last executing test programs: 5.163800165s ago: executing program 2 (id=2850): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x6, 0x5, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB], 0xfdef) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_ext_remove_space\x00', r3, 0x0, 0x6}, 0x18) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], 0x0, 0x37}, 0x28) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xd, 0x1c, 0x4, 0x1, 0x0, r5, 0x0, '\x00', 0x0, r4}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x3f000000}, 0x50) 5.088039425s ago: executing program 0 (id=2852): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e40)=ANY=[@ANYBLOB="0b00000005000000020000000200000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000160000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x9}, 0x0, 0xc8, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81e6978800fe08000e40000200875a65969ff57b00ff020000000000002000000000000001"], 0xfdef) 5.078283317s ago: executing program 0 (id=2853): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="120000000d00000004000000"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000380)=r0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r2, &(0x7f00000001c0), 0x0}, 0x20) 5.029135373s ago: executing program 2 (id=2854): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1100000200e4218c1f2fd614fc3f7a630018fb8a3d44339258e14f", @ANYRES32, @ANYBLOB="1800"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03000000020000000200"/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000000), &(0x7f0000000040)='%ps \x00'}, 0x20) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8, 0x0, 0x2, 0x3, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r2}, 0x10) (async, rerun: 32) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37ce}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r3}, 0x10) (async, rerun: 32) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) close(r5) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) (async) perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa121, 0x0, @perf_config_ext={0x1000000000, 0x4}, 0x110200, 0xc8, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000eb9f00000800000000000000", @ANYRES32, @ANYBLOB="00000000ffffff7f00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) (async, rerun: 32) close(r8) (async, rerun: 32) recvmsg$unix(r7, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0}, 0x200, 0x2, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b000059bb8800528cc101da5a5d4c78b89a000000000000000000000000000fb05dc1d0bad77a9373b823e340d31f70f88cd544898226c91d5656588e501f63f5d42c74cbfd05253fca7b7faad0efe3bc2cdac1deade6bcbc1b21bd638a819eb6a9cb1f3de867ade5c1126e3e4fcb18f91cb26533a435b518f80941611ed5a8bae959354a6aedc10d424e24dc571fb7fa8d68", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x19, &(0x7f0000000680)=ANY=[@ANYBLOB="180000008f00fff9000000000b00000018110000", @ANYRESHEX, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000086000000bf0900000000000055090100000000009500000000000000bd0a060000000000d500f4ff0100030018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000010000006500000006000000bf91000000000000b702000003000000850000002a000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x7, 0x1000, &(0x7f0000000cc0)=""/4096, 0x41100, 0x3b, '\x00', 0x0, 0x0, r1}, 0x94) 5.023002824s ago: executing program 0 (id=2856): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000210e0200000000000000000000000000000604000000002e"], 0x0, 0x37}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0b000000080000000c0000000400000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x8, 0x7, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000840a0000000000006660000000000000180000000000008000000000ff0300009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0x93, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r4}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x30120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) syz_clone(0x60002080, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8982, &(0x7f0000000080)) 5.002875376s ago: executing program 2 (id=2857): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff85000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/../file0/../file0/file0\x00', 0xffffffffffffffa1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1f, 0x40, 0x0, 0x8000, 0x260, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x400000, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0000000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001010404000001007de0b7030000010000006a0a00fe00000000850000000d000000b700000001000000950000000000000075cd67b5b18065752a3ad500000000000000cb450063bc36005400000000000000ff7f00000001000000000000000000cb04fcbb0b5ba9918d37b056b9bbd11b6b9f260000000000008062d77e84cef4a2ab938f65aac33c4d620de2c9b7dc10d7d313f9f57606b83b994fb4845124ef2e487204000000aaf75e5cc4051ade12f41deff6df6a936b4ec3827c739bb39aadffcc75fe369258673b5d053bdec75dca377232a790bce5a6f087ae8f5e64be2c9d2d29db3d36dd015c7bd3f15aa6aadbeab2a01685108e61aa000000000000000000000000008b798b4f7458d1863cc67d4c6a06e828e5216f601b19db9af1b5d356d0f062137d866d11be4b1260b06cca9098a3f0151fdbbd4e97d62ecc6405003a60f1c6edc76683073909826151e2b42bf0ed0c8cef3ba2a730a00c87c493db845b10e9468bdaeecc952a3fd2c46f3c1cde71a19d1a2982492abaa96765372831210e00d2bfea3b8df2eff8d56aaae7d32a2e183722537395019f02ec4b85f6aad7faca088de9b26797a8446b16c28d85f22542c133aadafdc96fdb49cc992dbdd5ac01ba51508951c7a7c5f5093bd6ca0916c3a12912715649c2b1c7193a4251b59d378d0616a48c7957e122665c8b7e89eddfc3783f000000000000000050572061dfb5248d3d4a1c37dcb92d9ef99e2f638f7eb12f63be72a3d817b324d6e417b1c2cbfdcada0a16e31790e26cf19524cf30f810da3204f4c93f4f5d7321acfefc4d1c9139ca4b65b9990995000000000000000000000000000000c8a3988cca41217c950554bb043cf364d709c2bf3ec46b75f1bce43e726210b53d362072bc120c076b4647afc595d97c288f5017088ac2b02ed97fc883a102ae6000044542e3aa7ada6d13ff93ec634a0fa0b5f41ed317b48b8b8c03b243d6e14b7087e2c5d41f8a51408e27283b54d04212cbb0f5af76b70b1bdcec7c0abe6407e7fa204b9919490af8bffca6fbbd2174a84328af4acc9c7ec655729125fc15da558cb6edfcdd0c3fca7130863d13369f79f1d13ac166249e4bffa4a272a0116b591a63bfca11205d216b34000000000000000045b5ade570aeb7cf89e900004dc6c89355082bdcb0b08b810cf63fd19a17f4d440f1546e8e5f8addedb88c7f7990947505d2fcd8cb14"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000100), 0x237}, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r7, 0x1f2f, 0x18, 0x1e8, &(0x7f00000007c0)="9f44948721919580684010a49e66", 0x0, 0x1e8, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39", &(0x7f0000000000), 0x0, 0xe8030000}, 0x23) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x61, 0x2e, 0x2e]}}, 0x0, 0x1e}, 0x28) perf_event_open$cgroup(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x3, 0x2, 0x0, 0x4, 0x21000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000300), 0xa}, 0x4000, 0x8000000000000001, 0x4, 0x3, 0x6, 0x3f, 0x16ae, 0x0, 0x5, 0x0, 0xffff}, r0, 0x1, r2, 0x7) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x20000000, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.351436917s ago: executing program 1 (id=2870): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000004000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x92d357db82b8cfe6}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x24010, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x3, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xd, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) 2.0963183s ago: executing program 3 (id=2871): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0xff7f, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5}, 0x48) 2.02324998s ago: executing program 3 (id=2872): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="050000ff00000000004aababbb00000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x48) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xcc, 0xc}, 0x50) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) close(r1) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="002416d164"]) bpf$LINK_DETACH(0x22, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x5a}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7, 0x0, 0xffffffffffffffff, 0x68000000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r1, 0x0, 0x0}, 0x10) 1.722771688s ago: executing program 1 (id=2873): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020100f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8, 0x0, 0x2, 0x3, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r3}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}, 0x102110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37ce}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r7) syz_clone(0x1000, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) 1.495015948s ago: executing program 1 (id=2874): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x9}, 0x100040, 0xc8, 0x40000000, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}, 0xffffffffffffffff, 0xfffffffffffffffe, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00083300db5b6861589bcfe8875a060300000023000000000000000020000000ac1414aa"], 0xfdef) 1.47658211s ago: executing program 0 (id=2875): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000f447333de39c7095758218a68bc5142f0cb2229fa6c8b0d7c8126aee6d3def94cd964218564fb1d255bce6cef9bea8322326039744a98eead8c59bc75bb5b42123eef53ae4bc331b0ad09a8efc4175c484ad74df9158ff1882cdd83c97c03a35e91c30a0"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x4000000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64}, 0x80) 1.198063546s ago: executing program 0 (id=2876): bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0x4) (async) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000000)='./file0\x00', r0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b708000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfffffe51) 1.101200718s ago: executing program 1 (id=2877): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22ffee) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, 0x0, &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b7020000f53f6314bfa300000000000024020000fffeff7f7a03f0fff0ffffff79a400fe00000000b7060000ffffffff2e64050000000000750afaff07cd02020404000000247d60b7030000030a00006a0a00fe0000000c8500000026000000b70000000000002995000000000000001da5ad3548ebb63d18c5071c7e821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c0ec908abb6e7325ec1956bd8660bf3664148a2c96752fe2bb328dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8ef040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdbb126eb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b782ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a6211e52bb3598e9b5d4f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75b0100000042127a8f84538a9a311c757f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d32e3f4ee367c5a769c0a606636c9f4a4413c098f4fcc96623b7c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c436432b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48e7565efff2dbbb512218c98442406333c890923a797e00b75481739952fe87fde27ce81893f54ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45576c205c70631e8ad585951950e521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d9338923789a1edcd8043fe83919088383268324a25df14010c8ed6b8d43400eaa00ff9bc46e1cfecbdc0e451ac53b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404e0b7c723d3b19c3dc382fa91fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37deee7a60b903d2d9fe9d451cafcc8dc389671c2d08b6e264150a6b9445b00cee4585af04fa69e0380be0d66649dcf3bf8a906b029faca75ce34c41aec7aa86e596119109ea8b3f7c65c902499227c087301643baab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628e3e77a0de32e356521df06f995cb57f97052fc4158250ccecfb67ea8faf509593fadc7eafb613327b052397af1ede94d87590ce90a0a7579766f0e5eb09d38ac46e99e7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf16dc3af6e0b67f62a83a256474c97c925d9d447175b535c87dbdeb0dcca5303eed6689ea91e1665c691df736368dde47e6672e93a314c5f60e7b68c2242bd0f0d8c66449d8687dcf2d0f76668b2b9bf8b32b99b7daf34b2d825d192ade90a1162acfe9749d516d014cef5f99126324ea02baea5808c430985749901b09e4902a6f5addc0103756b894418e4591c624a9b206abbfb888d413d923b0d7c9d997d6d8e64787c4d397f57a15b6e0b4212b6cb55b9c207bbe08f483b1bea05f41b9a1d3af087047c568ae6ebfc0bb5ec10b6290dc757a4903a88fb2c035b2349b6d2f0c051b8b7718384eebd5fc19928cea713ff09e179c308fbe9bd64374d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad1030a79517a88de7596429a20793e12616aa32b3e720c6521fbe93963e9536d16f3db211fca7dd99c0a0125ff8ef534b93dcb34e1da2c008a9f2a29e30823bf0ec3639cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471667f82f5e250b979b9f2bd0d1b6bc03d11811ac6eec9a3ecd9e3c3299ee5eb3c6cac8fbd06514b7ee743ece79c04566d02a08fd5fcabbab3d129c0cced3ce11dafa380700000000000000c114d0b423e64c6157fac5e4e2168f33541daeff9983d0e488a78bef538f870b84798272b2101e0abf1cd64500b79e01e11d727389653bd80a39d5bbe2e23d2f5ff10047423429981bd9b4ce680e174c266391e3e7689452654e5cd5ada6e025327a1942b5a068f15fa58eaa267d4e0881783dddbdd777f8be0824ffdf6d06c621880dbbe9534f15e8c2e364d3ec67deb6ab9f2a0f03212972dbd38500000008173553a67be48633103809eee0be51d67d7ce230b389607b4c3b18da1c48f3180f2e0d79e54565fdd9a099b5b5ba2761905b88b7cbfc39c35dd153609da3da263438f12769602c2195245ff83e249119d4f6cabfbdef84ada19ef4a67ed66d7043036515d0be5a231f99e71aba5d5ae04676eff3e85f0844c41bbcfde7a931d1ec55c01f703bfd1b97756bfe55a91f6b379f34a018906339771157c66dbd7471d1beec7f029ef552cf5e92a1a0db21b59355763967ce26a577bc514b6d22a09c385c5ba6caf524e1688fc0f29f8bb35ae7bc8eb5ba51aebdf7d972c3267cedbe77ed70d9c539bc455a6f88b39196c8a224b0acf4d796fea59a07baa34cc270fb096ef330fbebdf872d7d0bc4f9a963355c554abc5cdb91464faabcd09cd9a53f5d1b2ea7e96f428f7cd6735c19c61dc9942d30bf29ef85ed01c2fcd6060aa40eeff971477b4fde48507b7bad95a496540adff7e4a72fd1f94d7c703ab1525c946c54e0da3d7ebfcc8cea2e84c3b310aaea5a1627df898c00a9aaf2d88a36afa4c5b1816384310600001c33125ad7f7970beeb256aec06e39fc6c66544e1d1dc5fea4b68a82e3568ca30aea9a1d097f06f11dc362f4bae5ef57c67686a15855cd351bf26f40fb1348cfce79897682228e6d9643530c81bab27bf7b1c4a76a5be180bb830cf06827c3f38a9c9c580c732c30aaceda78b0297de35a922b1375b129655beb31899e26052cc216f832fdb0a0015f93c9cff77f59cda1ec5f3e358848756cebb074266a47e39ae26e80e8c65aaf73c24925458520a9ca98760d1005c9f81846459ae6d5baa4f02807939ddc29c3520f7c58ed9bc5a569c7a1bc33cf4f330a18276ffb4550b9166c3939e8041094bec034aa0ec6638b74fe34f0f1ec6903a1135808d5d8d26c9203c3f87e66c407b7c5c0888d4558dd657cc0213efad68e76fdd7b23e68064fd4b271ed79c50abacdd2871b0c1f8c971df59a5a1901ddf804bed43e391f882d2a45c51cdbba86b2a1b7c0c4923642a731ea4dcbad2b6ebbebe787a8e28e781d75beee924b3b1e390750f316648133922c021f98fd2d5d71a7a3679397ef6cf432837b7e264831ec01c4c3146ba0caac3b13d55945ec00e978a1c1712cd51187936200606c9cd6877b2f72125295c54721f8e15df2ae282a8becb99a726fd92acc92141e1f574b4b0b3c992a61af3372d0d9217776b1a42cd2cee816a70bf1ddd69b590d53e28ba356e74b38e23e50d898e95cdc7cc809e462c884b53f672aab1411ecfd4c91e7a9782fc6763f0efd4bcbaf1fc3a00000000000000000000000000000000500000000000000000000000048e510340087caf22439d5304bd704a6a78a512269a9b1cbd13bea78c807bbc73853ae187cbb768673e9d1bf74a3b0a6c234accd8506adf314f4c5e08174540b69d3c0da660052b43b86baf49e7ac64d9c21598b1e01dc1e1b5a53626b090496dbf7af441e397016c3c094d5c91ffe0a7ceacfd225ed9a6c905f79ad7052747dd6cceef4c310e0e935311118bc6bf0e5ca6c7cca7d5c03be570308da8a40578b4db14961fbccf6e2f2d56e9509c434126515b56d032e20c12e830d1bc64826fc9b318da5911e466878dbb81edeff69363fb75af5cd80536f14d2eaa7764db23acdbd394bbbbccfd8b129258bb0a93cee1d44f8665172c06933d20f184b78b435462c52a85149451ffd564c56a7cbf11a1127c77242915e43b2bc"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000002c0)={r0}, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={r3, 0x20, &(0x7f0000000380)={&(0x7f0000000300)=""/88, 0x58, 0x0, &(0x7f0000000680)=""/162, 0xa2}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.08552913s ago: executing program 3 (id=2878): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000), 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000000400007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70400000000000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0xfe, 0x0, 0xfffffffffffffdf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="1b0000000000000000000000008000", @ANYRES32=0x0], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) 929.64469ms ago: executing program 1 (id=2880): perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0xc, 0x11, &(0x7f0000000940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x3}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8e3d}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffc00}, @ldst={0x0, 0x0, 0x4, 0x8, 0x2, 0xfffffffffffffff4, 0xfffffffffffffffd}, @alu={0x7, 0x3, 0x4, 0x2, 0x7, 0xffffffffffffffff, 0xc}, @ldst={0x2, 0x2, 0x4, 0x3, 0x8, 0x6, 0xfffffffffffffff0}]}, &(0x7f0000000580)='GPL\x00', 0x1, 0x4d, &(0x7f0000000680)=""/77, 0x41000, 0x8, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r2, 0x6, &(0x7f0000000ac0), &(0x7f0000000b00)=[{0x2, 0x4, 0x4, 0x3}, {0x2, 0x1, 0x1, 0xb}, {0x0, 0x1, 0x0, 0x6}, {0x2, 0x5, 0xa, 0x8}, {0x4, 0x5, 0x6, 0xb}, {0x3, 0x1, 0xb, 0xc}], 0x10, 0x7}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000007000000ddff", @ANYRES32, @ANYBLOB="0400"/15, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400000002000000000000000c00"/28], 0x50) 929.148871ms ago: executing program 4 (id=2881): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) (async, rerun: 32) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async, rerun: 32) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r0}, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000280)={'veth0_macvtap\x00', @broadcast}) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async, rerun: 32) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) (async) write$cgroup_type(r1, &(0x7f00000001c0), 0x9) (async) write$cgroup_devices(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="1e031800dd5c980128854d"], 0xffdd) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) (async) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext, 0x0, 0x10003, 0x0, 0x5, 0x8000000000000000, 0x5, 0x1}, 0x0, 0x100000000, 0xffffffffffffffff, 0x0) (async, rerun: 64) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x10000) (async, rerun: 64) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000000240)=0x1) (async) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 888.236806ms ago: executing program 3 (id=2882): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2020000}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000fffff0007000000000000000000000001050000a2200000000000000001000085100000000000000002000000000000ff00000100da"], 0x0, 0x52}, 0x20) 760.703632ms ago: executing program 4 (id=2883): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f00000002c0)='sched_kthread_work_queue_work\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000600)=0xd, 0x18) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x8008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 693.825121ms ago: executing program 3 (id=2884): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x2, 0x2, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000540), &(0x7f0000000740), 