last executing test programs: 4.691112457s ago: executing program 2 (id=433): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = syz_clone(0x2000800, &(0x7f00000003c0)="f148d746d5f5b8a392b2777192e935132c685a78b63fce715e4706bb1866ef1cf6220a47739b", 0x26, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100ffff8000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000400000000000fdff00"/21], 0x48) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000000a40)={&(0x7f0000000480)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000700)=[{&(0x7f0000000500)="f3d5da1dd0c26230c58535e634e9f1cb8182068dbc7d72c315d084ab51f10ab76f204bdb05d5deebb72ad823527784a35fe743555d", 0x35}, {&(0x7f0000000540)="ce09a5fe730a4f4f5fc1545ca61da634ae1c56396c1f502fb79cc06254a5e8b3050f2c13089a4f9677e54019e664ae7db3ff2cbaf2962f6d6fc862c8d3052e17ea6fbc575ab2085e519a696da5b1b6e4aff0527a0bb7826887c44780bafd424fb0ccf5edbc6bd0150c731de15c3068e604e84a8529bcffea8991229ae94eb27f652654dd49b67eb28619139b58d097f4d680ab579165ec8d555c96f56bf9caa42bc448ddd1a90c2ecf3da8ac8e9eaefdd2d0cad4e04f9aa91b4e92", 0xbb}, {&(0x7f0000000600)="c93f1d49aac8a5d78c59610c4b4210fe1fef42b75740bfcfe52b19edf959607093cd805a759c49e1cd60c7a9636e5eab31c33fbc0afe27e355bb6f9eab", 0x3d}, {&(0x7f0000000840)="3307028a55aebd5cafa4a5db5bf71abd27c1bd768f281704015fe397edc65248b24e46a73edd7aa53312bde8e67d2b71855c6a0b7bfd83655f733fd58ae72f2290a942926915ce0dd0ede546c39bc60bfc9739042c8afc436b026c7d432cb30faf88f4f26de081311ad87675740c56641f4f643a6a78c5bfd54d0260817f00b6950bad43e85764055ad27845caea23f5cfcd0e1cb7a6bc6b7a6c846292ef5c4749b1abd4e26b6e877cbde00d8b998a8c6dde23d5f692769ea80d480c47", 0xbd}], 0x4, &(0x7f0000000940)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r1, r4, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xffffffffffffffff, 0xee01}}}], 0x80, 0x1}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) 3.795291986s ago: executing program 0 (id=439): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000005c0)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x7, 0x5, 0x0, 0x0, 0x28000, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xb}, 0x0, 0xc8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x80) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102033a00fe08000e40000200875a65969ff57b00ff02000000000000000000000000030b"], 0xfdef) 3.35454909s ago: executing program 3 (id=441): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x21, &(0x7f0000000040), 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) sendmsg$tipc(r1, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000841}, 0x0) recvmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1, &(0x7f00000032c0)=""/4096, 0x1000}, 0x0) sendmsg$tipc(r0, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x1800) 3.35423092s ago: executing program 2 (id=442): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r1, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000840)=r2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0800000004000000040000000900000000000000", @ANYRES32, @ANYBLOB='\x00\"\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xa, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7030000070000008500000021000000b70000000000000095"], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000280)=0x7ff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/21], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0xe, 0x0}, 0x8) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={0x0, r9}, 0x18) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_devices(r7, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000c00)=ANY=[@ANYRES32=r10], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r12}, &(0x7f00000006c0)=0x12, &(0x7f0000000700)=r11}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080), 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0x0, 0x1, 0x10}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) 3.280339585s ago: executing program 3 (id=444): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000ffffffffffffffe8e7"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x40047438, 0x20000010) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/11, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000220000001801000020207025000000000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'macvlan1\x00', 0x200}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x16, &(0x7f00000006c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x200, 0x20, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000}, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2.070342899s ago: executing program 2 (id=445): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000340)=@x25={0x9, @remote}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/218, 0xda}, {&(0x7f00000005c0)=""/160, 0xa0}], 0x2}, 0x20000) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x7, 0xf9, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000107000000000000000026001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180100000000000000000000000000001812"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000000c, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r6}, 0x10) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0e0000000400000008000000081000000000", @ANYRES32=0x0, @ANYRES32], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup(r7, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x80409, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0xfffffffffffffffd}, 0x0, 0xc8, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xc, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000340)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317040000000400fef2000e40004d59875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 2.000613954s ago: executing program 0 (id=448): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000280)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) r0 = perf_event_open$cgroup(&(0x7f0000000400)={0x5, 0x80, 0x37, 0x6, 0xb, 0x4f, 0x0, 0x401, 0x800, 0xe, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x853d, 0x10000, 0xffffffc0, 0x8, 0x6, 0x94, 0x2, 0x0, 0xd}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b9, 0x220, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5014, 0x0, @perf_config_ext={0x7, 0xfffffffffffffff8}, 0x100, 0xc9, 0x0, 0x5, 0x0, 0x7, 0x4080, 0x0, 0x9000}, 0x0, 0x7, r0, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff0000", @ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000240)={'veth1_virt_wifi\x00', 0x100}) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2.000067545s ago: executing program 3 (id=449): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x75, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x105004, 0xc8}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="371ea51f749fc961c004637f1f12a23e135d733116d9", @ANYRES32, @ANYRES32, @ANYBLOB='\x00'/13], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="2e0000000000000000000000000000002f110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x25, &(0x7f0000000540), 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r3, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 1.999452675s ago: executing program 4 (id=450): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000080)) 1.93432555s ago: executing program 4 (id=451): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0xffe9, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, 0x0, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r4, &(0x7f0000000380), 0x2, 0x0) r5 = openat$cgroup_freezer_state(r4, &(0x7f0000002b00), 0x2, 0x0) close(r5) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) 1.79868573s ago: executing program 4 (id=453): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2a, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x3, 0xe, 0x0, &(0x7f0000000500)="0000001afa3cb651ce2f2f009ec3", 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r3}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) 1.451072057s ago: executing program 1 (id=456): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x1, 0x6, 0x3, 0x0, 0x0, 0x4, 0x119, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0xc8, 0x5, 0x0, 0x9, 0x0, 0xa86, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendmsg$unix(r2, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r1, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000004000000000ac1414aa"], 0xfdef) 1.40883434s ago: executing program 3 (id=457): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES16=r0, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00b300"/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}], {0x95, 0x0, 0x0, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x6c, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="2f48537c394d340199d2f10e79d7984ccf3012e9a9bda8e1ec7ffbb1c9ecd3813fb99d481e2eabf475c945e54a48ebdae3d8233e9d5a7fa8207c95b2f993c64b0935f4ca000a0cf01900a91ee739ae7e5cd302c117f077bc87ca14ef021da67ed67923895ab31edfa75174a2c62cb40ca8d7ba02767afe28dd2b9051430901b1b580e05105506f66fa9c7d276b015e33f046716c3d1d7ee65ea1c238143b538df110ee306d3ae56590818abb306947568c682cc55a379e51b97bef276bd54ff08f7d1381461cdf92992c1e6a1299ee", @ANYRES16=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={0x0, r6}, 