0x1}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00'}, 0x10) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x7, 0x2}, 0x0, 0x0, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49, 0x0, &(0x7f00000001c0)="008dc69f2b4e39486c71847792f1e666879b2ef38a8521ab5fd87780684325046591dcd61aca5531958c0538561f246ea4cda99f437e364d6cfd72c14501cb63ead1acb01c9b37a1e7", 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x21, 0x2, 0x4, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000200), 0x20000000}, 0x20) 1.534027905s ago: executing program 1 (id=926): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{}, &(0x7f0000000000), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a04, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000004080)=@base={0x8, 0x4, 0x4, 0xbf22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 1.264761924s ago: executing program 3 (id=927): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="18020000fcffffff00000000000000008500000041000000850000007d00000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0x2111, 0x300, &(0x7f0000000100), 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x9}, 0x50) 1.201526024s ago: executing program 3 (id=928): bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="05000000010000008e001000c9e7000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000484cad1d1c1d672e00"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000"], 0x0, 0x8468, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000040000000500000000000000", @ANYBLOB='\x00 \x00\x00\x00\x00\x00\x00\x00\x00', @ANYBLOB='\x00'/18], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x9) socketpair(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='netlink_extack\x00', r3}, 0x10) 1.103972474s ago: executing program 0 (id=929): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x6f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r1}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={r0}, 0x4) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0), 0x69) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000004080)=@base={0x8, 0x4, 0x4, 0xbf22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (fail_nth: 5) 1.015083073s ago: executing program 2 (id=930): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[], &(0x7f00000005c0)=""/93, 0x5d, 0x5d, 0x1, 0x81, 0x0, @void, @value}, 0x28) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r2}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x800, r1, 0xc00}, 0x38) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, 0x0}, 0x1f00) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = getpid() sendmsg$unix(r4, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32=r4, @ANYRES32, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x60}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000001c0)=[0x0, 0x0], 0x0, 0x0, 0x3c, 0x0, 0x0, 0x10, &(0x7f0000000380), 0x0, 0x0, 0x45, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, &(0x7f00000002c0), &(0x7f0000000300)=r0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x2a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0xf4240, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value=0x700}, 0x80) bpf$MAP_CREATE(0x0, 0x0, 0x0) 949.933014ms ago: executing program 3 (id=931): mkdir(&(0x7f0000000000)='./cgroup\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mm_page_alloc\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) syz_clone(0x43001000, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x1, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x2e, 0x8d4c67e0bffa2942]}}, 0x0, 0x1c, 0x0, 0x0, 0x5, 0x10000, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 358.400092ms ago: executing program 4 (id=932): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x4, 0x599, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), 0x0, 0x404, r2, 0x0, 0x1ba8847c99}, 0x38) 289.333021ms ago: executing program 0 (id=933): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x5, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000", @ANYRES64=r0, @ANYBLOB="e060fe6f6bd6c88008fc3e7e3cd10ab5b5c116b61f28b9021ac50c1897d3eb15ef881f1fa5591f163dadb17c5641c549e004c88930beeb680b7a469a2a1261472b35f244e28e1800c06372e0f6a6d2f230595303b581cb00e560f255f220910f48cbca42357c0db331085c6e9c613387c7c1feac5eaa5d365d38e78bb04d0c6a9c88b4b2c1be7b3e7a96e9127dcda6842f6314ca5b44025aba37f6dae9ba33f8e6c2946c37ccb7509c971a26c7e16b584e3525b8d0ae07e26d161deba27616efbc400ce020b80799a24bf5e368ae3d8e7535d62c1324407ebd775c5f015ba9d8de54ff59085f2c", @ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES32=r0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='tlb_flush\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r3, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000200)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r6, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="74243de8e4941c0328d4e23c14e67a4233fdd055f21daa5df6f78d8dccd3cdafffced73299f2f5a68bda738e66f5eceb1a4058a8430a9c12b74f25581cb754eee0acee470146aca5c6f8466e595acc28a4e60ed59e8a78e7747099fe5c46af40cbb8c71905037f9c05cdf34b9766571161a23d3ff596b8566200b2724a09dc192052cb8c0dc6dc3140abdf51dca4", @ANYRESOCT=r0, @ANYRES64=r1, @ANYRESDEC=0x0, @ANYRES16=r0, @ANYBLOB="4b5155fd144a2847e8a2233a08b885a2e888469e12c6c679af9ba08364948deafb2708137fdc5dd96aaef4fdd179343c2fb0d81cbb928110cd5df70dfb0cbf103c88b7fa359a4a068efdf9b7dcfc02f02caa3964816854d7bae53ff95d17f40cd582c27293cd70faee68669662192618ac5c4868e12af35a38184e7eeb1e06a8", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00'}, 0x10) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002940)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r4, @ANYBLOB="faffffffb441d49e39f6c1c500"/28, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="050000000300"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000002f40)={0xc, 0xa, &(0x7f0000002c80)=ANY=[@ANYBLOB="18004e1187c8425482b9486f836f4b1c1d3f02abedb444c0a365ee10b164f5d0164b9810b67a3034cc269a7ddb799dade716e8a16a66c22e35aab27c8d9809a8fb63e64ac0848de25accda50af0ae27d71dd3122b4e95625c4d287fafc969f0a938b213e337e759d82b16f13680fec6d65772f9657e5b91b93d00942077f7523629ff03320a7beceb3998dbb00a42754eb6f0d3603c8629d9dd010164f6bf6313b7eee15de9d854e", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000b9ce0000000000000100000085200000020000008520000005000000185000000600"/72], &(0x7f00000004c0)='GPL\x00', 0xfffffffa, 0x0, 0x0, 0x41000, 0x35, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x8, &(0x7f0000002c00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000002c40)={0x3, 0xe, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000002e80)=[r7, r0], &(0x7f0000002ec0)=[{0x1, 0x5, 0x4, 0x6}, {0x4, 0x5, 0x3, 0x4}, {0x1, 0x5, 0x5, 0x5}, {0x2, 0x5, 0x3, 0x5}, {0x0, 0x2, 0x1, 0x8}, {0x0, 0x3, 0x4, 0xb}, {0x2, 0x5, 0x3, 0x1}], 0x10, 0x200, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r9, &(0x7f0000000080)='cgroup.kill\x00', 0x275a, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000040)={'bridge_slave_1\x00', @random="70d370117ddb"}) openat$cgroup_ro(r9, &(0x7f0000000180)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) 155.929571ms ago: executing program 1 (id=934): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x9c, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0xfffffffffffffe82, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r7}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000003c0)={@cgroup, r5, 0x18, 0x8, 0x0, @void, @value=r6}, 0x20) write$cgroup_subtree(r3, &(0x7f0000000140)=ANY=[], 0xfffffdef) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r8, &(0x7f0000000980), 0x20000992) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r9}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x1, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 122.30528ms ago: executing program 2 (id=935): r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x200, 0x40f4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x2}, 0x410, 0x0, 0xfffffdff, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200000000000}, 0x0, 0x4, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x17, 0x6, &(0x7f0000001e00)=ANY=[@ANYRES16=r0], &(0x7f00000002c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="11000000180000000800000040000000420000004716f62e538d2cfff38529bf3d3d0a8840521351c5", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0xffffffffffffffff, @ANYBLOB='\b\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r1}, 0x38) r3 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x6, 0x4, 0xd, &(0x7f0000000000)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5d31, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xe}, 0x0, 0x200, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, r3, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x4, &(0x7f00000009c0)=ANY=[@ANYRES64, @ANYBLOB="19da8e8ef5e08a97785c8cffb232956bb0735e0eeb251dbcb82b3e9bdf6968595122dabe4afd7060fa3fadef8a7bdca828e3302b260aa41f0b311b5b89516bf52aa2e62b5fb750644ca4d253efadfbafd38943d736339e13cfc7e758fa652b860374102f8d5fd54e7d3eac011536bc7344ce1c0e26a86355e2838ad2e2db7bb5526e274273eac77e2cdd474e0f3b97da0b82ae9a3f72112cccafff140d909103277f4b6ae376ee177d8c92518f537fc08b4713984aebd79ca954f4d5bebf6dfb3dbc083139af389db8248680fb1a008f748911d3a24e04dcb7d941e72ad9ced7669d29b17782667b5f0f2404f1", @ANYRES16=r2], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080)={0x0, 0xe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffa, @void, @value}, 0x94) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) (async) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001e40)=ANY=[@ANYBLOB="0f000000040000001200"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000001000000000000128fcd059ea38c108b3805ec6613feef2e08a0f9c12a00386ddc800c367b12bf86b59290c405dc858a48cf205047bf228ecc28bfa6067a605b96ac07a991b4f92d3275da416a50ea0f1038540b9a01aa5416e78d12689ea4"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) mkdirat$cgroup(r6, &(0x7f00000004c0)='syz1\x00', 0x1ff) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000500)=ANY=[@ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="0500"/12, @ANYRES32, @ANYBLOB="689bfeff07a57764d98d7067ecd587e1f395d01dc41eeea38625ad3ecb02bd0c3539f1dc6d91032724", @ANYRES64=0x0], 0x10) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r9 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r9, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x31) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b0000000500000002000000040000000500", @ANYBLOB], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r10, 0x58, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000008c0)={0x8, 0x0}, 0x8) (async) r13 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001b40)=@bpf_tracing={0x1a, 0x3, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7}}, &(0x7f00000006c0)='GPL\x00', 0x80000001, 0x25, &(0x7f0000000900)=""/37, 0x41100, 0x20, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x3, 0x2000000f, 0xfffffbca, 0x3}, 0x10, 0x11cf, r4, 0x0, &(0x7f0000001a40)=[r7], 0x0, 0x10, 0xed, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001c40)={0xf, 0x11, &(0x7f0000002e00)=ANY=[@ANYBLOB="1800000008000000000000000050000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018280000", @ANYRES32=r7, @ANYBLOB="b376de7d7854e24d8d640000000000080000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x4, 0x74, &(0x7f0000000640)=""/116, 0x40f00, 0x44, '\x00', r11, @fallback=0xe859b7a5b960ac81, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000880)={0x3, 0xb, 0x6, 0x5}, 0x10, r12, r13, 0x1, 0x0, &(0x7f0000001c00)=[{0x3, 0x5, 0x5, 0x1}], 0x10, 0x8, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) 94.94376ms ago: executing program 0 (id=936): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xffdd) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYRESHEX=r1, @ANYRES32, @ANYBLOB='\t\x00'/20, @ANYBLOB="713c87886cb1df46fd86aa945e5ce7770b5bc5e3530e15b64376c247786fe46e0740aa6697c9a9c4500eb58fd2195104135fd3a7c08de17d27fb6d3e35b9f9a4f2762918369ae2588cca8dd61644d330273331ca0d16f4f19abcc67d30de891a545c33d2246c862c1b776fa3c7d2d2ffe7eff0f24431420bc704360de2d099a550a3ad76b5316a8708c449fe191e2df859d984c6510a42058f20547e4b082b51a54195da33dee7bf838b365b5504d2e8e651cea3401520fe96051437f373be91e56681db1e8af10660c7953f2f089d19469975849bfc5557e9ee85fb5347b0ef", @ANYRES32=r2, @ANYBLOB="41000083000000000000e7ff00000000000000"], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x3, 