0x75, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000900000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) sendmsg$tipc(r2, &(0x7f0000000640)={&(0x7f0000000080)=@id={0x1e, 0x3, 0x2, {0x4e24}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x40) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r6}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 693.264751ms ago: executing program 1 (id=2885): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000001c000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5c6fa8aec5e2d98b, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x3, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11368}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000001f000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) close(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0xfeff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) write$cgroup_subtree(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_bp={0x0, 0x9}, 0x100000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xfffffffffffffe1e, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x18) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x57) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x702, 0xe, 0x700, &(0x7f0000000540)="e460334470b8d480eb00c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000400000004"], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair(0x1, 0x2, 0x6, &(0x7f0000000180)) 671.922464ms ago: executing program 4 (id=2886): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x9, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x75, &(0x7f0000000540)=[{}, {}], 0x10, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x5e, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe8, 0xe8, 0x7, [@union={0x4, 0x2, 0x0, 0x5, 0x1, 0x1, [{0xe, 0x2, 0xf}, {0xf, 0x2, 0x5}]}, @typedef={0x6}, @decl_tag={0x3, 0x0, 0x0, 0x11, 0x3, 0x6}, @float={0xa, 0x0, 0x0, 0x10, 0x4}, @struct={0x10, 0x5, 0x0, 0x4, 0x0, 0x7, [{0x0, 0x2}, {0xe, 0x4, 0x4}, {0xd, 0x0, 0x1000}, {0xa, 0x1, 0x2}, {0x4, 0x4, 0xfffffff8}]}, @type_tag={0xf, 0x0, 0x0, 0x12, 0x2}, @restrict={0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x5, 0xa}}, @enum={0x3, 0x1, 0x0, 0x6, 0x4, [{0xc, 0x1ff}]}, @decl_tag={0x5, 0x0, 0x0, 0x11, 0x5, 0x8}]}, {0x0, [0x61, 0x5f, 0x61, 0x61, 0x8c]}}, &(0x7f0000000980)=""/31, 0x107, 0x1f, 0x1, 0x1}, 0x28) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000a00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x4}, 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r11, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) r12 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001340)=@bpf_lsm={0x1d, 0x28, &(0x7f00000010c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6000000}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r10}}, @map_fd={0x18, 0x9, 0x1, 0x0, r10}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r10}}, @call={0x85, 0x0, 0x0, 0x9e}, @map_val={0x18, 0x1, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001200)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x20, '\x00', r4, 0x1b, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001240)={0x0, 0x9, 0x28c5, 0x9ef3}, 0x10, r5, 0x0, 0x6, &(0x7f0000001280)=[0x1, r7], &(0x7f00000012c0)=[{0x2, 0x2, 0x10, 0x7}, {0x1, 0x4, 0x5, 0x3}, {0x1, 0x1, 0x9, 0x7}, {0x4, 0x5, 0x10, 0x3}, {0x1, 0x1, 0x4, 0xa}, {0x3, 0x1, 0x10, 0x5}], 0x10, 0xa}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0xa, 0x1a, &(0x7f0000000e80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r11}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r10}}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000f80)='syzkaller\x00', 0x150913c1, 0x50, &(0x7f0000000fc0)=""/80, 0x41100, 0x46, '\x00', r4, @fallback=0x30, r6, 0x8, &(0x7f0000001040)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000001080)={0x1, 0x1, 0x3, 0xffff}, 0x10, r5, r12, 0x9, &(0x7f0000001440)=[r9, r9, r3], &(0x7f0000001480)=[{0x2, 0x2, 0x4, 0x7}, {0x3, 0x3, 0xc, 0x91a877a267a97769}, {0x0, 0x3, 0x8, 0xb}, {0x1, 0x4, 0x9, 0x8}, {0x1, 0x4, 0x5, 0x6}, {0x4, 0x2, 0x8, 0xa}, {0x4, 0x4, 0x8, 0x2}, {0x3, 0x3, 0x1, 0x4}, {0x2, 0x2, 0x6, 0x2}], 0x10, 0x24000}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r10, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r10}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r13 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a80)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0xd, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b80)={{0x1, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000b40)=r1}, 0x20) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001640)=r8, 0x4) close(r15) write$cgroup_devices(r15, &(0x7f00000005c0)=ANY=[], 0xfffffeff) r16 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r16, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@bloom_filter={0x1e, 0xe, 0xffffffff, 0x4, 0x4, 0x1, 0x73, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1}, 0x50) r18 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000c40)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000dc0)={0x6, 0x10, &(0x7f0000000380)=@raw=[@ldst={0x2, 0x0, 0x4, 0x5, 0x9, 0x40, 0x10}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}], &(0x7f0000000040)='syzkaller\x00', 0xffff, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, 0x25, r6, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000cc0)=[r7, r9, r10, r13, r14, r15, r16, r17, r18], &(0x7f0000000d00)=[{0x4, 0x4, 0xc}, {0x4, 0x3, 0x5, 0x5}, {0x5, 0x2, 0x2, 0x6}, {0x2, 0x2, 0x7, 0xc}, {0x1, 0x4, 0x2, 0x1}, {0x3, 0x4, 0x10, 0x5}, {0x4, 0x4, 0x6, 0x1}, {0x0, 0x4}, {0x1, 0x1, 0x1, 0x2}], 0x10, 0xa}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='task_newtask\x00', r2}, 0x18) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 591.644804ms ago: executing program 3 (id=2887): bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x0, 0xa, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x61980, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000001000), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00010000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca7f8fbc9cdfa146ec56175037958e271f60d25b7937f02c8695e5a1b2cdf41dc10d1e8bf076d83923dd29c0301000000010000003d5d78c07fa1f7e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831ab7ea0c34f17e3ad6e70af07da5ceb01b7551ef3bb622003b538dfd8e012e79578e51bc53099e90fbdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f93781965f1328d6704902cbe7bc0476619f28d99cde7a6b73340cc2160a1fe3c184b751c51160fbce841dfebd31a08b32808b80200000000009dd27080e71113610e10d8fb9c2aec61ce63a3462fd50117b89a9ab759b4eeb8cb000067d42b4e54861d0227dbfd2ed8576a3f7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0180aabc18cae2ed4b4390af9a9ceafd07ed0030000002cab154ad029a119ca3c972780870014605c83d7d11c3c975d5aec84222fff0d7216fdb0d3a0ec4bfae563858dc06e7c337642d3e5a815212f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a46939868d75211bbae0e7313bff5d4c391ddece00fc772dd6b4d4d0a917b239fe12280fc92c88c5b8dcdcc22ee1747790a8992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5cc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673fffffff7f23877a6b24db0e067345560942fa629fbef2461c96a08707671215c302fae29187d4f5c06a960fd37c10223fdae7ed04935c3c90d3add8eebc8619d73415e6adcda2130f5011e42e50adab988dd8e12baf5cc9398c88607a08009c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859adfe38f77b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc874b2f663ddeef0005b3d96c7aae73835d5a3cda9e90d76c1993e0799d4894ee7f8249dc1e3428d2129369ee1b85afa1a5b6154eb2eea0d0df414b315f65112412392191fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7ade8a5b859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b20428d6474a0a91ee90b8de802c6b538622e6bbcb80f87b415263c401e64ed69a2f75409000000000000001d695c4559b82cabac3cccadc1e1c19af4e03020abf5ff0433d660f20898d2a045d009a0ffb20a77c9af2b80c05184a66d30bbea2ca45a4d6d6d1e6e79aef42355a500587b603306a5af8d867d80a07f10d82eafb03062e95196d5e3ffea0000000000000be959096ea948cfa8e7194123e918914a71ad5a8521fb9553bc60f7d9719b55b3abb6bba3d113a680a8d46fe074c83fbe378a3889e8145b2eaceab05ef932c6e4f8ef0ed0d818a7b76d839cf3c63ebb4380b168c38fa32e49563cfee3a7f0fc18bfa32c418cef875fb49e2989177a1bcd1e30280bc586e79a5dd80701018e7d6e97b3ce267dd4e27b6ef206660090bb2164474cef378f97ca33fc03000000000000001547053453d0c9aec91a24079b21d52fb5516bf0c28ef37aa76442f6083dc99cd61afaf6be45d7b00d3639f2f10ac2d5c759c3e5468f0000000011d415b6b085fb73a2c7c3852e0e658ffeb4e863428a792bee94f6cd895424360e0464f9d7ea425f2fa6aac029d15af607ad83532ff181c985f54b39370c06e63055b4d6a36fa98a44e379d28307c9912fb097601f3f88a2ca6fd1f9320cfe7fc8e9f7f15f02e177ce23f43a154b42e26f037e8a01377cbd3f509e6e540c9ba9c2a589c95d8ad67a65e9a44c576dc24452eaa9d819e2b04bdd1c000000070000000000000000000000005333c6199c12dcd926891927a7267c47cf897853d160100b39b613faefe16bed1fc105dddd77ab929b837d4442d13d5a29179a00837918dd7854aa17eb9fbdc2bdc0e98ae2c3f23a6131e2879f04ff01000030b92dd493be66c2242f8184733b80ba28e8ffffff7f00000000bb2f89049c5f6d63d56995747639964217aacfe548bc869098aa8e07e51dbc9e2d4db3c5f79fd355222ec2a00cf7f2ccd6dd6d2dc2a815d8314221a5472f1318a9dfbec5a759579caf3262129b14e99040b5d91398e17df85c25ccae973eecc7d187168d5c9cd848d566cc17587641ed01889c927da38d83314480b15e23138c5b877a72bd4cf74a299df4fbfc8e6ea96939f15d254d9033c5d371c61f550e9d86aabda45706bda78ab60200000000000000000000000000000000000000706f78f0a2ea9667fb5b951808545a46830970c2dfae01adbda7d29bf1f7abdaf52e0de6f9d7150808ed086642e64ebf98762b34338b80e41b704c3eefaf0bb5ff070000000000000ea15ccc0d7a830b6eb33b6b61675511d693ef5e3c44bbf71cabc5f45c879e7499f8baae2a1a09cf38da73297764fbc0e723e1cc3abb12e3076982ed32c94a2ce3e6f37c47e983da4ca5c96187db5a2a2e1742bc93a65d7187126126b3a80f17dd2f7dbbe82d104ede9ba6925afc2ee6cb94f56f1363cad635abf8f983292c49c0ebf5005154c7b58a3a2a2ea86d2fd92b8661264f781e3fb02d05a28f3f17b64d0258853d45cb5ebde10cd3d82eeed2f1ed925b7cf400304932c5ed0a362b235ce37e1f17700f7d1fecf8be8a2c5d25a9c60657560d05441387ff158a018d19a286c58684a1d2f624c3eb59d509ee89cc2df52881d005b2e5c27563ba54e4153c132d0366aa660000000000000009c1aaec93ec0f925921fb2e9eb202a29bef28224dbabe723de5c584bc398a8792e493048c87f60a51a391e95921218149403558fd13c649f90b0911d57eeb298b590581eba1ce383b539ab80fd15445987b1bb4eb512545e1ab65fef3103ce10b1ee362b51c72f82edf2f502ddf52567775e34a56d1be892f1e62b08950d517fa6fb1b0ef2edf1b67f8644786116b037d4a36fdd30b000063e58c856ec44cbbc2d370553f832af9480215e09aaa3843fe360b1c293a14627f2cfbe278f31d0abc0f5aaa10926dbbfe8a4b131c13a73d4e6d065c2c0fed3ab8442520ce0e0ad7d2d177377ab197ace3ef8b1c24ceb0bdee84bd6e6317633938dd19dc42de7f8f860eca6d9c74525fcd3497526df4c13e3ba5f0d75365a4542ae9440d2fede416d618cdaaf7e038879c5d177b3876fda4121e00000100000000003edd3d43cc64e0d26b46907b42e08d000000000000903350932d3eef7fdada20c19807066e2c72d0d816eb9fa50be213bf6bbb7ccb9f2e8a153e6ced68f192ebed6e86af0f2cec7335fa8039fd6eb025440bc2a34d071f0a0e6774308a74748b8cd994ed368695aa2c5986aa9200a1306ffa5a71ca69e89a6980612b35fc858f37c2c398515a910a35e22ab0573c10b85df4c2972a2fb8b9c080fbb41a753791df727fdeaded2930376eda31312256191c620cce34d1e3bf40a4a207ab1575b399eb8155781bfc7cb5920b49c039935a888d77041894f60fbbcafa487ee96b368e8769da90b44190e569fe8b923c32c288baaca5c5558b5a78bb43e5d9e47a1d5809bb178184b5672d08e29aecf1f572ac1e6cab7e820751e95999b7532603494d37a2bff35a9eec46dfc8a52433f605ebf151c837b4966b5f3628a406175a87e32c5e4268d3000933b580415b162e2946446b8f02554c8a1225217d69d049685dd06aa8528673a9673a723ac414af77f523ad730d00e8700c213f95c87a94f39f506b9e00"/2869], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000fc0)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0xfffffffb}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') 535.264691ms ago: executing program 2 (id=2888): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) close(r0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800000eb7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000050000000850000005000000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x57}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r5}, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r7}, 0x10) close(r6) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r8}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) 534.515421ms ago: executing program 0 (id=2889): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="050000ff00000000004aababbb00000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x48) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xcc, 0xc}, 0x50) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) close(r1) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="002416d164"]) bpf$LINK_DETACH(0x22, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x5a}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7, 0x0, 0xffffffffffffffff, 0x68000000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r1, 0x0, 0x0}, 0x10) 534.072481ms ago: executing program 4 (id=2890): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="b702000026000000bfa300000000000007030000007effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400010000050404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf27fb6d2c643db7e2d5fb4b0936cdf827fb43a431ca711fcd0cdfa146ed3d09a6175037958e27106e225b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc525d78c07f34e4d5b3185b310efcfa89147a09000000f110026e6d2ef831ab7ea0c34f17e3ad6eecbb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b0a341a2d7cbdb9cd38bdb2ca8e050000003a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c214733a18c8b6619f28d9961b626c57c2691208173656d60a17e3c184b751c51160fbcbbdb5b1e7be6148ba532e60a0ac346dfebd31a08060000000200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86acac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e957bc73ddc4eabba08ab1e1ad828267d4eadd3964663e88535c133f7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc190ae2ebf8aad34732181feb215139f15ea7e8cb0bae7c34d5ac5e7c805210600000000000000c3dec04b25dfc17975238345d4f71ab158c36657b7218baa0700f781c0a99bd50499ccc421ace5e845885efb5b9964e4beba3da8223fe5308e4e65ee93e107000000f8ddebf70132a4d0175b989b8eccf707882042e716df9b57b290c661d4e85031086197bcc5cb0e221a0c34323c129102b6ff0100002e88a1940b3c02ed9c92d6f64b1282dc51bb0015982730711c599e1c72ffa11ed8be1a6830d7507005154c46bd3ca96318c570f0721fc7aa2a5836ba99fe1f86468694f22cdf550ef091a78098534f0d973059594119d06d5ea9a8d0857382ec6e2a071474cfc12346e47ad97f4ead7cf70a9d1cdac944779dc08a705414888700a30e2366c6a06b3367a389ca39059787790017b0689a173db9c24db65c1e00015c1d093dab18fd0699fe3304000000323e9c7080397bc49d70c060d57bc88fbe3bbaa058b040362ab926150363fb099408885afc2bf9a46a076b7babfcddeff8c35030669ea69f5e4be1b8e0d6697e97186f9ae97d5670dba6623279f73db9dec75070cd9ab0fda6b069ef6d2857ca3e4effcf7462710d133d541da86e0477e4a6cc999dc21c3ef408e6b178e7c9f274d7fafc8d757d33dfa35aa2000034837d365e63845f3c1092f8dde8af3904ea0f4b82649b83ed4fa0f873339c4cadecc13219ba7518aa4f7db34ead13484742067ab743c1d82a5687f2ed690000000000000000000000000000000000000000000099d4fa0000000000003f0ecdc7c82e72919c91d2039afe17e95edeeeba72205beff7771bcb293747b88486cacee403000000a2919a4bff2ed893f2c814679fa69fc7e0cf761f918725704a01c56009a9f748e5aaf30a10bd8c409b1870c1f75e26b45264e3d3f8e0048e55ae289ce2ad779ce71d4dc30cbb2cc4289d2f884d66cddc76eb7f601110ff39053c262279f4ef00fbdb8c328615a9ec84f27a9f3938ae736138b8c1ec220c1540bf3d162dc1c27fa30f0dc60b9f257db5d1c7ed2e152cb2cf06f8edb30177fead735a952ffce676a93110904d5ee2abdab2ef3ff84c4d61443f73552195c7ccfbf9f03c44432eaa3b7501d4239354da8de21eada75d3a3afb2c76ff0700007981699b6c0f0e946766f57544ff52cef0dd811bec4e3c0a30f2d7d19d26d2503a3ea376721b8eded3bc475958dd498ee2b2d6146e33fc0de1dc2e0516ac565ddb1d4ae89e6712824a85eb9ee0a3b68c9e209756623adf685dd715d68ed11e4b4d5502f5124948f8f98c615cac3666c58f785c3f758be352a71871d5c081197d37980e4f4e26b5476fb20407ff7098b7174bef66fa03a99b5c0c20b378065fac4ef9ac2d0d804b9400000060e5d3f1749f6aecf69ba83a71caa9bdddc679f1b826f54b6563a4be1fd82b73c8c2bc65f63982b951fb058fd3c7b6341c4580376b6c16bd94d2da66059de81abfa15eeeb88b6ae5882ad341032c73f1285e21fff5a1d138e061b1dc7bbda199b5fab8e0719e9cd69b47dcb52b0be6a3a73afdf328132e1d4f21065716be0c53a23940d07188b015fa341dbc92231c8b5e5717eac184f46c9f61b69f55cd2231bcf821052429a1f250e8b734be0605a15f25923d599544b319319ff0a32621019347df460a098119a6f47eb1bac47946d7a009cbc6ec74c19a93cc7c7138b28c95270116181fd5f553573c48104d2ad0e10d3663488e664401453f22f0d76d2162635365258af61ae1f46f4a7862f302d91e3f7c2781f602220522e84602a939a8d5e4137ae31ccd397404dc72e06715a6503d4d865182803ee6725da7293b23daeebefd6fce7411c9624a7e8d5ba5a13e1c32adc4f3274497c6882a72475e4280a4d9a47c003c6ed3071330c58145be813a10788a720a6b5a498ca2b42496c479a0a71e2f6f9bad8c84bc6be20281bde0b348cf2c60538a505ad4a0510eebb023e4954c9eb6cd70627f5c03d867dbf3ad5d1f1dc852064dd0efafc3df20ec8faf3d194db76127f88f284fa1b71ab964fdd2474471da76373e65e9a8bf844bdfdd348bc7d00c4c7e7afe8a1f8cde79b7a6c5aafe954b8ba37818e40c14b37c23f9f614576b689436fef2f27f8b1e756e00262e22bca49c43fd73e7e99b2fa44a8c1db99c2cf2735ad6c5fabf082e0df0f8ba7e24272165f2f5b28230c02b53d44bd84bf6770157e96bbb96b5e1f165c87e7ad68a3600b3d357fa9a7d53c281d88ebb175a4dbb82130e6870982947913110f091d21760d985afd3163f2e6880682432f9b3b97d57a9f980edfa1116a3d04d58872a07d6a7e12db673acd2f7b8988d833e71943fe2c1c65a3cf36b955c56b55bfd3ecf0af694c71a03f2996c15b1ba971de1cb9c7e6a0000000000000014783ef54c51199317413f98dca8ff3d0bda50f6c0af58dbd6c031b1a5a7512c5896514adfa17d31429c68db50a93d88199defd3b4625fea426ff9293a28a544a6a9e2a79b55daa1b3c6b14c4ec6d164e902ce4913843d65d841973468729ea12bf6d3499036dbb66718f3497855c3baa6cc07c0fa388ec9e70617c1a28ef5a595ee267a76175b8a057e6efaf4fefe46def451f2858fe71a53e77b1a44e98843bb3a40102da3703dfb9f61bdcea2fb810b32d52e2157a150a63ea6135d1cf6f864c2e68884d7245bc5d61dc5a114d10ffb22e76678bbfc1e3865d17d128306d1b81884a934cb00000000000000000098a4526e6468987dbc63bff7590eb388afaba43d811996333eef7e9f472bee293f0c40d434b8be07cbd52325296e22802493edb5c590ad208bac683a8b2d4c9d2d57ff846ae8c422e0b28546671f11d8157bb762c91f3fbcca8e21589c92446ae65d408c0637ffcc2d44d715ce003dd1e12b085e186d069a55c2e96efbe5024d61a56a36d988c0f51a973a6c238e545b28211a92000000001501aed8d72af0fcd540a9d4e293690c5e697b3a1480e46df5371bca1cfb28a57c1b3c956ec81397e81fbf870a67385fea04220423f52ad8178b9fd04bdc7e5fee4bd52db9"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00'}, 0x2d) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x20, 0x12, &(0x7f0000000b80)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000660800000000000018000000000000000000000000000000360a020d00000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a0000000000008500000006000000950000000000000075d8db336e42e0eb6624855ef0766591f6ec9103c6d6dd0bb00b2b6fa6f3cdba9300"/160], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40000000, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r2}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), &(0x7f00000007c0), 0xffff}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec85000000750000008500000008000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 445.660843ms ago: executing program 2 (id=2891): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000a50000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000039c0)=ANY=[@ANYRESHEX], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0x38, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f086dd", 0x0, 0x63, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 302.849141ms ago: executing program 2 (id=2892): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000), 