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 1.334726566s ago: executing program 1 (id=458): bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@cgroup=r1, 0xf, 0x1, 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000000080)=[0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0]}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="05000000050000000200000004"], 0x48) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b703000000000000850000007200000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='tlb_flush\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000080ba3bdf9959cb175ef54debfc48d1d02bb7e650a520bf130cee2b69808663d35842263af6abc46462cd16097b028862119ef2949c12ae88b23893e735020e7f901173449f9061c5f8cd412ea28cf62af0d3e17627321dddb7b28c15a3d20376f3170fc4796760b41fead473fe4e4c314c2f73480dc97326a4a5cfc48cb5a431ded00cd1bcf82f47054f2d3adec558188ed3d819f88d00"/188], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.334456616s ago: executing program 3 (id=459): r0 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0600000004000000008000005c00000000000000", @ANYRES32, @ANYBLOB='\x00'/10], 0x48) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) close(r1) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, r0}, 0x38) 1.324850667s ago: executing program 4 (id=460): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000000000000800000001"], 0xfdef) 1.273071001s ago: executing program 1 (id=461): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000080)) 1.231442954s ago: executing program 1 (id=462): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e40)=ANY=[@ANYBLOB="0b00000005000000020000000200000005"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000160000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r4}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd42"], 0xfdef) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000009a39c0f788bd05086c959135f1b9dbbeca24544c20f298c375e25092a503d47764f3f369fc17bdba6f5f08bf08e8e59966c4dd73bdfb45c987a92d28eaf6eb5287f2e3797a8a477a6ee2ef3a8c0921c22aa9a036d97242cf84375008d5c000afdc42359d5fb7301480b564f06db9a77c572b92f7df2b0786945123bfe6276ea3edcb234703033668692beef781509d9a38b168b982fef1f06bab9a856c6c0b59acfcf9bc6428732a1a8f25544625a08db9f4307b6fa5e2360cd7fac178fcbdfbd0060863912ca1798f86b73f86411c2192dec860a942f4"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r6}, 0x10) 1.094592125s ago: executing program 4 (id=463): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0900000008000000040000000940000000000000", @ANYRES32, @ANYRESHEX=0x0], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x808, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0xc8, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="8f0ccb7907081175f37538e486dd"], 0xfdef) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1e000000ff07000007001000a000000020000000", @ANYRES32, @ANYBLOB="1000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000001000000040000000b00"/28], 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000001c0)='[-(/:])%\x00') write$cgroup_subtree(r3, &(0x7f0000000180)=ANY=[], 0xffbf) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@fallback=r0, 0x12, 0x1, 0x1, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0]}, 0x40) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r5, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800000, @void, @value}, 0x94) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c27", 0x39}], 0x1}, 0x0) recvmsg(r7, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000300)=""/6, 0x2}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r6, 0x0, 0x3c, 0x45, &(0x7f0000000140)="01ef4fa9c285f19b51123eefcd704727eee7c811fa330e36834ce27d6010d98aab6feca42d35a54866fbaba57ccaeee96ced2035fedc88ccccf22489", &(0x7f00000005c0)=""/69, 0x200, 0x0, 0x2e, 0x1000, &(0x7f0000000340)="efcff81cb3f0a6c3ae556bb8421797dc10620e5a5ed18700f6d7a1aaf4c8ad202d8996857b6368c6467a18369824", &(0x7f0000001040)="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", 0x1, 0x0, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x18, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000646c6c2500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000f00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000040)='mm_lru_insertion\x00', r6, 0x0, 0x5}, 0x18) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x40010) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 1.094208575s ago: executing program 1 (id=464): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000280)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) r0 = perf_event_open$cgroup(&(0x7f0000000400)={0x5, 0x80, 0x37, 0x6, 0xb, 0x4f, 0x0, 0x401, 0x800, 0xe, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x853d, 0x10000, 0xffffffc0, 0x8, 0x6, 0x94, 0x2, 0x0, 0xd}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b9, 0x220, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5014, 0x0, @perf_config_ext={0x7, 0xfffffffffffffff8}, 0x100, 0xc9, 0x0, 0x5, 0x0, 0x7, 0x4080, 0x0, 0x9000}, 0x0, 0x7, r0, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff0000", @ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000240)={'veth1_virt_wifi\x00', 0x100}) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x6, 0x0, 0x4, 0x2000000, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 1.049084548s ago: executing program 0 (id=465): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000005c0)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x7, 0x5, 0x0, 0x0, 0x28000, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xb}, 0x0, 0xc8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x80) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102033a00fe08000e40000200875a65969ff57b00ff020000000000000000000000000301"], 0xfdef) 1.02595765s ago: executing program 2 (id=466): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18006b1000000000bbc672b60000001018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)}, {&(0x7f0000000140)="ec", 0x1}, {0x0}], 0x308}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r3 = perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x4, 0x3, 0xe, 0x2, 0x0, 0x80000000, 0x4000a, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_config_ext={0x3, 0x8000}, 0x10488, 0x4, 0x7f, 0x9, 0xfffffffffffffffc, 0x9, 0x46dd, 0x0, 0x5, 0x0, 0x9}, 0xffffffffffffffff, 0x80000000000b, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000040)='&%$*-\'7\x00') r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='workqueue_activate_work\x00', r4}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r5}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) 838.775625ms ago: executing program 0 (id=467): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2000000}, 0x50) 734.835973ms ago: executing program 0 (id=468): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x44, &(0x7f0000000000), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x1, 0x6, 0x3, 0x0, 0x0, 0x4, 0x119, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0xc8, 0x5, 0x0, 0x9, 0x0, 0xa86, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0x1002, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000100)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000700)=ANY=[@ANYBLOB='1-0:', @ANYRESDEC, @ANYBLOB='C'], 0x31) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r7}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000c40)="7102b87fd4a29eb711d3d8dd9d30af2321e6f6e273aa268bf88d9b6b401a48d9897f02e252e0882cc55d14a5949d95b3fa8e0fdefbdb9d5f2b2402455bb8ea9669c041e99a804b3a84e5be4329c6ac5ccfd26d65bf13d7dc9ce767be3e7d49acf525dca7123b6bc44d49b40ce43b8cb32004f23c12750711d0858c8d0d41dc8700148a722a3cbc6abb644537cc9988c84675409be1b18298b0ec383bda34bfbcca2d71d63e2f097fc59fe25c27c8dd1d893dd361b0fee1c66b8b31c07fb4b2a8ddfecf480d68ed284feb7ce103ef4b9f86e7731d0d21aed50dd887bd2217bc31b1ee7e1f8928c40d1b6fffdbf1eef39151466bd33eefce34a00f5932b41cd3e8eae6b2e2cfec5a968270f4a34e8ea5cc115189aff201dd0e4547d39e63aaf67f4e8ad5d3adf9ce876356cc36fcfd9aee0268f3e9f2eb07", 0x137}, {&(0x7f0000001c80)="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", 0x472}], 0x2}, 0x0) setsockopt$sock_attach_bpf(r10, 0x1, 0x21, &(0x7f0000000540), 0x4) sendmsg$inet(r11, &(0x7f0000001c40)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r10, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendmsg$unix(r3, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r12, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) 664.930668ms ago: executing program 2 (id=469): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000008b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='/proc///\x00\x82q\xee\x00!