0x7, &(0x7f0000000380)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5c}, @jmp={0x5, 0x1, 0xc, 0x1, 0x3, 0xffffffffffffffef, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x59}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0x6, 0x5, 0xb, 0xffffffffffffffe0, 0x7ffffffffffffff8}], &(0x7f0000000480)='syzkaller\x00', 0x3, 0xb2, &(0x7f0000000700)=""/178, 0x41100, 0x10, '\x00', 0x0, @fallback=0x15, r0, 0x8, &(0x7f0000000540)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0xe, 0x9, 0x2}, 0x10, 0x0, r7, 0x0, &(0x7f0000000c00)=[0xffffffffffffffff, r1, r1, r6, r6, r1, r1, r6, r4, 0xffffffffffffffff], 0x0, 0x10, 0xfff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000039c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r9, 0x18000000000002a0, 0x38, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f086dd", 0x0, 0x63, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000001c0)=r0, 0x4) ioctl$SIOCSIFHWADDR(r5, 0x8914, 0x0) bpf$MAP_DELETE_ELEM(0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x401, 0x200, 0x0, 0x7, 0x0, 0x103}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb0100e7e860353cb82e332218000000000000000c0000000300000006000000030000000000001000000000005f2e5f0000cf2f526d6221fc8528140237bd885139a3bb56c57c12c8abecfa46"], 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r10, 0x47, &(0x7f0000003fc0)}, 0xe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000018000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r11, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 86.100801ms ago: executing program 4 (id=937): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000020000000100000000000001e5ff0000080000000000000001000084060004000000000001"], 0x0, 0x42, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x900, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r1, 0x58, &(0x7f0000003fc0)}, 0xe) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)={0x0, 0x0}) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000002000000000000f8888f00"/27], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) 0s ago: executing program 2 (id=938): bpf$TOKEN_CREATE(0x24, &(0x7f0000000080), 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0x40010) openat$cgroup(r0, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000073010b000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xfffffffffffffcc8) syz_clone(0x4100, &(0x7f0000000240)="118f24b2237db7bb0cd0af4d6bdcf0352c588d975530372d1a1b51443f2b1adf3771241e75c65644f3a23be9233522556c90dbb8079e487f3649d4193340f0091ef19c9e8541cfdf646933fe354f578ba5f57c3a52115527cb0fc671df703a5b48cdc2685d6df869478f28060e379f38d640aa58bd992b4e4ceea843ad59151364d6b37e110b1f72ce3f6f83352b7fab84306735ebc819c13da526cbcc43998f34594b2638f906cd5e1987305ce94e2e5251f4dbc2e161278966314286fa9dc25296020cadead22d9b80807cadd987a401a674ed3edb6b62385274f5a12402f58c779b2ad489c8bf34f0aedf9e72be2a76fc0366ee4a3731b9b61a1d698e9a796a067d81f9cd3819f3fbd77757e52da033643bae06ed55ad04b167400c9c8d5afeccd27289cda37b20ecc0e7a904d12c3546db781ede4fd9a35e62c767e29ab739a5213f2d36ad17eb59e61216e2b475b70f6cdc34a8af322f1abfc8544af44f01a5e12f331da1c1e4d508845eec9ee55ca3a685abc2fe1dc66f28e9ff3a0ee4481379533d970b7b7cd8d0d037f27dcce8f13e568b829d6079bf28ecfa9bb1811bbe74c14142b531d46b8b0c471f44ea289e29b9bc958c91a798366aafe0c0b31350dc4b4a352e128a8744a42b2f16f943a48391f51595232b74386ec22bb0c1b74dd8a3a62772e45348dfab91c52f89d69498074ccba9df3a3c1c85c684b921d3aff107a1dbb4464a0ce0eff72f18283e15e6a6e67f1d3291f19701124e484df36e2e40cf3d87e50a53b4d4d284e465989aed3caa56869e659a35ab06a6d5e2dd401fada6a49c31948867c60f1852232275855b21115e808d499e663d7ed1c605dcc1905aec64bb03df682ba4458021a88e3d37606b4bbbdd361947af78ccd65780c21c4c0107f1c002594b1f228f7a7524cb80f2851642c451f2041128fb9cbe848fc4975b6201c9adbd5d3b5227567697f9c7d3976980419bdd6a7d817b8cb7eb068627b5ffd420cf9f44a24e1996f3bda89ae475847a0033cbf1fe40437bd0f622949d158864639bf86d9942d735f11f82c46bbfe8b08a7914abee2b5464e222bbd100529808f8c16d796e15b20b72c88ab4e803033dac7c4f67ea95f16bbe41229490b9acb8b2126e44db99f24af4675b6d1c3ba0c0377e4955f9d57970dc33c4c1c57215bb8e1479d41ec4d14cdee1a60ef8ddd555e8aea6d054aa91bc29a0f77e295a2b517b64c1f64b6b1e052b418ac77daf99686d6a1f74c732a07fed7a00c70503e66ba89d1dc34c80a4021c32f9e0fb9bdbab5023c9c12eb9dac9209764f9b6a09d029bab6308e6c69db3ac2a61c46c478e921b887612a830a228fc58c62de574594e56491f3b571b67d7305e70b14925d3c64349b99f7fb03362aa6d11e632f0f10053d10403e37c0c2c6c0f4dae173a7602238b88f2084ac3f2f465e1c40621f1bc1b15865bcb33157d020bdb78678de440a02e2c1c592fc8c65c4f13d4ea17168dc5f1207a97018e351041d218a926ddd82dea8030708b5aaa97cc0b01958e1ff309162ada1a295e4f05743b118d6f5150f7ab994059d7e5a5fbcfe848eaac241f62c89d9eff6dd2d0d21047defd468cbd431265d34494b911735a815a050594a3bc213ff1f9ab98381adab6aa1d8ca14c06de492369226381423ce09f8497cc7033b7e9d8d980dcfd3ea5f2850b15202a4c3a11a186b78ca38f6ebbbbb0d003917184b31a5828514ab739902698302f36846f91cfb324f2be58f37bbcb3511793c89d94d8c10f2ba98676ed046c4833b65145d5152bdf18cab1fbd3e50a7a3b3fafe1e9c34530a13a8aee2db45b6fa23258f88003dc46c0cd680892032d6661050f3f73cf6b73c5bc8305eaf84a6e9116c090e21ebbda7c5f2b32d6702e328a407425581a7347c14bc91a9077c07e3ea96d1dc219056f8e4171c0463c6325774a12642408560be3586d8584d14cede9d09bb12f8833f1d89011f5a4d797aafe3fcfb157406c37deae79cec89e95a5c6cc22057638c6721c756cdf9b7b1d3247306080b267e83a6e4162e94ad87d5aedb41fd9873d836b3d069d36241bdf37669c8e0d305c0da5bcb8e41a36386a493970fc90f87b4df8a73fc4b700952a7f9cd8d3a232dd5057260ef051d376578ffc67b6915fc2919bd84b40ea6fa4a40a4bce61b54ebbdbc993c5f512bf3f2c980c57c825f391f4e7589e92501b1228b4bef97b7734d81f441ef02cd8badc29012ca54ec8def37f9ed5702994ec1ce93b6fe4e8c494c69bc707e86e79e1edaaa434aeccfc186164363ab5b1abde9798b23b5abff3788d4c1bec904d4d38adc9486617793e817e371fd23fa8815a6ee8627aaec2bc2bc689c126e8d2e40d4efd75832c2a50e2c7ccc7e2767a84d05d2cb499cfe24cdf916225c221e9a7f028ea6f823fdbfac10c3ecddf6a104a313484a1794f7dbd7787ab553b1016e41422626cf4a9aff4e075f1c6b72f1366743b3effedf5913b82f227e530c1197b621e22cccba2b61dc69cffb3d9694ad0f1580e24ff301e9f6a38436e9816f033707ab9c43497097357d472686c2233b0cd70102f297edb7c404bba45310fd72377b34358ea42680c46e7fc110276e3a7956e2d4094f543e3a1a002ab485be6169858641cf1c029bddac0a6b492b8e4415eeb67e5e3e48fb5c05d910670c4a4de6039073be4935340f755d40ce85499df5166132b4d7556ec0eecf1fddb5544927aa5dc79793b3fa5dbe6a10520521ba8543b8088b5f851826a550f8e13ac900bfb90dc6b5e06eda565e500f06634e130e3544e62b995a30003171822264def951c7e226e721501ac45aa7884e64c05babcaccc61abc45a06354dadcf7430fedb0409e105cb10fa08744965435a9ca0b5f7805169fc2c226984aed76ef43b5294a86eb2fcd91e0aa6ddeda48174364d154f50b12061c3a439cf64792f21503d69e938ba499f250ed4f78d436285f6c7d8b9a233df30bee59bea963f231ff2c7b71dedfd2aa84b87a2a6333cdaf6884655bb3c63b0ea53767778b589397988caa4818b83743cac0a8347b445e9a40315bff188eec534600a87181699f2fd142c54bc7a6740d09c3e35df8e8bc76d04ea30ae63e14c5e6100d36c76aea8ee8ecbfc95fee0b53681f469e3cf8b4a44c4576ea3944317c51dfa6633b200ec81b3821addad9cb47932d3257f3b36ea61cece4a0304e09d1c34d12d72ce6c9e6cb8301208b921508dd6143dce02158f45efb5ce3930be7bd5ae5dd999d66e2865444491dee2efd4a8d827e475c37cb7d8058683c92d102c4b56db812d8843df918a1b6137b1bca6c910b885afc12b315e34b6b2a52838a73e306091c61e7374249f712af7db6efe82e6dcab38ea49198c69c2b9102c11fd5ac7ebf1dbeaa1d4f1e7bbb7d075019847f4c6cd4ceb1ef65cad38981491baadf218284bce01fa77f97c268d7335e1d9089d6d516f15279b68e1bbc2c2eabafc35147fdfd5e139d322531b8389137fd20c871eda94122a4160d3d02ae7fde4c49ac537b5c774d5fc0fe8a3b7a8aacf27aa185df1bc08bfe8401b93d380f0d8ea2ad01fe1117038123fa66048efe07e59d85bdaad1414d38df18861844e8941d748de587e92dd90283bd5fbb15f159c1c82c254c3be99c7d55c477428e52d44a9694cd92afb8de5a304c89aa302ec9b82414d03202ca60c292b9644d70e0412686a2417edd35d909f625d0fbabb872d03b83838d5da2b62ce11c45468aa48446b2ba550605a0f583e54defe6b27c228eb1c646dc8df7f6b150b3efc0b078295625beb2e9632c61a40479a1622d1cfdb5ad201ec1fd912637f6dc154df2fa6151298ed3957e8af38478e3099d9afc0146247bcb6261311bc2f5b69a9d7c0ecc36a2583ff97901e4ca4c92b7751b56b712170a4487e690c5e7a0025a79540966f0487b59f760856fabcfd6d6f504de831a9866805ff709c37a6162ad70facd02cdcbad92f4623c3bcc21cbc85f7832e3e78583d483c4d1e28d4ed93449e46a22c613a7c298775bf864989df6151d581e2bddb3d71586532774771d3129ea7e289b8b7137a76ef994479e25ca94d912f549f3f7e61e5efe8ecd68f172b49eb7a0202b21612d2ab4953c7135656334a991cec445289c524d7c63043db62c89937ef7441f7e69b51225efca026a033bcc4285f731371dd575df77974fd4cbc4a09771a8b3392b23e4c87871edfeb4bba9da597f97499714232c8c5b151e9a906c0bd6f2a32ae9110b4e6ad1617217a4cc1840a5eec504c82af14a95102c48ce37018643998ef177f648358f626b21aca227077a1f5060f8b30f1639eb92f323a08e467be0648dbe1a9705afa32ad60222ba33964d9b3c4584e041d95ece76df567f2d93d8ff20fb0231b37bc914bec4816cad77a986ee58f34a8c7641db2e242ae6c0c8efb1f83c99e44b7edd21b027e263c621491c08e8ac227350244e1f8d6d3079d7e97fcf4c3801128ab8ac98b5e879784c506d9d16c731fb00e877e3b608f4285391d7d85520a7acbf8dd7e64b534ba30c1451813415e4c8a93e5feae37ce2d92848a01443ae7fc59d784b80843780d2f53c4086ddea11b994c73489694ff09d03d49d5f4819a701da4b0bd116c2eacd9d497fb8e117bcaf2ec132228fce224e0f68c8283129def5b436825955bbfcaeb6525b8c82ae3e4f11a4b06e1c1df340865da4defbec47780943793def24f6b2b24742c5bed9dd9ccc4a3096d4de696c9bc647043e2a5f3ce490c3e9cd86788637d860e5c1b0f9d1b5c64278b83b81a518c190e763b8af1a535d46e00ca7358f27594fa8f2000445be1c5e1c7d3ab02f73b44d7e452478443f2873b6427154b5fdac7d34a12eb54febcf029102d8be9d201ee8d4f90f2bca99070d954bd424c1ec3aa75e2b7ca52ec9e0b7b26473fed71443cbb07ad86d72fe73d328fde8c6e6c10e670f12d27bd8c7103cda482467abf456596b4b632682eefa2a69330b0eb4d23c70efacb48cbb3f8077956495ba3eed1bb334cb170786a198c46dfed244298f4676ad9e00a1763599024709fd2d9551ef8d8f615b26a03d00697c07f66772d7dff4c8f21868a28d17ee0999fafbf955ed2063c10d44bf0e4e51d562fd2f1f4b50db0f3f2f64f44d10d99220cf0cbc1fb6d9e8dc19f6793410f7ef1aef430bc4793299aa62ded8f5e6506a808afdb16f9be6fdb38905b3f8d8e2504f377e467d0ef08303256641a30d9f430cb1aee89efcdd6846d2d23119007dc7226f762636a6fd31d8438ba21c643521c03294fda1ae22e3e81fc8140beba0efa4c83a2010305cb46cad4bcd973c8360862e529ed040ddb33713e5069163b8e2c2c1aca40c51f370228d5e377b56ddd07227236256aa04c61044614c391776c2e8b038c6533eacf75aafefa0c4f173b7eae1bb7c622f5aca5c1dd63eee8119868e8ac022c192765b797304bb776199c2bbf8836b57652f3ce2a91a32ed98f8f4cc84c89942d596118b7dbc63703070e1a3954b3e7813890c291e15292adf6a3f5e1d6dc31e7b336c870a59081de47f03fd1e2fc95979482e75f1dae82c7f144f9f873dbff8b251a5d79115c20e297fc73eb8940a1cb4132ead62524ae266f76cc97547d6c0ffd2af2930a498075b793602a4149ef7d79e60fa776deeff534431d8f5b1cc46e14714e3fc5576205a082e1a54f7ade45dbe91d8d4f18af60af2d5d1eae4504b4d757ed1fc53d0c593f4bbcb715eccc2e536ec7f5e47e73e88fc29b4a6f91f9d0df82032c5732b2ce0c", 0x1000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000001240)="d0a1eef17cfc822de24982a61a0a1d87c8ad93e6dacd7f69d5f1b5b61bae636c4891b0dc1be9005e3a591dacccdcabd6597c854dbf17f5449c3552e5d8a86b3a5a5060a612883045dfc449e6fc3f7beca74fec1170cca845ab23d26643c7ba2cfa29bfaa4c7bdba86188750870a6490f7a94e323a3") kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.191' (ED25519) to the list of known hosts. [ 20.329460][ T28] audit: type=1400 audit(1737682638.415:66): avc: denied { mounton } for pid=282 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.330479][ T282] cgroup: Unknown subsys name 'net' [ 20.351933][ T28] audit: type=1400 audit(1737682638.415:67): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.378832][ T28] audit: type=1400 audit(1737682638.445:68): avc: denied { unmount } for pid=282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.378988][ T282] cgroup: Unknown subsys name 'devices' [ 20.488614][ T282] cgroup: Unknown subsys name 'hugetlb' [ 20.494016][ T282] cgroup: Unknown subsys name 'rlimit' [ 20.626306][ T28] audit: type=1400 audit(1737682638.705:69): avc: denied { setattr } for pid=282 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.649416][ T28] audit: type=1400 audit(1737682638.705:70): avc: denied { mounton } for pid=282 