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000000000001823", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000000400007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70400000000000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0xfe, 0x0, 0xfffffffffffffdf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="1b0000000000000000000000008000", @ANYRES32=0x0], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) 235.79063ms ago: executing program 4 (id=2893): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="120000000d00000004000000d9"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) 0s ago: executing program 4 (id=2894): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92344f242b416ae9eeefc0e9c6f203cb1276bfdbb4ddffffff7f82dc2b938189a7ca02f732e4c2eab72bf40c0682fd0a0c4ac106b29e220dc2880072599456d4c4e6f3fe684ab8373bb4df9d72876ef3834293812e927c01c7da1322da44c7f2ed1084a12f56d1cb39df9858037458a4ca037604007600b6be484e4c9517af216bd8ed42f7dd01008e49f4a94608c9a20819e02fc22e6be45574d4ed88b37ab8d7674c644dca2f1b4d745fd95c41f9dfc1adafd1e5a3e7f2e898961cb43e438c4e41ae43ea118e14ffffffffe4b8a80366ce5401ec61921a1b529cc8b99bffffb1ac006c67767b03b95151aeb89e6d4a43c625aa228504e4afd8c1cc3eb215ba22f43115f4d39dc7beedb130d9f2be90133a4500000058b8c9370634060105baa664953514605fba3973aa021945b985a8a66e0200000057033815717b4fdbe55b37cb8d7f41aacfbd4089ea1bd22440f64909a09b5a759a703e71f358e11ac8e13db15d792e604a4f279b3bd6621bdf2c17bc0400001000000000ff8d81006200607a9a76e5d9656a7154c75773902a1bdf399df3925130312d095e9c1f973d091c198c1a11edb6b3cc425fe203d2f2655a76865c2c34e2470fcfb1248c0add5431a7fbcb0ef4f66a09af93a09fab1daae4b518d7a5d95a017864010067d6bab101446ebfe3fdeed7ee7bb0749cacf56cf27409c60fca2e0004000000000000a9cb6f4a78444986f9b1ab61f9dab53038010000004abbfc59d6d1b18fe380df4bf024f120bd755d82033f2fb7d8fc9e0de834f7646c8dd27da1297d0c77b294e097e293db7f002c0024ab2fb4d32972cba6f49051cec1ff5d16231bbb90a2d201a500000000000000007700b06fa191ebd3a0c2ef0058ffebd7cc4cf80f74a7cdac01d998c24f34a5ba9a4a2039d0416e3f8107671141ffffffe0c7d8e94a27a06a4e3d9acee835fd0571e5bbb3e6d2b5eba505000000968983811f832dc5390f83e817c602c4f1f0d0504255c22ee8674053d0e160e5255366139bbe5863e23c3dd42d21f542816edf56a93d0a7e6f08f9ffffff64875fea6ff57ba6ae25c5e8ca4f78d5a01308243b08f1caa46be5244d64f8e875857f083144c642f71cdc8e5634c1360c056430fe77ee7ed7ac1f9743786b2fb8e0fcfcc3d36c93230b7b1da97c971c8c84a427edc3492b97e73d2060acfd8145e4a5851bc4d6fdc5ad939d7795f3879baa88bd194d48e50c84892c97c800d156b059a718f6b10274b077a710f27ab8ee953de70ea860b74a0f3c3dc11177b11cc2e62a95f1ecf607a8dc38e525f415a1bd46b38845ebca04061bacbf627f7975fe599678fee48f83b5989543729e3600000000bc86cd51704f309130f534741377ea7b7bea3c46c0c4c4b7c27c5d057d95ac85a41cdcee8e6fa31f7d2137ed1fb4b21c13b9a2c5e3f7c9ef9e45a35adbf0b9312be929863f000000000000004a82bc080de1f87808d0711dd76f2977ca7f2684bfa5c14a0cd6f1f561e34e4e8e51e81d4a355a7d00d917c16a2bb0cfb2b5f59dfead7ac6e7fa84746e2e425769b9ee2c8ff10e934847604d930f62924d0562ce17f6dadf5053ed8f33092a41bb46e1878c5295fecc27f9c6d1f62da58c0002ea00000000009aa38a05e70591d5cdab1c488ef3c1984c7c0a566cfc2a080000009ec206a54fb49056a555414178ef00d8b8f3c59f01eb5d83415994efcc6ec4b3c275cd6b1b5ff82ef7d7abb1d218e7a1d0afa285706841aac9ccc89df41c39dd58dd70569dde45f8adeaad7d3328fbb6e279f745d2872f0208635e465ca443c3a64c7803760880af23fb3f430a0311fffc96dd13b951642f1433f65b4e170a62a5f7b7d0f9d5cef0d17289c43d4aee0001f7a343899434594cc23e1c864164e130754b337e560f285dc670a31241bf657babf0615b85dc200a10294b7d5885b43ac62fc7f97a85586168483427072a535f2c7481ec261c00f725de74e48d9a86f7d4a5d28da3f099ca3e6472b9d7c86d961f525f799b4517141f018af0673b8296f867eca1ec07be11bc497a6f7d2b752bcf77c2908b64630e7fa0c2261bc2d5de32ab6bbcf296d36807544aa7c3d3301fe227b713a371414c98695e559f9cbf6b046184064a5f24a4cc6f41f21fc24a3ad7d20a89e00a9dc99a40f890869d35fba3ce6f297661d3f8ba21c65badf55d1859581f9e7ef3e2693b46a8fc85be061ce79a08002c04dc04de8b6536123b24be2ef80eb06b2db900fb30596c1574b2a31f81d61ccfd58080d2330b9c7b87b5d17d48c32daffead3414b91603e250eeedc7d601000000037426f643797be3e93da96b5643d3feed0b7c885d06006b830d7cbf3152f27522f5142dcc84a9e48a07518f0142167abf5d6685d09945cbc778bcc3e7dcfaee5d9c1689a3bafc0d3b51b5a3bfd6007954c36d532960964183842601e5364ecb6ad9168040388c7640bfa2f88643de7eebf4da8d1c3e76daace5217761d933d06bbe9609fcf5971aa1e77c3123910e63daaadd8878ad468eabaf78a96012a4ada1a9cd217fb2a0da2d521454ea9e8fcd3b5badfd6f00003a73345b841d04a02bf441955b932c59608a555bc44873272812e0fb874618a0b56b4cf44990f60000000000000000000000b20000da0ca6797590ed13b0bccf71a39e05e877893646d185a77882f866785af6b0149e336c31fb177e3e85f4c60cd4de4ce6ea73a95f434328620fa493937386ad2e2a0d60eb815aa05c33e02c32276dab36d14c63af66a31409ab2a403ec3c7a4e07bd745efa2835a8c932f22aa6da40af9bcdf808b916bc8deb37d5b8c422b65c42d17e61751c561ce775a31b52703d398d52694cfbb7d2b3791b030093b321d9f16b2f06676cf94d75cbba6491ae0b5a16ce92320321314d8d2e88d1cd7e7b1216bdaecba309a38e107103e649d46958cc6ba2d660dd41b78d832beb7206ae01508377273ea96e40760410aeed1866971e04f578e9d856d01000000045aea928f5f669be0636dc3f34f90c34531735f271527412d1ae755a9243da523d713071f9370b509a34eeb46415b2f0d271a7072cbd17e293f20132e6c15756e92776c6a0d7c3a9f512ce17edf3f1ea190853bbf93e220a6ce968b79d504c057000e7d8f8249a8158e68a90bbea8bfab2bd3c067c28e185fe62ce7020f5282cf045b9c790984c6fb65fd3187bd8bfcbe663df6b7770000f58fbad41e6eee5c9595950c4172b9c925403b2f99bbf3cb1981bb0d14bded8eae35e08278020a1ec7f508628056fd3d408a02a1cf8594bcbb21a88f477673442804f714212d000045b9f563b5352fe460a30489b1b6a6d37daead86151492f7fd4b5c64007b68a1b04027eac124478a2ef7f59fe472795785de83578cb96334e0f7c1370dc397d3aa42d937b5718b7610cdcdfe104db7801ec74980b8b111a2748321f81512e4204eb2b024b9fc9e0f257f8c6037b93b2caa236d4354b32434d5a6b01e00000000ee2ea723ea2e1accb97a200609c77e0000000000000000d3a54ccd6e13a966801e9341260d6cbce5fe03999214462cbaa297448677ab659102d0f430fbeae119a7ef2e962d2829d4dd2201c4b30d491269594c88252fbd09aced90609851bd9e5c307e7e0d39e73579c1f3563eff1a6237d3699d61acdc8e36010d76093ddd237df1c4181b0a0c4543b4249e9ff2f5e8b5e0ba2048d542de40f643fda4036124b8feb2dd45d0fa52300518c8052cc09ad73f89734fce82cc627356aa2c651ed2644f34cfbc32e8b29cf29e895e43b473ddb9a43421b4b25f8bbce8e2d7cb8547d156d5972021ae4c9e30f85413276ddebde55999d2ec3c524632b74d703147ba09e0dcb26c4b89636d28428b67e955f53bfd0c9eeb7a9d17000000000096cd8ecf1c511eea07aefa1c5cae1841efa9329d80eafefe00000000000000009111274a44c722ff9f5151aa7cb99ea3e8b2c51eadbd2d0ba1a25b08cc3e67cd186c12ea62a55ff905388bb30d1a63d42593c9aea3a84f5a6fc470d8aaaafeccb373ca26c3685679e6a048af19fca3fc5315a33687"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="b0ff04c66b0d698cb89e2fe086dd1f74ffff06000000fe800000000c0000ac14140746647b7954c4c06b580febc28eb143d0f6c0bad62c67a04402ba4125c7024f63fdb0b6c8ee826b4dfe6042a2f057c66cad677d850ea9928bcfcb47e585e427746ed3b27c40060cbd030a6d675c9926af53cd3085b24f9b7a486775c4f284f8c5a572ca115bce90c0ee9d4e7a07f5f1518092cb1f156694036f6618a59196631e6303fd5307d1112601d3641c9492f7dc3503416836b14590c53b1fc1ac149b70cc1142d6bc57fc3a76839fa2f96878b520fedfb9f64d81584a2e85ab4f6ec718b02d78f2ebf04e6b3b94610a21616181629a03c3dc0bf05e0a71f887833b81db7a10bc53259cb80716f6804934a411d424c1db98d454be1adb2776fdbb92b299d3b80af6987a871b4549fdb4c8297ee31ad925c8b0fb1a9d2589b08ed52602cbc26b56df71201bc4ea8621c56f33d251c1d4589af2dcd78fbb4e34bde02cb3920a30cee9489ee72c3e19304c16c2110e1839712d484b80abe77786a7e2ba834874a4e16b93dd07297554a06c2ad2c906f8ebb1db8730df096709184728d48f0a806696bd0d4b12d0064b933d9675353dae77fe8419451f85da63be78b70ca2a84a77f572d9f289d4313e6f6039fe756ac13a5d08838315dff44cda433cc7bc6b77449f8c", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.153' (ED25519) to the list of known hosts. [ 18.789915][ T30] audit: type=1400 audit(1768649697.476:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 18.791220][ T273] cgroup: Unknown subsys name 'net' [ 18.793435][ T30] audit: type=1400 audit(1768649697.476:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.797401][ T30] audit: type=1400 audit(1768649697.486:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.797515][ T273] cgroup: Unknown subsys name 'devices' [ 18.921984][ T273] cgroup: Unknown subsys name 'hugetlb' [ 18.927591][ T273] cgroup: Unknown subsys name 'rlimit' [ 19.064812][ T30] audit: type=1400 audit(1768649697.756:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.088132][ T30] audit: type=1400 audit(1768649697.756:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 19.113039][ T30] audit: type=1400 audit(1768649697.756:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 19.118960][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 19.144882][ T30] audit: type=1400 audit(1768649697.836:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.170482][ T30] audit: type=1400 audit(1768649697.836:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.206665][ T30] audit: type=1400 audit(1768649697.906:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.232170][ T30] audit: type=1400 audit(1768649697.906:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.232233][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 19.725210][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.732382][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.739839][ T281] device bridge_slave_0 entered promiscuous mode [ 19.747606][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.754771][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.762160][ T281] device bridge_slave_1 entered promiscuous mode [ 19.858946][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.866005][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.873330][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.880361][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.911591][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.918623][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.925974][ T283] device bridge_slave_0 entered promiscuous mode [ 19.935587][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.942873][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.950144][ T283] device bridge_slave_1 entered promiscuous mode [ 19.974465][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.981529][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.988923][ T288] device bridge_slave_0 entered promiscuous mode [ 19.998244][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.005346][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.012746][ T288] device bridge_slave_1 entered promiscuous mode [ 20.027692][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.034786][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.042184][ T282] device bridge_slave_0 entered promiscuous mode [ 20.064036][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.071189][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.078562][ T282] device bridge_slave_1 entered promiscuous mode [ 20.108684][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.115830][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.123228][ T284] device bridge_slave_0 entered promiscuous mode [ 20.141205][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.148241][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.155638][ T284] device bridge_slave_1 entered promiscuous mode [ 20.225557][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.232855][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.241536][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.248905][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.262925][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.271162][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.278189][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.315019][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.323238][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.330238][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.355823][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.373026][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.392441][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.409333][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.426138][ T281] device veth0_vlan entered promiscuous mode [ 20.432982][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.441149][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.448477][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.456045][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.480966][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.489675][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.498015][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.505064][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.512729][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.520880][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.527881][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.535292][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.544509][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.552802][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.559820][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.568559][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.591553][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.600015][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.608473][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.615518][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.623174][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.631143][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.639039][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.646987][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.655106][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.662127][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.669454][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.677616][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.684637][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.692748][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.700822][ T281] device veth1_macvtap entered promiscuous mode [ 20.717197][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.725615][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.734503][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.742680][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.750765][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.767794][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.776665][ T281] request_module fs-gadgetfs succeeded, but still no fs? [ 20.777313][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.800064][ T282] device veth0_vlan entered promiscuous mode [ 20.817147][ T288] device veth0_vlan entered promiscuous mode [ 20.830464][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.839692][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.848788][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.856820][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.865170][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.873305][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.881638][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.889071][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.896986][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 20.905739][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.914238][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.921283][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.928999][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 20.937420][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.945783][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.952834][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.968166][ T282] device veth1_macvtap entered promiscuous mode [ 20.979822][ T284] device veth0_vlan entered promiscuous mode [ 20.986995][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.995695][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.004314][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.012517][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.019940][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.028000][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.036466][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.045062][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.053047][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.061817][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.070160][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.078385][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.086699][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.094489][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.105000][ T288] device veth1_macvtap entered promiscuous mode [ 21.126363][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.134871][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.143224][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.151275][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.159554][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.168295][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.176907][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.185215][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.193383][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.201945][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.209932][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.218034][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.226077][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.235127][ T284] device veth1_macvtap entered promiscuous mode [ 21.247724][ T339] device sit0 entered promiscuous mode [ 21.260312][ C0] hrtimer: interrupt took 18230 ns [ 21.282708][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.293763][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.302919][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.349119][ T283] device veth0_vlan entered promiscuous mode [ 21.374386][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.421038][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.454006][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.503862][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.571188][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.603941][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.612510][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.620993][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.629661][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.637864][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.646273][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.654561][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.702374][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.764298][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.807843][ T283] device veth1_macvtap entered promiscuous mode [ 21.860091][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.941405][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.968448][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.104858][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.113346][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.190311][ C1] sched: RT throttling activated [ 27.600898][ T30] kauditd_printk_skb: 42 callbacks suppressed [ 27.600912][ T30] audit: type=1400 audit(1768649706.296:116): avc: denied { read } for pid=449 comm="syz.2.