\xbd\xc2\x98#YP\xee\x9c2G\xf0\x81x\x97'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (fail_nth: 73) 466.721063ms ago: executing program 3 (id=470): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2a, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x3, 0xe, 0x0, &(0x7f0000000500)="0000001afa3cb651ce2f2f009ec3", 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r3}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) 466.157313ms ago: executing program 0 (id=471): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) (async) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="280100"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) (async) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r6}, 0x0, &(0x7f0000000040)}, 0x20) bpf$ITER_CREATE(0x21, &(0x7f0000000400), 0x8) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r7, &(0x7f0000000380), 0x2, 0x0) (async) openat$cgroup_freezer_state(r7, &(0x7f0000000380), 0x2, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='timer_start\x00', r9}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000200)='./file0\x00'}, 0x18) gettid() (async) gettid() sendmsg$unix(r5, &(0x7f00000028c0)={&(0x7f00000006c0)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4008814}, 0x20008800) (async) sendmsg$unix(r5, &(0x7f00000028c0)={&(0x7f00000006c0)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4008814}, 0x20008800) 294.411347ms ago: executing program 1 (id=472): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000fcffffff850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='netlink_extack\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8922, &(0x7f0000000080)) 159.097667ms ago: executing program 4 (id=473): r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x8001}, 0x11000, 0xc8, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffdc}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYRES32=r0], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000160000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) syz_clone(0x2020000, &(0x7f0000000240)="7e52945b277e9dc5e11ad55a7bd5b6c0aff994e3034b24b7eda7aa6017a3d3793f325f3f2a0609f253e57214dd50555c49bf439036ddc2c4713c733bf9cc5c1d99738e6129da055b81aa4656e126720efe9969ff2089de3c71a7e7cb05c39549ac004a13d7c723aae9c05f406fe4a584001c11e060021424d79e6fcd5aed7553507fd381ce19c7c45198a310fe5960bca6871406486673beeef3a05bfe437cd46e3402cfe74520fdbaa6a87ad5de3257ebbf14da32316d7b173ee0e6f825ff3a649231549c00a51cc4cdd53783802c97", 0xd0, &(0x7f0000000040), &(0x7f0000000340), &(0x7f0000000440)="61cbc57c23aaeb7624b66f8251ebb03ba1d90904f5148fde61f955014847b9cd344c795e2d67935dba49b1d0d6ba75c06bf787a0e6040ee022264dcc66b907746b91add86e2d1d16e18c7a9e1c48382707802cf99473ccfc38df") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000180)={0x0, 0x80, 0xa8, 0x3, 0x5, 0x10, 0x0, 0x9, 0x40000, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, @perf_bp={&(0x7f0000000000), 0x2}, 0xa, 0x8, 0x0, 0x0, 0x196b, 0x400, 0x5, 0x0, 0x5, 0x0, 0x9}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xd, &(0x7f0000000400)=ANY=[@ANYBLOB="07020143651579c000"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082000000850000000f0000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r7}, 0x10) syz_clone(0x0, &(0x7f0000001800), 0x0, 0x0, &(0x7f0000002840), 0x0) syz_clone(0x8a004480, 0x0, 0x0, 0x0, 0x0, &(0x7f00000029c0)) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r8, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r10}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_user\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0x41, &(0x7f0000000100)=r13, 0x4) write$cgroup_pid(r11, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 0s ago: executing program 2 (id=474): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000340)='percpu_free_percpu\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r0}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x30, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (fail_nth: 87) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.255' (ED25519) to the list of known hosts. [ 21.361224][ T30] audit: type=1400 audit(1739475160.762:66): avc: denied { integrity } for pid=280 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 21.385486][ T30] audit: type=1400 audit(1739475160.782:67): avc: denied { mounton } for pid=280 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.386995][ T280] cgroup: Unknown subsys name 'net' [ 21.408379][ T30] audit: type=1400 audit(1739475160.782:68): avc: denied { mount } for pid=280 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.435097][ T30] audit: type=1400 audit(1739475160.812:69): avc: denied { unmount } for pid=280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.435232][ T280] cgroup: Unknown subsys name 'devices' [ 21.579683][ T280] cgroup: Unknown subsys name 'hugetlb' [ 21.585094][ T280] cgroup: Unknown subsys name 'rlimit' Setting up swapspace version 1, size = 127995904 bytes [ 21.756064][ T30] audit: type=1400 audit(1739475161.152:70): avc: denied { setattr } for pid=280 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.775063][ T284] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.779078][ T30] audit: type=1400 audit(1739475161.152:71): avc: denied { mounton } for pid=280 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.798716][ T280] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.812734][ T30] audit: type=1400 audit(1739475161.152:72): avc: denied { mount } for pid=280 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.843380][ T30] audit: type=1400 audit(1739475161.192:73): avc: denied { relabelto } for pid=284 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.868541][ T30] audit: type=1400 audit(1739475161.192:74): avc: denied { write } for pid=284 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.894077][ T30] audit: type=1400 audit(1739475161.202:75): avc: denied { read } for pid=280 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.423309][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.430394][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.437864][ T290] device bridge_slave_0 entered promiscuous mode [ 22.452162][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.459088][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.466333][ T290] device bridge_slave_1 entered promiscuous mode [ 22.511624][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.518590][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.525759][ T292] device bridge_slave_0 entered promiscuous mode [ 22.533710][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.540577][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.547937][ T292] device bridge_slave_1 entered promiscuous mode [ 22.557829][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.564669][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.572132][ T291] device bridge_slave_0 entered promiscuous mode [ 22.580259][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.587102][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.594453][ T291] device bridge_slave_1 entered promiscuous mode [ 22.657647][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.664584][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.672083][ T294] device bridge_slave_0 entered promiscuous mode [ 22.690998][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.697896][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.705034][ T294] device bridge_slave_1 entered promiscuous mode [ 22.721946][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.728833][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.736359][ T293] device bridge_slave_0 entered promiscuous mode [ 22.755348][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.762292][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.769498][ T293] device bridge_slave_1 entered promiscuous mode [ 22.915991][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.922866][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.929983][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.936739][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.954917][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.961776][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.968880][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.975655][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.987633][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.994491][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.001614][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.008388][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.050635][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.057490][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.064647][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.071501][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.083087][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.089958][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.097059][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.103860][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.112704][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.120026][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.127114][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.134288][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.141339][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.148417][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.155391][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.162488][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.169697][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.176644][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.184309][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.191633][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.200975][