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 20.650920][ T284] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.675181][ T28] audit: type=1400 audit(1737682638.705:71): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.705341][ T28] audit: type=1400 audit(1737682638.765:72): avc: denied { relabelto } for pid=284 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.722065][ T282] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.730554][ T28] audit: type=1400 audit(1737682638.765:73): avc: denied { write } for pid=284 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.764431][ T28] audit: type=1400 audit(1737682638.805:74): avc: denied { read } for pid=282 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.789658][ T28] audit: type=1400 audit(1737682638.805:75): avc: denied { open } for pid=282 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.740808][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.747911][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.755019][ T294] device bridge_slave_0 entered promiscuous mode [ 21.762985][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.769878][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.777106][ T294] device bridge_slave_1 entered promiscuous mode [ 21.850172][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.857023][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.864116][ T291] device bridge_slave_0 entered promiscuous mode [ 21.870678][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.877548][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.884631][ T293] device bridge_slave_0 entered promiscuous mode [ 21.899716][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.906559][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.913812][ T291] device bridge_slave_1 entered promiscuous mode [ 21.923501][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.930385][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.937531][ T293] device bridge_slave_1 entered promiscuous mode [ 21.960755][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.967662][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.974838][ T292] device bridge_slave_0 entered promiscuous mode [ 21.994316][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.001244][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.008364][ T292] device bridge_slave_1 entered promiscuous mode [ 22.018655][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.025490][ T295] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.032743][ T295] device bridge_slave_0 entered promiscuous mode [ 22.046429][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.053475][ T295] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.061124][ T295] device bridge_slave_1 entered promiscuous mode [ 22.218158][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.225009][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.232135][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.238907][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.247383][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.254224][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.261364][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.268128][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.285580][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.292447][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.299541][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.306311][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.314566][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.321417][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.328509][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.335281][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.360230][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.367094][ T295] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.374184][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.380987][ T295] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.416798][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.424152][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.431295][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.439073][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.446039][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.453061][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.460074][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.467165][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.474158][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.481299][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.489106][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.496303][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.532429][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.539791][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.548627][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.556561][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.563407][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.570749][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.578897][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.585719][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.592931][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.600931][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.607772][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.614938][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.622956][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.629787][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.636961][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.644859][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.651611][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.658768][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.666691][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.673526][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.680694][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.706807][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.714211][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.722654][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.730793][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.738691][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.746383][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.754541][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.761398][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.768771][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.776686][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.783523][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.790708][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.798474][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.823301][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.831610][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.839655][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.846475][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.853877][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.862989][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.870972][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.877837][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.884958][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.892967][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.900774][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.908689][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.916337][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.924255][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.932083][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.939998][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.951062][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.959272][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.970671][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.979059][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.990601][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.998737][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.011875][ T295] device veth0_vlan entered promiscuous mode [ 23.022484][ T292] device veth0_vlan entered promiscuous mode [ 23.029492][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.038172][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.046228][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.054147][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.061970][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.069743][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.077752][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.084971][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.092345][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.099660][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.109569][ T291] device veth0_vlan entered promiscuous mode [ 23.118276][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.126000][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.134040][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.141401][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.152459][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.160236][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.171843][ T291] device veth1_macvtap entered promiscuous mode [ 23.178916][ T294] device veth0_vlan entered promiscuous mode [ 23.190991][ T292] device veth1_macvtap entered promiscuous mode [ 23.199712][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.207413][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.214598][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.222998][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.231321][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.238897][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.246805][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.254872][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.262357][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.270505][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.278678][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.286627][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.299495][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.320395][ T293] device veth0_vlan entered promiscuous mode [ 23.326584][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.334913][ T291] request_module fs-gadgetfs succeeded, but still no fs? [ 23.335092][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.351474][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.359832][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.368105][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.376067][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.384507][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.392312][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.400166][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.407449][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.417855][ T295] device veth1_macvtap entered promiscuous mode [ 23.442398][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.451506][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.461134][ T294] device veth1_macvtap entered promiscuous mode [ 23.479457][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.487480][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.495610][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.504664][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.513038][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.521707][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.530380][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.585209][ T293] device veth1_macvtap entered promiscuous mode [ 23.634401][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.658006][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.796908][ C0] hrtimer: interrupt took 17000 ns [ 23.804821][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.907331][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.997338][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.147346][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.155440][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.327593][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.345965][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.748683][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.411264][ T336] bond_slave_1: mtu greater than device maximum [ 25.680999][ T28] kauditd_printk_skb: 32 callbacks suppressed [ 25.681014][ T28] audit: type=1400 audit(1737682643.715:108): avc: denied { create } for pid=345 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 25.977732][ T28] audit: type=1400 audit(1737682644.065:109): avc: denied { setopt } for pid=345 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 26.092365][ T351] device syzkaller0 entered promiscuous mode [ 26.108384][ T28] audit: type=1400 audit(1737682644.115:110): avc: denied { create } for pid=347 comm="syz.4.