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.692938][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.700185][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.778230][ T450] device bridge_slave_1 left promiscuous mode [ 27.785913][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.793916][ T450] device bridge_slave_0 left promiscuous mode [ 27.800155][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.863012][ T451] syz.3.40 (451) used greatest stack depth: 21376 bytes left [ 28.100967][ T30] audit: type=1400 audit(1768649706.796:117): avc: denied { cpu } for pid=460 comm="syz.3.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 28.170663][ T461] GPL: port 1(erspan0) entered blocking state [ 28.178636][ T461] GPL: port 1(erspan0) entered disabled state [ 28.233762][ T461] device erspan0 entered promiscuous mode [ 28.351574][ T466] GPL: port 1(erspan0) entered blocking state [ 28.357652][ T466] GPL: port 1(erspan0) entered forwarding state [ 28.700658][ T490] device pim6reg1 entered promiscuous mode [ 29.172283][ T30] audit: type=1400 audit(1768649707.856:118): avc: denied { create } for pid=512 comm="syz.1.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 29.213819][ T509] device veth0_vlan left promiscuous mode [ 29.220209][ T509] device veth0_vlan entered promiscuous mode [ 29.241572][ T479] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 33.026429][ T560] device veth0_vlan left promiscuous mode [ 33.057621][ T560] device veth0_vlan entered promiscuous mode [ 36.608575][ T635] device veth0_vlan left promiscuous mode [ 36.687147][ T635] device veth0_vlan entered promiscuous mode [ 36.840188][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.871158][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 36.885311][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 38.388966][ T658] device pim6reg1 entered promiscuous mode [ 39.712151][ T723] device pim6reg1 entered promiscuous mode [ 40.257710][ T739] GPL: port 1(erspan0) entered blocking state [ 40.263902][ T739] GPL: port 1(erspan0) entered disabled state [ 40.271554][ T739] device erspan0 entered promiscuous mode [ 40.311660][ T739] GPL: port 1(erspan0) entered blocking state [ 40.318030][ T739] GPL: port 1(erspan0) entered forwarding state [ 40.809866][ T757] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.817081][ T757] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.384912][ T794] GPL: port 1(erspan0) entered blocking state [ 42.397825][ T794] GPL: port 1(erspan0) entered disabled state [ 42.405021][ T794] device erspan0 entered promiscuous mode [ 42.416951][ T792] GPL: port 1(erspan0) entered blocking state [ 42.423580][ T792] GPL: port 1(erspan0) entered forwarding state [ 42.820455][ T803] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.827633][ T803] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.137242][ T842] GPL: port 1(erspan0) entered blocking state [ 47.309290][ T842] GPL: port 1(erspan0) entered disabled state [ 47.432401][ T842] device erspan0 entered promiscuous mode [ 54.585086][ T940] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.592450][ T940] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.377587][ T978] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.384837][ T978] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.762465][ T1137] device sit0 entered promiscuous mode [ 61.760703][ T1210] device sit0 entered promiscuous mode [ 63.241152][ T1254] device sit0 entered promiscuous mode [ 64.831825][ T1320] ref_ctr_offset mismatch. inode: 0x193 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 64.949312][ T1315] GPL: port 1(erspan0) entered blocking state [ 64.956820][ T1315] GPL: port 1(erspan0) entered forwarding state [ 65.006951][ T30] audit: type=1400 audit(1768649743.696:119): avc: denied { create } for pid=1312 comm="syz.1.361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 65.660925][ T1345] FAULT_INJECTION: forcing a failure. [ 65.660925][ T1345] name failslab, interval 1, probability 0, space 0, times 1 [ 65.880811][ T1345] CPU: 1 PID: 1345 Comm: syz.4.372 Not tainted syzkaller #0 [ 65.883945][ T497] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 65.888130][ T1345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 65.888147][ T1345] Call Trace: [ 65.908458][ T1345] [ 65.911383][ T1345] __dump_stack+0x21/0x30 [ 65.915751][ T1345] dump_stack_lvl+0x110/0x170 [ 65.920439][ T1345] ? show_regs_print_info+0x20/0x20 [ 65.925639][ T1345] dump_stack+0x15/0x20 [ 65.929792][ T1345] should_fail+0x3c1/0x510 [ 65.934204][ T1345] __should_failslab+0xa4/0xe0 [ 65.938973][ T1345] should_failslab+0x9/0x20 [ 65.943472][ T1345] slab_pre_alloc_hook+0x3b/0xe0 [ 65.948411][ T1345] ? prepare_creds+0x2f/0x640 [ 65.953095][ T1345] kmem_cache_alloc+0x44/0x260 [ 65.957880][ T1345] prepare_creds+0x2f/0x640 [ 65.962390][ T1345] copy_creds+0xe4/0x640 [ 65.966632][ T1345] copy_process+0x7b9/0x3250 [ 65.971222][ T1345] ? kstrtol_from_user+0x2a0/0x2a0 [ 65.976336][ T1345] ? putname+0x111/0x160 [ 65.980577][ T1345] ? __kasan_check_write+0x14/0x20 [ 65.985725][ T1345] ? proc_fail_nth_write+0x180/0x200 [ 65.991006][ T1345] ? proc_fail_nth_read+0x220/0x220 [ 65.996200][ T1345] ? __pidfd_prepare+0x150/0x150 [ 66.001125][ T1345] kernel_clone+0x233/0x960 [ 66.005622][ T1345] ? create_io_thread+0x170/0x170 [ 66.010626][ T1345] ? __kasan_check_write+0x14/0x20 [ 66.015742][ T1345] ? mutex_unlock+0x8f/0x230 [ 66.020320][ T1345] __x64_sys_clone+0x198/0x210 [ 66.025064][ T1345] ? __kasan_check_write+0x14/0x20 [ 66.030159][ T1345] ? __ia32_sys_vfork+0x130/0x130 [ 66.035171][ T1345] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 66.041249][ T1345] x64_sys_call+0x41f/0x9a0 [ 66.045729][ T1345] do_syscall_64+0x4c/0xa0 [ 66.050118][ T1345] ? clear_bhb_loop+0x50/0xa0 [ 66.054777][ T1345] ? clear_bhb_loop+0x50/0xa0 [ 66.059522][ T1345] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 66.065407][ T1345] RIP: 0033:0x7fecef0c4cb9 [ 66.069799][ T1345] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 66.089390][ T1345] RSP: 002b:00007fecedb20fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 66.097822][ T1345] RAX: ffffffffffffffda RBX: 00007fecef33ffa0 RCX: 00007fecef0c4cb9 [ 66.105792][ T1345] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 66.113771][ T1345] RBP: 00007fecedb21090 R08: 0000000000000000 R09: 0000000000000000 [ 66.121733][ T1345] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 66.129718][ T1345] R13: 00007fecef340038 R14: 00007fecef33ffa0 R15: 00007ffc2155f208 [ 66.137709][ T1345] [ 69.369816][ T1483] FAULT_INJECTION: forcing a failure. [ 69.369816][ T1483] name failslab, interval 1, probability 0, space 0, times 0 [ 69.446151][ T1483] CPU: 0 PID: 1483 Comm: syz.1.423 Not tainted syzkaller #0 [ 69.453467][ T1483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 69.463523][ T1483] Call Trace: [ 69.466805][ T1483] [ 69.469732][ T1483] __dump_stack+0x21/0x30 [ 69.474063][ T1483] dump_stack_lvl+0x110/0x170 [ 69.478823][ T1483] ? show_regs_print_info+0x20/0x20 [ 69.484373][ T1483] dump_stack+0x15/0x20 [ 69.488528][ T1483] should_fail+0x3c1/0x510 [ 69.492944][ T1483] __should_failslab+0xa4/0xe0 [ 69.497711][ T1483] should_failslab+0x9/0x20 [ 69.502207][ T1483] slab_pre_alloc_hook+0x3b/0xe0 [ 69.507230][ T1483] ? vm_area_dup+0x26/0x210 [ 69.511744][ T1483] kmem_cache_alloc+0x44/0x260 [ 69.516512][ T1483] vm_area_dup+0x26/0x210 [ 69.520857][ T1483] copy_mm+0x947/0x13c0 [ 69.525027][ T1483] ? copy_signal+0x600/0x600 [ 69.529612][ T1483] ? __init_rwsem+0xfc/0x1d0 [ 69.534193][ T1483] ? copy_signal+0x4cb/0x600 [ 69.538773][ T1483] copy_process+0x117c/0x3250 [ 69.543451][ T1483] ? __kasan_check_write+0x14/0x20 [ 69.548577][ T1483] ? __pidfd_prepare+0x150/0x150 [ 69.553512][ T1483] kernel_clone+0x233/0x960 [ 69.558019][ T1483] ? create_io_thread+0x170/0x170 [ 69.563042][ T1483] ? __kasan_check_write+0x14/0x20 [ 69.568143][ T1483] ? mutex_unlock+0x8f/0x230 [ 69.572728][ T1483] __x64_sys_clone+0x198/0x210 [ 69.577495][ T1483] ? __kasan_check_write+0x14/0x20 [ 69.582628][ T1483] ? __ia32_sys_vfork+0x130/0x130 [ 69.587656][ T1483] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 69.593720][ T1483] x64_sys_call+0x41f/0x9a0 [ 69.598221][ T1483] do_syscall_64+0x4c/0xa0 [ 69.602632][ T1483] ? clear_bhb_loop+0x50/0xa0 [ 69.607296][ T1483] ? clear_bhb_loop+0x50/0xa0 [ 69.611964][ T1483] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 69.617847][ T1483] RIP: 0033:0x7f529dad7cb9 [ 69.622255][ T1483] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 69.641852][ T1483] RSP: 002b:00007f529c533fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 69.650259][ T1483] RAX: ffffffffffffffda RBX: 00007f529dd52fa0 RCX: 00007f529dad7cb9 [ 69.658237][ T1483] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 69.666201][ T1483] RBP: 00007f529c534090 R08: 0000000000000000 R09: 0000000000000000 [ 69.674164][ T1483] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 69.682128][ T1483] R13: 00007f529dd53038 R14: 00007f529dd52fa0 R15: 00007ffdb4deb7a8 [ 69.690096][ T1483] [ 69.913801][ T30] audit: type=1400 audit(1768649748.596:120): avc: denied { create } for pid=1498 comm="syz.4.428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 71.144568][ T1556] device syzkaller0 entered promiscuous mode [ 71.903631][ T30] audit: type=1400 audit(1768649750.596:121): avc: denied { tracepoint } for pid=1600 comm="syz.2.468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 72.516249][ T1632] Q±6ã`Ò˜: renamed from lo [ 72.940059][ T1662] device veth0_vlan left promiscuous mode [ 72.946814][ T1662] device veth0_vlan entered promiscuous mode [ 75.021768][ T1728] device veth1_macvtap left promiscuous mode [ 75.830637][ T1746] FAULT_INJECTION: forcing a failure. [ 75.830637][ T1746] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 75.844526][ T1746] CPU: 1 PID: 1746 Comm: syz.3.522 Not tainted syzkaller #0 [ 75.851837][ T1746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 75.861894][ T1746] Call Trace: [ 75.865171][ T1746] [ 75.868098][ T1746] __dump_stack+0x21/0x30 [ 75.872426][ T1746] dump_stack_lvl+0x110/0x170 [ 75.877190][ T1746] ? show_regs_print_info+0x20/0x20 [ 75.882382][ T1746] ? vfs_write+0xc72/0xfd0 [ 75.886798][ T1746] dump_stack+0x15/0x20 [ 75.890960][ T1746] should_fail+0x3c1/0x510 [ 75.895379][ T1746] should_fail_usercopy+0x1a/0x20 [ 75.900402][ T1746] _copy_from_user+0x20/0xd0 [ 75.904993][ T1746] __sys_bpf+0x258/0x7d0 [ 75.909236][ T1746] ? bpf_link_show_fdinfo+0x330/0x330 [ 75.914611][ T1746] ? debug_smp_processor_id+0x17/0x20 [ 75.920075][ T1746] __x64_sys_bpf+0x7c/0x90 [ 75.924483][ T1746] x64_sys_call+0x4b9/0x9a0 [ 75.928983][ T1746] do_syscall_64+0x4c/0xa0 [ 75.933393][ T1746] ? clear_bhb_loop+0x50/0xa0 [ 75.938072][ T1746] ? clear_bhb_loop+0x50/0xa0 [ 75.942753][ T1746] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 75.948649][ T1746] RIP: 0033:0x7f23808d9cb9 [ 75.953062][ T1746] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 75.972664][ T1746] RSP: 002b:00007f237f336028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 75.981056][ T1746] RAX: ffffffffffffffda RBX: 00007f2380b54fa0 RCX: 00007f23808d9cb9 [ 75.989005][ T1746] RDX: 0000000000000010 RSI: 0000200000000100 RDI: 000000000000000f [ 75.996953][ T1746] RBP: 00007f237f336090 R08: 0000000000000000 R09: 0000000000000000 [ 76.004911][ T1746] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 76.012860][ T1746] R13: 00007f2380b55038 R14: 00007f2380b54fa0 R15: 00007ffd5c0a5ec8 [ 76.020815][ T1746] [ 79.121052][ T30] audit: type=1400 audit(1768649757.816:122): avc: denied { create } for pid=1836 comm="syz.4.552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 86.232868][ T1996] ref_ctr_offset mismatch. inode: 0x28a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 86.526044][ T2013] FAULT_INJECTION: forcing a failure. [ 86.526044][ T2013] name failslab, interval 1, probability 0, space 0, times 0 [ 86.539245][ T2013] CPU: 0 PID: 2013 Comm: syz.0.616 Not tainted syzkaller #0 [ 86.546551][ T2013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 86.556594][ T2013] Call Trace: [ 86.559856][ T2013] [ 86.562768][ T2013] __dump_stack+0x21/0x30 [ 86.567087][ T2013] dump_stack_lvl+0x110/0x170 [ 86.571745][ T2013] ? show_regs_print_info+0x20/0x20 [ 86.576924][ T2013] dump_stack+0x15/0x20 [ 86.581055][ T2013] should_fail+0x3c1/0x510 [ 86.585467][ T2013] __should_failslab+0xa4/0xe0 [ 86.590212][ T2013] should_failslab+0x9/0x20 [ 86.594699][ T2013] slab_pre_alloc_hook+0x3b/0xe0 [ 86.599623][ T2013] ? alloc_vmap_area+0x186/0x1a60 [ 86.604628][ T2013] kmem_cache_alloc+0x44/0x260 [ 86.609374][ T2013] alloc_vmap_area+0x186/0x1a60 [ 86.614205][ T2013] ? vm_map_ram+0xa70/0xa70 [ 86.618686][ T2013] ? kmem_cache_alloc_trace+0x119/0x270 [ 86.624209][ T2013] __get_vm_area_node+0x14e/0x350 [ 86.629222][ T2013] __vmalloc_node_range+0xdf/0xaf0 [ 86.634314][ T2013] ? copy_process+0x5c4/0x3250 [ 86.639057][ T2013] ? slab_post_alloc_hook+0x6d/0x2b0 [ 86.644320][ T2013] ? kmem_cache_alloc+0xf7/0x260 [ 86.649239][ T2013] dup_task_struct+0x3f2/0xc10 [ 86.653978][ T2013] ? copy_process+0x5c4/0x3250 [ 86.658721][ T2013] copy_process+0x5c4/0x3250 [ 86.663287][ T2013] ? kstrtol_from_user+0x2a0/0x2a0 [ 86.668377][ T2013] ? __kasan_check_write+0x14/0x20 [ 86.673467][ T2013] ? proc_fail_nth_write+0x180/0x200 [ 86.678729][ T2013] ? proc_fail_nth_read+0x220/0x220 [ 86.683907][ T2013] ? __pidfd_prepare+0x150/0x150 [ 86.688826][ T2013] kernel_clone+0x233/0x960 [ 86.693310][ T2013] ? create_io_thread+0x170/0x170 [ 86.698315][ T2013] ? __kasan_check_write+0x14/0x20 [ 86.703410][ T2013] ? mutex_unlock+0x8f/0x230 [ 86.707991][ T2013] __x64_sys_clone+0x198/0x210 [ 86.712759][ T2013] ? __kasan_check_write+0x14/0x20 [ 86.717870][ T2013] ? __ia32_sys_vfork+0x130/0x130 [ 86.722892][ T2013] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 86.728941][ T2013] x64_sys_call+0x41f/0x9a0 [ 86.733425][ T2013] do_syscall_64+0x4c/0xa0 [ 86.737824][ T2013] ? clear_bhb_loop+0x50/0xa0 [ 86.742487][ T2013] ? clear_bhb_loop+0x50/0xa0 [ 86.747145][ T2013] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 86.753016][ T2013] RIP: 0033:0x7fd1db709cb9 [ 86.757411][ T2013] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 86.777000][ T2013] RSP: 002b:00007fd1da165fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 86.785400][ T2013] RAX: ffffffffffffffda RBX: 00007fd1db984fa0 RCX: 00007fd1db709cb9 [ 86.793359][ T2013] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 86.801310][ T2013] RBP: 00007fd1da166090 R08: 0000000000000000 R09: 0000000000000000 [ 86.809259][ T2013] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 86.817204][ T2013] R13: 00007fd1db985038 R14: 00007fd1db984fa0 R15: 00007ffd04c58978 [ 86.825162][ T2013] [ 86.847709][ T2013] syz.0.616: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 86.876646][ T2013] CPU: 0 PID: 2013 Comm: syz.0.616 Not tainted syzkaller #0 [ 86.883961][ T2013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 86.894019][ T2013] Call Trace: [ 86.897302][ T2013] [ 86.900227][ T2013] __dump_stack+0x21/0x30 [ 86.904562][ T2013] dump_stack_lvl+0x110/0x170 [ 86.909252][ T2013] ? show_regs_print_info+0x20/0x20 [ 86.914468][ T2013] ? pr_cont_kernfs_name+0xe3/0xf0 [ 86.919588][ T2013] dump_stack+0x15/0x20 [ 86.923737][ T2013] warn_alloc+0x1dc/0x200 [ 86.928059][ T2013] ? __kasan_slab_free+0x11/0x20 [ 86.932980][ T2013] ? slab_free_freelist_hook+0xc2/0x190 [ 86.938507][ T2013] ? zone_watermark_ok_safe+0x270/0x270 [ 86.944038][ T2013] ? kfree+0xc4/0x270 [ 86.948000][ T2013] ? __get_vm_area_node+0x163/0x350 [ 86.953178][ T2013] __vmalloc_node_range+0x152/0xaf0 [ 86.958358][ T2013] ? slab_post_alloc_hook+0x6d/0x2b0 [ 86.963640][ T2013] ? kmem_cache_alloc+0xf7/0x260 [ 86.968555][ T2013] dup_task_struct+0x3f2/0xc10 [ 86.973295][ T2013] ? copy_process+0x5c4/0x3250 [ 86.978038][ T2013] copy_process+0x5c4/0x3250 [ 86.982605][ T2013] ? kstrtol_from_user+0x2a0/0x2a0 [ 86.987698][ T2013] ? __kasan_check_write+0x14/0x20 [ 86.992791][ T2013] ? proc_fail_nth_write+0x180/0x200 [ 86.998065][ T2013] ? proc_fail_nth_read+0x220/0x220 [ 87.003257][ T2013] ? __pidfd_prepare+0x150/0x150 [ 87.008180][ T2013] kernel_clone+0x233/0x960 [ 87.012669][ T2013] ? create_io_thread+0x170/0x170 [ 87.017673][ T2013] ? __kasan_check_write+0x14/0x20 [ 87.022767][ T2013] ? mutex_unlock+0x8f/0x230 [ 87.027339][ T2013] __x64_sys_clone+0x198/0x210 [ 87.032100][ T2013] ? __kasan_check_write+0x14/0x20 [ 87.037187][ T2013] ? __ia32_sys_vfork+0x130/0x130 [ 87.042191][ T2013] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 87.048238][ T2013] x64_sys_call+0x41f/0x9a0 [ 87.052722][ T2013] do_syscall_64+0x4c/0xa0 [ 87.057122][ T2013] ? clear_bhb_loop+0x50/0xa0 [ 87.061775][ T2013] ? clear_bhb_loop+0x50/0xa0 [ 87.066437][ T2013] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 87.072309][ T2013] RIP: 0033:0x7fd1db709cb9 [ 87.076703][ T2013] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 87.096369][ T2013] RSP: 002b:00007fd1da165fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 87.104770][ T2013] RAX: ffffffffffffffda RBX: 00007fd1db984fa0 RCX: 00007fd1db709cb9 [ 87.112723][ T2013] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 87.120674][ T2013] RBP: 00007fd1da166090 R08: 0000000000000000 R09: 0000000000000000 [ 87.128629][ T2013] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 87.136578][ T2013] R13: 00007fd1db985038 R14: 00007fd1db984fa0 R15: 00007ffd04c58978 [ 87.144535][ T2013] [ 87.154553][ T2009] tun0: tun_chr_ioctl cmd 1074812117 [ 87.169289][ T2013] Mem-Info: [ 87.174018][ T2013] active_anon:38 inactive_anon:6303 isolated_anon:0 [ 87.174018][ T2013] active_file:4780 inactive_file:3866 isolated_file:0 [ 87.174018][ T2013] unevictable:0 dirty:92 writeback:18 [ 87.174018][ T2013] slab_reclaimable:7717 slab_unreclaimable:74910 [ 87.174018][ T2013] mapped:29298 shmem:163 pagetables:610 bounce:0 [ 87.174018][ T2013] kernel_misc_reclaimable:0 [ 87.174018][ T2013] free:1568731 free_pcp:13573 free_cma:0 [ 87.218329][ T2013] Node 0 active_anon:152kB inactive_anon:25148kB active_file:19120kB inactive_file:15464kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:117200kB dirty:368kB writeback:72kB shmem:652kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5300kB pagetables:2456kB all_unreclaimable? no [ 87.250394][ T2013] DMA32 free:2978772kB min:62612kB low:78264kB high:93916kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2982772kB mlocked:0kB bounce:0kB free_pcp:4000kB local_pcp:0kB free_cma:0kB [ 87.278003][ T2013] lowmem_reserve[]: 0 3941 3941 [ 87.288212][ T2013] Normal free:3296152kB min:84840kB low:106048kB high:127256kB reserved_highatomic:0KB active_anon:152kB inactive_anon:25384kB active_file:19128kB inactive_file:15468kB unevictable:0kB writepending:392kB present:5242880kB managed:4036096kB mlocked:0kB bounce:0kB free_pcp:50780kB local_pcp:23328kB free_cma:0kB [ 87.331253][ T2013] lowmem_reserve[]: 0 0 0 [ 87.335656][ T2013] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2978772kB [ 87.358076][ T2013] Normal: 0*4kB 1*8kB (U) 133*16kB (UM) 66*32kB (ME) 40*64kB (UME) 160*128kB (UME) 323*256kB (UM) 217*512kB (UM) 137*1024kB (UME) 