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.221347][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.229409][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.236406][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.258862][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.266910][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.273776][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.281706][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.289940][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.296791][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.304128][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.312163][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.319029][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.326214][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.333610][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.369334][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.376871][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.385517][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.394008][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.402157][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.410383][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.417233][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.424658][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.433110][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.440002][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.447259][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.455449][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.463633][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.470496][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.477759][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.485714][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.492592][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.511637][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.519816][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.527667][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.535833][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.544312][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.551209][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.558566][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.566740][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.575070][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.581935][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.595163][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.603122][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.612936][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.621272][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.643242][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.651395][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.659448][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.667318][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.675442][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.683660][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.691608][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.699584][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.707507][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.715901][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.729305][ T291] device veth0_vlan entered promiscuous mode [ 23.736828][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.745118][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.753435][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.761752][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.769863][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.777209][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.792975][ T293] device veth0_vlan entered promiscuous mode [ 23.805793][ T292] device veth0_vlan entered promiscuous mode [ 23.812652][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.820777][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.828371][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.835656][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.844089][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.852418][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.860664][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.868922][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.877022][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.885427][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.893393][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.901457][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.908893][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.916727][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.924639][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.934634][ T291] device veth1_macvtap entered promiscuous mode [ 23.947650][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.955002][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.962522][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.970789][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.979413][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.993733][ T294] device veth0_vlan entered promiscuous mode [ 24.001114][ T290] device veth0_vlan entered promiscuous mode [ 24.008371][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.016605][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.024451][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.032609][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.040161][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.047760][ T293] device veth1_macvtap entered promiscuous mode [ 24.061307][ T292] device veth1_macvtap entered promiscuous mode [ 24.071695][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.079998][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.088527][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.096554][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.105057][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.113255][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.121672][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.136383][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.144859][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.153980][ T291] request_module fs-gadgetfs succeeded, but still no fs? [ 24.166076][ T290] device veth1_macvtap entered promiscuous mode [ 24.175774][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.183968][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.192549][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.200430][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.208666][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.221011][ T294] device veth1_macvtap entered promiscuous mode [ 24.238461][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.251526][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.260635][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.268886][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.276905][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.285377][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.293826][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.302359][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.311220][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.319554][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.339580][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.353285][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.384465][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.393283][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.500413][ T335] FAULT_INJECTION: forcing a failure. [ 24.500413][ T335] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 24.515269][ T335] CPU: 0 PID: 335 Comm: syz.0.1 Not tainted 5.15.178-syzkaller-00193-g058abb720bd1 #0 [ 24.524649][ T335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 24.534552][ T335] Call Trace: [ 24.537665][ T335] [ 24.540444][ T335] dump_stack_lvl+0x151/0x1c0 [ 24.544954][ T335] ? io_uring_drop_tctx_refs+0x190/0x190 [ 24.550427][ T335] dump_stack+0x15/0x20 [ 24.554412][ T335] should_fail+0x3c6/0x510 [ 24.558664][ T335] should_fail_alloc_page+0x5a/0x80 [ 24.563697][ T335] prepare_alloc_pages+0x15c/0x700 [ 24.568652][ T335] ? __alloc_pages_bulk+0xd80/0xd80 [ 24.573699][ T335] __alloc_pages+0x18c/0x8f0 [ 24.578111][ T335] ? prep_new_page+0x110/0x110 [ 24.582712][ T335] shmem_alloc_and_acct_page+0x4bd/0xa80 [ 24.588181][ T335] ? shmem_swapin_page+0x1680/0x1680 [ 24.593316][ T335] ? xas_start+0x2bd/0x3f0 [ 24.597549][ T335] ? xas_load+0x2a9/0x2d0 [ 24.601809][ T335] ? pagecache_get_page+0xdc2/0xeb0 [ 24.606843][ T335] ? page_cache_prev_miss+0x410/0x410 [ 24.612156][ T335] shmem_getpage_gfp+0x1388/0x23c0 [ 24.618305][ T335] ? shmem_getpage+0xa0/0xa0 [ 24.623059][ T335] ? fault_in_safe_writeable+0x240/0x240 [ 24.628729][ T335] shmem_write_begin+0xca/0x1b0 [ 24.633486][ T335] generic_perform_write+0x2de/0x750 [ 24.638736][ T335] ? grab_cache_page_write_begin+0xa0/0xa0 [ 24.644371][ T335] ? file_remove_privs+0x610/0x610 [ 24.649400][ T335] ? rwsem_write_trylock+0x153/0x340 [ 24.654613][ T335] ? rwsem_mark_wake+0x770/0x770 [ 24.659393][ T335] __generic_file_write_iter+0x25b/0x4b0 [ 24.664854][ T335] generic_file_write_iter+0xaf/0x1c0 [ 24.670063][ T335] vfs_write+0xd5d/0x1110 [ 24.674238][ T335] ? file_end_write+0x1c0/0x1c0 [ 24.679060][ T335] ? mutex_lock+0xb6/0x1e0 [ 24.683672][ T335] ? wait_for_completion_killable_timeout+0x10/0x10 [ 24.690189][ T335] ? __fdget_pos+0x2e7/0x3a0 [ 24.694604][ T335] ? ksys_write+0x77/0x2c0 [ 24.698860][ T335] ksys_write+0x199/0x2c0 [ 24.703024][ T335] ? __ia32_sys_read+0x90/0x90 [ 24.707752][ T335] ? debug_smp_processor_id+0x17/0x20 [ 24.712917][ T335] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 24.718819][ T335] __x64_sys_write+0x7b/0x90 [ 24.723241][ T335] x64_sys_call+0x2f/0x9a0 [ 24.727489][ T335] do_syscall_64+0x3b/0xb0 [ 24.731747][ T335] ? clear_bhb_loop+0x35/0x90 [ 24.736261][ T335] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 24.742002][ T335] RIP: 0033:0x7f4b6a15bde9 [ 24.746247][ T335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 24.765686][ T335] RSP: 002b:00007f4b687a5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 24.773936][ T335] RAX: ffffffffffffffda RBX: 00007f4b6a375080 RCX: 00007f4b6a15bde9 [ 24.781745][ T335] RDX: 0000000013bb711e RSI: 0000400000000180 RDI: 0000000000000005 [ 24.789637][ T335] RBP: 00007f4b687a5090 R08: 0000000000000000 R09: 0000000000000000 [ 24.797448][ T335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 24.805257][ T335] R13: 0000000000000000 R14: 00007f4b6a375080 R15: 00007ffca93982c8 [ 24.813111][ T335] [ 25.020468][ C0] hrtimer: interrupt took 25952 ns [ 25.401523][ T383] device veth1_macvtap left promiscuous mode [ 25.433207][ T383] device macsec0 entered promiscuous mode [ 25.971124][ T373] syz.1.18 (373) used greatest stack depth: 20824 bytes left [ 26.180277][ T408] device wg2 entered promiscuous mode [ 26.274524][ T418] device syzkaller0 entered promiscuous mode [ 26.894320][ T441] FAULT_INJECTION: forcing a failure. [ 26.894320][ T441] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 26.940508][ T441] CPU: 0 PID: 441 Comm: syz.3.46 Not tainted 5.15.178-syzkaller-00193-g058abb720bd1 #0 [ 26.949981][ T441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 26.959870][ T441] Call Trace: [ 26.962998][ T441] [ 26.965776][ T441] dump_stack_lvl+0x151/0x1c0 [ 26.970289][ T441] ? io_uring_drop_tctx_refs+0x190/0x190 [ 26.975753][ T441] ? migrate_enable+0x1c1/0x2a0 [ 26.980444][ T441] ? migrate_disable+0x190/0x190 [ 26.985214][ T441] dump_stack+0x15/0x20 [ 26.989206][ T441] should_fail+0x3c6/0x510 [ 26.993474][ T441] should_fail_usercopy+0x1a/0x20 [ 26.998321][ T441] _copy_to_user+0x20/0x90 [ 27.002579][ T441] generic_map_lookup_batch+0x781/0xc70 [ 27.007958][ T441] ? bpf_map_update_value+0x3c0/0x3c0 [ 27.013162][ T441] ? bpf_map_do_batch+0x99/0x620 [ 27.017933][ T441] ? bpf_map_update_value+0x3c0/0x3c0 [ 27.023142][ T441] bpf_map_do_batch+0x2dc/0x620 [ 27.027833][ T441] __sys_bpf+0x5dc/0x760 [ 27.031907][ T441] ? bpf_link_show_fdinfo+0x300/0x300 [ 27.037118][ T441] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 27.043109][ T441] __x64_sys_bpf+0x7c/0x90 [ 27.047358][ T441] x64_sys_call+0x87f/0x9a0 [ 27.051698][ T441] do_syscall_64+0x3b/0xb0 [ 27.055969][ T441] ? clear_bhb_loop+0x35/0x90 [ 27.060464][ T441] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 27.066189][ T441] RIP: 0033:0x7fa4b4508de9 [ 27.070447][ T441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 27.089884][ T441] RSP: 002b:00007fa4b2b73038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 27.098130][ T441] RAX: ffffffffffffffda RBX: 00007fa4b4721fa0 RCX: 00007fa4b4508de9 [ 27.105950][ T441] RDX: 0000000000000038 RSI: 00004000000003c0 RDI: 0000000000000018 [ 27.113753][ T441] RBP: 00007fa4b2b73090 R08: 0000000000000000 R09: 0000000000000000 [ 27.121565][ T441] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 27.129374][ T441] R13: 0000000000000000 R14: 00007fa4b4721fa0 R15: 00007ffe56a61818 [ 27.137189][ T441] [ 27.280647][ T30] kauditd_printk_skb: 39 callbacks suppressed [ 27.280663][ T30] audit: type=1400 audit(1739475166.682:115): avc: denied { cpu } for pid=451 comm="syz.2.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 27.341801][ T30] audit: type=1400 audit(1739475166.702:116): avc: denied { write } for pid=451 comm="syz.2.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 27.572070][ T463] device syzkaller0 entered promiscuous mode [ 27.627743][ T30] audit: type=1400 audit(1739475167.022:117): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 28.645093][ T516] FAULT_INJECTION: forcing a failure. [ 28.645093][ T516] name failslab, interval 1, probability 0, space 0, times 1 [ 28.705730][ T516] CPU: 1 PID: 516 Comm: syz.2.71 Not tainted 5.15.178-syzkaller-00193-g058abb720bd1 #0 [ 28.715296][ T516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 28.725188][ T516] Call Trace: [ 28.728308][ T516] [ 28.731175][ T516] dump_stack_lvl+0x151/0x1c0 [ 28.735683][ T516] ? io_uring_drop_tctx_refs+0x190/0x190 [ 28.741156][ T516] dump_stack+0x15/0x20 [ 28.745145][ T516] should_fail+0x3c6/0x510 [ 28.749425][ T516] __should_failslab+0xa4/0xe0 [ 28.754021][ T516] ? copy_sighand+0x54/0x250 [ 28.758426][ T516] should_failslab+0x9/0x20 [ 28.762767][ T516] slab_pre_alloc_hook+0x37/0xd0 [ 28.767560][ T516] ? copy_sighand+0x54/0x250 [ 28.771963][ T516] kmem_cache_alloc+0x44/0x250 [ 28.776563][ T516] copy_sighand+0x54/0x250 [ 28.780817][ T516] copy_process+0x10d6/0x3290 [ 28.785328][ T516] ? __kasan_check_write+0x14/0x20 [ 28.790281][ T516] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 28.795222][ T516] ? vfs_write+0x94d/0x1110 [ 28.799567][ T516] kernel_clone+0x21e/0x9e0 [ 28.803901][ T516] ? __kasan_check_write+0x14/0x20 [ 28.809021][ T516] ? create_io_thread+0x1e0/0x1e0 [ 28.813886][ T516] __x64_sys_clone+0x23f/0x290 [ 28.818482][ T516] ? __do_sys_vfork+0x130/0x130 [ 28.823172][ T516] ? debug_smp_processor_id+0x17/0x20 [ 28.828387][ T516] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 28.834290][ T516] ? exit_to_user_mode_prepare+0x39/0xa0 [ 28.839751][ T516] x64_sys_call+0x1b0/0x9a0 [ 28.844088][ T516] do_syscall_64+0x3b/0xb0 [ 28.848341][ T516] ? clear_bhb_loop+0x35/0x90 [ 28.852853][ T516] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 28.858577][ T516] RIP: 0033:0x7fb207d8bde9 [ 28.862833][ T516] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 28.882280][ T516] RSP: 002b:00007fb2063f5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 28.890520][ T516] RAX: ffffffffffffffda RBX: 00007fb207fa4fa0 RCX: 00007fb207d8bde9 [ 28.898327][ T516] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 28.906140][ T516] RBP: 00007fb2063f6090 R08: 0000000000000000 R09: 0000000000000000 [ 28.913951][ T516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 28.921764][ T516] R13: 0000000000000000 R14: 00007fb207fa4fa0 R15: 00007ffd04818a98 [ 28.929582][ T516] [ 30.240882][ T30] audit: type=1400 audit(1739475169.642:118): avc: denied { read } for pid=550 comm="syz.0.83" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.245497][ T549] device syzkaller0 entered promiscuous mode [ 30.395658][ T30] audit: type=1400 audit(1739475169.792:119): avc: denied { create } for pid=550 comm="syz.0.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 30.851522][ T30] audit: type=1400 audit(1739475170.252:120): avc: denied { create } for pid=571 comm="syz.2.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 31.182449][ T590] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 32.048601][ T30] audit: type=1400 audit(1739475171.442:121): avc: denied { relabelfrom } for pid=615 comm="syz.4.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 32.148995][ T30] audit: type=1400 audit(1739475171.442:122): avc: denied { relabelto } for pid=615 comm="syz.4.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 32.643974][ T30] audit: type=1400 audit(1739475172.042:123): avc: denied { read } for pid=653 comm="syz.1.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 32.783725][ T662] device bridge0 entered promiscuous mode [ 33.195329][ T686] device pim6reg1 entered promiscuous mode [ 33.307253][ T684] bond_slave_1: mtu less than device minimum [ 34.869860][ T728] device syzkaller0 entered promiscuous mode [ 35.142590][ T745] syz.2.151 uses obsolete (PF_INET,SOCK_PACKET) [ 35.155708][ T30] audit: type=1400 audit(1739475174.552:124): avc: denied { create } for pid=743 comm="syz.2.