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 26.840102][ T355] Driver unsupported XDP return value 0 on prog (id 18) dev N/A, expect packet loss! [ 27.051626][ T360] device pim6reg1 entered promiscuous mode [ 27.940762][ T28] audit: type=1400 audit(1737682646.025:111): avc: denied { write } for pid=372 comm="syz.4.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.186992][ T28] audit: type=1400 audit(1737682646.155:112): avc: denied { read } for pid=372 comm="syz.4.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 29.504327][ T401] bond_slave_1: mtu greater than device maximum [ 29.677420][ T404] bond_slave_1: mtu greater than device maximum [ 29.782483][ T412] device veth0_vlan left promiscuous mode [ 29.867232][ T412] device veth0_vlan entered promiscuous mode [ 30.068302][ T409] bond_slave_1: mtu greater than device maximum [ 30.222609][ T416] device pim6reg1 entered promiscuous mode [ 30.365431][ T28] audit: type=1400 audit(1737682648.445:113): avc: denied { relabelfrom } for pid=420 comm="syz.2.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 30.657778][ T28] audit: type=1400 audit(1737682648.445:114): avc: denied { relabelto } for pid=420 comm="syz.2.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 30.959589][ T28] audit: type=1400 audit(1737682648.525:115): avc: denied { append } for pid=420 comm="syz.2.27" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 31.357449][ T28] audit: type=1400 audit(1737682648.525:116): avc: denied { open } for pid=420 comm="syz.2.27" path="/dev/ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 31.490815][ T28] audit: type=1400 audit(1737682648.535:117): avc: denied { read } for pid=420 comm="syz.2.27" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 31.555261][ T28] audit: type=1400 audit(1737682648.565:118): avc: denied { ioctl } for pid=420 comm="syz.2.27" path="/dev/ppp" dev="devtmpfs" ino=153 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 31.555307][ T439] bond_slave_1: mtu greater than device maximum [ 31.579929][ T28] audit: type=1400 audit(1737682648.795:119): avc: denied { create } for pid=426 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 31.579956][ T28] audit: type=1400 audit(1737682649.065:120): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 31.579974][ T28] audit: type=1400 audit(1737682649.175:121): avc: denied { create } for pid=433 comm="syz.2.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 32.424545][ T453] syz.4.34 uses obsolete (PF_INET,SOCK_PACKET) [ 32.556725][ T28] audit: type=1400 audit(1737682650.635:122): avc: denied { create } for pid=448 comm="syz.4.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 33.515023][ T471] bond_slave_1: mtu greater than device maximum [ 33.718769][ T471] syz.1.40 (471) used greatest stack depth: 22040 bytes left [ 34.468882][ T485] device veth1_macvtap left promiscuous mode [ 34.524574][ T28] audit: type=1400 audit(1737682652.605:123): avc: denied { create } for pid=490 comm="syz.0.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 34.912437][ T502] bond_slave_1: mtu greater than device maximum [ 35.152222][ T509] device pim6reg1 entered promiscuous mode [ 35.821458][ T28] audit: type=1400 audit(1737682653.905:124): avc: denied { create } for pid=506 comm="syz.0.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 37.430996][ T543] bond_slave_1: mtu greater than device maximum [ 38.031867][ T28] audit: type=1400 audit(1737682656.115:125): avc: denied { create } for pid=553 comm="syz.3.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 38.082747][ T556] bond_slave_1: mtu greater than device maximum [ 39.724511][ T592] bond_slave_1: mtu greater than device maximum [ 40.349969][ T604] device pim6reg1 entered promiscuous mode [ 41.754803][ T621] bond_slave_1: mtu greater than device maximum [ 42.286733][ T635] bond_slave_1: mtu greater than device maximum [ 42.981179][ T642] bond_slave_1: mtu greater than device maximum [ 45.225116][ T662] bond_slave_1: mtu greater than device maximum [ 45.906293][ T686] bond_slave_1: mtu greater than device maximum [ 47.135730][ T697] bond_slave_1: mtu greater than device maximum [ 50.106987][ T734] bond_slave_1: mtu greater than device maximum [ 50.278445][ T745] bond_slave_1: mtu greater than device maximum [ 50.830739][ T751] bond_slave_1: mtu greater than device maximum [ 53.288105][ T788] bond_slave_1: mtu greater than device maximum [ 53.839698][ T802] bond_slave_1: mtu greater than device maximum [ 54.251365][ T28] audit: type=1400 audit(1737682672.335:126): avc: denied { create } for pid=809 comm="syz.3.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 54.876256][ T829] device veth0_vlan left promiscuous mode [ 54.975145][ T829] device veth0_vlan entered promiscuous mode [ 55.010473][ T833] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.528194][ T841] device pim6reg1 entered promiscuous mode [ 55.549601][ T844] device veth1_macvtap left promiscuous mode [ 57.254075][ T871] bond_slave_1: mtu greater than device maximum [ 57.368088][ T880] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.331222][ T937] device veth1_macvtap left promiscuous mode [ 59.505119][ T949] device pim6reg1 entered promiscuous mode [ 60.976010][ T1000] device pim6reg1 entered promiscuous mode [ 61.954257][ T1034] device pim6reg1 entered promiscuous mode [ 62.146868][ T1037] device sit0 entered promiscuous mode [ 62.623002][ T28] audit: type=1400 audit(1737682680.705:127): avc: denied { write } for pid=1044 comm="syz.4.200" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 64.072453][ T28] audit: type=1400 audit(1737682682.155:128): avc: denied { create } for pid=1078 comm="syz.0.211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 64.282052][ T1084] device sit0 entered promiscuous mode [ 64.767274][ T1091] bond_slave_1: mtu greater than device maximum [ 65.185184][ T28] audit: type=1400 audit(1737682683.255:129): avc: denied { create } for pid=1110 comm="syz.0.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 65.258271][ T1118] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.140587][ T1137] device sit0 entered promiscuous mode [ 67.901313][ T1141] bond_slave_1: mtu greater than device maximum [ 68.139056][ T1158] bond_slave_1: mtu greater than device maximum [ 68.803678][ T1166] bridge0: port 3(veth1_macvtap) entered blocking state [ 68.810773][ T1166] bridge0: port 3(veth1_macvtap) entered disabled state [ 69.666551][ T1183] bond_slave_1: mtu less than device minimum [ 70.245573][ T1179] syz.1.240 (1179) used greatest stack depth: 21848 bytes left [ 70.410010][ T28] audit: type=1400 audit(1737682688.495:130): avc: denied { cpu } for pid=1211 comm="syz.4.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 70.571894][ T28] audit: type=1400 audit(1737682688.495:131): avc: denied { tracepoint } for pid=1211 comm="syz.4.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 70.647062][ T1217] bond_slave_1: mtu greater than device maximum [ 73.287513][ T1271] bond_slave_1: mtu greater than device maximum [ 73.597037][ T1286] bond_slave_1: mtu less than device minimum [ 74.204409][ T1294] device pim6reg1 entered promiscuous mode [ 74.575845][ T1303] device syzkaller0 entered promiscuous mode [ 76.172506][ T1333] bond_slave_1: mtu greater than device maximum [ 76.461698][ T28] audit: type=1400 audit(1737682694.545:132): avc: denied { create } for pid=1336 comm="syz.3.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 77.247212][ T1360] device pim6reg1 entered promiscuous mode [ 78.652554][ T28] audit: type=1400 audit(1737682696.735:133): avc: denied { create } for pid=1382 comm="syz.2.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 78.707578][ T1399] bond_slave_1: mtu greater than device maximum [ 79.219417][ T1413] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.260650][ T1411] device pim6reg1 entered promiscuous mode [ 79.559854][ T28] audit: type=1400 audit(1737682697.645:134): avc: denied { write } for pid=1419 comm="syz.3.311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 79.692397][ T1427] device syzkaller0 entered promiscuous mode [ 79.789200][ T28] audit: type=1400 audit(1737682697.725:135): avc: denied { setopt } for pid=1419 comm="syz.3.311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 80.243817][ T1436] FAULT_INJECTION: forcing a failure. [ 80.243817][ T1436] name failslab, interval 1, probability 0, space 0, times 0 [ 80.289891][ T1436] CPU: 1 PID: 1436 Comm: syz.1.315 Not tainted 6.1.118-syzkaller-00023-g092a580916f8 #0 [ 80.299447][ T1436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 80.309346][ T1436] Call Trace: [ 80.312470][ T1436] [ 80.315238][ T1436] dump_stack_lvl+0x151/0x1b7 [ 80.319755][ T1436] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 80.325055][ T1436] ? addrconf_ifdown+0x1866/0x1ab0 [ 80.330000][ T1436] dump_stack+0x15/0x18 [ 80.333991][ T1436] should_fail_ex+0x3d0/0x520 [ 80.338503][ T1436] __should_failslab+0xaf/0xf0 [ 80.343101][ T1436] should_failslab+0x9/0x20 [ 80.347442][ T1436] kmem_cache_alloc_node+0x42/0x330 [ 80.352479][ T1436] ? __alloc_skb+0xcc/0x2d0 [ 80.356816][ T1436] __alloc_skb+0xcc/0x2d0 [ 80.360982][ T1436] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 80.366103][ T1436] unregister_netdevice_many+0xeb8/0x1730 [ 80.371662][ T1436] ? alloc_netdev_mqs+0xf90/0xf90 [ 80.376517][ T1436] ? ip6gre_tunnel_find+0x54a/0x5d0 [ 80.381553][ T1436] ? __kasan_check_read+0x11/0x20 [ 80.386412][ T1436] unregister_netdevice_queue+0x2e6/0x350 [ 80.391974][ T1436] ? ip6gre_tnl_parm_from_user+0x31f/0x530 [ 80.397610][ T1436] ? list_netdevice+0x710/0x710 [ 80.402296][ T1436] ? ip6gre_tnl_parm_from_user+0x31f/0x530 [ 80.407940][ T1436] ip6gre_tunnel_siocdevprivate+0x27f/0x800 [ 80.413666][ T1436] ? do_vfs_ioctl+0xba7/0x29a0 [ 80.418265][ T1436] ? ip6gre_tunnel_init+0x170/0x170 [ 80.423303][ T1436] ? kstrtol_from_user+0x180/0x180 [ 80.428254][ T1436] ? full_name_hash+0x9d/0xf0 [ 80.432768][ T1436] dev_ifsioc+0xd40/0x1150 [ 80.437013][ T1436] ? ioctl_has_perm+0x3f0/0x560 [ 80.441700][ T1436] ? dev_ioctl+0xe60/0xe60 [ 80.445952][ T1436] ? __kasan_check_write+0x14/0x20 [ 80.450902][ T1436] ? mutex_lock+0xb1/0x1e0 [ 80.455153][ T1436] ? bit_wait_io_timeout+0x120/0x120 [ 80.460275][ T1436] dev_ioctl+0x5e9/0xe60 [ 80.464356][ T1436] sock_ioctl+0x665/0x740 [ 80.468519][ T1436] ? sock_poll+0x400/0x400 [ 80.472775][ T1436] ? __fget_files+0x2cb/0x330 [ 80.477293][ T1436] ? security_file_ioctl+0x84/0xb0 [ 80.482231][ T1436] ? sock_poll+0x400/0x400 [ 80.486490][ T1436] __se_sys_ioctl+0x114/0x190 [ 80.491001][ T1436] __x64_sys_ioctl+0x7b/0x90 [ 80.495427][ T1436] x64_sys_call+0x98/0x9a0 [ 80.499677][ T1436] do_syscall_64+0x3b/0xb0 [ 80.503931][ T1436] ? clear_bhb_loop+0x55/0xb0 [ 80.508449][ T1436] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 80.514174][ T1436] RIP: 0033:0x7f59ed18cd29 [ 80.518427][ T1436] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 80.537867][ T1436] RSP: 002b:00007f59ee01c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 80.546115][ T1436] RAX: ffffffffffffffda RBX: 00007f59ed3a5fa0 RCX: 00007f59ed18cd29 [ 80.553929][ T1436] RDX: 0000000020000080 