81*2048kB (UM) 676*4096kB (UM) = 3296152kB [ 87.405918][ T2013] 8827 total pagecache pages [ 87.463682][ T2013] 0 pages in swap cache [ 87.477213][ T2013] Swap cache stats: add 0, delete 0, find 0/0 [ 87.483616][ T2013] Free swap = 124996kB [ 87.487873][ T2013] Total swap = 124996kB [ 87.493990][ T2013] 2097051 pages RAM [ 87.498010][ T2013] 0 pages HighMem/MovableOnly [ 87.512775][ T2013] 342334 pages reserved [ 87.592788][ T2013] 0 pages cma reserved [ 89.868902][ T2145] device sit0 left promiscuous mode [ 90.221909][ T2152] device sit0 entered promiscuous mode [ 90.307602][ T2159] FAULT_INJECTION: forcing a failure. [ 90.307602][ T2159] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 90.450554][ T2159] CPU: 0 PID: 2159 Comm: syz.0.667 Not tainted syzkaller #0 [ 90.457870][ T2159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 90.467919][ T2159] Call Trace: [ 90.471187][ T2159] [ 90.474108][ T2159] __dump_stack+0x21/0x30 [ 90.478432][ T2159] dump_stack_lvl+0x110/0x170 [ 90.483101][ T2159] ? show_regs_print_info+0x20/0x20 [ 90.488291][ T2159] ? unwind_get_return_address+0x4d/0x90 [ 90.493923][ T2159] ? stack_trace_save+0xf0/0xf0 [ 90.498771][ T2159] ? arch_stack_walk+0xee/0x140 [ 90.503623][ T2159] dump_stack+0x15/0x20 [ 90.507774][ T2159] should_fail+0x3c1/0x510 [ 90.512183][ T2159] should_fail_alloc_page+0x55/0x80 [ 90.517371][ T2159] prepare_alloc_pages+0x156/0x610 [ 90.522469][ T2159] ? __alloc_pages_bulk+0xad0/0xad0 [ 90.527650][ T2159] ? __kasan_slab_alloc+0xcf/0xf0 [ 90.532652][ T2159] __alloc_pages+0x11d/0x460 [ 90.537224][ T2159] ? prep_new_page+0x110/0x110 [ 90.541964][ T2159] new_slab+0xa1/0x4d0 [ 90.546011][ T2159] ___slab_alloc+0x381/0x810 [ 90.550661][ T2159] ? vm_area_dup+0x26/0x210 [ 90.555147][ T2159] ? vm_area_dup+0x26/0x210 [ 90.559638][ T2159] __slab_alloc+0x49/0x90 [ 90.563944][ T2159] ? vm_area_dup+0x26/0x210 [ 90.568433][ T2159] kmem_cache_alloc+0x138/0x260 [ 90.573265][ T2159] vm_area_dup+0x26/0x210 [ 90.577578][ T2159] copy_mm+0x947/0x13c0 [ 90.581713][ T2159] ? copy_signal+0x600/0x600 [ 90.586281][ T2159] ? __init_rwsem+0xfc/0x1d0 [ 90.590858][ T2159] ? copy_signal+0x4cb/0x600 [ 90.595425][ T2159] copy_process+0x117c/0x3250 [ 90.600080][ T2159] ? __kasan_check_write+0x14/0x20 [ 90.605170][ T2159] ? __pidfd_prepare+0x150/0x150 [ 90.610088][ T2159] kernel_clone+0x233/0x960 [ 90.614588][ T2159] ? create_io_thread+0x170/0x170 [ 90.619589][ T2159] ? __kasan_check_write+0x14/0x20 [ 90.624680][ T2159] ? mutex_unlock+0x8f/0x230 [ 90.629247][ T2159] __x64_sys_clone+0x198/0x210 [ 90.633988][ T2159] ? __kasan_check_write+0x14/0x20 [ 90.639078][ T2159] ? __ia32_sys_vfork+0x130/0x130 [ 90.644085][ T2159] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 90.650130][ T2159] x64_sys_call+0x41f/0x9a0 [ 90.654614][ T2159] do_syscall_64+0x4c/0xa0 [ 90.659008][ T2159] ? clear_bhb_loop+0x50/0xa0 [ 90.663660][ T2159] ? clear_bhb_loop+0x50/0xa0 [ 90.668312][ T2159] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 90.674184][ T2159] RIP: 0033:0x7fd1db709cb9 [ 90.678578][ T2159] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 90.698159][ T2159] RSP: 002b:00007fd1da165fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 90.706554][ T2159] RAX: ffffffffffffffda RBX: 00007fd1db984fa0 RCX: 00007fd1db709cb9 [ 90.714502][ T2159] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 90.722456][ T2159] RBP: 00007fd1da166090 R08: 0000000000000000 R09: 0000000000000000 [ 90.730413][ T2159] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 90.738363][ T2159] R13: 00007fd1db985038 R14: 00007fd1db984fa0 R15: 00007ffd04c58978 [ 90.746313][ T2159] [ 98.787633][ T2341] device veth1_macvtap left promiscuous mode [ 100.549464][ T2366] FAULT_INJECTION: forcing a failure. [ 100.549464][ T2366] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 100.597321][ T2366] CPU: 1 PID: 2366 Comm: syz.1.737 Not tainted syzkaller #0 [ 100.604633][ T2366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 100.614686][ T2366] Call Trace: [ 100.617960][ T2366] [ 100.620886][ T2366] __dump_stack+0x21/0x30 [ 100.625218][ T2366] dump_stack_lvl+0x110/0x170 [ 100.629896][ T2366] ? show_regs_print_info+0x20/0x20 [ 100.635088][ T2366] dump_stack+0x15/0x20 [ 100.639244][ T2366] should_fail+0x3c1/0x510 [ 100.643659][ T2366] should_fail_usercopy+0x1a/0x20 [ 100.648681][ T2366] _copy_from_user+0x20/0xd0 [ 100.653261][ T2366] bpf_obj_get_info_by_fd+0xd30/0x2d00 [ 100.658716][ T2366] ? kstrtol_from_user+0x2a0/0x2a0 [ 100.663825][ T2366] ? bpf_map_get_fd_by_id+0x330/0x330 [ 100.669188][ T2366] ? __kasan_check_write+0x14/0x20 [ 100.674298][ T2366] ? proc_fail_nth_write+0x180/0x200 [ 100.679574][ T2366] ? proc_fail_nth_read+0x220/0x220 [ 100.684779][ T2366] ? security_file_permission+0x79/0xa0 [ 100.690323][ T2366] ? vfs_write+0xc72/0xfd0 [ 100.694736][ T2366] ? file_end_write+0x1b0/0x1b0 [ 100.699579][ T2366] ? selinux_bpf+0xce/0xf0 [ 100.703994][ T2366] ? security_bpf+0x82/0xa0 [ 100.708486][ T2366] __sys_bpf+0x46f/0x7d0 [ 100.712718][ T2366] ? bpf_link_show_fdinfo+0x330/0x330 [ 100.718088][ T2366] ? debug_smp_processor_id+0x17/0x20 [ 100.723459][ T2366] __x64_sys_bpf+0x7c/0x90 [ 100.727864][ T2366] x64_sys_call+0x4b9/0x9a0 [ 100.732359][ T2366] do_syscall_64+0x4c/0xa0 [ 100.736768][ T2366] ? clear_bhb_loop+0x50/0xa0 [ 100.741434][ T2366] ? clear_bhb_loop+0x50/0xa0 [ 100.746106][ T2366] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 100.751991][ T2366] RIP: 0033:0x7f529dad7cb9 [ 100.756401][ T2366] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 100.775998][ T2366] RSP: 002b:00007f529c534028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 100.784516][ T2366] RAX: ffffffffffffffda RBX: 00007f529dd52fa0 RCX: 00007f529dad7cb9 [ 100.792487][ T2366] RDX: 0000000000000010 RSI: 0000200000000100 RDI: 000000000000000f [ 100.800456][ T2366] RBP: 00007f529c534090 R08: 0000000000000000 R09: 0000000000000000 [ 100.808426][ T2366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.816393][ T2366] R13: 00007f529dd53038 R14: 00007f529dd52fa0 R15: 00007ffdb4deb7a8 [ 100.824369][ T2366] [ 104.285795][ T2474] ref_ctr_offset mismatch. inode: 0x302 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 104.299768][ T30] audit: type=1400 audit(1768649782.986:123): avc: denied { relabelfrom } for pid=2475 comm="syz.1.773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 104.401463][ T30] audit: type=1400 audit(1768649782.986:124): avc: denied { relabelto } for pid=2475 comm="syz.1.773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 106.308653][ T2524] ref_ctr_offset mismatch. inode: 0x381 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 106.490047][ T2528] GPL: port 1(erspan0) entered blocking state [ 106.500367][ T2528] GPL: port 1(erspan0) entered disabled state [ 106.506979][ T2528] device erspan0 entered promiscuous mode [ 106.607917][ T2524] GPL: port 1(erspan0) entered blocking state [ 106.614078][ T2524] GPL: port 1(erspan0) entered forwarding state [ 107.857086][ T2574] ref_ctr_offset mismatch. inode: 0x321 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 108.217162][ T30] audit: type=1400 audit(1768649786.906:125): avc: denied { create } for pid=2600 comm="syz.1.818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 109.427828][ T2644] device syzkaller0 entered promiscuous mode [ 109.919822][ T30] audit: type=1400 audit(1768649788.606:126): avc: denied { create } for pid=2677 comm="syz.0.844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 110.314783][ T2683] device veth1_macvtap left promiscuous mode [ 111.127962][ T30] audit: type=1400 audit(1768649789.816:127): avc: denied { ioctl } for pid=2700 comm="syz.4.851" path="net:[4026532639]" dev="nsfs" ino=4026532639 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 111.730556][ T2725] device sit0 left promiscuous mode [ 111.899175][ T2725] device sit0 entered promiscuous mode [ 111.905036][ T2721] syz.3.855[2721] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.905122][ T2721] syz.3.855[2721] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.975826][ T30] audit: type=1400 audit(1768649790.666:128): avc: denied { create } for pid=2724 comm="syz.2.858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 114.124791][ T2779] device sit0 left promiscuous mode [ 115.220172][ T2799] device syzkaller0 entered promiscuous mode [ 115.732159][ T2810] syz.0.882 (2810) used obsolete PPPIOCDETACH ioctl [ 115.955453][ T2825] syz.1.884[2825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.955526][ T2825] syz.1.884[2825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.192081][ T2836] device pim6reg1 entered promiscuous mode [ 117.776220][ T2877] syz.0.907[2877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.776509][ T2877] syz.0.907[2877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.665123][ T2908] device pim6reg1 entered promiscuous mode [ 121.064074][ T2930] ip6_vti0: mtu greater than device maximum [ 121.097748][ T2932] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.104857][ T2932] bridge0: port 2(bridge_slave_1) entered forwarding state [ 121.112196][ T2932] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.119312][ T2932] bridge0: port 1(bridge_slave_0) entered forwarding state [ 121.246934][ T30] audit: type=1400 audit(1768649799.936:129): avc: denied { create } for pid=2931 comm="syz.0.926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 121.312472][ T2932] device bridge0 entered promiscuous mode [ 121.531055][ T30] audit: type=1400 audit(1768649800.216:130): avc: denied { create } for pid=2931 comm="syz.0.926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 122.121788][ T497] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 126.000423][ T3014] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.007474][ T3014] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.014795][ T3014] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.021830][ T3014] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.040030][ T3014] device bridge0 entered promiscuous mode [ 126.059821][ T497] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 128.890147][ T3079] device sit0 entered promiscuous mode [ 129.909011][ T3108] device syzkaller0 entered promiscuous mode [ 130.353925][ T3138] device sit0 entered promiscuous mode [ 130.514093][ T3148] device syzkaller0 entered promiscuous mode [ 131.060583][ T30] audit: type=1400 audit(1768649809.746:131): avc: denied { create } for pid=3173 comm="syz.4.1008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 131.878807][ T3214] device syzkaller0 entered promiscuous mode [ 135.114926][ T3270] ref_ctr_offset mismatch. inode: 0x419 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 136.793908][ T3315] syz.4.1053[3315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.793976][ T3315] syz.4.1053[3315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.803393][ T3309] syz.4.1053[3309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.037316][ T3316] ref_ctr_offset mismatch. inode: 0x440 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 137.102375][ T3309] syz.4.1053[3309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.297585][ T3369] ref_ctr_offset mismatch. inode: 0x47d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 140.024826][ T30] audit: type=1400 audit(1768649818.716:132): avc: denied { create } for pid=3381 comm="syz.0.1087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 140.461337][ T3394] device wg2 entered promiscuous mode [ 140.929168][ T3436] syz.3.1095[3436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.929237][ T3436] syz.3.1095[3436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.977225][ T3431] syz.3.1095[3431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.085673][ T3431] syz.3.1095[3431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.984228][ T3485] syz.1.1115[3485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.061831][ T3491] syz.1.1115[3491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.065592][ T3485] syz.1.1115[3485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.078424][ T3491] syz.1.1115[3491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.392364][ T3513] ref_ctr_offset mismatch. inode: 0x4bc offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 144.135473][ T3532] device syzkaller0 entered promiscuous mode [ 145.851486][ T3559] device sit0 left promiscuous mode [ 145.971397][ T3561] device sit0 entered promiscuous mode [ 146.144927][ T30] audit: type=1400 audit(1768649824.836:133): avc: denied { ioctl } for pid=3558 comm="syz.4.1141" path="socket:[28933]" dev="sockfs" ino=28933 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 148.132942][ T3612] device wg2 left promiscuous mode [ 148.147685][ T3615] device wg2 entered promiscuous mode [ 148.161282][ T3618] device sit0 left promiscuous mode [ 148.202350][ T3616] device sit0 entered promiscuous mode [ 149.527851][ T3637] device syzkaller0 entered promiscuous mode [ 151.015107][ T3698] device syzkaller0 entered promiscuous mode [ 152.959055][ T3726] device syzkaller0 entered promiscuous mode [ 153.010273][ T3737] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.017453][ T3737] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.025092][ T3737] device bridge0 left promiscuous mode [ 154.400483][ T3782] ref_ctr_offset mismatch. inode: 0x539 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 155.680033][ T3822] FAULT_INJECTION: forcing a failure. [ 155.680033][ T3822] name failslab, interval 1, probability 0, space 0, times 0 [ 155.840674][ T3822] CPU: 1 PID: 3822 Comm: syz.4.1234 Not tainted syzkaller #0 [ 155.848081][ T3822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 155.858134][ T3822] Call Trace: [ 155.861413][ T3822] [ 155.864341][ T3822] __dump_stack+0x21/0x30 [ 155.868695][ T3822] dump_stack_lvl+0x110/0x170 [ 155.873363][ T3822] ? show_regs_print_info+0x20/0x20 [ 155.878559][ T3822] dump_stack+0x15/0x20 [ 155.882715][ T3822] should_fail+0x3c1/0x510 [ 155.887122][ T3822] __should_failslab+0xa4/0xe0 [ 155.891888][ T3822] should_failslab+0x9/0x20 [ 155.896393][ T3822] slab_pre_alloc_hook+0x3b/0xe0 [ 155.901324][ T3822] ? anon_vma_fork+0xf2/0x510 [ 155.905990][ T3822] kmem_cache_alloc+0x44/0x260 [ 155.910745][ T3822] anon_vma_fork+0xf2/0x510 [ 155.915244][ T3822] copy_mm+0x9de/0x13c0 [ 155.919396][ T3822] ? copy_signal+0x600/0x600 [ 155.923977][ T3822] ? __init_rwsem+0xfc/0x1d0 [ 155.928564][ T3822] ? copy_signal+0x4cb/0x600 [ 155.933146][ T3822] copy_process+0x117c/0x3250 [ 155.937818][ T3822] ? __kasan_check_write+0x14/0x20 [ 155.942924][ T3822] ? __pidfd_prepare+0x150/0x150 [ 155.947857][ T3822] kernel_clone+0x233/0x960 [ 155.952362][ T3822] ? create_io_thread+0x170/0x170 [ 155.957385][ T3822] ? __kasan_check_write+0x14/0x20 [ 155.962486][ T3822] ? mutex_unlock+0x8f/0x230 [ 155.967070][ T3822] __x64_sys_clone+0x198/0x210 [ 155.971829][ T3822] ? __kasan_check_write+0x14/0x20 [ 155.976934][ T3822] ? __ia32_sys_vfork+0x130/0x130 [ 155.981955][ T3822] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 155.988018][ T3822] x64_sys_call+0x41f/0x9a0 [ 155.992514][ T3822] do_syscall_64+0x4c/0xa0 [ 155.996921][ T3822] ? clear_bhb_loop+0x50/0xa0 [ 156.001583][ T3822] ? clear_bhb_loop+0x50/0xa0 [ 156.006245][ T3822] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 156.012128][ T3822] RIP: 0033:0x7fecef0c4cb9 [ 156.016532][ T3822] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 156.036124][ T3822] RSP: 002b:00007fecedb20fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 156.044527][ T3822] RAX: ffffffffffffffda RBX: 00007fecef33ffa0 RCX: 00007fecef0c4cb9 [ 156.052490][ T3822] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 156.060452][ T3822] RBP: 00007fecedb21090 R08: 0000000000000000 R09: 0000000000000000 [ 156.068424][ T3822] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 156.076401][ T3822] R13: 00007fecef340038 R14: 00007fecef33ffa0 R15: 00007ffc2155f208 [ 156.084473][ T3822] [ 161.130477][ T3935] bond_slave_1: mtu less than device minimum [ 162.514429][ T3976] device pim6reg1 entered promiscuous mode [ 165.029472][ T30] audit: type=1400 audit(1768649843.716:134): avc: denied { create } for pid=4072 comm="syz.1.1325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 165.519796][ T4085] ref_ctr_offset mismatch. inode: 0x5a5 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 166.481098][ T4115] device veth0_vlan left promiscuous mode [ 166.594032][ T4115] device veth0_vlan entered promiscuous mode [ 166.644749][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.653752][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.670962][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.758032][ T4134] FAULT_INJECTION: forcing a failure. [ 166.758032][ T4134] name failslab, interval 1, probability 0, space 0, times 0 [ 167.238714][ T4134] CPU: 1 PID: 4134 Comm: syz.1.1344 Not tainted syzkaller #0 [ 167.246108][ T4134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 167.256155][ T4134] Call Trace: [ 167.259425][ T4134] [ 167.262351][ T4134] __dump_stack+0x21/0x30 [ 167.266682][ T4134] dump_stack_lvl+0x110/0x170 [ 167.271354][ T4134] ? show_regs_print_info+0x20/0x20 [ 167.276549][ T4134] dump_stack+0x15/0x20 [ 167.280693][ T4134] should_fail+0x3c1/0x510 [ 167.285098][ T4134] __should_failslab+0xa4/0xe0 [ 167.289852][ T4134] should_failslab+0x9/0x20 [ 167.294352][ T4134] slab_pre_alloc_hook+0x3b/0xe0 [ 167.299286][ T4134] ? anon_vma_fork+0xf2/0x510 [ 167.303951][ T4134] kmem_cache_alloc+0x44/0x260 [ 167.308710][ T4134] anon_vma_fork+0xf2/0x510 [ 167.313207][ T4134] copy_mm+0x9de/0x13c0 [ 167.317357][ T4134] ? copy_signal+0x600/0x600 [ 167.321939][ T4134] ? __init_rwsem+0xfc/0x1d0 [ 167.326521][ T4134] ? copy_signal+0x4cb/0x600 [ 167.331101][ T4134] copy_process+0x117c/0x3250 [ 167.335774][ T4134] ? __kasan_check_write+0x14/0x20 [ 167.340883][ T4134] ? __pidfd_prepare+0x150/0x150 [ 167.345829][ T4134] kernel_clone+0x233/0x960 [ 167.350343][ T4134] ? create_io_thread+0x170/0x170 [ 167.355368][ T4134] ? __kasan_check_write+0x14/0x20 [ 167.360475][ T4134] ? mutex_unlock+0x8f/0x230 [ 167.365059][ T4134] __x64_sys_clone+0x198/0x210 [ 167.369817][ T4134] ? __kasan_check_write+0x14/0x20 [ 167.374923][ T4134] ? __ia32_sys_vfork+0x130/0x130 [ 167.379942][ T4134] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 167.386004][ T4134] x64_sys_call+0x41f/0x9a0 [ 167.390499][ T4134] do_syscall_64+0x4c/0xa0 [ 167.394907][ T4134] ? clear_bhb_loop+0x50/0xa0 [ 167.399572][ T4134] ? clear_bhb_loop+0x50/0xa0 [ 167.404238][ T4134] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 167.410124][ T4134] RIP: 0033:0x7f529dad7cb9 [ 167.414528][ T4134] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 167.434123][ T4134] RSP: 002b:00007f529c533fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 167.442536][ T4134] RAX: ffffffffffffffda RBX: 00007f529dd52fa0 RCX: 00007f529dad7cb9 [ 167.450502][ T4134] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 167.458467][ T4134] RBP: 00007f529c534090 R08: 0000000000000000 R09: 0000000000000000 [ 167.466568][ T4134] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 167.474548][ T4134] R13: 00007f529dd53038 R14: 00007f529dd52fa0 R15: 00007ffdb4deb7a8 [ 167.482528][ T4134] [ 168.195291][ T4155] device syzkaller0 entered promiscuous mode [ 169.153396][ T4177] device veth0_vlan left promiscuous mode [ 169.203940][ T4177] device veth0_vlan entered promiscuous mode [ 169.360625][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 169.369605][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 169.377306][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 170.044056][ T4194] device veth0_vlan left promiscuous mode [ 170.133611][ T4194] device veth0_vlan entered promiscuous mode [ 170.480019][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 170.491335][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 170.504479][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.036056][ T4214] device veth1_macvtap left promiscuous mode [ 171.052041][ T4209] device macsec0 entered promiscuous mode [ 171.179163][ T4209] device veth1_macvtap entered promiscuous mode [ 171.334825][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 171.782798][ T4217] device veth0_vlan left promiscuous mode [ 172.014833][ T4217] device veth0_vlan entered promiscuous mode [ 173.814086][ T4262] device syzkaller0 entered promiscuous mode [ 174.515937][ T4279] device macsec0 entered promiscuous mode [ 175.186104][ T4297] device veth0_vlan left promiscuous mode [ 175.228530][ T4297] device veth0_vlan entered promiscuous mode [ 177.442058][ T4356] device syzkaller0 entered promiscuous mode [ 178.147496][ T4390] lo: mtu less than device minimum [ 180.252647][ T4395] FAULT_INJECTION: forcing a failure. [ 180.252647][ T4395] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 180.305825][ T4395] CPU: 1 PID: 4395 Comm: syz.3.1438 Not tainted syzkaller #0 [ 180.313225][ T4395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 180.323271][ T4395] Call Trace: [ 180.326537][ T4395] [ 180.329445][ T4395] __dump_stack+0x21/0x30 [ 180.333751][ T4395] dump_stack_lvl+0x110/0x170 [ 180.338403][ T4395] ? show_regs_print_info+0x20/0x20 [ 180.343575][ T4395] dump_stack+0x15/0x20 [ 180.347701][ T4395] should_fail+0x3c1/0x510 [ 180.352096][ T4395] should_fail_usercopy+0x1a/0x20 [ 180.357122][ T4395] _copy_from_user+0x20/0xd0 [ 180.361707][ T4395] iovec_from_user+0x1bc/0x2f0 [ 180.366467][ T4395] __import_iovec+0x71/0x400 [ 180.371052][ T4395] ? kstrtol_from_user+0x2a0/0x2a0 [ 180.376157][ T4395] import_iovec+0x7c/0xb0 [ 180.380479][ T4395] ___sys_recvmsg+0x4e9/0x5c0 [ 180.385155][ T4395] ? __sys_recvmsg+0x270/0x270 [ 180.389918][ T4395] ? vfs_write+0xc72/0xfd0 [ 180.394335][ T4395] ? __fdget+0x1a1/0x230 [ 180.398574][ T4395] __x64_sys_recvmsg+0x203/0x2f0 [ 180.403506][ T4395] ? ___sys_recvmsg+0x5c0/0x5c0 [ 180.408349][ T4395] ? ksys_write+0x1f4/0x250 [ 180.412842][ T4395] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 180.418905][ T4395] x64_sys_call+0x705/0x9a0 [ 180.423399][ T4395] do_syscall_64+0x4c/0xa0 [ 180.427806][ T4395] ? clear_bhb_loop+0x50/0xa0 [ 180.432470][ T4395] ? clear_bhb_loop+0x50/0xa0 [ 180.437135][ T4395] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 180.443023][ T4395] RIP: 0033:0x7f23808d9cb9 [ 180.447433][ T4395] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 180.467031][ T4395] RSP: 002b:00007f237f336028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 180.475444][ T4395] RAX: ffffffffffffffda RBX: 00007f2380b54fa0 RCX: 00007f23808d9cb9 [ 180.483409][ T4395] RDX: 00000000000040fd RSI: 0000200000000b00 RDI: 0000000000000005 [ 180.491375][ T4395] RBP: 00007f237f336090 R08: 0000000000000000 R09: 0000000000000000 [ 180.499338][ T4395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 180.507306][ T4395] R13: 00007f2380b55038 R14: 00007f2380b54fa0 R15: 00007ffd5c0a5ec8 [ 180.515277][ T4395] [ 180.681038][ T4413] device syzkaller0 entered promiscuous mode [ 186.261071][ T4518] device veth0_vlan left promiscuous mode [ 186.339475][ T4518] device veth0_vlan entered promiscuous mode [ 186.512232][ T497] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 186.598271][ T497] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.668734][ T497] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 188.652706][ T4576] ref_ctr_offset mismatch. inode: 0x650 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 190.845493][ T4640] ref_ctr_offset mismatch. inode: 0x66b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 193.575285][ T4689] FAULT_INJECTION: forcing a failure. [ 193.575285][ T4689] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 193.775323][ T4689] CPU: 1 PID: 4689 Comm: syz.4.1536 Not tainted syzkaller #0 [ 193.782720][ T4689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 193.792773][ T4689] Call Trace: [ 193.796049][ T4689] [ 193.798970][ T4689] __dump_stack+0x21/0x30 [ 193.803296][ T4689] dump_stack_lvl+0x110/0x170 [ 193.807975][ T4689] ? show_regs_print_info+0x20/0x20 [ 193.813170][ T4689] dump_stack+0x15/0x20 [ 193.817324][ T4689] should_fail+0x3c1/0x510 [ 193.821732][ T4689] should_fail_usercopy+0x1a/0x20 [ 193.826754][ T4689] _copy_to_user+0x20/0x90 [ 193.831171][ T4689] simple_read_from_buffer+0xe9/0x160 [ 193.836545][ T4689] proc_fail_nth_read+0x1a6/0x220 [ 193.841570][ T4689] ? proc_fault_inject_write+0x310/0x310 [ 193.847197][ T4689] ? security_file_permission+0x83/0xa0 [ 193.852741][ T4689] ? proc_fault_inject_write+0x310/0x310 [ 193.858369][ T4689] vfs_read+0x28d/0xc40 [ 193.862515][ T4689] ? kernel_read+0x1f0/0x1f0 [ 193.867090][ T4689] ? __kasan_check_write+0x14/0x20 [ 193.872188][ T4689] ? mutex_lock+0x9b/0x1c0 [ 193.876595][ T4689] ? wait_for_completion_killable_timeout+0x10/0x10 [ 193.883164][ T4689] ? __fget_files+0x2c4/0x320 [ 193.887827][ T4689] ? __fdget_pos+0x2d2/0x380 [ 193.892403][ T4689] ? ksys_read+0x71/0x250 [ 193.896713][ T4689] ksys_read+0x149/0x250 [ 193.900933][ T4689] ? vfs_write+0xfd0/0xfd0 [ 193.905326][ T4689] ? debug_smp_processor_id+0x17/0x20 [ 193.910678][ T4689] __x64_sys_read+0x7b/0x90 [ 193.915158][ T4689] x64_sys_call+0x96d/0x9a0 [ 193.919641][ T4689] do_syscall_64+0x4c/0xa0 [ 193.924037][ T4689] ? clear_bhb_loop+0x50/0xa0 [ 193.928691][ T4689] ? clear_bhb_loop+0x50/0xa0 [ 193.933346][ T4689] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 193.939223][ T4689] RIP: 0033:0x7fecef08558e [ 193.943617][ T4689] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 193.963200][ T4689] RSP: 002b:00007fecedb20fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 193.971595][ T4689] RAX: ffffffffffffffda RBX: 00007fecedb216c0 RCX: 00007fecef08558e [ 193.979556][ T4689] RDX: 000000000000000f RSI: 00007fecedb210a0 RDI: 0000000000000005 [ 193.987510][ T4689] RBP: 00007fecedb21090 R08: 0000000000000000 R09: 0000000000000000 [ 193.995474][ T4689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 194.003426][ T4689] R13: 00007fecef340038 R14: 00007fecef33ffa0 R15: 00007ffc2155f208 [ 194.011391][ T4689] [ 194.211309][ T4702] FAULT_INJECTION: forcing a failure. [ 194.211309][ T4702] name failslab, interval 1, probability 0, space 0, times 0 [ 194.493457][ T4702] CPU: 1 PID: 4702 Comm: syz.3.1543 Not tainted syzkaller #0 [ 194.500859][ T4702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 194.510906][ T4702] Call Trace: [ 194.514177][ T4702] [ 194.517098][ T4702] __dump_stack+0x21/0x30 [ 194.521427][ T4702] dump_stack_lvl+0x110/0x170 [ 194.526099][ T4702] ? show_regs_print_info+0x20/0x20 [ 194.531293][ T4702] dump_stack+0x15/0x20 [ 194.535481][ T4702] should_fail+0x3c1/0x510 [ 194.539899][ T4702] __should_failslab+0xa4/0xe0 [ 194.544679][ T4702] should_failslab+0x9/0x20 [ 194.549189][ T4702] slab_pre_alloc_hook+0x3b/0xe0 [ 194.554121][ T4702] ? anon_vma_fork+0xf2/0x510 [ 194.558792][ T4702] kmem_cache_alloc+0x44/0x260 [ 194.563546][ T4702] anon_vma_fork+0xf2/0x510 [ 194.568043][ T4702] copy_mm+0x9de/0x13c0 [ 194.572179][ T4702] ? copy_signal+0x600/0x600 [ 194.576744][ T4702] ? __init_rwsem+0xfc/0x1d0 [ 194.581313][ T4702] ? copy_signal+0x4cb/0x600 [ 194.585882][ T4702] copy_process+0x117c/0x3250 [ 194.590542][ T4702] ? __kasan_check_write+0x14/0x20 [ 194.595637][ T4702] ? __pidfd_prepare+0x150/0x150 [ 194.600566][ T4702] kernel_clone+0x233/0x960 [ 194.605064][ T4702] ? create_io_thread+0x170/0x170 [ 194.610080][ T4702] ? __kasan_check_write+0x14/0x20 [ 194.615180][ T4702] ? mutex_unlock+0x8f/0x230 [ 194.619757][ T4702] __x64_sys_clone+0x198/0x210 [ 194.624505][ T4702] ? __kasan_check_write+0x14/0x20 [ 194.629597][ T4702] ? __ia32_sys_vfork+0x130/0x130 [ 194.634612][ T4702] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 194.640675][ T4702] x64_sys_call+0x41f/0x9a0 [ 194.645165][ T4702] do_syscall_64+0x4c/0xa0 [ 194.649567][ T4702] ? clear_bhb_loop+0x50/0xa0 [ 194.654228][ T4702] ? clear_bhb_loop+0x50/0xa0 [ 194.658886][ T4702] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 194.664770][ T4702] RIP: 0033:0x7f23808d9cb9 [ 194.669180][ T4702] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 194.688776][ T4702] RSP: 002b:00007f237f335fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 194.697177][ T4702] RAX: ffffffffffffffda RBX: 00007f2380b54fa0 RCX: 00007f23808d9cb9 [ 194.705129][ T4702] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 194.713081][ T4702] RBP: 00007f237f336090 R08: 0000000000000000 R09: 0000000000000000 [ 194.721032][ T4702] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 194.728988][ T4702] R13: 00007f2380b55038 R14: 00007f2380b54fa0 R15: 00007ffd5c0a5ec8 [ 194.736963][ T4702] [ 196.230677][ T4742] device macsec0 left promiscuous mode [ 196.394643][ T4750] device veth1_macvtap entered promiscuous mode [ 196.426855][ T4750] device macsec0 entered promiscuous mode [ 196.481621][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 202.653824][ T4924] device syzkaller0 entered promiscuous mode [ 205.163166][ T4981] FAULT_INJECTION: forcing a failure. [ 205.163166][ T4981] name failslab, interval 1, probability 0, space 0, times 0 [ 205.220198][ T4981] CPU: 1 PID: 4981 Comm: syz.0.1638 Not tainted syzkaller #0 [ 205.227605][ T4981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 205.237664][ T4981] Call Trace: [ 205.240946][ T4981] [ 205.243878][ T4981] __dump_stack+0x21/0x30 [ 205.248204][ T4981] dump_stack_lvl+0x110/0x170 [ 205.252871][ T4981] ? show_regs_print_info+0x20/0x20 [ 205.258074][ T4981] dump_stack+0x15/0x20 [ 205.262222][ T4981] should_fail+0x3c1/0x510 [ 205.266636][ T4981] __should_failslab+0xa4/0xe0 [ 205.271392][ T4981] should_failslab+0x9/0x20 [ 205.275906][ T4981] slab_pre_alloc_hook+0x3b/0xe0 [ 205.280852][ T4981] ? anon_vma_clone+0xc0/0x500 [ 205.285621][ T4981] kmem_cache_alloc+0x44/0x260 [ 205.290360][ T4981] anon_vma_clone+0xc0/0x500 [ 205.294921][ T4981] anon_vma_fork+0x8c/0x510 [ 205.299397][ T4981] copy_mm+0x9de/0x13c0 [ 205.303527][ T4981] ? copy_signal+0x600/0x600 [ 205.308087][ T4981] ? __init_rwsem+0xfc/0x1d0 [ 205.312652][ T4981] ? copy_signal+0x4cb/0x600 [ 205.317210][ T4981] copy_process+0x117c/0x3250 [ 205.321860][ T4981] ? __kasan_check_write+0x14/0x20 [ 205.326955][ T4981] ? __pidfd_prepare+0x150/0x150 [ 205.331898][ T4981] kernel_clone+0x233/0x960 [ 205.336384][ T4981] ? create_io_thread+0x170/0x170 [ 205.341382][ T4981] ? __kasan_check_write+0x14/0x20 [ 205.346470][ T4981] ? mutex_unlock+0x8f/0x230 [ 205.351034][ T4981] __x64_sys_clone+0x198/0x210 [ 205.355769][ T4981] ? __kasan_check_write+0x14/0x20 [ 205.360852][ T4981] ? __ia32_sys_vfork+0x130/0x130 [ 205.365850][ T4981] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 205.371893][ T4981] x64_sys_call+0x41f/0x9a0 [ 205.376391][ T4981] do_syscall_64+0x4c/0xa0 [ 205.380801][ T4981] ? clear_bhb_loop+0x50/0xa0 [ 205.385473][ T4981] ? clear_bhb_loop+0x50/0xa0 [ 205.390140][ T4981] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 205.396027][ T4981] RIP: 0033:0x7fd1db709cb9 [ 205.400431][ T4981] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 205.420017][ T4981] RSP: 002b:00007fd1da165fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 205.428416][ T4981] RAX: ffffffffffffffda RBX: 00007fd1db984fa0 RCX: 00007fd1db709cb9 [ 205.436375][ T4981] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 205.444320][ T4981] RBP: 00007fd1da166090 R08: 0000000000000000 R09: 0000000000000000 [ 205.452266][ T4981] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 205.460214][ T4981] R13: 00007fd1db985038 R14: 00007fd1db984fa0 R15: 00007ffd04c58978 [ 205.468165][ T4981] [ 209.906483][ T5064] device veth1_macvtap left promiscuous mode [ 210.024302][ T5064] device macsec0 left promiscuous mode [ 212.390395][ T5103] device veth0_vlan left promiscuous mode [ 212.409914][ T5103] device veth0_vlan entered promiscuous mode [ 212.500633][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 212.529030][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 212.659716][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 218.287700][ T5223] device veth0_vlan left promiscuous mode [ 218.293833][ T5223] device veth0_vlan entered promiscuous mode [ 218.305363][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 218.313744][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 218.340813][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 219.484907][ T5241] ref_ctr_offset mismatch. inode: 0x767 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 221.956658][ T5300] ref_ctr_offset mismatch. inode: 0x6f5 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 222.374873][ T5300] device wg2 left promiscuous mode [ 222.645673][ T5326] device sit0 left promiscuous mode [ 222.719227][ T5323] device sit0 entered promiscuous mode [ 224.005719][ T5369] device veth1_macvtap left promiscuous mode [ 225.493779][ T5458] ref_ctr_offset mismatch. inode: 0x74d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 226.140605][ T5467] device pim6reg1 entered promiscuous mode [ 234.478763][ T30] audit: type=1400 audit(1768649913.166:135): avc: denied { create } for pid=5609 comm="syz.3.1846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 235.311256][ T5633] device sit0 left promiscuous mode [ 236.019382][ T5655] ref_ctr_offset mismatch. inode: 0x78a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 236.694760][ T5688] device sit0 left promiscuous mode [ 238.035456][ T5726] ref_ctr_offset mismatch. inode: 0x843 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 238.255569][ T5743] device sit0 left promiscuous mode [ 239.090190][ T30] audit: type=1400 audit(1768649917.776:136): avc: denied { create } for pid=5770 comm="syz.0.1900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 240.175124][ T5807] device sit0 left promiscuous mode [ 242.154661][ T5891] device bond_slave_0 entered promiscuous mode [ 242.238101][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 242.258502][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 244.133572][ T5938] device veth1_macvtap left promiscuous mode [ 244.140056][ T5938] device macsec0 left promiscuous mode [ 244.147078][ T5941] device veth1_macvtap entered promiscuous mode [ 244.154092][ T5941] device macsec0 entered promiscuous mode [ 244.668693][ T5955] device pim6reg1 entered promiscuous mode [ 246.047951][ T5997] FAULT_INJECTION: forcing a failure. [ 246.047951][ T5997] name failslab, interval 1, probability 0, space 0, times 0 [ 246.109912][ T5997] CPU: 1 PID: 5997 Comm: syz.0.1977 Not tainted syzkaller #0 [ 246.117310][ T5997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 246.127362][ T5997] Call Trace: [ 246.130631][ T5997] [ 246.133556][ T5997] __dump_stack+0x21/0x30 [ 246.137882][ T5997] dump_stack_lvl+0x110/0x170 [ 246.142555][ T5997] ? show_regs_print_info+0x20/0x20 [ 246.147753][ T5997] dump_stack+0x15/0x20 [ 246.151902][ T5997] should_fail+0x3c1/0x510 [ 246.156311][ T5997] __should_failslab+0xa4/0xe0 [ 246.161081][ T5997] should_failslab+0x9/0x20 [ 246.165581][ T5997] slab_pre_alloc_hook+0x3b/0xe0 [ 246.170526][ T5997] ? anon_vma_fork+0xf2/0x510 [ 246.175201][ T5997] kmem_cache_alloc+0x44/0x260 [ 246.179956][ T5997] anon_vma_fork+0xf2/0x510 [ 246.184449][ T5997] copy_mm+0x9de/0x13c0 [ 246.188597][ T5997] ? copy_signal+0x600/0x600 [ 246.193175][ T5997] ? __init_rwsem+0xfc/0x1d0 [ 246.197755][ T5997] ? copy_signal+0x4cb/0x600 [ 246.202340][ T5997] copy_process+0x117c/0x3250 [ 246.207013][ T5997] ? __kasan_check_write+0x14/0x20 [ 246.212116][ T5997] ? __pidfd_prepare+0x150/0x150 [ 246.217049][ T5997] kernel_clone+0x233/0x960 [ 246.221548][ T5997] ? create_io_thread+0x170/0x170 [ 246.226564][ T5997] ? __kasan_check_write+0x14/0x20 [ 246.231667][ T5997] ? mutex_unlock+0x8f/0x230 [ 246.236249][ T5997] __x64_sys_clone+0x198/0x210 [ 246.241004][ T5997] ? __kasan_check_write+0x14/0x20 [ 246.246108][ T5997] ? __ia32_sys_vfork+0x130/0x130 [ 246.251126][ T5997] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 246.257187][ T5997] x64_sys_call+0x41f/0x9a0 [ 246.261687][ T5997] do_syscall_64+0x4c/0xa0 [ 246.266094][ T5997] ? clear_bhb_loop+0x50/0xa0 [ 246.270761][ T5997] ? clear_bhb_loop+0x50/0xa0 [ 246.275425][ T5997] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 246.281420][ T5997] RIP: 0033:0x7fd1db709cb9 [ 246.285838][ T5997] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 246.305440][ T5997] RSP: 002b:00007fd1da165fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 246.313833][ T5997] RAX: ffffffffffffffda RBX: 00007fd1db984fa0 RCX: 00007fd1db709cb9 [ 246.321783][ T5997] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 246.329736][ T5997] RBP: 00007fd1da166090 R08: 0000000000000000 R09: 0000000000000000 [ 246.337689][ T5997] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 246.345652][ T5997] R13: 00007fd1db985038 R14: 00007fd1db984fa0 R15: 00007ffd04c58978 [ 246.353712][ T5997] [ 246.548192][ T5999] device pim6reg1 entered promiscuous mode [ 247.258535][ T6023] ref_ctr_offset mismatch. inode: 0x831 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 250.871560][ T30] audit: type=1400 audit(1768649929.566:137): avc: denied { append } for pid=6067 comm="syz.0.1997" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 251.612427][ T6082] device veth0_vlan left promiscuous mode [ 251.826141][ T6082] device veth0_vlan entered promiscuous mode [ 255.704881][ T6220] syz.1.2051[6220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.704976][ T6220] syz.1.2051[6220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.800634][ T6214] device veth0_vlan left promiscuous mode [ 256.094218][ T6214] device veth0_vlan entered promiscuous mode [ 256.825687][ T6242] device veth0_vlan left promiscuous mode [ 257.083741][ T6242] device veth0_vlan entered promiscuous mode [ 258.853068][ T6273] device veth0_vlan left promiscuous mode [ 258.894193][ T6273] device veth0_vlan entered promiscuous mode [ 258.980052][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 259.003177][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 259.081734][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 259.150188][ T6283] ref_ctr_offset mismatch. inode: 0x917 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 263.276717][ T6311] FAULT_INJECTION: forcing a failure. [ 263.276717][ T6311] name failslab, interval 1, probability 0, space 0, times 0 [ 263.299849][ T6311] CPU: 1 PID: 6311 Comm: syz.3.2080 Not tainted syzkaller #0 [ 263.307247][ T6311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 263.317294][ T6311] Call Trace: [ 263.320558][ T6311] [ 263.323473][ T6311] __dump_stack+0x21/0x30 [ 263.327790][ T6311] dump_stack_lvl+0x110/0x170 [ 263.332446][ T6311] ? show_regs_print_info+0x20/0x20 [ 263.337629][ T6311] dump_stack+0x15/0x20 [ 263.341767][ T6311] should_fail+0x3c1/0x510 [ 263.346161][ T6311] __should_failslab+0xa4/0xe0 [ 263.350902][ T6311] should_failslab+0x9/0x20 [ 263.355486][ T6311] slab_pre_alloc_hook+0x3b/0xe0 [ 263.360401][ T6311] ? anon_vma_clone+0xc0/0x500 [ 263.365141][ T6311] kmem_cache_alloc+0x44/0x260 [ 263.369885][ T6311] anon_vma_clone+0xc0/0x500 [ 263.374456][ T6311] anon_vma_fork+0x8c/0x510 [ 263.378935][ T6311] copy_mm+0x9de/0x13c0 [ 263.383074][ T6311] ? copy_signal+0x600/0x600 [ 263.387640][ T6311] ? __init_rwsem+0xfc/0x1d0 [ 263.392212][ T6311] ? copy_signal+0x4cb/0x600 [ 263.396776][ T6311] copy_process+0x117c/0x3250 [ 263.401434][ T6311] ? __kasan_check_write+0x14/0x20 [ 263.406524][ T6311] ? __pidfd_prepare+0x150/0x150 [ 263.411446][ T6311] kernel_clone+0x233/0x960 [ 263.415931][ T6311] ? create_io_thread+0x170/0x170 [ 263.420935][ T6311] ? __kasan_check_write+0x14/0x20 [ 263.426026][ T6311] ? mutex_unlock+0x8f/0x230 [ 263.430598][ T6311] __x64_sys_clone+0x198/0x210 [ 263.435340][ T6311] ? __kasan_check_write+0x14/0x20 [ 263.440428][ T6311] ? __ia32_sys_vfork+0x130/0x130 [ 263.445445][ T6311] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 263.451490][ T6311] x64_sys_call+0x41f/0x9a0 [ 263.455982][ T6311] do_syscall_64+0x4c/0xa0 [ 263.460404][ T6311] ? clear_bhb_loop+0x50/0xa0 [ 263.465075][ T6311] ? clear_bhb_loop+0x50/0xa0 [ 263.469737][ T6311] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 263.475613][ T6311] RIP: 0033:0x7f23808d9cb9 [ 263.480008][ T6311] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 263.499616][ T6311] RSP: 002b:00007f237f335fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 263.508035][ T6311] RAX: ffffffffffffffda RBX: 00007f2380b54fa0 RCX: 00007f23808d9cb9 [ 263.516005][ T6311] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 263.523965][ T6311] RBP: 00007f237f336090 R08: 0000000000000000 R09: 0000000000000000 [ 263.531927][ T6311] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 263.539890][ T6311] R13: 00007f2380b55038 R14: 00007f2380b54fa0 R15: 00007ffd5c0a5ec8 [ 263.547859][ T6311] [ 264.060326][ T6339] device veth0_vlan left promiscuous mode [ 264.119584][ T6339] device veth0_vlan entered promiscuous mode [ 265.273127][ T6362] FAULT_INJECTION: forcing a failure. [ 265.273127][ T6362] name failslab, interval 1, probability 0, space 0, times 0 [ 265.404134][ T6362] CPU: 0 PID: 6362 Comm: syz.0.2097 Not tainted syzkaller #0 [ 265.411539][ T6362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 265.421597][ T6362] Call Trace: [ 265.424988][ T6362] [ 265.427916][ T6362] __dump_stack+0x21/0x30 [ 265.432249][ T6362] dump_stack_lvl+0x110/0x170 [ 265.436929][ T6362] ? show_regs_print_info+0x20/0x20 [ 265.442131][ T6362] ? kasan_set_track+0x5b/0x70 [ 265.446893][ T6362] ? kasan_set_free_info+0x23/0x40 [ 265.451997][ T6362] ? ____kasan_slab_free+0x125/0x160 [ 265.457274][ T6362] ? __kasan_slab_free+0x11/0x20 [ 265.462207][ T6362] ? kmem_cache_free+0x100/0x320 [ 265.467149][ T6362] ? putname+0x111/0x160 [ 265.471389][ T6362] ? do_sys_openat2+0x6df/0x7f0 [ 265.476246][ T6362] ? __x64_sys_openat+0x136/0x160 [ 265.481275][ T6362] dump_stack+0x15/0x20 [ 265.485429][ T6362] should_fail+0x3c1/0x510 [ 265.489838][ T6362] __should_failslab+0xa4/0xe0 [ 265.494598][ T6362] should_failslab+0x9/0x20 [ 265.499092][ T6362] slab_pre_alloc_hook+0x3b/0xe0 [ 265.504022][ T6362] __kmalloc+0x6d/0x2c0 [ 265.508168][ T6362] ? bpf_test_init+0x100/0x1c0 [ 265.512930][ T6362] bpf_test_init+0x100/0x1c0 [ 265.517513][ T6362] bpf_prog_test_run_skb+0x193/0x1150 [ 265.522883][ T6362] ? __kasan_check_write+0x14/0x20 [ 265.527983][ T6362] ? fput_many+0x15a/0x1a0 [ 265.532400][ T6362] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 265.538287][ T6362] bpf_prog_test_run+0x3d5/0x630 [ 265.543219][ T6362] ? bpf_prog_query+0x230/0x230 [ 265.548058][ T6362] ? selinux_bpf+0xce/0xf0 [ 265.552464][ T6362] ? security_bpf+0x82/0xa0 [ 265.556959][ T6362] __sys_bpf+0x590/0x7d0 [ 265.561190][ T6362] ? bpf_link_show_fdinfo+0x330/0x330 [ 265.566554][ T6362] ? debug_smp_processor_id+0x17/0x20 [ 265.571919][ T6362] __x64_sys_bpf+0x7c/0x90 [ 265.576346][ T6362] x64_sys_call+0x4b9/0x9a0 [ 265.580843][ T6362] do_syscall_64+0x4c/0xa0 [ 265.585250][ T6362] ? clear_bhb_loop+0x50/0xa0 [ 265.589917][ T6362] ? clear_bhb_loop+0x50/0xa0 [ 265.594582][ T6362] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 265.600467][ T6362] RIP: 0033:0x7fd1db709cb9 [ 265.604872][ T6362] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 265.624466][ T6362] RSP: 002b:00007fd1da166028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 265.632870][ T6362] RAX: ffffffffffffffda RBX: 00007fd1db984fa0 RCX: 00007fd1db709cb9 [ 265.640836][ T6362] RDX: 0000000000000050 RSI: 0000200000000d40 RDI: 000000000000000a [ 265.648796][ T6362] RBP: 00007fd1da166090 R08: 0000000000000000 R09: 0000000000000000 [ 265.656756][ T6362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 265.664716][ T6362] R13: 00007fd1db985038 R14: 00007fd1db984fa0 R15: 00007ffd04c58978 [ 265.672685][ T6362] [ 266.446442][ T30] audit: type=1400 audit(1768649945.136:138): avc: denied { create } for pid=6393 comm="syz.3.2108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 266.485985][ T6387] device pim6reg1 entered promiscuous mode [ 266.550867][ T30] audit: type=1400 audit(1768649945.176:139): avc: denied { setattr } for pid=6382 comm="syz.0.2104" path="/dev/net/tun" dev="devtmpfs" ino=152 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 268.148285][ T6459] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.155470][ T6459] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.380363][ T6459] device bridge0 left promiscuous mode [ 268.448773][ T6455] device pim6reg1 entered promiscuous mode [ 268.471766][ T6458] device bridge_slave_1 left promiscuous mode [ 268.480700][ T6458] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.556059][ T6458] device bridge_slave_0 left promiscuous mode [ 268.562302][ T6458] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.893379][ T6511] device pim6reg1 entered promiscuous mode [ 272.959638][ T6564] ref_ctr_offset mismatch. inode: 0x8b4 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 275.379781][ T6636] ref_ctr_offset mismatch. inode: 0x900 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 280.104500][ T6765] device sit0 left promiscuous mode [ 281.642473][ T6801] device veth1_macvtap left promiscuous mode [ 281.766099][ T6801] device macsec0 left promiscuous mode [ 281.995071][ T6804] device veth1_macvtap entered promiscuous mode [ 282.082793][ T6804] device macsec0 entered promiscuous mode [ 283.009737][ T6834] device pim6reg1 entered promiscuous mode [ 283.083204][ T6838] bond_slave_1: mtu less than device minimum [ 283.306294][ T6844] device veth1_macvtap entered promiscuous mode [ 283.312947][ T6844] device macsec0 entered promiscuous mode [ 283.363512][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 285.422725][ T6890] device veth1_macvtap entered promiscuous mode [ 285.429265][ T6890] device macsec0 entered promiscuous mode [ 285.441296][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 285.672994][ T6909] device pim6reg1 entered promiscuous mode [ 286.846576][ T6968] device syzkaller0 entered promiscuous mode [ 288.057823][ T7006] device sit0 entered promiscuous mode [ 288.463457][ T7017] device sit0 entered promiscuous mode [ 292.301270][ T7102] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 292.307718][ T7102] syzkaller0: persist disabled [ 296.060785][ T7196] ref_ctr_offset mismatch. inode: 0x9e1 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 297.231960][ T7230] device sit0 entered promiscuous mode [ 302.610991][ T7340] ref_ctr_offset mismatch. inode: 0x9cd offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 307.749343][ T7440] FAULT_INJECTION: forcing a failure. [ 307.749343][ T7440] name failslab, interval 1, probability 0, space 0, times 0 [ 307.790377][ T7440] CPU: 0 PID: 7440 Comm: syz.1.2451 Not tainted syzkaller #0 [ 307.797763][ T7440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 307.807802][ T7440] Call Trace: [ 307.811065][ T7440] [ 307.813978][ T7440] __dump_stack+0x21/0x30 [ 307.818299][ T7440] dump_stack_lvl+0x110/0x170 [ 307.822956][ T7440] ? show_regs_print_info+0x20/0x20 [ 307.828134][ T7440] ? avc_has_perm_noaudit+0x30b/0x490 [ 307.833486][ T7440] dump_stack+0x15/0x20 [ 307.837621][ T7440] should_fail+0x3c1/0x510 [ 307.842015][ T7440] __should_failslab+0xa4/0xe0 [ 307.846757][ T7440] should_failslab+0x9/0x20 [ 307.851237][ T7440] slab_pre_alloc_hook+0x3b/0xe0 [ 307.856152][ T7440] kmem_cache_alloc_trace+0x48/0x270 [ 307.861417][ T7440] ? bpf_local_storage_map_alloc+0x56/0x470 [ 307.867288][ T7440] bpf_local_storage_map_alloc+0x56/0x470 [ 307.872981][ T7440] ? capable+0x8a/0xe0 [ 307.877025][ T7440] bpf_sk_storage_map_alloc+0x19/0x90 [ 307.882378][ T7440] map_create+0x455/0x21b0 [ 307.886770][ T7440] __sys_bpf+0x2ff/0x7d0 [ 307.890988][ T7440] ? bpf_link_show_fdinfo+0x330/0x330 [ 307.896338][ T7440] ? debug_smp_processor_id+0x17/0x20 [ 307.901689][ T7440] __x64_sys_bpf+0x7c/0x90 [ 307.906081][ T7440] x64_sys_call+0x4b9/0x9a0 [ 307.910563][ T7440] do_syscall_64+0x4c/0xa0 [ 307.914960][ T7440] ? clear_bhb_loop+0x50/0xa0 [ 307.919611][ T7440] ? clear_bhb_loop+0x50/0xa0 [ 307.924271][ T7440] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 307.930142][ T7440] RIP: 0033:0x7f529dad7cb9 [ 307.934536][ T7440] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 307.954120][ T7440] RSP: 002b:00007f529c534028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 307.962511][ T7440] RAX: ffffffffffffffda RBX: 00007f529dd52fa0 RCX: 00007f529dad7cb9 [ 307.970458][ T7440] RDX: 0000000000000048 RSI: 0000200000000100 RDI: 0300000000000000 [ 307.978409][ T7440] RBP: 00007f529c534090 R08: 0000000000000000 R09: 0000000000000000 [ 307.986359][ T7440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 307.994308][ T7440] R13: 00007f529dd53038 R14: 00007f529dd52fa0 R15: 00007ffdb4deb7a8 [ 308.002367][ T7440] [ 308.461963][ T7470] FAULT_INJECTION: forcing a failure. [ 308.461963][ T7470] name failslab, interval 1, probability 0, space 0, times 0 [ 308.478412][ T7470] CPU: 1 PID: 7470 Comm: syz.2.2462 Not tainted syzkaller #0 [ 308.485811][ T7470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 308.495865][ T7470] Call Trace: [ 308.499143][ T7470] [ 308.502065][ T7470] __dump_stack+0x21/0x30 [ 308.506404][ T7470] dump_stack_lvl+0x110/0x170 [ 308.511084][ T7470] ? show_regs_print_info+0x20/0x20 [ 308.516288][ T7470] dump_stack+0x15/0x20 [ 308.520441][ T7470] should_fail+0x3c1/0x510 [ 308.524859][ T7470] __should_failslab+0xa4/0xe0 [ 308.529624][ T7470] should_failslab+0x9/0x20 [ 308.534122][ T7470] slab_pre_alloc_hook+0x3b/0xe0 [ 308.539046][ T7470] ? anon_vma_fork+0x200/0x510 [ 308.543786][ T7470] kmem_cache_alloc+0x44/0x260 [ 308.548529][ T7470] anon_vma_fork+0x200/0x510 [ 308.553101][ T7470] copy_mm+0x9de/0x13c0 [ 308.557238][ T7470] ? copy_signal+0x600/0x600 [ 308.561802][ T7470] ? __init_rwsem+0xfc/0x1d0 [ 308.566375][ T7470] ? copy_signal+0x4cb/0x600 [ 308.570942][ T7470] copy_process+0x117c/0x3250 [ 308.575605][ T7470] ? __kasan_check_write+0x14/0x20 [ 308.580695][ T7470] ? __pidfd_prepare+0x150/0x150 [ 308.585612][ T7470] kernel_clone+0x233/0x960 [ 308.590093][ T7470] ? create_io_thread+0x170/0x170 [ 308.595097][ T7470] ? __kasan_check_write+0x14/0x20 [ 308.600187][ T7470] ? mutex_unlock+0x8f/0x230 [ 308.604754][ T7470] __x64_sys_clone+0x198/0x210 [ 308.609495][ T7470] ? __kasan_check_write+0x14/0x20 [ 308.614582][ T7470] ? __ia32_sys_vfork+0x130/0x130 [ 308.619587][ T7470] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 308.625634][ T7470] x64_sys_call+0x41f/0x9a0 [ 308.630117][ T7470] do_syscall_64+0x4c/0xa0 [ 308.634512][ T7470] ? clear_bhb_loop+0x50/0xa0 [ 308.639164][ T7470] ? clear_bhb_loop+0x50/0xa0 [ 308.643825][ T7470] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 308.649699][ T7470] RIP: 0033:0x7f2dcca52cb9 [ 308.654093][ T7470] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 308.673675][ T7470] RSP: 002b:00007f2dcb4aefd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 308.682066][ T7470] RAX: ffffffffffffffda RBX: 00007f2dccccdfa0 RCX: 00007f2dcca52cb9 [ 308.690014][ T7470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 308.697962][ T7470] RBP: 00007f2dcb4af090 R08: 0000000000000000 R09: 0000000000000000 [ 308.705918][ T7470] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 308.713884][ T7470] R13: 00007f2dcccce038 R14: 00007f2dccccdfa0 R15: 00007ffda63dc208 [ 308.721853][ T7470] [ 309.690243][ T7514] ref_ctr_offset mismatch. inode: 0xa07 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 312.622432][ T7569] syz.3.2494[7569] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.622500][ T7569] syz.3.2494[7569] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.173872][ T7612] device sit0 left promiscuous mode [ 315.355334][ T7619] device sit0 entered promiscuous mode [ 317.441865][ T7682] syz.3.2527[7682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.441934][ T7682] syz.3.2527[7682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.512146][ T7680] device veth0_vlan left promiscuous mode [ 317.948618][ T7680] device veth0_vlan entered promiscuous mode [ 318.070426][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 318.093090][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 318.110773][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 318.383467][ T7692] FAULT_INJECTION: forcing a failure. [ 318.383467][ T7692] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 318.460411][ T7692] CPU: 0 PID: 7692 Comm: syz.0.2530 Not tainted syzkaller #0 [ 318.467805][ T7692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 318.477858][ T7692] Call Trace: [ 318.481137][ T7692] [ 318.484064][ T7692] __dump_stack+0x21/0x30 [ 318.488398][ T7692] dump_stack_lvl+0x110/0x170 [ 318.493070][ T7692] ? show_regs_print_info+0x20/0x20 [ 318.498260][ T7692] dump_stack+0x15/0x20 [ 318.502398][ T7692] should_fail+0x3c1/0x510 [ 318.506793][ T7692] should_fail_usercopy+0x1a/0x20 [ 318.511793][ T7692] _copy_from_iter+0x21e/0x1070 [ 318.516625][ T7692] ? copy_mc_pipe_to_iter+0x770/0x770 [ 318.521978][ T7692] tun_get_user+0x415/0x3400 [ 318.526551][ T7692] ? tun_do_read+0x1d30/0x1d30 [ 318.531294][ T7692] ? kstrtouint_from_user+0x1c4/0x220 [ 318.536645][ T7692] ? tracing_record_taskinfo+0x7c/0x220 [ 318.542272][ T7692] ? kstrtol_from_user+0x2a0/0x2a0 [ 318.547358][ T7692] ? __update_load_avg_cfs_rq+0xaf/0x2f0 [ 318.552968][ T7692] ? avc_policy_seqno+0x1b/0x70 [ 318.557805][ T7692] ? selinux_file_permission+0x2aa/0x510 [ 318.563433][ T7692] tun_chr_write_iter+0x1eb/0x2e0 [ 318.568449][ T7692] vfs_write+0x835/0xfd0 [ 318.572680][ T7692] ? file_end_write+0x1b0/0x1b0 [ 318.577510][ T7692] ? __fget_files+0x2c4/0x320 [ 318.582168][ T7692] ? __fdget_pos+0x1f7/0x380 [ 318.586738][ T7692] ? ksys_write+0x71/0x250 [ 318.591128][ T7692] ksys_write+0x149/0x250 [ 318.595433][ T7692] ? __ia32_sys_read+0x90/0x90 [ 318.600174][ T7692] ? debug_smp_processor_id+0x17/0x20 [ 318.605612][ T7692] __x64_sys_write+0x7b/0x90 [ 318.610178][ T7692] x64_sys_call+0x8ef/0x9a0 [ 318.614663][ T7692] do_syscall_64+0x4c/0xa0 [ 318.619056][ T7692] ? clear_bhb_loop+0x50/0xa0 [ 318.623712][ T7692] ? clear_bhb_loop+0x50/0xa0 [ 318.628371][ T7692] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 318.634246][ T7692] RIP: 0033:0x7fd1db709cb9 [ 318.638646][ T7692] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 318.658231][ T7692] RSP: 002b:00007fd1da166028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 318.666639][ T7692] RAX: ffffffffffffffda RBX: 00007fd1db984fa0 RCX: 00007fd1db709cb9 [ 318.674686][ T7692] RDX: 0000000000008202 RSI: 0000200000000000 RDI: 0000000000000005 [ 318.682647][ T7692] RBP: 00007fd1da166090 R08: 0000000000000000 R09: 0000000000000000 [ 318.690603][ T7692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 318.698559][ T7692] R13: 00007fd1db985038 R14: 00007fd1db984fa0 R15: 00007ffd04c58978 [ 318.706526][ T7692] [ 320.100163][ T30] audit: type=1400 audit(1768649998.786:140): avc: denied { create } for pid=7774 comm="syz.3.2560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 320.582531][ T30] audit: type=1400 audit(1768649999.276:141): avc: denied { create } for pid=7783 comm="syz.1.2563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 322.425771][ T7860] device pim6reg1 entered promiscuous mode [ 322.436241][ T30] audit: type=1400 audit(1768650001.126:142): avc: denied { create } for pid=7858 comm="syz.4.2589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 323.565852][ T7880] device veth1_macvtap left promiscuous mode [ 323.600475][ T7880] device macsec0 left promiscuous mode [ 325.163997][ T30] audit: type=1400 audit(1768650003.856:143): avc: denied { create } for pid=7934 comm="syz.4.2615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 325.372585][ T7943] FAULT_INJECTION: forcing a failure. [ 325.372585][ T7943] name failslab, interval 1, probability 0, space 0, times 0 [ 325.608841][ T7943] CPU: 0 PID: 7943 Comm: syz.1.2616 Not tainted syzkaller #0 [ 325.616238][ T7943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 325.626282][ T7943] Call Trace: [ 325.629564][ T7943] [ 325.632491][ T7943] __dump_stack+0x21/0x30 [ 325.636821][ T7943] dump_stack_lvl+0x110/0x170 [ 325.641498][ T7943] ? show_regs_print_info+0x20/0x20 [ 325.646691][ T7943] dump_stack+0x15/0x20 [ 325.650843][ T7943] should_fail+0x3c1/0x510 [ 325.655256][ T7943] __should_failslab+0xa4/0xe0 [ 325.660014][ T7943] should_failslab+0x9/0x20 [ 325.664518][ T7943] slab_pre_alloc_hook+0x3b/0xe0 [ 325.669452][ T7943] __kmalloc+0x6d/0x2c0 [ 325.673604][ T7943] ? kmem_cache_alloc_trace+0x119/0x270 [ 325.679148][ T7943] ? slhc_init+0xb0/0x770 [ 325.683473][ T7943] slhc_init+0xb0/0x770 [ 325.687625][ T7943] ppp_ioctl+0x12f6/0x1790 [ 325.692035][ T7943] ? mutex_unlock+0x8f/0x230 [ 325.696614][ T7943] ? __mutex_lock_slowpath+0x10/0x10 [ 325.701881][ T7943] ? ppp_poll+0x260/0x260 [ 325.706186][ T7943] ? security_file_ioctl+0x84/0xa0 [ 325.711275][ T7943] ? ppp_poll+0x260/0x260 [ 325.715598][ T7943] __se_sys_ioctl+0x121/0x1a0 [ 325.720268][ T7943] __x64_sys_ioctl+0x7b/0x90 [ 325.724848][ T7943] x64_sys_call+0x2f/0x9a0 [ 325.729264][ T7943] do_syscall_64+0x4c/0xa0 [ 325.733671][ T7943] ? clear_bhb_loop+0x50/0xa0 [ 325.738334][ T7943] ? clear_bhb_loop+0x50/0xa0 [ 325.743010][ T7943] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 325.748899][ T7943] RIP: 0033:0x7f529dad7cb9 [ 325.753305][ T7943] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 325.772902][ T7943] RSP: 002b:00007f529c513028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 325.781301][ T7943] RAX: ffffffffffffffda RBX: 00007f529dd53090 RCX: 00007f529dad7cb9 [ 325.789259][ T7943] RDX: 0000200000000180 RSI: 0000000040047451 RDI: 0000000000000045 [ 325.797227][ T7943] RBP: 00007f529c513090 R08: 0000000000000000 R09: 0000000000000000 [ 325.805189][ T7943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 325.813153][ T7943] R13: 00007f529dd53128 R14: 00007f529dd53090 R15: 00007ffdb4deb7a8 [ 325.821112][ T7943] [ 327.030830][ T7979] syz.0.2629[7979] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.030926][ T7979] syz.0.2629[7979] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.559086][ T7979] device veth0_vlan left promiscuous mode [ 327.592626][ T7979] device veth0_vlan entered promiscuous mode [ 327.622228][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 327.631842][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 327.641105][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 329.234689][ T8043] FAULT_INJECTION: forcing a failure. [ 329.234689][ T8043] name failslab, interval 1, probability 0, space 0, times 0 [ 329.391477][ T8043] CPU: 1 PID: 8043 Comm: syz.4.2651 Not tainted syzkaller #0 [ 329.398887][ T8043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 329.408940][ T8043] Call Trace: [ 329.412224][ T8043] [ 329.415151][ T8043] __dump_stack+0x21/0x30 [ 329.419485][ T8043] dump_stack_lvl+0x110/0x170 [ 329.424167][ T8043] ? show_regs_print_info+0x20/0x20 [ 329.429364][ T8043] ? __kasan_kmalloc+0xec/0x110 [ 329.434209][ T8043] ? kmem_cache_alloc_trace+0x119/0x270 [ 329.439757][ T8043] ? bpf_local_storage_map_alloc+0x56/0x470 [ 329.445644][ T8043] ? bpf_sk_storage_map_alloc+0x19/0x90 [ 329.451188][ T8043] ? __sys_bpf+0x2ff/0x7d0 [ 329.455599][ T8043] ? __x64_sys_bpf+0x7c/0x90 [ 329.460184][ T8043] ? x64_sys_call+0x4b9/0x9a0 [ 329.464856][ T8043] ? do_syscall_64+0x4c/0xa0 [ 329.469442][ T8043] dump_stack+0x15/0x20 [ 329.473593][ T8043] should_fail+0x3c1/0x510 [ 329.478003][ T8043] __should_failslab+0xa4/0xe0 [ 329.482769][ T8043] should_failslab+0x9/0x20 [ 329.487268][ T8043] slab_pre_alloc_hook+0x3b/0xe0 [ 329.492204][ T8043] __kmalloc+0x6d/0x2c0 [ 329.496364][ T8043] ? kvmalloc_node+0x211/0x320 [ 329.501140][ T8043] kvmalloc_node+0x211/0x320 [ 329.505727][ T8043] ? vm_mmap+0xb0/0xb0 [ 329.509792][ T8043] ? kmem_cache_alloc_trace+0x119/0x270 [ 329.515329][ T8043] ? bpf_local_storage_map_alloc+0x56/0x470 [ 329.521218][ T8043] ? bpf_map_init_from_attr+0x146/0x350 [ 329.526764][ T8043] bpf_local_storage_map_alloc+0x14d/0x470 [ 329.532550][ T8043] bpf_sk_storage_map_alloc+0x19/0x90 [ 329.537903][ T8043] map_create+0x455/0x21b0 [ 329.542298][ T8043] __sys_bpf+0x2ff/0x7d0 [ 329.546520][ T8043] ? bpf_link_show_fdinfo+0x330/0x330 [ 329.551871][ T8043] ? debug_smp_processor_id+0x17/0x20 [ 329.557230][ T8043] __x64_sys_bpf+0x7c/0x90 [ 329.561638][ T8043] x64_sys_call+0x4b9/0x9a0 [ 329.566145][ T8043] do_syscall_64+0x4c/0xa0 [ 329.570559][ T8043] ? clear_bhb_loop+0x50/0xa0 [ 329.575241][ T8043] ? clear_bhb_loop+0x50/0xa0 [ 329.579904][ T8043] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 329.585791][ T8043] RIP: 0033:0x7fecef0c4cb9 [ 329.590189][ T8043] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 329.609775][ T8043] RSP: 002b:00007fecedb21028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 329.618176][ T8043] RAX: ffffffffffffffda RBX: 00007fecef33ffa0 RCX: 00007fecef0c4cb9 [ 329.626258][ T8043] RDX: 0000000000000048 RSI: 0000200000000100 RDI: 0300000000000000 [ 329.634219][ T8043] RBP: 00007fecedb21090 R08: 0000000000000000 R09: 0000000000000000 [ 329.642179][ T8043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 329.650134][ T8043] R13: 00007fecef340038 R14: 00007fecef33ffa0 R15: 00007ffc2155f208 [ 329.658093][ T8043] [ 330.172811][ T8074] FAULT_INJECTION: forcing a failure. [ 330.172811][ T8074] name failslab, interval 1, probability 0, space 0, times 0 [ 330.333806][ T8074] CPU: 0 PID: 8074 Comm: syz.1.2659 Not tainted syzkaller #0 [ 330.341212][ T8074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 330.351261][ T8074] Call Trace: [ 330.354535][ T8074] [ 330.357455][ T8074] __dump_stack+0x21/0x30 [ 330.361786][ T8074] dump_stack_lvl+0x110/0x170 [ 330.366465][ T8074] ? show_regs_print_info+0x20/0x20 [ 330.371663][ T8074] dump_stack+0x15/0x20 [ 330.375817][ T8074] should_fail+0x3c1/0x510 [ 330.380230][ T8074] __should_failslab+0xa4/0xe0 [ 330.384987][ T8074] should_failslab+0x9/0x20 [ 330.389484][ T8074] slab_pre_alloc_hook+0x3b/0xe0 [ 330.394415][ T8074] ? anon_vma_clone+0xc0/0x500 [ 330.399174][ T8074] kmem_cache_alloc+0x44/0x260 [ 330.403939][ T8074] anon_vma_clone+0xc0/0x500 [ 330.408534][ T8074] anon_vma_fork+0x8c/0x510 [ 330.413032][ T8074] copy_mm+0x9de/0x13c0 [ 330.417180][ T8074] ? copy_signal+0x600/0x600 [ 330.421760][ T8074] ? __init_rwsem+0xfc/0x1d0 [ 330.426343][ T8074] ? copy_signal+0x4cb/0x600 [ 330.430929][ T8074] copy_process+0x117c/0x3250 [ 330.435603][ T8074] ? __kasan_check_write+0x14/0x20 [ 330.440708][ T8074] ? __pidfd_prepare+0x150/0x150 [ 330.445639][ T8074] kernel_clone+0x233/0x960 [ 330.450143][ T8074] ? create_io_thread+0x170/0x170 [ 330.455167][ T8074] ? __kasan_check_write+0x14/0x20 [ 330.460268][ T8074] ? mutex_unlock+0x8f/0x230 [ 330.464851][ T8074] __x64_sys_clone+0x198/0x210 [ 330.469620][ T8074] ? __kasan_check_write+0x14/0x20 [ 330.474726][ T8074] ? __ia32_sys_vfork+0x130/0x130 [ 330.479746][ T8074] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 330.485807][ T8074] x64_sys_call+0x41f/0x9a0 [ 330.490321][ T8074] do_syscall_64+0x4c/0xa0 [ 330.494730][ T8074] ? clear_bhb_loop+0x50/0xa0 [ 330.499401][ T8074] ? clear_bhb_loop+0x50/0xa0 [ 330.504069][ T8074] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 330.509959][ T8074] RIP: 0033:0x7f529dad7cb9 [ 330.514362][ T8074] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 330.533963][ T8074] RSP: 002b:00007f529c533fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 330.542376][ T8074] RAX: ffffffffffffffda RBX: 00007f529dd52fa0 RCX: 00007f529dad7cb9 [ 330.550355][ T8074] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 330.558322][ T8074] RBP: 00007f529c534090 R08: 0000000000000000 R09: 0000000000000000 [ 330.566297][ T8074] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 330.574263][ T8074] R13: 00007f529dd53038 R14: 00007f529dd52fa0 R15: 00007ffdb4deb7a8 [ 330.582235][ T8074] [ 331.317950][ T8100] device veth0_vlan left promiscuous mode [ 331.400655][ T8100] device veth0_vlan entered promiscuous mode [ 331.409062][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 331.429597][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 331.444797][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 332.280798][ T8120] device sit0 left promiscuous mode [ 332.309172][ T8120] device sit0 entered promiscuous mode [ 332.963842][ T8134] ref_ctr_offset mismatch. inode: 0xb0a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 338.193395][ T30] audit: type=1400 audit(1768650016.886:144): avc: denied { create } for pid=8308 comm="syz.2.2732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 338.243822][ T8318] FAULT_INJECTION: forcing a failure. [ 338.243822][ T8318] name failslab, interval 1, probability 0, space 0, times 0 [ 338.261468][ T8318] CPU: 1 PID: 8318 Comm: syz.2.2735 Not tainted syzkaller #0 [ 338.268857][ T8318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 338.278901][ T8318] Call Trace: [ 338.282169][ T8318] [ 338.285088][ T8318] __dump_stack+0x21/0x30 [ 338.289409][ T8318] dump_stack_lvl+0x110/0x170 [ 338.294082][ T8318] ? show_regs_print_info+0x20/0x20 [ 338.299269][ T8318] dump_stack+0x15/0x20 [ 338.303407][ T8318] should_fail+0x3c1/0x510 [ 338.307809][ T8318] __should_failslab+0xa4/0xe0 [ 338.312570][ T8318] should_failslab+0x9/0x20 [ 338.317167][ T8318] slab_pre_alloc_hook+0x3b/0xe0 [ 338.322096][ T8318] ? __alloc_skb+0xe0/0x740 [ 338.326580][ T8318] kmem_cache_alloc+0x44/0x260 [ 338.331327][ T8318] __alloc_skb+0xe0/0x740 [ 338.335642][ T8318] alloc_skb_with_frags+0xa8/0x620 [ 338.340736][ T8318] sock_alloc_send_pskb+0x87f/0x9a0 [ 338.345922][ T8318] ? sock_kzfree_s+0x60/0x60 [ 338.350501][ T8318] ? iov_iter_advance+0x1f9/0x360 [ 338.355521][ T8318] tun_get_user+0xb41/0x3400 [ 338.360104][ T8318] ? kmem_cache_free+0x70/0x320 [ 338.365119][ T8318] ? putname+0x111/0x160 [ 338.369357][ T8318] ? do_syscall_64+0x4c/0xa0 [ 338.373930][ T8318] ? tun_do_read+0x1d30/0x1d30 [ 338.378682][ T8318] ? kstrtouint_from_user+0x1c4/0x220 [ 338.384038][ T8318] ? kstrtol_from_user+0x2a0/0x2a0 [ 338.389136][ T8318] ? avc_policy_seqno+0x1b/0x70 [ 338.393972][ T8318] ? selinux_file_permission+0x2aa/0x510 [ 338.399586][ T8318] tun_chr_write_iter+0x1eb/0x2e0 [ 338.404593][ T8318] vfs_write+0x835/0xfd0 [ 338.408819][ T8318] ? file_end_write+0x1b0/0x1b0 [ 338.413655][ T8318] ? __fget_files+0x2c4/0x320 [ 338.418312][ T8318] ? __fdget_pos+0x1f7/0x380 [ 338.422880][ T8318] ? ksys_write+0x71/0x250 [ 338.427274][ T8318] ksys_write+0x149/0x250 [ 338.431587][ T8318] ? __ia32_sys_read+0x90/0x90 [ 338.436329][ T8318] ? debug_smp_processor_id+0x17/0x20 [ 338.441680][ T8318] __x64_sys_write+0x7b/0x90 [ 338.446250][ T8318] x64_sys_call+0x8ef/0x9a0 [ 338.450736][ T8318] do_syscall_64+0x4c/0xa0 [ 338.455139][ T8318] ? clear_bhb_loop+0x50/0xa0 [ 338.459791][ T8318] ? clear_bhb_loop+0x50/0xa0 [ 338.464445][ T8318] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 338.470329][ T8318] RIP: 0033:0x7f2dcca52cb9 [ 338.474724][ T8318] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 338.494308][ T8318] RSP: 002b:00007f2dcb4af028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 338.502847][ T8318] RAX: ffffffffffffffda RBX: 00007f2dccccdfa0 RCX: 00007f2dcca52cb9 [ 338.510808][ T8318] RDX: 0000000000008202 RSI: 0000200000000000 RDI: 0000000000000005 [ 338.518762][ T8318] RBP: 00007f2dcb4af090 R08: 0000000000000000 R09: 0000000000000000 [ 338.526718][ T8318] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 338.534672][ T8318] R13: 00007f2dcccce038 R14: 00007f2dccccdfa0 R15: 00007ffda63dc208 [ 338.542631][ T8318] [ 339.825476][ T30] audit: type=1400 audit(1768650018.516:145): avc: denied { read } for pid=8395 comm="syz.1.2763" dev="nsfs" ino=4026532289 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 340.159426][ T30] audit: type=1400 audit(1768650018.516:146): avc: denied { open } for pid=8395 comm="syz.1.2763" path="uts:[4026532289]" dev="nsfs" ino=4026532289 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 340.279815][ T8402] device syzkaller0 entered promiscuous mode [ 341.665086][ T8467] device veth0_vlan left promiscuous mode [ 341.750568][ T8467] device veth0_vlan entered promiscuous mode [ 341.841103][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 342.006645][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 342.026865][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 342.657144][ T8518] device veth1_macvtap left promiscuous mode [ 343.802645][ T8544] device macsec0 left promiscuous mode [ 345.859611][ T8598] bond_slave_1: mtu less than device minimum [ 345.964841][ T8606] FAULT_INJECTION: forcing a failure. [ 345.964841][ T8606] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 345.979059][ T8606] CPU: 0 PID: 8606 Comm: syz.2.2835 Not tainted syzkaller #0 [ 345.986441][ T8606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 345.996496][ T8606] Call Trace: [ 345.999766][ T8606] [ 346.002692][ T8606] __dump_stack+0x21/0x30 [ 346.007016][ T8606] dump_stack_lvl+0x110/0x170 [ 346.011680][ T8606] ? show_regs_print_info+0x20/0x20 [ 346.016856][ T8606] dump_stack+0x15/0x20 [ 346.020984][ T8606] should_fail+0x3c1/0x510 [ 346.025375][ T8606] should_fail_alloc_page+0x55/0x80 [ 346.030547][ T8606] prepare_alloc_pages+0x156/0x610 [ 346.035631][ T8606] ? __alloc_pages_bulk+0xad0/0xad0 [ 346.040805][ T8606] ? __x64_sys_ioctl+0x7b/0x90 [ 346.045548][ T8606] ? x64_sys_call+0x2f/0x9a0 [ 346.050124][ T8606] ? do_syscall_64+0x4c/0xa0 [ 346.054703][ T8606] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 346.060752][ T8606] __alloc_pages+0x11d/0x460 [ 346.065320][ T8606] ? prep_new_page+0x110/0x110 [ 346.070058][ T8606] kmalloc_order+0x4c/0x160 [ 346.074538][ T8606] kmalloc_order_trace+0x18/0xb0 [ 346.079448][ T8606] __kmalloc+0x199/0x2c0 [ 346.083663][ T8606] ? slhc_init+0xb0/0x770 [ 346.087967][ T8606] slhc_init+0x160/0x770 [ 346.092186][ T8606] ppp_ioctl+0x12f6/0x1790 [ 346.096577][ T8606] ? mutex_unlock+0x8f/0x230 [ 346.101140][ T8606] ? __mutex_lock_slowpath+0x10/0x10 [ 346.106398][ T8606] ? ppp_poll+0x260/0x260 [ 346.110710][ T8606] ? security_file_ioctl+0x84/0xa0 [ 346.115799][ T8606] ? ppp_poll+0x260/0x260 [ 346.120105][ T8606] __se_sys_ioctl+0x121/0x1a0 [ 346.124850][ T8606] __x64_sys_ioctl+0x7b/0x90 [ 346.129418][ T8606] x64_sys_call+0x2f/0x9a0 [ 346.133809][ T8606] do_syscall_64+0x4c/0xa0 [ 346.138203][ T8606] ? clear_bhb_loop+0x50/0xa0 [ 346.142849][ T8606] ? clear_bhb_loop+0x50/0xa0 [ 346.147505][ T8606] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 346.153373][ T8606] RIP: 0033:0x7f2dcca52cb9 [ 346.157764][ T8606] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 346.177345][ T8606] RSP: 002b:00007f2dcb48e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 346.185734][ T8606] RAX: ffffffffffffffda RBX: 00007f2dcccce090 RCX: 00007f2dcca52cb9 [ 346.193690][ T8606] RDX: 0000200000000180 RSI: 0000000040047451 RDI: 0000000000000047 [ 346.201642][ T8606] RBP: 00007f2dcb48e090 R08: 0000000000000000 R09: 0000000000000000 [ 346.209591][ T8606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 346.217543][ T8606] R13: 00007f2dcccce128 R14: 00007f2dcccce090 R15: 00007ffda63dc208 [ 346.225494][ T8606] [ 352.150878][ T8750] ref_ctr_offset mismatch. inode: 0xc15 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 352.661259][ T278] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 352.672999][ T278] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 352.681410][ T278] CPU: 1 PID: 278 Comm: syz-executor Not tainted syzkaller #0 [ 352.688865][ T278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 352.698917][ T278] RIP: 0010:__rb_erase_color+0x1e6/0xaf0 [ 352.704560][ T278] Code: 00 fc ff df 48 89 4d c0 80 3c 01 00 74 08 48 89 df e8 be 4e 38 ff 4c 8b 2b 4d 89 ef 49 c1 ef 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 07 00 74 08 4c 89 ef e8 9b 4e 38 ff 41 f6 45 00 01 48 89 [ 352.724162][ T278] RSP: 0018:ffffc900009776c0 EFLAGS: 00010246 [ 352.730236][ T278] RAX: dffffc0000000000 RBX: ffff88811f0672b8 RCX: 1ffff11023e0ce57 [ 352.738203][ T278] RDX: ffffffff819c9b50 RSI: 1ffff11021318410 RDI: ffff88811f0672a8 [ 352.746168][ T278] RBP: ffffc90000977720 R08: ffff8881098c209f R09: 1ffff11021318413 [ 352.754128][ T278] R10: dffffc0000000000 R11: ffffed1021318414 R12: 1ffff11024ee4ec7 [ 352.762080][ T278] R13: 0000000000000000 R14: ffff88811f0672a8 R15: 0000000000000000 [ 352.770029][ T278] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 352.778941][ T278] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 352.785505][ T278] CR2: 00007ffda63dae20 CR3: 0000000127414000 CR4: 00000000003506a0 [ 352.793458][ T278] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 352.801406][ T278] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 352.809359][ T278] Call Trace: [ 352.812622][ T278] [ 352.815533][ T278] ? anon_vma_interval_tree_iter_next+0x380/0x380 [ 352.821938][ T278] vma_interval_tree_remove+0xadc/0xb00 [ 352.827465][ T278] unlink_file_vma+0xda/0xf0 [ 352.832041][ T278] free_pgtables+0x139/0x280 [ 352.836609][ T278] exit_mmap+0x433/0x8b0 [ 352.840829][ T278] ? vm_brk+0x30/0x30 [ 352.844787][ T278] ? mutex_unlock+0x8f/0x230 [ 352.849362][ T278] ? uprobe_clear_state+0x2c1/0x320 [ 352.854537][ T278] __mmput+0x93/0x320 [ 352.858505][ T278] ? mmput+0x48/0x150 [ 352.862462][ T278] mmput+0x50/0x150 [ 352.866246][ T278] do_exit+0x9f2/0x27e0 [ 352.870389][ T278] ? _raw_spin_unlock+0x4d/0x70 [ 352.875224][ T278] ? put_task_struct+0x90/0x90 [ 352.879961][ T278] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 352.885395][ T278] ? _raw_spin_lock+0xf0/0xf0 [ 352.890049][ T278] ? __kasan_check_write+0x14/0x20 [ 352.895138][ T278] ? _raw_spin_lock_irq+0x95/0xf0 [ 352.900139][ T278] do_group_exit+0x141/0x310 [ 352.904708][ T278] ? __kasan_check_write+0x14/0x20 [ 352.909795][ T278] get_signal+0x66a/0x1480 [ 352.914193][ T278] arch_do_signal_or_restart+0xdf/0x11c0 [ 352.919811][ T278] ? kernel_waitid+0x3d0/0x3d0 [ 352.924555][ T278] ? __x64_sys_wait4+0x1b4/0x230 [ 352.929470][ T278] ? get_sigframe_size+0x10/0x10 [ 352.934383][ T278] ? kernel_wait+0x1c0/0x1c0 [ 352.938955][ T278] exit_to_user_mode_loop+0xa7/0xe0 [ 352.944128][ T278] exit_to_user_mode_prepare+0x87/0xd0 [ 352.949564][ T278] syscall_exit_to_user_mode+0x1a/0x30 [ 352.954999][ T278] do_syscall_64+0x58/0xa0 [ 352.959391][ T278] ? clear_bhb_loop+0x50/0xa0 [ 352.964054][ T278] ? clear_bhb_loop+0x50/0xa0 [ 352.968707][ T278] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 352.974577][ T278] RIP: 0033:0x7f2dcca0ded7 [ 352.978969][ T278] Code: Unable to access opcode bytes at RIP 0x7f2dcca0dead. [ 352.986308][ T278] RSP: 002b:00007ffda63dc6f0 EFLAGS: 00000202 ORIG_RAX: 000000000000003d [ 352.994701][ T278] RAX: fffffffffffffe00 RBX: 0000555586bb2500 RCX: 00007f2dcca0ded7 [ 353.002652][ T278] RDX: 0000000040000000 RSI: 00007ffda63dc74c RDI: ffffffffffffffff [ 353.010602][ T278] RBP: 00007ffda63dc74c R08: 0000000000000000 R09: 0000000000000000 [ 353.018556][ T278] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000008 [ 353.026506][ T278] R13: 0000000000000003 R14: 00007ffda63dc9a8 R15: 0000000000000000 [ 353.034460][ T278] [ 353.037472][ T278] Modules linked in: [ 353.046790][ T278] ---[ end trace 4459a6f3b2a978df ]--- [ 353.046818][ T30] audit: type=1400 audit(1768650031.736:147): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 353.075438][ T278] RIP: 0010:__rb_erase_color+0x1e6/0xaf0 [ 353.081358][ T278] Code: 00 fc ff df 48 89 4d c0 80 3c 01 00 74 08 48 89 df e8 be 4e 38 ff 4c 8b 2b 4d 89 ef 49 c1 ef 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 07 00 74 08 4c 89 ef e8 9b 4e 38 ff 41 f6 45 00 01 48 89 [ 353.101853][ T30] audit: type=1400 audit(1768650031.736:148): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 353.123373][ T278] RSP: 0018:ffffc900009776c0 EFLAGS: 00010246 [ 353.129449][ T278] RAX: dffffc0000000000 RBX: ffff88811f0672b8 RCX: 1ffff11023e0ce57 [ 353.137804][ T278] RDX: ffffffff819c9b50 RSI: 1ffff11021318410 RDI: ffff88811f0672a8 [ 353.145994][ T30] audit: type=1400 audit(1768650031.736:149): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 353.167456][ T278] RBP: ffffc90000977720 R08: ffff8881098c209f R09: 1ffff11021318413 [ 353.175450][ T278] R10: dffffc0000000000 R11: ffffed1021318414 R12: 1ffff11024ee4ec7 [ 353.183463][ T278] R13: 0000000000000000 R14: ffff88811f0672a8 R15: 0000000000000000 [ 353.191465][ T30] audit: type=1400 audit(1768650031.736:150): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 353.211977][ T278] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 353.211984][ T30] audit: type=1400 audit(1768650031.736:151): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 353.212006][ T30] audit: type=1400 audit(1768650031.736:152): avc: denied { append open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 353.220981][ T278] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 353.241587][ T30] audit: type=1400 audit(1768650031.736:153): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 353.264222][ T278] CR2: 0000200000091000 CR3: 000000012663e000 CR4: 00000000003506a0 [ 353.301293][ T278] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 353.309290][ T278] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 353.317289][ T278] Kernel panic - not syncing: Fatal exception [ 353.323667][ T278] Kernel Offset: disabled [ 353.327978][ T278] Rebooting in 86400 seconds..