RSI: 00000000000089f2 RDI: 0000000000000004 [ 80.561735][ T1436] RBP: 00007f59ee01c090 R08: 0000000000000000 R09: 0000000000000000 [ 80.569547][ T1436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 80.577358][ T1436] R13: 0000000000000000 R14: 00007f59ed3a5fa0 R15: 00007fffb0ce9bd8 [ 80.585176][ T1436] [ 80.862845][ T28] audit: type=1400 audit(1737682698.945:136): avc: denied { read } for pid=1443 comm="syz.1.318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 81.200591][ T1454] device pim6reg1 entered promiscuous mode [ 82.232166][ T1469] device syzkaller0 entered promiscuous mode [ 82.361160][ T1476] bond_slave_1: mtu greater than device maximum [ 82.814420][ T1494] device pim6reg1 entered promiscuous mode [ 82.826649][ T1495] bond_slave_1: mtu greater than device maximum [ 83.910241][ T1512] bond_slave_1: mtu greater than device maximum [ 84.629151][ T28] audit: type=1400 audit(1737682702.715:137): avc: denied { create } for pid=1531 comm="syz.1.344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 84.828382][ T1540] FAULT_INJECTION: forcing a failure. [ 84.828382][ T1540] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 84.997682][ T1540] CPU: 1 PID: 1540 Comm: syz.1.347 Not tainted 6.1.118-syzkaller-00023-g092a580916f8 #0 [ 85.007247][ T1540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 85.017134][ T1540] Call Trace: [ 85.020256][ T1540] [ 85.023033][ T1540] dump_stack_lvl+0x151/0x1b7 [ 85.027548][ T1540] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 85.032842][ T1540] ? _printk+0x106/0x111 [ 85.036919][ T1540] dump_stack+0x15/0x18 [ 85.040912][ T1540] should_fail_ex+0x3d0/0x520 [ 85.045432][ T1540] should_fail_alloc_page+0x68/0x90 [ 85.050464][ T1540] prepare_alloc_pages+0x14e/0x6f0 [ 85.055410][ T1540] ? __alloc_pages_bulk+0xda0/0xda0 [ 85.060446][ T1540] ? slab_post_alloc_hook+0x53/0x2c0 [ 85.065559][ T1540] ? alloc_vmap_area+0x1a5/0x1aa0 [ 85.070417][ T1540] ? __get_vm_area_node+0x171/0x370 [ 85.075451][ T1540] ? __vmalloc_node_range+0x338/0x1560 [ 85.080749][ T1540] __alloc_pages+0x162/0x610 [ 85.085172][ T1540] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 85.090816][ T1540] ? prep_new_page+0x110/0x110 [ 85.095426][ T1540] ? _raw_spin_trylock_bh+0x190/0x190 [ 85.100626][ T1540] ? kasan_check_range+0x193/0x2a0 [ 85.105571][ T1540] __get_free_pages+0xe/0x30 [ 85.109996][ T1540] kasan_populate_vmalloc_pte+0x39/0x130 [ 85.115465][ T1540] ? __apply_to_page_range+0x8ca/0xbe0 [ 85.120760][ T1540] __apply_to_page_range+0x8dd/0xbe0 [ 85.125893][ T1540] ? kasan_populate_vmalloc+0x70/0x70 [ 85.131095][ T1540] ? kasan_populate_vmalloc+0x70/0x70 [ 85.136298][ T1540] apply_to_page_range+0x3b/0x50 [ 85.141072][ T1540] kasan_populate_vmalloc+0x65/0x70 [ 85.146104][ T1540] alloc_vmap_area+0x1961/0x1aa0 [ 85.150880][ T1540] ? vm_map_ram+0x940/0x940 [ 85.155223][ T1540] ? __kasan_kmalloc+0x9c/0xb0 [ 85.159820][ T1540] ? kmalloc_node_trace+0x3d/0xb0 [ 85.164686][ T1540] __get_vm_area_node+0x171/0x370 [ 85.169548][ T1540] __vmalloc_node_range+0x338/0x1560 [ 85.174836][ T1540] ? htab_map_alloc+0x39d/0xf80 [ 85.179524][ T1540] ? vmap+0x2b0/0x2b0 [ 85.183341][ T1540] ? kasan_save_alloc_info+0x1f/0x30 [ 85.188460][ T1540] ? __kasan_kmalloc+0x9c/0xb0 [ 85.193059][ T1540] ? __kmalloc_node+0xb4/0x1e0 [ 85.197659][ T1540] bpf_map_area_alloc+0xdc/0xf0 [ 85.202346][ T1540] ? htab_map_alloc+0x39d/0xf80 [ 85.207035][ T1540] htab_map_alloc+0x39d/0xf80 [ 85.211550][ T1540] ? htab_map_alloc_check+0x3ce/0x4b0 [ 85.216758][ T1540] map_create+0x44a/0xcf0 [ 85.220932][ T1540] __sys_bpf+0x2e6/0x7f0 [ 85.225002][ T1540] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 85.230212][ T1540] ? __ia32_sys_read+0x90/0x90 [ 85.234812][ T1540] ? debug_smp_processor_id+0x17/0x20 [ 85.240017][ T1540] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 85.245918][ T1540] __x64_sys_bpf+0x7c/0x90 [ 85.250174][ T1540] x64_sys_call+0x87f/0x9a0 [ 85.254508][ T1540] do_syscall_64+0x3b/0xb0 [ 85.258762][ T1540] ? clear_bhb_loop+0x55/0xb0 [ 85.263294][ T1540] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 85.269005][ T1540] RIP: 0033:0x7f59ed18cd29 [ 85.273258][ T1540] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 85.292700][ T1540] RSP: 002b:00007f59ee01c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 85.300944][ T1540] RAX: ffffffffffffffda RBX: 00007f59ed3a5fa0 RCX: 00007f59ed18cd29 [ 85.308757][ T1540] RDX: 0000000000000050 RSI: 0000000020000500 RDI: 0000000000000000 [ 85.316589][ T1540] RBP: 00007f59ee01c090 R08: 0000000000000000 R09: 0000000000000000 [ 85.324402][ T1540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 85.332188][ T1540] R13: 0000000000000000 R14: 00007f59ed3a5fa0 R15: 00007fffb0ce9bd8 [ 85.340005][ T1540] [ 85.889863][ T1552] bond_slave_1: mtu greater than device maximum [ 90.583093][ T28] audit: type=1400 audit(1737682708.665:138): avc: denied { create } for pid=1647 comm="syz.1.377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 90.668277][ T1654] FAULT_INJECTION: forcing a failure. [ 90.668277][ T1654] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 90.803215][ T1654] CPU: 0 PID: 1654 Comm: syz.4.379 Not tainted 6.1.118-syzkaller-00023-g092a580916f8 #0 [ 90.812766][ T1654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 90.822663][ T1654] Call Trace: [ 90.825785][ T1654] [ 90.828563][ T1654] dump_stack_lvl+0x151/0x1b7 [ 90.833078][ T1654] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 90.838368][ T1654] ? vfs_write+0x952/0xed0 [ 90.842624][ T1654] ? __kasan_slab_free+0x11/0x20 [ 90.847398][ T1654] dump_stack+0x15/0x18 [ 90.851389][ T1654] should_fail_ex+0x3d0/0x520 [ 90.855904][ T1654] should_fail+0xb/0x10 [ 90.859893][ T1654] should_fail_usercopy+0x1a/0x20 [ 90.864753][ T1654] _copy_from_user+0x1e/0xc0 [ 90.869184][ T1654] __sys_bpf+0x23b/0x7f0 [ 90.873260][ T1654] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 90.878479][ T1654] ? __ia32_sys_read+0x90/0x90 [ 90.883068][ T1654] ? debug_smp_processor_id+0x17/0x20 [ 90.888278][ T1654] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 90.894182][ T1654] __x64_sys_bpf+0x7c/0x90 [ 90.898431][ T1654] x64_sys_call+0x87f/0x9a0 [ 90.902771][ T1654] do_syscall_64+0x3b/0xb0 [ 90.907030][ T1654] ? clear_bhb_loop+0x55/0xb0 [ 90.911536][ T1654] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 90.917266][ T1654] RIP: 0033:0x7f318718cd29 [ 90.921523][ T1654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 90.940967][ T1654] RSP: 002b:00007f3187f65038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 90.949207][ T1654] RAX: ffffffffffffffda RBX: 00007f31873a5fa0 RCX: 00007f318718cd29 [ 90.957017][ T1654] RDX: 0000000000000020 RSI: 0000000020000240 RDI: 0000000000000002 [ 90.964829][ T1654] RBP: 00007f3187f65090 R08: 0000000000000000 R09: 0000000000000000 [ 90.972645][ T1654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 90.980453][ T1654] R13: 0000000000000000 R14: 00007f31873a5fa0 R15: 00007ffc2b7ba608 [ 90.988268][ T1654] [ 91.331250][ T1650] bond_slave_1: mtu greater than device maximum [ 91.758618][ T1662] device pim6reg1 entered promiscuous mode [ 94.136845][ T28] audit: type=1400 audit(1737682712.215:139): avc: denied { create } for pid=1697 comm="syz.4.393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 94.777550][ T1708] bond_slave_1: mtu greater than device maximum [ 94.787850][ T1713] device pim6reg1 entered promiscuous mode [ 96.254810][ T1747] device pim6reg1 entered promiscuous mode [ 96.799979][ T1771] bond_slave_1: mtu greater than device maximum [ 97.661687][ T1789] device pim6reg1 entered promiscuous mode [ 97.790924][ T1793] device macsec0 entered promiscuous mode [ 97.981205][ T1799] device pim6reg1 entered promiscuous mode [ 98.273353][ T1800] bond_slave_1: mtu greater than device maximum [ 99.750813][ T1818] FAULT_INJECTION: forcing a failure. [ 99.750813][ T1818] name failslab, interval 1, probability 0, space 0, times 0 [ 99.912052][ T1818] CPU: 0 PID: 1818 Comm: syz.2.428 Not tainted 6.1.118-syzkaller-00023-g092a580916f8 #0 [ 99.921611][ T1818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 99.931502][ T1818] Call Trace: [ 99.934626][ T1818] [ 99.937407][ T1818] dump_stack_lvl+0x151/0x1b7 [ 99.941920][ T1818] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 99.947213][ T1818] dump_stack+0x15/0x18 [ 99.951204][ T1818] should_fail_ex+0x3d0/0x520 [ 99.955721][ T1818] ? security_inode_alloc+0x29/0x120 [ 99.960838][ T1818] __should_failslab+0xaf/0xf0 [ 99.965437][ T1818] should_failslab+0x9/0x20 [ 99.969780][ T1818] kmem_cache_alloc+0x3b/0x320 [ 99.974378][ T1818] security_inode_alloc+0x29/0x120 [ 99.979325][ T1818] inode_init_always+0x720/0x970 [ 99.984098][ T1818] ? sockfs_init_fs_context+0xb0/0xb0 [ 99.989309][ T1818] new_inode_pseudo+0x98/0x1d0 [ 99.993908][ T1818] __sock_create+0x132/0x7e0 [ 99.998335][ T1818] __sys_socketpair+0x313/0x6e0 [ 100.003020][ T1818] ? __ia32_sys_socket+0x90/0x90 [ 100.007802][ T1818] ? debug_smp_processor_id+0x17/0x20 [ 100.013004][ T1818] __x64_sys_socketpair+0x9b/0xb0 [ 100.017864][ T1818] x64_sys_call+0x19b/0x9a0 [ 100.022200][ T1818] do_syscall_64+0x3b/0xb0 [ 100.026454][ T1818] ? clear_bhb_loop+0x55/0xb0 [ 100.030967][ T1818] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 100.036698][ T1818] RIP: 0033:0x7f1f0d38cd29 [ 100.040953][ T1818] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 100.060390][ T1818] RSP: 002b:00007f1f0e10b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 100.068640][ T1818] RAX: ffffffffffffffda RBX: 00007f1f0d5a5fa0 RCX: 00007f1f0d38cd29 [ 100.076449][ T1818] RDX: 0000000000000001 RSI: 0000000000000003 RDI: 0000000000000002 [ 100.084259][ T1818] RBP: 00007f1f0e10b090 R08: 0000000000000000 R09: 0000000000000000 [ 100.092072][ T1818] R10: 0000000020000300 R11: 0000000000000246 R12: 0000000000000001 [ 100.099881][ T1818] R13: 0000000000000000 R14: 00007f1f0d5a5fa0 R15: 00007ffdcbf65458 [ 100.107710][ T1818] [ 100.134906][ T1818] socket: no more sockets [ 100.303836][ T1836] device pim6reg1 entered promiscuous mode [ 100.565983][ T1837] bond_slave_1: mtu greater than device maximum [ 102.083523][ T1871] bond_slave_1: mtu greater than device maximum [ 102.391472][ T1878] bond_slave_1: mtu greater than device maximum [ 102.495918][ T1881] device pim6reg1 entered promiscuous mode [ 102.549189][ T1883] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.561176][ T1883] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.568058][ T1883] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.589246][ T1883] device bridge0 entered promiscuous mode [ 104.270186][ T1919] bond_slave_1: mtu greater than device maximum [ 104.474444][ T1933] device pim6reg1 entered promiscuous mode [ 104.724028][ T1939] bond_slave_1: mtu greater than device maximum [ 105.916173][ T1982] device pim6reg1 entered promiscuous mode [ 106.767148][ T1996] device pim6reg1 entered promiscuous mode [ 108.187643][ T2020] tun0: tun_chr_ioctl cmd 1074025692 [ 108.832918][ T2028] device pim6reg1 entered promiscuous mode [ 110.659394][ T2076] device pim6reg1 entered promiscuous mode [ 112.527261][ T2116] device pim6reg1 entered promiscuous mode [ 113.504803][ T2136] bond_slave_1: mtu greater than device maximum [ 114.320995][ T2156] device pim6reg1 entered promiscuous mode [ 115.405535][ T2180] bond_slave_1: mtu greater than device maximum [ 116.088822][ T2201] device pim6reg1 entered promiscuous mode [ 117.275790][ T2225] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.967301][ T2249] device pim6reg1 entered promiscuous mode [ 118.256933][ T2241] bond_slave_1: mtu greater than device maximum [ 119.611385][ T2299] device pim6reg1 entered promiscuous mode [ 119.673045][ T2301] device veth0_vlan left promiscuous mode [ 119.678923][ T2301] device veth0_vlan entered promiscuous mode [ 119.734806][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 119.756763][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 119.828448][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 120.070506][ T2312] device veth0_vlan left promiscuous mode [ 120.100746][ T2312] device veth0_vlan entered promiscuous mode [ 120.107332][ T28] audit: type=1400 audit(1737682738.195:140): avc: denied { remove_name } for pid=85 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 120.162574][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 120.180830][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 120.266602][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 120.277567][ T28] audit: type=1400 audit(1737682738.195:141): avc: denied { rename } for pid=85 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 122.023977][ T2357] FAULT_INJECTION: forcing a failure. [ 122.023977][ T2357] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 122.200795][ T2357] CPU: 0 PID: 2357 Comm: syz.0.592 Not tainted 6.1.118-syzkaller-00023-g092a580916f8 #0 [ 122.210351][ T2357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 122.220243][ T2357] Call Trace: [ 122.223369][ T2357] [ 122.226145][ T2357] dump_stack_lvl+0x151/0x1b7 [ 122.230662][ T2357] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 122.235954][ T2357] dump_stack+0x15/0x18 [ 122.239945][ T2357] should_fail_ex+0x3d0/0x520 [ 122.244467][ T2357] should_fail_alloc_page+0x68/0x90 [ 122.249494][ T2357] prepare_alloc_pages+0x14e/0x6f0 [ 122.254443][ T2357] ? __alloc_pages_bulk+0xda0/0xda0 [ 122.259475][ T2357] __alloc_pages+0x162/0x610 [ 122.263902][ T2357] ? prep_new_page+0x110/0x110 [ 122.268503][ T2357] ? _raw_spin_trylock_bh+0x190/0x190 [ 122.273706][ T2357] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 122.279700][ T2357] __get_free_pages+0xe/0x30 [ 122.284122][ T2357] kasan_populate_vmalloc_pte+0x39/0x130 [ 122.289591][ T2357] ? __apply_to_page_range+0x8ca/0xbe0 [ 122.294884][ T2357] __apply_to_page_range+0x8dd/0xbe0 [ 122.300007][ T2357] ? kasan_populate_vmalloc+0x70/0x70 [ 122.305233][ T2357] ? kasan_populate_vmalloc+0x70/0x70 [ 122.310423][ T2357] apply_to_page_range+0x3b/0x50 [ 122.315201][ T2357] kasan_populate_vmalloc+0x65/0x70 [ 122.320233][ T2357] alloc_vmap_area+0x1961/0x1aa0 [ 122.325007][ T2357] ? vm_map_ram+0x940/0x940 [ 122.329341][ T2357] ? __kasan_kmalloc+0x9c/0xb0 [ 122.333944][ T2357] ? kmalloc_node_trace+0x3d/0xb0 [ 122.338803][ T2357] __get_vm_area_node+0x171/0x370 [ 122.343664][ T2357] __vmalloc_node_range+0x338/0x1560 [ 122.348784][ T2357] ? htab_map_alloc+0x39d/0xf80 [ 122.353476][ T2357] ? vmap+0x2b0/0x2b0 [ 122.357288][ T2357] ? kasan_save_alloc_info+0x1f/0x30 [ 122.362408][ T2357] ? __kasan_kmalloc+0x9c/0xb0 [ 122.367011][ T2357] ? __kmalloc_node+0xb4/0x1e0 [ 122.371622][ T2357] bpf_map_area_alloc+0xdc/0xf0 [ 122.376304][ T2357] ? htab_map_alloc+0x39d/0xf80 [ 122.380986][ T2357] htab_map_alloc+0x39d/0xf80 [ 122.385501][ T2357] ? htab_map_alloc_check+0x3ce/0x4b0 [ 122.390706][ T2357] map_create+0x44a/0xcf0 [ 122.394869][ T2357] __sys_bpf+0x2e6/0x7f0 [ 122.398951][ T2357] ? clockevents_program_event+0x22f/0x300 [ 122.404592][ T2357] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 122.409800][ T2357] ? __sched_clock_gtod_offset+0x100/0x100 [ 122.415440][ T2357] ? debug_smp_processor_id+0x17/0x20 [ 122.420649][ T2357] __x64_sys_bpf+0x7c/0x90 [ 122.424908][ T2357] x64_sys_call+0x87f/0x9a0 [ 122.429241][ T2357] do_syscall_64+0x3b/0xb0 [ 122.433496][ T2357] ? clear_bhb_loop+0x55/0xb0 [ 122.438006][ T2357] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 122.443735][ T2357] RIP: 0033:0x7f1b7118cd29 [ 122.447987][ T2357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 122.467430][ T2357] RSP: 002b:00007f1b72071038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 122.475676][ T2357] RAX: ffffffffffffffda RBX: 00007f1b713a5fa0 RCX: 00007f1b7118cd29 [ 122.483486][ T2357] RDX: 0000000000000050 RSI: 0000000020000500 RDI: 0000000000000000 [ 122.491298][ T2357] RBP: 00007f1b72071090 R08: 0000000000000000 R09: 0000000000000000 [ 122.499110][ T2357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 122.506921][ T2357] R13: 0000000000000000 R14: 00007f1b713a5fa0 R15: 00007fffacd9ae98 [ 122.514737][ T2357] [ 122.935303][ T2376] bond_slave_1: mtu greater than device maximum [ 123.215617][ T28] audit: type=1400 audit(1737682741.295:142): avc: denied { create } for pid=2381 comm="syz.2.600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 124.262079][ T2422] device syzkaller0 entered promiscuous mode [ 127.447842][ T28] audit: type=1400 audit(1737682745.525:143): avc: denied { create } for pid=2532 comm="syz.0.652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 127.538333][ T2541] device sit0 entered promiscuous mode [ 127.738765][ T28] audit: type=1400 audit(1737682745.765:144): avc: denied { write } for pid=2538 comm="syz.2.655" name="cgroup.subtree_control" dev="cgroup2" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 127.848699][ T28] audit: type=1400 audit(1737682745.765:145): avc: denied { open } for pid=2538 comm="syz.2.655" path="" dev="cgroup2" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 128.309962][ T28] audit: type=1400 audit(1737682746.385:146): avc: denied { create } for pid=2557 comm="syz.2.661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 129.288736][ T2619] FAULT_INJECTION: forcing a failure. [ 129.288736][ T2619] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 129.319504][ T2619] CPU: 0 PID: 2619 Comm: syz.2.679 Not tainted 6.1.118-syzkaller-00023-g092a580916f8 #0 [ 129.329092][ T2619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 129.338988][ T2619] Call Trace: [ 129.342109][ T2619] [ 129.344888][ T2619] dump_stack_lvl+0x151/0x1b7 [ 129.349401][ T2619] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 129.354698][ T2619] dump_stack+0x15/0x18 [ 129.358690][ T2619] should_fail_ex+0x3d0/0x520 [ 129.363200][ T2619] should_fail_alloc_page+0x68/0x90 [ 129.368235][ T2619] prepare_alloc_pages+0x14e/0x6f0 [ 129.373186][ T2619] ? __alloc_pages_bulk+0xda0/0xda0 [ 129.378215][ T2619] ? slab_post_alloc_hook+0x53/0x2c0 [ 129.383332][ T2619] ? kmem_cache_alloc_node+0x188/0x330 [ 129.388628][ T2619] ? alloc_vmap_area+0x1a5/0x1aa0 [ 129.393489][ T2619] ? __get_vm_area_node+0x171/0x370 [ 129.398523][ T2619] ? __vmalloc_node_range+0x338/0x1560 [ 129.403820][ T2619] __alloc_pages+0x162/0x610 [ 129.408244][ T2619] ? prep_new_page+0x110/0x110 [ 129.412856][ T2619] __get_free_pages+0xe/0x30 [ 129.417269][ T2619] kasan_populate_vmalloc_pte+0x39/0x130 [ 129.423147][ T2619] ? __apply_to_page_range+0x8ca/0xbe0 [ 129.428442][ T2619] __apply_to_page_range+0x8dd/0xbe0 [ 129.433568][ T2619] ? kasan_populate_vmalloc+0x70/0x70 [ 129.438773][ T2619] ? kasan_populate_vmalloc+0x70/0x70 [ 129.443976][ T2619] apply_to_page_range+0x3b/0x50 [ 129.448753][ T2619] kasan_populate_vmalloc+0x65/0x70 [ 129.453786][ T2619] alloc_vmap_area+0x1961/0x1aa0 [ 129.458562][ T2619] ? vm_map_ram+0x940/0x940 [ 129.462896][ T2619] ? __kasan_kmalloc+0x9c/0xb0 [ 129.467499][ T2619] ? kmalloc_node_trace+0x3d/0xb0 [ 129.472358][ T2619] __get_vm_area_node+0x171/0x370 [ 129.477216][ T2619] ? kasan_save_free_info+0x2b/0x40 [ 129.482254][ T2619] __vmalloc_node_range+0x338/0x1560 [ 129.487374][ T2619] ? array_map_alloc+0x278/0x6d0 [ 129.492148][ T2619] ? selinux_capable+0x2f1/0x430 [ 129.496921][ T2619] ? selinux_capset+0xf0/0xf0 [ 129.501433][ T2619] ? vmap+0x2b0/0x2b0 [ 129.505251][ T2619] ? cap_capable+0x1d2/0x270 [ 129.509681][ T2619] bpf_map_area_alloc+0xdc/0xf0 [ 129.514367][ T2619] ? array_map_alloc+0x278/0x6d0 [ 129.519487][ T2619] array_map_alloc+0x278/0x6d0 [ 129.524088][ T2619] map_create+0x44a/0xcf0 [ 129.528253][ T2619] __sys_bpf+0x2e6/0x7f0 [ 129.532331][ T2619] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 129.537551][ T2619] ? __ia32_sys_read+0x90/0x90 [ 129.542140][ T2619] ? debug_smp_processor_id+0x17/0x20 [ 129.547346][ T2619] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 129.553250][ T2619] __x64_sys_bpf+0x7c/0x90 [ 129.557503][ T2619] x64_sys_call+0x87f/0x9a0 [ 129.561841][ T2619] do_syscall_64+0x3b/0xb0 [ 129.566094][ T2619] ? clear_bhb_loop+0x55/0xb0 [ 129.570609][ T2619] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 129.576339][ T2619] RIP: 0033:0x7f1f0d38cd29 [ 129.580590][ T2619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 129.600033][ T2619] RSP: 002b:00007f1f0e10b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 129.608279][ T2619] RAX: ffffffffffffffda RBX: 00007f1f0d5a5fa0 RCX: 00007f1f0d38cd29 [ 129.616088][ T2619] RDX: 0000000000000048 RSI: 0000000020004080 RDI: 0b00000000000000 [ 129.623903][ T2619] RBP: 00007f1f0e10b090 R08: 0000000000000000 R09: 0000000000000000 [ 129.631712][ T2619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 129.639524][ T2619] R13: 0000000000000000 R14: 00007f1f0d5a5fa0 R15: 00007ffdcbf65458 [ 129.647338][ T2619] [ 132.574323][ T2713] device veth0_vlan left promiscuous mode [ 132.582019][ T2713] device veth0_vlan entered promiscuous mode [ 132.592241][ T1980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.621245][ T1980] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 132.655694][ T1980] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 133.096169][ T2733] device sit0 left promiscuous mode [ 133.429901][ T2735] device sit0 entered promiscuous mode [ 134.843692][ T2765] bond_slave_1: mtu greater than device maximum [ 136.119992][ T2807] device syzkaller0 entered promiscuous mode [ 136.264337][ T2814] FAULT_INJECTION: forcing a failure. [ 136.264337][ T2814] name failslab, interval 1, probability 0, space 0, times 0 [ 136.329893][ T2814] CPU: 0 PID: 2814 Comm: syz.0.741 Not tainted 6.1.118-syzkaller-00023-g092a580916f8 #0 [ 136.339444][ T2814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 136.349340][ T2814] Call Trace: [ 136.352463][ T2814] [ 136.355236][ T2814] dump_stack_lvl+0x151/0x1b7 [ 136.359751][ T2814] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 136.365048][ T2814] dump_stack+0x15/0x18 [ 136.369040][ T2814] should_fail_ex+0x3d0/0x520 [ 136.373552][ T2814] ? sk_prot_alloc+0x5f/0x330 [ 136.378064][ T2814] __should_failslab+0xaf/0xf0 [ 136.382664][ T2814] should_failslab+0x9/0x20 [ 136.387010][ T2814] kmem_cache_alloc+0x3b/0x320 [ 136.391607][ T2814] sk_prot_alloc+0x5f/0x330 [ 136.395950][ T2814] sk_alloc+0x38/0x440 [ 136.399851][ T2814] ? ns_capable+0x89/0xe0 [ 136.404017][ T2814] inet_create+0x6be/0x1030 [ 136.408358][ T2814] __sock_create+0x3be/0x7e0 [ 136.412788][ T2814] __sys_socketpair+0x313/0x6e0 [ 136.417469][ T2814] ? __ia32_sys_socket+0x90/0x90 [ 136.422243][ T2814] ? debug_smp_processor_id+0x17/0x20 [ 136.427454][ T2814] __x64_sys_socketpair+0x9b/0xb0 [ 136.432311][ T2814] x64_sys_call+0x19b/0x9a0 [ 136.436651][ T2814] do_syscall_64+0x3b/0xb0 [ 136.440902][ T2814] ? clear_bhb_loop+0x55/0xb0 [ 136.445417][ T2814] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 136.451147][ T2814] RIP: 0033:0x7f1b7118cd29 [ 136.455397][ T2814] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 136.474842][ T2814] RSP: 002b:00007f1b72071038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 136.483086][ T2814] RAX: ffffffffffffffda RBX: 00007f1b713a5fa0 RCX: 00007f1b7118cd29 [ 136.490897][ T2814] RDX: 0000000000000001 RSI: 0000000000000003 RDI: 0000000000000002 [ 136.498710][ T2814] RBP: 00007f1b72071090 R08: 0000000000000000 R09: 0000000000000000 [ 136.506521][ T2814] R10: 0000000020000300 R11: 0000000000000246 R12: 0000000000000001 [ 136.514331][ T2814] R13: 0000000000000000 R14: 00007f1b713a5fa0 R15: 00007fffacd9ae98 [ 136.522148][ T2814] [ 137.495891][ T2849] bond_slave_1: mtu greater than device maximum [ 138.142782][ T2861] device wg2 entered promiscuous mode [ 139.890125][ T2906] FAULT_INJECTION: forcing a failure. [ 139.890125][ T2906] name failslab, interval 1, probability 0, space 0, times 0 [ 139.945052][ T2906] CPU: 1 PID: 2906 Comm: syz.1.766 Not tainted 6.1.118-syzkaller-00023-g092a580916f8 #0 [ 139.954603][ T2906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 139.964499][ T2906] Call Trace: [ 139.967620][ T2906] [ 139.970398][ T2906] dump_stack_lvl+0x151/0x1b7 [ 139.974912][ T2906] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 139.980210][ T2906] ? __stack_depot_save+0x36/0x480 [ 139.985153][ T2906] ? kfree+0x7a/0xf0 [ 139.988890][ T2906] dump_stack+0x15/0x18 [ 139.992878][ T2906] should_fail_ex+0x3d0/0x520 [ 139.997397][ T2906] __should_failslab+0xaf/0xf0 [ 140.001992][ T2906] should_failslab+0x9/0x20 [ 140.006335][ T2906] slab_pre_alloc_hook+0x2e/0x1b0 [ 140.011202][ T2906] kmem_cache_alloc_lru+0x49/0x270 [ 140.016148][ T2906] ? __d_alloc+0x34/0x700 [ 140.020306][ T2906] __d_alloc+0x34/0x700 [ 140.024298][ T2906] ? __kasan_check_write+0x14/0x20 [ 140.029247][ T2906] ? _raw_spin_lock+0xa4/0x1b0 [ 140.033849][ T2906] d_alloc_pseudo+0x1d/0x70 [ 140.038185][ T2906] alloc_file_pseudo+0x131/0x2f0 [ 140.042962][ T2906] ? alloc_empty_file_noaccount+0x80/0x80 [ 140.048518][ T2906] anon_inode_getfd+0xde/0x200 [ 140.053118][ T2906] btf_new_fd+0x62d/0x7c0 [ 140.057282][ T2906] bpf_btf_load+0x6f/0x90 [ 140.061445][ T2906] __sys_bpf+0x586/0x7f0 [ 140.065528][ T2906] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 140.070737][ T2906] ? __ia32_sys_read+0x90/0x90 [ 140.075333][ T2906] ? debug_smp_processor_id+0x17/0x20 [ 140.080549][ T2906] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 140.086441][ T2906] __x64_sys_bpf+0x7c/0x90 [ 140.090695][ T2906] x64_sys_call+0x87f/0x9a0 [ 140.095036][ T2906] do_syscall_64+0x3b/0xb0 [ 140.099288][ T2906] ? clear_bhb_loop+0x55/0xb0 [ 140.103804][ T2906] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 140.109534][ T2906] RIP: 0033:0x7f59ed18cd29 [ 140.113782][ T2906] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 140.133229][ T2906] RSP: 002b:00007f59ee01c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 140.141472][ T2906] RAX: ffffffffffffffda RBX: 00007f59ed3a5fa0 RCX: 00007f59ed18cd29 [ 140.149283][ T2906] RDX: 0000000000000028 RSI: 0000000020000180 RDI: 0000000000000012 [ 140.157091][ T2906] RBP: 00007f59ee01c090 R08: 0000000000000000 R09: 0000000000000000 [ 140.164904][ T2906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 140.172716][ T2906] R13: 0000000000000000 R14: 00007f59ed3a5fa0 R15: 00007fffb0ce9bd8 [ 140.180533][ T2906] [ 140.492077][ T2911] bond_slave_1: mtu greater than device maximum [ 140.774929][ T2927] device veth0_vlan left promiscuous mode [ 140.825344][ T2927] device veth0_vlan entered promiscuous mode [ 140.910776][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 140.922770][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 140.978209][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 141.105047][ T2925] bond_slave_1: mtu greater than device maximum [ 141.718183][ T2953] device wg2 entered promiscuous mode [ 142.868183][ T2987] bond_slave_1: mtu greater than device maximum [ 143.938549][ T3003] bond_slave_1: mtu greater than device maximum [ 144.175272][ T3016] device wg2 entered promiscuous mode [ 147.433681][ T3099] bond_slave_1: mtu greater than device maximum [ 147.794657][ T3113] device vlan1 entered promiscuous mode [ 149.318909][ T3146] bond_slave_1: mtu greater than device maximum [ 149.655458][ T28] audit: type=1400 audit(1737682767.735:147): avc: denied { ioctl } for pid=3162 comm="syz.0.843" path="socket:[23552]" dev="sockfs" ino=23552 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 150.763982][ T3198] FAULT_INJECTION: forcing a failure. [ 150.763982][ T3198] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 151.056900][ T3198] CPU: 0 PID: 3198 Comm: syz.1.856 Not tainted 6.1.118-syzkaller-00023-g092a580916f8 #0 [ 151.066453][ T3198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 151.076694][ T3198] Call Trace: [ 151.079814][ T3198] [ 151.082590][ T3198] dump_stack_lvl+0x151/0x1b7 [ 151.087105][ T3198] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 151.092436][ T3198] dump_stack+0x15/0x18 [ 151.096394][ T3198] should_fail_ex+0x3d0/0x520 [ 151.100905][ T3198] should_fail_alloc_page+0x68/0x90 [ 151.105940][ T3198] prepare_alloc_pages+0x14e/0x6f0 [ 151.110892][ T3198] ? __alloc_pages_bulk+0xda0/0xda0 [ 151.115924][ T3198] __alloc_pages+0x162/0x610 [ 151.120349][ T3198] ? prep_new_page+0x110/0x110 [ 151.124948][ T3198] ? _raw_spin_trylock_bh+0x190/0x190 [ 151.130154][ T3198] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 151.136148][ T3198] __get_free_pages+0xe/0x30 [ 151.140569][ T3198] kasan_populate_vmalloc_pte+0x39/0x130 [ 151.146037][ T3198] ? __apply_to_page_range+0x8ca/0xbe0 [ 151.151332][ T3198] __apply_to_page_range+0x8dd/0xbe0 [ 151.156471][ T3198] ? kasan_populate_vmalloc+0x70/0x70 [ 151.161762][ T3198] ? kasan_populate_vmalloc+0x70/0x70 [ 151.166971][ T3198] apply_to_page_range+0x3b/0x50 [ 151.171746][ T3198] kasan_populate_vmalloc+0x65/0x70 [ 151.176916][ T3198] alloc_vmap_area+0x1961/0x1aa0 [ 151.181694][ T3198] ? vm_map_ram+0x940/0x940 [ 151.186029][ T3198] ? __kasan_kmalloc+0x9c/0xb0 [ 151.190632][ T3198] ? kmalloc_node_trace+0x3d/0xb0 [ 151.195491][ T3198] __get_vm_area_node+0x171/0x370 [ 151.200351][ T3198] __vmalloc_node_range+0x338/0x1560 [ 151.205474][ T3198] ? htab_map_alloc+0x39d/0xf80 [ 151.210166][ T3198] ? vmap+0x2b0/0x2b0 [ 151.213977][ T3198] ? kasan_save_alloc_info+0x1f/0x30 [ 151.219101][ T3198] ? __kasan_kmalloc+0x9c/0xb0 [ 151.223695][ T3198] ? __kmalloc_node+0xb4/0x1e0 [ 151.228299][ T3198] bpf_map_area_alloc+0xdc/0xf0 [ 151.232987][ T3198] ? htab_map_alloc+0x39d/0xf80 [ 151.237673][ T3198] htab_map_alloc+0x39d/0xf80 [ 151.242187][ T3198] ? htab_map_alloc_check+0x3ce/0x4b0 [ 151.247395][ T3198] map_create+0x44a/0xcf0 [ 151.251562][ T3198] __sys_bpf+0x2e6/0x7f0 [ 151.255637][ T3198] ? clockevents_program_event+0x22f/0x300 [ 151.261278][ T3198] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 151.266489][ T3198] ? __sched_clock_gtod_offset+0x100/0x100 [ 151.272133][ T3198] ? debug_smp_processor_id+0x17/0x20 [ 151.277337][ T3198] __x64_sys_bpf+0x7c/0x90 [ 151.281592][ T3198] x64_sys_call+0x87f/0x9a0 [ 151.285931][ T3198] do_syscall_64+0x3b/0xb0 [ 151.290184][ T3198] ? clear_bhb_loop+0x55/0xb0 [ 151.294695][ T3198] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 151.300430][ T3198] RIP: 0033:0x7f59ed18cd29 [ 151.304678][ T3198] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 151.324122][ T3198] RSP: 002b:00007f59ee01c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 151.332367][ T3198] RAX: ffffffffffffffda RBX: 00007f59ed3a5fa0 RCX: 00007f59ed18cd29 [ 151.340174][ T3198] RDX: 0000000000000050 RSI: 0000000020000500 RDI: 0000000000000000 [ 151.347988][ T3198] RBP: 00007f59ee01c090 R08: 0000000000000000 R09: 0000000000000000 [ 151.355797][ T3198] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 151.363619][ T3198] R13: 0000000000000000 R14: 00007f59ed3a5fa0 R15: 00007fffb0ce9bd8 [ 151.371431][ T3198] [ 151.801053][ T3234] FAULT_INJECTION: forcing a failure. [ 151.801053][ T3234] name failslab, interval 1, probability 0, space 0, times 0 [ 151.977070][ T3234] CPU: 1 PID: 3234 Comm: syz.4.867 Not tainted 6.1.118-syzkaller-00023-g092a580916f8 #0 [ 151.986623][ T3234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 151.996514][ T3234] Call Trace: [ 151.999640][ T3234] [ 152.002418][ T3234] dump_stack_lvl+0x151/0x1b7 [ 152.006937][ T3234] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 152.012226][ T3234] ? debug_smp_processor_id+0x17/0x20 [ 152.017439][ T3234] dump_stack+0x15/0x18 [ 152.021429][ T3234] should_fail_ex+0x3d0/0x520 [ 152.025939][ T3234] __should_failslab+0xaf/0xf0 [ 152.030539][ T3234] ? kobject_uevent_env+0x262/0x720 [ 152.035571][ T3234] should_failslab+0x9/0x20 [ 152.039911][ T3234] __kmem_cache_alloc_node+0x3d/0x2a0 [ 152.045119][ T3234] ? __kasan_check_write+0x14/0x20 [ 152.050067][ T3234] ? kobject_uevent_env+0x262/0x720 [ 152.055100][ T3234] kmalloc_trace+0x2a/0xa0 [ 152.059355][ T3234] kobject_uevent_env+0x262/0x720 [ 152.064217][ T3234] kobject_uevent+0x1f/0x30 [ 152.068553][ T3234] __kobject_del+0xee/0x300 [ 152.072894][ T3234] kobject_put+0x1cc/0x260 [ 152.077146][ T3234] net_rx_queue_update_kobjects+0x42a/0x4a0 [ 152.082876][ T3234] netdev_unregister_kobject+0x10a/0x260 [ 152.088347][ T3234] unregister_netdevice_many+0x1227/0x1730 [ 152.093988][ T3234] ? alloc_netdev_mqs+0xf90/0xf90 [ 152.098846][ T3234] ? ip6gre_tunnel_find+0x54a/0x5d0 [ 152.103885][ T3234] ? __kasan_check_read+0x11/0x20 [ 152.108740][ T3234] unregister_netdevice_queue+0x2e6/0x350 [ 152.114294][ T3234] ? ip6gre_tnl_parm_from_user+0x31f/0x530 [ 152.119939][ T3234] ? list_netdevice+0x710/0x710 [ 152.124627][ T3234] ? ip6gre_tnl_parm_from_user+0x31f/0x530 [ 152.130264][ T3234] ip6gre_tunnel_siocdevprivate+0x27f/0x800 [ 152.135994][ T3234] ? do_vfs_ioctl+0xba7/0x29a0 [ 152.140595][ T3234] ? ip6gre_tunnel_init+0x170/0x170 [ 152.145627][ T3234] ? kstrtol_from_user+0x180/0x180 [ 152.150579][ T3234] ? full_name_hash+0x9d/0xf0 [ 152.155091][ T3234] dev_ifsioc+0xd40/0x1150 [ 152.159340][ T3234] ? ioctl_has_perm+0x3f0/0x560 [ 152.164032][ T3234] ? dev_ioctl+0xe60/0xe60 [ 152.168279][ T3234] ? __kasan_check_write+0x14/0x20 [ 152.173227][ T3234] ? mutex_lock+0xb1/0x1e0 [ 152.177482][ T3234] ? bit_wait_io_timeout+0x120/0x120 [ 152.182603][ T3234] dev_ioctl+0x5e9/0xe60 [ 152.186684][ T3234] sock_ioctl+0x665/0x740 [ 152.190846][ T3234] ? sock_poll+0x400/0x400 [ 152.195107][ T3234] ? __fget_files+0x2cb/0x330 [ 152.199621][ T3234] ? security_file_ioctl+0x84/0xb0 [ 152.204564][ T3234] ? sock_poll+0x400/0x400 [ 152.208817][ T3234] __se_sys_ioctl+0x114/0x190 [ 152.213351][ T3234] __x64_sys_ioctl+0x7b/0x90 [ 152.217755][ T3234] x64_sys_call+0x98/0x9a0 [ 152.222010][ T3234] do_syscall_64+0x3b/0xb0 [ 152.226261][ T3234] ? clear_bhb_loop+0x55/0xb0 [ 152.230782][ T3234] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 152.236504][ T3234] RIP: 0033:0x7f318718cd29 [ 152.240755][ T3234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 152.260201][ T3234] RSP: 002b:00007f3187f65038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 152.268446][ T3234] RAX: ffffffffffffffda RBX: 00007f31873a5fa0 RCX: 00007f318718cd29 [ 152.276251][ T3234] RDX: 0000000020000080 RSI: 00000000000089f2 RDI: 0000000000000004 [ 152.284069][ T3234] RBP: 00007f3187f65090 R08: 0000000000000000 R09: 0000000000000000 [ 152.291879][ T3234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 152.299689][ T3234] R13: 0000000000000000 R14: 00007f31873a5fa0 R15: 00007ffc2b7ba608 [ 152.307506][ T3234] [ 156.185524][ T3335] FAULT_INJECTION: forcing a failure. [ 156.185524][ T3335] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 156.357794][ T3335] CPU: 1 PID: 3335 Comm: syz.1.898 Not tainted 6.1.118-syzkaller-00023-g092a580916f8 #0 [ 156.367355][ T3335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 156.377250][ T3335] Call Trace: [ 156.380372][ T3335] [ 156.383146][ T3335] dump_stack_lvl+0x151/0x1b7 [ 156.387665][ T3335] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 156.392960][ T3335] ? _printk+0x8/0x111 [ 156.396862][ T3335] dump_stack+0x15/0x18 [ 156.400855][ T3335] should_fail_ex+0x3d0/0x520 [ 156.405374][ T3335] should_fail_alloc_page+0x68/0x90 [ 156.410404][ T3335] prepare_alloc_pages+0x14e/0x6f0 [ 156.415364][ T3335] ? __alloc_pages_bulk+0xda0/0xda0 [ 156.420385][ T3335] ? __kasan_check_read+0x11/0x20 [ 156.425256][ T3335] ? preempt_schedule_irq+0xe7/0x140 [ 156.430375][ T3335] __alloc_pages+0x162/0x610 [ 156.434798][ T3335] ? prep_new_page+0x110/0x110 [ 156.439392][ T3335] ? _raw_spin_trylock_bh+0x190/0x190 [ 156.444599][ T3335] __get_free_pages+0xe/0x30 [ 156.449098][ T3335] kasan_populate_vmalloc_pte+0x39/0x130 [ 156.454491][ T3335] ? __apply_to_page_range+0x8ca/0xbe0 [ 156.459804][ T3335] __apply_to_page_range+0x8dd/0xbe0 [ 156.464908][ T3335] ? kasan_populate_vmalloc+0x70/0x70 [ 156.470120][ T3335] ? kasan_populate_vmalloc+0x70/0x70 [ 156.475323][ T3335] apply_to_page_range+0x3b/0x50 [ 156.480098][ T3335] kasan_populate_vmalloc+0x65/0x70 [ 156.485136][ T3335] alloc_vmap_area+0x1961/0x1aa0 [ 156.489909][ T3335] ? vm_map_ram+0x940/0x940 [ 156.494244][ T3335] ? __kasan_kmalloc+0x9c/0xb0 [ 156.498849][ T3335] ? kmalloc_node_trace+0x3d/0xb0 [ 156.503708][ T3335] __get_vm_area_node+0x171/0x370 [ 156.508568][ T3335] __vmalloc_node_range+0x338/0x1560 [ 156.513687][ T3335] ? htab_map_alloc+0x39d/0xf80 [ 156.518378][ T3335] ? vmap+0x2b0/0x2b0 [ 156.522197][ T3335] ? kasan_save_alloc_info+0x1f/0x30 [ 156.527319][ T3335] ? __kasan_kmalloc+0x9c/0xb0 [ 156.531923][ T3335] ? __kmalloc_node+0xb4/0x1e0 [ 156.536522][ T3335] bpf_map_area_alloc+0xdc/0xf0 [ 156.541203][ T3335] ? htab_map_alloc+0x39d/0xf80 [ 156.545892][ T3335] htab_map_alloc+0x39d/0xf80 [ 156.550402][ T3335] ? htab_map_alloc_check+0x3ce/0x4b0 [ 156.555614][ T3335] map_create+0x44a/0xcf0 [ 156.559783][ T3335] __sys_bpf+0x2e6/0x7f0 [ 156.563856][ T3335] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 156.569074][ T3335] ? fpregs_restore_userregs+0x130/0x290 [ 156.574544][ T3335] __x64_sys_bpf+0x7c/0x90 [ 156.578786][ T3335] x64_sys_call+0x87f/0x9a0 [ 156.583124][ T3335] do_syscall_64+0x3b/0xb0 [ 156.587385][ T3335] ? clear_bhb_loop+0x55/0xb0 [ 156.592016][ T3335] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 156.597741][ T3335] RIP: 0033:0x7f59ed18cd29 [ 156.602000][ T3335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 156.621442][ T3335] RSP: 002b:00007f59ee01c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 156.629679][ T3335] RAX: ffffffffffffffda RBX: 00007f59ed3a5fa0 RCX: 00007f59ed18cd29 [ 156.637490][ T3335] RDX: 0000000000000050 RSI: 0000000020000500 RDI: 0000000000000000 [ 156.645310][ T3335] RBP: 00007f59ee01c090 R08: 0000000000000000 R09: 0000000000000000 [ 156.653117][ T3335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 156.660926][ T3335] R13: 0000000000000000 R14: 00007f59ed3a5fa0 R15: 00007fffb0ce9bd8 [ 156.668746][ T3335] [ 156.809148][ T28] audit: type=1400 audit(1737682774.895:148): avc: denied { ioctl } for pid=3352 comm="syz.2.905" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5828 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 158.023667][ T3383] device pim6reg1 entered promiscuous mode [ 158.123067][ T3388] FAULT_INJECTION: forcing a failure. [ 158.123067][ T3388] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 158.297480][ T3388] CPU: 1 PID: 3388 Comm: syz.2.916 Not tainted 6.1.118-syzkaller-00023-g092a580916f8 #0 [ 158.307039][ T3388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 158.317193][ T3388] Call Trace: [ 158.320317][ T3388] [ 158.323093][ T3388] dump_stack_lvl+0x151/0x1b7 [ 158.327607][ T3388] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 158.332905][ T3388] dump_stack+0x15/0x18 [ 158.336901][ T3388] should_fail_ex+0x3d0/0x520 [ 158.341409][ T3388] should_fail+0xb/0x10 [ 158.345402][ T3388] should_fail_usercopy+0x1a/0x20 [ 158.350262][ T3388] _copy_from_user+0x1e/0xc0 [ 158.354687][ T3388] get_user_ifreq+0xd5/0x230 [ 158.359114][ T3388] sock_do_ioctl+0x1a7/0x450 [ 158.363543][ T3388] ? has_cap_mac_admin+0x3c0/0x3c0 [ 158.368545][ T3388] ? sock_show_fdinfo+0xa0/0xa0 [ 158.373175][ T3388] ? selinux_file_ioctl+0x3cc/0x540 [ 158.378211][ T3388] sock_ioctl+0x455/0x740 [ 158.382374][ T3388] ? sock_poll+0x400/0x400 [ 158.386627][ T3388] ? __fget_files+0x2cb/0x330 [ 158.391143][ T3388] ? security_file_ioctl+0x84/0xb0 [ 158.396090][ T3388] ? sock_poll+0x400/0x400 [ 158.400344][ T3388] __se_sys_ioctl+0x114/0x190 [ 158.404861][ T3388] __x64_sys_ioctl+0x7b/0x90 [ 158.409287][ T3388] x64_sys_call+0x98/0x9a0 [ 158.413535][ T3388] do_syscall_64+0x3b/0xb0 [ 158.417786][ T3388] ? clear_bhb_loop+0x55/0xb0 [ 158.422299][ T3388] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 158.428029][ T3388] RIP: 0033:0x7f1f0d38cd29 [ 158.432281][ T3388] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 158.451725][ T3388] RSP: 002b:00007f1f0e10b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 158.459968][ T3388] RAX: ffffffffffffffda RBX: 00007f1f0d5a5fa0 RCX: 00007f1f0d38cd29 [ 158.467783][ T3388] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 000000000000000b [ 158.475591][ T3388] RBP: 00007f1f0e10b090 R08: 0000000000000000 R09: 0000000000000000 [ 158.483405][ T3388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 158.491215][ T3388] R13: 0000000000000000 R14: 00007f1f0d5a5fa0 R15: 00007ffdcbf65458 [ 158.499040][ T3388] [ 158.749856][ T28] audit: type=1400 audit(1737682776.835:149): avc: denied { create } for pid=3404 comm="syz.2.921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 159.310886][ T3430] FAULT_INJECTION: forcing a failure. [ 159.310886][ T3430] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 159.511306][ T3430] CPU: 1 PID: 3430 Comm: syz.0.929 Not tainted 6.1.118-syzkaller-00023-g092a580916f8 #0 [ 159.520855][ T3430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 159.530748][ T3430] Call Trace: [ 159.533875][ T3430] [ 159.536919][ T3430] dump_stack_lvl+0x151/0x1b7 [ 159.541425][ T3430] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 159.546727][ T3430] dump_stack+0x15/0x18 [ 159.550711][ T3430] should_fail_ex+0x3d0/0x520 [ 159.555228][ T3430] should_fail_alloc_page+0x68/0x90 [ 159.560257][ T3430] prepare_alloc_pages+0x14e/0x6f0 [ 159.565209][ T3430] ? __alloc_pages_bulk+0xda0/0xda0 [ 159.570253][ T3430] ? slab_post_alloc_hook+0x53/0x2c0 [ 159.575361][ T3430] ? alloc_vmap_area+0x1a5/0x1aa0 [ 159.580223][ T3430] ? __get_vm_area_node+0x171/0x370 [ 159.585256][ T3430] ? __vmalloc_node_range+0x338/0x1560 [ 159.590550][ T3430] __alloc_pages+0x162/0x610 [ 159.594983][ T3430] ? prep_new_page+0x110/0x110 [ 159.599576][ T3430] ? _raw_spin_trylock_bh+0x190/0x190 [ 159.604787][ T3430] __get_free_pages+0xe/0x30 [ 159.609209][ T3430] kasan_populate_vmalloc_pte+0x39/0x130 [ 159.614676][ T3430] ? __apply_to_page_range+0x8ca/0xbe0 [ 159.619984][ T3430] __apply_to_page_range+0x8dd/0xbe0 [ 159.625094][ T3430] ? kasan_populate_vmalloc+0x70/0x70 [ 159.630306][ T3430] ? kasan_populate_vmalloc+0x70/0x70 [ 159.635510][ T3430] apply_to_page_range+0x3b/0x50 [ 159.640284][ T3430] kasan_populate_vmalloc+0x65/0x70 [ 159.645317][ T3430] alloc_vmap_area+0x1961/0x1aa0 [ 159.650095][ T3430] ? vm_map_ram+0x940/0x940 [ 159.654429][ T3430] ? __kasan_kmalloc+0x9c/0xb0 [ 159.659030][ T3430] ? kmalloc_node_trace+0x3d/0xb0 [ 159.663893][ T3430] __get_vm_area_node+0x171/0x370 [ 159.668752][ T3430] ? kasan_save_free_info+0x2b/0x40 [ 159.673789][ T3430] __vmalloc_node_range+0x338/0x1560 [ 159.678905][ T3430] ? array_map_alloc+0x278/0x6d0 [ 159.683681][ T3430] ? selinux_capable+0x2f1/0x430 [ 159.688454][ T3430] ? selinux_capset+0xf0/0xf0 [ 159.692972][ T3430] ? vmap+0x2b0/0x2b0 [ 159.696789][ T3430] ? cap_capable+0x1d2/0x270 [ 159.701218][ T3430] bpf_map_area_alloc+0xdc/0xf0 [ 159.705902][ T3430] ? array_map_alloc+0x278/0x6d0 [ 159.710674][ T3430] array_map_alloc+0x278/0x6d0 [ 159.715275][ T3430] map_create+0x44a/0xcf0 [ 159.719439][ T3430] __sys_bpf+0x2e6/0x7f0 [ 159.723519][ T3430] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 159.728730][ T3430] ? __ia32_sys_read+0x90/0x90 [ 159.733327][ T3430] ? debug_smp_processor_id+0x17/0x20 [ 159.738539][ T3430] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 159.744437][ T3430] __x64_sys_bpf+0x7c/0x90 [ 159.748689][ T3430] x64_sys_call+0x87f/0x9a0 [ 159.753039][ T3430] do_syscall_64+0x3b/0xb0 [ 159.757281][ T3430] ? clear_bhb_loop+0x55/0xb0 [ 159.761795][ T3430] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 159.767749][ T3430] RIP: 0033:0x7f1b7118cd29 [ 159.772000][ T3430] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 159.791444][ T3430] RSP: 002b:00007f1b72050038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 159.799687][ T3430] RAX: ffffffffffffffda RBX: 00007f1b713a6080 RCX: 00007f1b7118cd29 [ 159.807602][ T3430] RDX: 0000000000000048 RSI: 0000000020004080 RDI: 0b00000000000000 [ 159.815412][ T3430] RBP: 00007f1b72050090 R08: 0000000000000000 R09: 0000000000000000 [ 159.823225][ T3430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 159.831035][ T3430] R13: 0000000000000000 R14: 00007f1b713a6080 R15: 00007fffacd9ae98 [ 159.838851][ T3430] [ 160.180260][ T28] audit: type=1400 audit(1737682778.265:150): avc: denied { create } for pid=3449 comm="syz.2.935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 SYZFAIL: failed to send rpc fd=3 want=304 sent=0 n=-1 (errno 32: Broken pipe) [ 178.168709][ T294] syz-executor (294) used greatest stack depth: 20840 bytes left [ 178.241034][ T3493] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.247951][ T3493] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.255277][ T3493] device bridge_slave_0 entered promiscuous mode [ 178.262004][ T3493] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.269138][ T3493] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.276412][ T3493] device bridge_slave_1 entered promiscuous mode [ 178.319635][ T3493] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.326481][ T3493] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.333613][ T3493] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.340379][ T3493] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.360952][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.368401][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.375414][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.384536][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.392633][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.399484][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.409220][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.417331][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.424153][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.435558][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 178.444609][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 178.459194][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 178.470019][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 178.478093][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 178.485273][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 178.494878][ T3493] device veth0_vlan entered promiscuous mode [ 178.504365][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 178.513345][ T3493] device veth1_macvtap entered promiscuous mode [ 178.522514][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 178.532109][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 178.547206][ T28] audit: type=1400 audit(1737682796.635:151): avc: denied { mounton } for pid=3493 comm="syz-executor" path="/root/syzkaller.HNxT0P/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 178.572878][ T28] audit: type=1400 audit(1737682796.635:152): avc: denied { mount } for pid=3493 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 178.594699][ T28] audit: type=1400 audit(1737682796.655:153): avc: denied { mounton } for pid=3493 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=522 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 178.867558][ T3348] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.874769][ T3348] device bridge_slave_0 left promiscuous mode [ 178.880797][ T3348] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.888253][ T3348] device veth0_vlan left promiscuous mode [ 179.688695][ T3348] device bridge_slave_1 left promiscuous mode [ 179.694612][ T3348] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.701949][ T3348] device bridge_slave_0 left promiscuous mode [ 179.707990][ T3348] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.715605][ T3348] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.722869][ T3348] device bridge_slave_0 left promiscuous mode [ 179.728809][ T3348] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.736291][ T3348] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.743521][ T3348] device bridge_slave_0 left promiscuous mode [ 179.749515][ T3348] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.757204][ T3348] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.764307][ T3348] device bridge_slave_0 left promiscuous mode [ 179.770355][ T3348] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.777942][ T3348] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.784961][ T3348] device bridge_slave_0 left promiscuous mode [ 179.790906][ T3348] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.798930][ T3348] device veth1_macvtap left promiscuous mode [ 179.804733][ T3348] device veth0_vlan left promiscuous mode [ 179.810667][ T3348] device veth1_macvtap left promiscuous mode [ 179.816471][ T3348] device veth0_vlan left promiscuous mode [ 179.822356][ T3348] device veth0_vlan left promiscuous mode [ 179.828239][ T3348] device veth1_macvtap left promiscuous mode [ 179.834074][ T3348] device veth0_vlan left promiscuous mode [ 179.840067][ T3348] device veth0_vlan left promiscuous mode