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 35.860808][ T777] device syzkaller0 entered promiscuous mode [ 36.028990][ T785] tap0: tun_chr_ioctl cmd 2147767520 [ 36.447457][ T30] audit: type=1400 audit(1739475175.842:125): avc: denied { ioctl } for pid=793 comm="syz.3.169" path="socket:[17446]" dev="sockfs" ino=17446 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 36.604156][ T30] audit: type=1400 audit(1739475175.962:126): avc: denied { create } for pid=801 comm="syz.4.171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 37.170076][ T818] device syzkaller0 entered promiscuous mode [ 38.343677][ T30] audit: type=1400 audit(1739475177.742:127): avc: denied { create } for pid=876 comm="syz.2.199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 39.038185][ T902] FAULT_INJECTION: forcing a failure. [ 39.038185][ T902] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 39.099672][ T902] CPU: 0 PID: 902 Comm: syz.3.208 Not tainted 5.15.178-syzkaller-00193-g058abb720bd1 #0 [ 39.109234][ T902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 39.119147][ T902] Call Trace: [ 39.122376][ T902] [ 39.125122][ T902] dump_stack_lvl+0x151/0x1c0 [ 39.129635][ T902] ? io_uring_drop_tctx_refs+0x190/0x190 [ 39.135967][ T902] ? __stack_depot_save+0x40d/0x470 [ 39.141024][ T902] dump_stack+0x15/0x20 [ 39.145386][ T902] should_fail+0x3c6/0x510 [ 39.149695][ T902] should_fail_alloc_page+0x5a/0x80 [ 39.154844][ T902] prepare_alloc_pages+0x15c/0x700 [ 39.159870][ T902] ? __alloc_pages+0x8f0/0x8f0 [ 39.164488][ T902] ? __alloc_pages_bulk+0xd80/0xd80 [ 39.169729][ T902] __alloc_pages+0x18c/0x8f0 [ 39.174155][ T902] ? prep_new_page+0x110/0x110 [ 39.178747][ T902] ? __kasan_kmalloc+0x9/0x10 [ 39.183258][ T902] ? __vmalloc_node_range+0x2d6/0x8d0 [ 39.188467][ T902] __vmalloc_node_range+0x482/0x8d0 [ 39.193509][ T902] bpf_map_area_alloc+0xd9/0xf0 [ 39.198187][ T902] ? stack_map_alloc+0x324/0x580 [ 39.202957][ T902] stack_map_alloc+0x324/0x580 [ 39.207645][ T902] map_create+0x411/0x2050 [ 39.211901][ T902] __sys_bpf+0x296/0x760 [ 39.216410][ T902] ? fput_many+0x160/0x1b0 [ 39.220661][ T902] ? bpf_link_show_fdinfo+0x300/0x300 [ 39.225901][ T902] ? debug_smp_processor_id+0x17/0x20 [ 39.231075][ T902] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 39.236981][ T902] __x64_sys_bpf+0x7c/0x90 [ 39.241236][ T902] x64_sys_call+0x87f/0x9a0 [ 39.245575][ T902] do_syscall_64+0x3b/0xb0 [ 39.249915][ T902] ? clear_bhb_loop+0x35/0x90 [ 39.254425][ T902] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 39.260152][ T902] RIP: 0033:0x7fa4b4508de9 [ 39.264407][ T902] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 39.283976][ T902] RSP: 002b:00007fa4b2b73038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 39.292342][ T902] RAX: ffffffffffffffda RBX: 00007fa4b4721fa0 RCX: 00007fa4b4508de9 [ 39.300152][ T902] RDX: 0000000000000050 RSI: 0000400000000040 RDI: 0000000000000000 [ 39.308046][ T902] RBP: 00007fa4b2b73090 R08: 0000000000000000 R09: 0000000000000000 [ 39.315854][ T902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 39.323665][ T902] R13: 0000000000000000 R14: 00007fa4b4721fa0 R15: 00007ffe56a61818 [ 39.331483][ T902] [ 39.359028][ T30] audit: type=1400 audit(1739475178.762:128): avc: denied { create } for pid=900 comm="syz.4.206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 39.633525][ T927] device syzkaller0 entered promiscuous mode [ 39.648121][ T934] device syzkaller0 entered promiscuous mode [ 40.580927][ T984] FAULT_INJECTION: forcing a failure. [ 40.580927][ T984] name failslab, interval 1, probability 0, space 0, times 0 [ 40.593358][ T984] CPU: 1 PID: 984 Comm: syz.0.238 Not tainted 5.15.178-syzkaller-00193-g058abb720bd1 #0 [ 40.602891][ T984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 40.612784][ T984] Call Trace: [ 40.615908][ T984] [ 40.618686][ T984] dump_stack_lvl+0x151/0x1c0 [ 40.623199][ T984] ? io_uring_drop_tctx_refs+0x190/0x190 [ 40.628674][ T984] ? __alloc_pages+0x3cb/0x8f0 [ 40.633273][ T984] dump_stack+0x15/0x20 [ 40.637257][ T984] should_fail+0x3c6/0x510 [ 40.641513][ T984] __should_failslab+0xa4/0xe0 [ 40.646164][ T984] ? xas_create+0x5ce/0x15d0 [ 40.650535][ T984] should_failslab+0x9/0x20 [ 40.654873][ T984] slab_pre_alloc_hook+0x37/0xd0 [ 40.659647][ T984] ? xas_create+0x5ce/0x15d0 [ 40.664074][ T984] kmem_cache_alloc+0x44/0x250 [ 40.668676][ T984] xas_create+0x5ce/0x15d0 [ 40.672933][ T984] xas_create_range+0x1fc/0x720 [ 40.677614][ T984] ? xas_start+0x2bd/0x3f0 [ 40.681872][ T984] shmem_add_to_page_cache+0x7fc/0xe90 [ 40.687174][ T984] ? put_page+0xc0/0xc0 [ 40.691157][ T984] shmem_getpage_gfp+0x1559/0x23c0 [ 40.696110][ T984] ? shmem_getpage+0xa0/0xa0 [ 40.700529][ T984] ? fault_in_safe_writeable+0x240/0x240 [ 40.705998][ T984] shmem_write_begin+0xca/0x1b0 [ 40.710682][ T984] generic_perform_write+0x2de/0x750 [ 40.715808][ T984] ? grab_cache_page_write_begin+0xa0/0xa0 [ 40.721456][ T984] ? file_remove_privs+0x610/0x610 [ 40.726396][ T984] ? rwsem_write_trylock+0x153/0x340 [ 40.731518][ T984] ? rwsem_mark_wake+0x770/0x770 [ 40.736286][ T984] __generic_file_write_iter+0x25b/0x4b0 [ 40.741844][ T984] generic_file_write_iter+0xaf/0x1c0 [ 40.747050][ T984] vfs_write+0xd5d/0x1110 [ 40.751221][ T984] ? file_end_write+0x1c0/0x1c0 [ 40.755902][ T984] ? mutex_lock+0xb6/0x1e0 [ 40.760155][ T984] ? wait_for_completion_killable_timeout+0x10/0x10 [ 40.766578][ T984] ? __fdget_pos+0x2e7/0x3a0 [ 40.770999][ T984] ? ksys_write+0x77/0x2c0 [ 40.775257][ T984] ksys_write+0x199/0x2c0 [ 40.779425][ T984] ? __ia32_sys_read+0x90/0x90 [ 40.784020][ T984] ? debug_smp_processor_id+0x17/0x20 [ 40.789230][ T984] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 40.795132][ T984] __x64_sys_write+0x7b/0x90 [ 40.799555][ T984] x64_sys_call+0x2f/0x9a0 [ 40.803808][ T984] do_syscall_64+0x3b/0xb0 [ 40.808064][ T984] ? clear_bhb_loop+0x35/0x90 [ 40.812572][ T984] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 40.818305][ T984] RIP: 0033:0x7f4b6a15bde9 [ 40.822557][ T984] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.841998][ T984] RSP: 002b:00007f4b687c6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 40.850246][ T984] RAX: ffffffffffffffda RBX: 00007f4b6a374fa0 RCX: 00007f4b6a15bde9 [ 40.858053][ T984] RDX: 0000000013bb711e RSI: 0000400000000180 RDI: 0000000000000007 [ 40.865875][ T984] RBP: 00007f4b687c6090 R08: 0000000000000000 R09: 0000000000000000 [ 40.873676][ T984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 40.882450][ T984] R13: 0000000000000000 R14: 00007f4b6a374fa0 R15: 00007ffca93982c8 [ 40.890261][ T984] [ 40.931266][ T978] device syzkaller0 entered promiscuous mode [ 41.911109][ T1021] device syzkaller0 entered promiscuous mode [ 42.173776][ T1034] FAULT_INJECTION: forcing a failure. [ 42.173776][ T1034] name failslab, interval 1, probability 0, space 0, times 0 [ 42.228260][ T1034] CPU: 0 PID: 1034 Comm: syz.4.257 Not tainted 5.15.178-syzkaller-00193-g058abb720bd1 #0 [ 42.238000][ T1034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 42.247982][ T1034] Call Trace: [ 42.251104][ T1034] [ 42.253881][ T1034] dump_stack_lvl+0x151/0x1c0 [ 42.258487][ T1034] ? io_uring_drop_tctx_refs+0x190/0x190 [ 42.263963][ T1034] dump_stack+0x15/0x20 [ 42.267953][ T1034] should_fail+0x3c6/0x510 [ 42.272194][ T1034] __should_failslab+0xa4/0xe0 [ 42.276803][ T1034] should_failslab+0x9/0x20 [ 42.281135][ T1034] slab_pre_alloc_hook+0x37/0xd0 [ 42.285907][ T1034] ? __request_module+0x2ad/0x8e0 [ 42.291702][ T1034] __kmalloc_track_caller+0x6c/0x2c0 [ 42.296822][ T1034] ? __request_module+0x2ad/0x8e0 [ 42.301678][ T1034] ? __kasan_kmalloc+0x9/0x10 [ 42.306191][ T1034] kstrdup+0x34/0x70 [ 42.309919][ T1034] __request_module+0x2ad/0x8e0 [ 42.314605][ T1034] ? capable+0x78/0xe0 [ 42.318509][ T1034] ? _trace_android_vh_delayacct_thrashing_end+0x120/0x120 [ 42.325639][ T1034] ? has_cap_mac_admin+0x3c0/0x3c0 [ 42.330687][ T1034] ? security_capable+0x87/0xb0 [ 42.335368][ T1034] dev_load+0x5b/0xb0 [ 42.339183][ T1034] dev_ioctl+0x5dc/0xe70 [ 42.343263][ T1034] sock_ioctl+0x665/0x740 [ 42.347430][ T1034] ? sock_poll+0x400/0x400 [ 42.351684][ T1034] ? security_file_ioctl+0x84/0xb0 [ 42.356627][ T1034] ? sock_poll+0x400/0x400 [ 42.360882][ T1034] __se_sys_ioctl+0x114/0x190 [ 42.365399][ T1034] __x64_sys_ioctl+0x7b/0x90 [ 42.369822][ T1034] x64_sys_call+0x98/0x9a0 [ 42.374072][ T1034] do_syscall_64+0x3b/0xb0 [ 42.378411][ T1034] ? clear_bhb_loop+0x35/0x90 [ 42.382929][ T1034] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 42.388653][ T1034] RIP: 0033:0x7fb8d95c9de9 [ 42.392911][ T1034] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 42.412362][ T1034] RSP: 002b:00007fb8d7c34038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 42.420594][ T1034] RAX: ffffffffffffffda RBX: 00007fb8d97e2fa0 RCX: 00007fb8d95c9de9 [ 42.428411][ T1034] RDX: 0000400000000080 RSI: 00000000000089f3 RDI: 0000000000000007 [ 42.436310][ T1034] RBP: 00007fb8d7c34090 R08: 0000000000000000 R09: 0000000000000000 [ 42.444112][ T1034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 42.451924][ T1034] R13: 0000000000000000 R14: 00007fb8d97e2fa0 R15: 00007ffdb3c93838 [ 42.459843][ T1034] [ 42.477715][ T30] audit: type=1400 audit(1739475181.872:129): avc: denied { sys_module } for pid=1033 comm="syz.4.257" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 42.954534][ T1062] FAULT_INJECTION: forcing a failure. [ 42.954534][ T1062] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 42.982756][ T1062] CPU: 1 PID: 1062 Comm: syz.2.266 Not tainted 5.15.178-syzkaller-00193-g058abb720bd1 #0 [ 42.992397][ T1062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 43.002291][ T1062] Call Trace: [ 43.005417][ T1062] [ 43.008196][ T1062] dump_stack_lvl+0x151/0x1c0 [ 43.012711][ T1062] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 43.018347][ T1062] ? io_uring_drop_tctx_refs+0x190/0x190 [ 43.023819][ T1062] ? __wake_up_klogd+0xd5/0x110 [ 43.028502][ T1062] dump_stack+0x15/0x20 [ 43.032496][ T1062] should_fail+0x3c6/0x510 [ 43.036751][ T1062] should_fail_alloc_page+0x5a/0x80 [ 43.041783][ T1062] prepare_alloc_pages+0x15c/0x700 [ 43.046735][ T1062] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 43.052718][ T1062] ? __alloc_pages_bulk+0xd80/0xd80 [ 43.057750][ T1062] ? pvclock_clocksource_read+0xa5/0x6e0 [ 43.063218][ T1062] __alloc_pages+0x18c/0x8f0 [ 43.067649][ T1062] ? prep_new_page+0x110/0x110 [ 43.072250][ T1062] handle_pte_fault+0xe7e/0x25c0 [ 43.077023][ T1062] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 43.082658][ T1062] ? fault_around_bytes_set+0xc0/0xc0 [ 43.087899][ T1062] do_handle_mm_fault+0x20bc/0x2400 [ 43.092907][ T1062] ? numa_migrate_prep+0xe0/0xe0 [ 43.097680][ T1062] ? __alloc_pages+0x8f0/0x8f0 [ 43.102275][ T1062] ? irqentry_exit+0x30/0x40 [ 43.106709][ T1062] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 43.112339][ T1062] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 43.118331][ T1062] ? __find_vma+0xc7/0x150 [ 43.122586][ T1062] ? vmacache_update+0xb7/0x120 [ 43.127271][ T1062] ? __find_vma+0x136/0x150 [ 43.131613][ T1062] exc_page_fault+0x3b5/0x7f0 [ 43.136135][ T1062] asm_exc_page_fault+0x27/0x30 [ 43.140812][ T1062] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 43.147232][ T1062] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 83 f8 [ 43.166678][ T1062] RSP: 0018:ffffc90000c27bc0 EFLAGS: 00050206 [ 43.172574][ T1062] RAX: ffffffff82662f01 RBX: 0000000000010000 RCX: 000000000000e100 [ 43.180394][ T1062] RDX: 0000000000010000 RSI: ffff888112281f04 RDI: 0000400000002000 [ 43.188201][ T1062] RBP: ffffc90000c27bf0 R08: dffffc0000000000 R09: 0000000000000003 [ 43.196007][ T1062] R10: ffffed1022452000 R11: dffffc0000000001 R12: 00007ffffffff000 [ 43.203820][ T1062] R13: 0000400000010100 R14: ffff888112280004 R15: 0000400000000100 [ 43.211633][ T1062] ? _copy_from_user+0x41/0xd0 [ 43.216231][ T1062] ? _copy_to_user+0x78/0x90 [ 43.220658][ T1062] generic_map_lookup_batch+0x781/0xc70 [ 43.226182][ T1062] ? bpf_map_update_value+0x3c0/0x3c0 [ 43.231379][ T1062] ? __fdget+0x1bc/0x240 [ 43.235457][ T1062] ? bpf_map_update_value+0x3c0/0x3c0 [ 43.240785][ T1062] bpf_map_do_batch+0x2dc/0x620 [ 43.245469][ T1062] __sys_bpf+0x5dc/0x760 [ 43.249547][ T1062] ? fput_many+0x160/0x1b0 [ 43.253796][ T1062] ? bpf_link_show_fdinfo+0x300/0x300 [ 43.259021][ T1062] ? debug_smp_processor_id+0x17/0x20 [ 43.264214][ T1062] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 43.270113][ T1062] __x64_sys_bpf+0x7c/0x90 [ 43.274365][ T1062] x64_sys_call+0x87f/0x9a0 [ 43.278703][ T1062] do_syscall_64+0x3b/0xb0 [ 43.282961][ T1062] ? clear_bhb_loop+0x35/0x90 [ 43.287471][ T1062] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 43.293200][ T1062] RIP: 0033:0x7fb207d8bde9 [ 43.297454][ T1062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 43.316980][ T1062] RSP: 002b:00007fb2063f6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 43.325223][ T1062] RAX: ffffffffffffffda RBX: 00007fb207fa4fa0 RCX: 00007fb207d8bde9 [ 43.333039][ T1062] RDX: 0000000000000038 RSI: 00004000000003c0 RDI: 0000000000000018 [ 43.340855][ T1062] RBP: 00007fb2063f6090 R08: 0000000000000000 R09: 0000000000000000 [ 43.348656][ T1062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 43.356474][ T1062] R13: 0000000000000000 R14: 00007fb207fa4fa0 R15: 00007ffd04818a98 [ 43.364287][ T1062] [ 43.634583][ T1070] device syzkaller0 entered promiscuous mode [ 43.958251][ T30] audit: type=1400 audit(1739475183.362:130): avc: denied { create } for pid=1086 comm="syz.1.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 44.180985][ T1094] device syzkaller0 entered promiscuous mode [ 44.220685][ T1092] device syzkaller0 entered promiscuous mode [ 44.336660][ T1103] FAULT_INJECTION: forcing a failure. [ 44.336660][ T1103] name failslab, interval 1, probability 0, space 0, times 0 [ 44.349425][ T1103] CPU: 0 PID: 1103 Comm: syz.0.281 Not tainted 5.15.178-syzkaller-00193-g058abb720bd1 #0 [ 44.359061][ T1103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 44.368959][ T1103] Call Trace: [ 44.372081][ T1103] [ 44.375118][ T1103] dump_stack_lvl+0x151/0x1c0 [ 44.379800][ T1103] ? io_uring_drop_tctx_refs+0x190/0x190 [ 44.385223][ T1103] dump_stack+0x15/0x20 [ 44.389212][ T1103] should_fail+0x3c6/0x510 [ 44.393468][ T1103] __should_failslab+0xa4/0xe0 [ 44.398065][ T1103] ? copy_sighand+0x54/0x250 [ 44.402491][ T1103] should_failslab+0x9/0x20 [ 44.406833][ T1103] slab_pre_alloc_hook+0x37/0xd0 [ 44.411604][ T1103] ? copy_sighand+0x54/0x250 [ 44.416031][ T1103] kmem_cache_alloc+0x44/0x250 [ 44.420634][ T1103] copy_sighand+0x54/0x250 [ 44.424897][ T1103] copy_process+0x10d6/0x3290 [ 44.429400][ T1103] ? __kasan_check_write+0x14/0x20 [ 44.434347][ T1103] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 44.439309][ T1103] ? vfs_write+0x94d/0x1110 [ 44.444069][ T1103] kernel_clone+0x21e/0x9e0 [ 44.448496][ T1103] ? __kasan_check_write+0x14/0x20 [ 44.453448][ T1103] ? create_io_thread+0x1e0/0x1e0 [ 44.458475][ T1103] __x64_sys_clone+0x23f/0x290 [ 44.463334][ T1103] ? __do_sys_vfork+0x130/0x130 [ 44.468024][ T1103] ? debug_smp_processor_id+0x17/0x20 [ 44.473402][ T1103] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 44.479682][ T1103] ? exit_to_user_mode_prepare+0x39/0xa0 [ 44.485823][ T1103] x64_sys_call+0x1b0/0x9a0 [ 44.490163][ T1103] do_syscall_64+0x3b/0xb0 [ 44.494416][ T1103] ? clear_bhb_loop+0x35/0x90 [ 44.498929][ T1103] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 44.504659][ T1103] RIP: 0033:0x7f4b6a15bde9 [ 44.508920][ T1103] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 44.529133][ T1103] RSP: 002b:00007f4b687c5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 44.537374][ T1103] RAX: ffffffffffffffda RBX: 00007f4b6a374fa0 RCX: 00007f4b6a15bde9 [ 44.545187][ T1103] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 44.552999][ T1103] RBP: 00007f4b687c6090 R08: 0000000000000000 R09: 0000000000000000 [ 44.560807][ T1103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 44.568621][ T1103] R13: 0000000000000000 R14: 00007f4b6a374fa0 R15: 00007ffca93982c8 [ 44.576439][ T1103] [ 44.585704][ T30] audit: type=1400 audit(1739475183.982:131): avc: denied { ioctl } for pid=1097 comm="syz.1.278" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 44.785271][ T1121] device syzkaller0 entered promiscuous mode [ 44.828689][ T1118] device syzkaller0 entered promiscuous mode [ 45.390327][ T1142] device syzkaller0 entered promiscuous mode [ 45.603162][ T30] audit: type=1400 audit(1739475185.002:132): avc: denied { write } for pid=1155 comm="syz.2.298" name="cgroup.subtree_control" dev="cgroup2" ino=191 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 45.668431][ T1161] device syzkaller0 entered promiscuous mode [ 45.695221][ T30] audit: type=1400 audit(1739475185.032:133): avc: denied { open } for pid=1155 comm="syz.2.298" path="" dev="cgroup2" ino=191 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 46.155914][ T1175] device syzkaller0 entered promiscuous mode [ 46.534138][ T1185] device syzkaller0 entered promiscuous mode [ 46.856130][ T1206] syz.0.312[1206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.861567][ T1206] syz.0.312[1206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.912055][ T1204] device syzkaller0 entered promiscuous mode [ 46.936004][ T1206] FAULT_INJECTION: forcing a failure. [ 46.936004][ T1206] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 46.951758][ T1206] CPU: 1 PID: 1206 Comm: syz.0.312 Not tainted 5.15.178-syzkaller-00193-g058abb720bd1 #0 [ 46.961395][ T1206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 46.971292][ T1206] Call Trace: [ 46.974417][ T1206] [ 46.977193][ T1206] dump_stack_lvl+0x151/0x1c0 [ 46.981705][ T1206] ? io_uring_drop_tctx_refs+0x190/0x190 [ 46.987173][ T1206] ? 0xffffffffa002851c [ 46.991168][ T1206] ? is_bpf_text_address+0x172/0x190 [ 46.996290][ T1206] dump_stack+0x15/0x20 [ 47.000276][ T1206] should_fail+0x3c6/0x510 [ 47.004536][ T1206] should_fail_alloc_page+0x5a/0x80 [ 47.009567][ T1206] prepare_alloc_pages+0x15c/0x700 [ 47.014525][ T1206] ? __alloc_pages+0x8f0/0x8f0 [ 47.019109][ T1206] ? __alloc_pages_bulk+0xd80/0xd80 [ 47.024140][ T1206] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 47.029612][ T1206] __alloc_pages+0x18c/0x8f0 [ 47.034037][ T1206] ? prep_new_page+0x110/0x110 [ 47.038637][ T1206] ? pcpu_chunk_relocate+0x20a/0x430 [ 47.043759][ T1206] pcpu_populate_chunk+0x18c/0xe30 [ 47.048717][ T1206] pcpu_alloc+0x984/0x13e0 [ 47.052962][ T1206] __alloc_percpu_gfp+0x27/0x30 [ 47.057644][ T1206] bpf_map_alloc_percpu+0xe6/0x160 [ 47.062593][ T1206] array_map_alloc+0x3a5/0x6d0 [ 47.067192][ T1206] map_create+0x411/0x2050 [ 47.071450][ T1206] __sys_bpf+0x296/0x760 [ 47.075521][ T1206] ? fput_many+0x160/0x1b0 [ 47.079776][ T1206] ? bpf_link_show_fdinfo+0x300/0x300 [ 47.084988][ T1206] ? debug_smp_processor_id+0x17/0x20 [ 47.090283][ T1206] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 47.096178][ T1206] __x64_sys_bpf+0x7c/0x90 [ 47.100430][ T1206] x64_sys_call+0x87f/0x9a0 [ 47.104770][ T1206] do_syscall_64+0x3b/0xb0 [ 47.109024][ T1206] ? clear_bhb_loop+0x35/0x90 [ 47.113535][ T1206] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 47.119263][ T1206] RIP: 0033:0x7f4b6a15bde9 [ 47.123516][ T1206] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 47.142956][ T1206] RSP: 002b:00007f4b687c6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 47.151200][ T1206] RAX: ffffffffffffffda RBX: 00007f4b6a374fa0 RCX: 00007f4b6a15bde9 [ 47.159015][ T1206] RDX: 0000000000000048 RSI: 0000400000000b00 RDI: 2000000000000000 [ 47.166826][ T1206] RBP: 00007f4b687c6090 R08: 0000000000000000 R09: 0000000000000000 [ 47.174634][ T1206] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 47.182447][ T1206] R13: 0000000000000000 R14: 00007f4b6a374fa0 R15: 00007ffca93982c8 [ 47.190264][ T1206] [ 47.365785][ T1214] device syzkaller0 entered promiscuous mode [ 48.221725][ T1252] device syzkaller0 entered promiscuous mode [ 48.395492][ T30] audit: type=1400 audit(1739475187.792:134): avc: denied { read } for pid=1259 comm="syz.1.330" name="cgroup.subtree_control" dev="cgroup2" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 48.617619][ T1269] device wg2 entered promiscuous mode [ 48.677374][ T1265] device syzkaller0 entered promiscuous mode [ 50.970036][ T1332] device pim6reg1 entered promiscuous mode [ 50.999186][ T30] audit: type=1400 audit(1739475190.402:135): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 51.095719][ T30] audit: type=1400 audit(1739475190.402:136): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 51.204614][ T30] audit: type=1400 audit(1739475190.602:137): avc: denied { create } for pid=1343 comm="syz.0.360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 51.386838][ T1356] FAULT_INJECTION: forcing a failure. [ 51.386838][ T1356] name failslab, interval 1, probability 0, space 0, times 0 [ 51.495026][ T1356] CPU: 0 PID: 1356 Comm: syz.4.365 Not tainted 5.15.178-syzkaller-00193-g058abb720bd1 #0 [ 51.504670][ T1356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 51.514585][ T1356] Call Trace: [ 51.517687][ T1356] [ 51.520466][ T1356] dump_stack_lvl+0x151/0x1c0 [ 51.524978][ T1356] ? io_uring_drop_tctx_refs+0x190/0x190 [ 51.530450][ T1356] dump_stack+0x15/0x20 [ 51.534438][ T1356] should_fail+0x3c6/0x510 [ 51.538691][ T1356] __should_failslab+0xa4/0xe0 [ 51.543290][ T1356] ? anon_vma_fork+0x1df/0x4e0 [ 51.547892][ T1356] should_failslab+0x9/0x20 [ 51.552232][ T1356] slab_pre_alloc_hook+0x37/0xd0 [ 51.557090][ T1356] ? anon_vma_fork+0x1df/0x4e0 [ 51.561692][ T1356] kmem_cache_alloc+0x44/0x250 [ 51.566293][ T1356] anon_vma_fork+0x1df/0x4e0 [ 51.570721][ T1356] copy_mm+0xa3a/0x13e0 [ 51.574712][ T1356] ? copy_signal+0x610/0x610 [ 51.579137][ T1356] ? __init_rwsem+0xfe/0x1d0 [ 51.583563][ T1356] ? copy_signal+0x4e3/0x610 [ 51.587991][ T1356] copy_process+0x1149/0x3290 [ 51.592505][ T1356] ? __kasan_check_write+0x14/0x20 [ 51.597454][ T1356] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 51.602398][ T1356] ? migrate_enable+0x1c1/0x2a0 [ 51.607085][ T1356] kernel_clone+0x21e/0x9e0 [ 51.611426][ T1356] ? create_io_thread+0x1e0/0x1e0 [ 51.616281][ T1356] ? trace_call_bpf+0x3f8/0x470 [ 51.620974][ T1356] __x64_sys_clone+0x23f/0x290 [ 51.625568][ T1356] ? __do_sys_vfork+0x130/0x130 [ 51.630258][ T1356] ? perf_trace_sys_enter+0x129/0x140 [ 51.635463][ T1356] x64_sys_call+0x1b0/0x9a0 [ 51.639802][ T1356] do_syscall_64+0x3b/0xb0 [ 51.644052][ T1356] ? clear_bhb_loop+0x35/0x90 [ 51.648568][ T1356] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 51.654302][ T1356] RIP: 0033:0x7fb8d95c9de9 [ 51.658635][ T1356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 51.678076][ T1356] RSP: 002b:00007fb8d7c33fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 51.686407][ T1356] RAX: ffffffffffffffda RBX: 00007fb8d97e2fa0 RCX: 00007fb8d95c9de9 [ 51.694228][ T1356] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000004d100000 [ 51.702037][ T1356] RBP: 00007fb8d7c34090 R08: 0000000000000000 R09: 0000000000000000 [ 51.709843][ T1356] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 51.717651][ T1356] R13: 0000000000000000 R14: 00007fb8d97e2fa0 R15: 00007ffdb3c93838 [ 51.725472][ T1356] [ 51.810988][ T1356] ------------[ cut here ]------------ [ 51.816276][ T1356] refcount_t: underflow; use-after-free. [ 51.832306][ T1356] WARNING: CPU: 1 PID: 1356 at lib/refcount.c:28 refcount_warn_saturate+0x158/0x1a0 [ 51.877654][ T1356] Modules linked in: [ 51.881632][ T1356] CPU: 1 PID: 1356 Comm: syz.4.365 Not tainted 5.15.178-syzkaller-00193-g058abb720bd1 #0 [ 51.928169][ T1356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 51.962360][ T1356] RIP: 0010:refcount_warn_saturate+0x158/0x1a0 [ 51.963055][ T1370] FAULT_INJECTION: forcing a failure. [ 51.963055][ T1370] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 51.986468][ T1356] Code: 04 01 48 c7 c7 a0 12 a3 85 e8 74 8a db fe 0f 0b eb 8b e8 fb 44 0a ff c6 05 b9 6d c0 04 01 48 c7 c7 00 13 a3 85 e8 58 8a db fe <0f> 0b e9 6c ff ff ff e8 dc 44 0a ff c6 05 9b 6d c0 04 01 48 c7 c7 [ 52.006301][ T1370] CPU: 1 PID: 1370 Comm: syz.0.368 Not tainted 5.15.178-syzkaller-00193-g058abb720bd1 #0 [ 52.015932][ T1370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 52.025824][ T1370] Call Trace: [ 52.028948][ T1370] [ 52.031722][ T1370] dump_stack_lvl+0x151/0x1c0 [ 52.036238][ T1370] ? io_uring_drop_tctx_refs+0x190/0x190 [ 52.041708][ T1370] ? __stack_depot_save+0x420/0x470 [ 52.046738][ T1370] dump_stack+0x15/0x20 [ 52.050730][ T1370] should_fail+0x3c6/0x510 [ 52.054990][ T1370] should_fail_alloc_page+0x5a/0x80 [ 52.060016][ T1370] prepare_alloc_pages+0x15c/0x700 [ 52.064963][ T1370] ? __alloc_pages+0x8f0/0x8f0 [ 52.069564][ T1370] ? __alloc_pages_bulk+0xd80/0xd80 [ 52.074605][ T1370] __alloc_pages+0x18c/0x8f0 [ 52.079030][ T1370] ? prep_new_page+0x110/0x110 [ 52.083627][ T1370] ? __kasan_kmalloc+0x9/0x10 [ 52.088136][ T1370] ? __kmalloc+0x13f/0x2c0 [ 52.092387][ T1370] ? __vmalloc_node_range+0x2d6/0x8d0 [ 52.097598][ T1370] __vmalloc_node_range+0x482/0x8d0 [ 52.102635][ T1370] bpf_map_area_alloc+0xd9/0xf0 [ 52.107318][ T1370] ? array_map_alloc+0x278/0x6d0 [ 52.112090][ T1370] array_map_alloc+0x278/0x6d0 [ 52.116694][ T1370] map_create+0x411/0x2050 [ 52.120960][ T1370] __sys_bpf+0x296/0x760 [ 52.125023][ T1370] ? bpf_link_show_fdinfo+0x300/0x300 [ 52.130239][ T1370] ? perf_trace_sys_enter+0x129/0x140 [ 52.135438][ T1370] __x64_sys_bpf+0x7c/0x90 [ 52.139694][ T1370] x64_sys_call+0x87f/0x9a0 [ 52.144030][ T1370] do_syscall_64+0x3b/0xb0 [ 52.148282][ T1370] ? clear_bhb_loop+0x35/0x90 [ 52.152793][ T1370] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 52.158525][ T1370] RIP: 0033:0x7f4b6a15bde9 [ 52.162780][ T1370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.182222][ T1370] RSP: 002b:00007f4b687c6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 52.190461][ T1370] RAX: ffffffffffffffda RBX: 00007f4b6a374fa0 RCX: 00007f4b6a15bde9 [ 52.198275][ T1370] RDX: 0000000000000048 RSI: 0000400000004080 RDI: 0b00000000000000 [ 52.206086][ T1370] RBP: 00007f4b687c6090 R08: 0000000000000000 R09: 0000000000000000 [ 52.213894][ T1370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 52.221707][ T1370] R13: 0000000000000001 R14: 00007f4b6a374fa0 R15: 00007ffca93982c8 [ 52.229522][ T1370] [ 52.318620][ T1356] RSP: 0018:ffffc90000ccf968 EFLAGS: 00010246 [ 52.334092][ T1356] RAX: 87c9e5f598325300 RBX: 0000000000000003 RCX: ffff888116f4cf00 [ 52.373492][ T1356] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 52.422683][ T1356] RBP: ffffc90000ccf978 R08: ffffffff8157a585 R09: ffffed103ee265e8 [ 52.478718][ T1356] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff110269e0d61 [ 52.525184][ T1384] device veth1_macvtap left promiscuous mode [ 52.583693][ T1356] R13: ffff888134f06b08 R14: 0000000000000003 R15: ffff88811e1b6621 [ 52.607631][ T1356] FS: 00007fb8d7c346c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 52.652590][ T1356] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 52.663796][ T1356] CR2: 0000000100000000 CR3: 0000000134f8c000 CR4: 00000000003506b0 [ 52.671888][ T1356] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 52.715619][ T1356] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 52.733348][ T1356] Call Trace: [ 52.740011][ T1356] [ 52.746171][ T1356] ? show_regs+0x58/0x60 [ 52.750595][ T1356] ? __warn+0x160/0x2f0 [ 52.754616][ T1356] ? refcount_warn_saturate+0x158/0x1a0 [ 52.764183][ T1356] ? report_bug+0x3d9/0x5b0 [ 52.770902][ T1356] ? refcount_warn_saturate+0x158/0x1a0 [ 52.777452][ T1356] ? handle_bug+0x41/0x70 [ 52.782194][ T1356] ? exc_invalid_op+0x1b/0x50 [ 52.789437][ T1356] ? asm_exc_invalid_op+0x1b/0x20 [ 52.806947][ T1356] ? __wake_up_klogd+0xd5/0x110 [ 52.825267][ T1356] ? refcount_warn_saturate+0x158/0x1a0 [ 52.862648][ T1356] ? refcount_warn_saturate+0x158/0x1a0 [ 52.887700][ T1356] vm_area_free_no_check+0x123/0x130 [ 52.893144][ T1356] copy_mm+0xefb/0x13e0 [ 52.899491][ T1356] ? copy_signal+0x610/0x610 [ 52.907848][ T1392] device pim6reg1 entered promiscuous mode [ 52.913761][ T1356] ? __init_rwsem+0xfe/0x1d0 [ 52.921608][ T1356] ? copy_signal+0x4e3/0x610 [ 52.926191][ T1356] copy_process+0x1149/0x3290 [ 52.933880][ T1356] ? __kasan_check_write+0x14/0x20 [ 52.940041][ T1356] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 52.945110][ T1356] ? migrate_enable+0x1c1/0x2a0 [ 52.955670][ T1356] kernel_clone+0x21e/0x9e0 [ 52.966903][ T1356] ? create_io_thread+0x1e0/0x1e0 [ 52.976378][ T1356] ? trace_call_bpf+0x3f8/0x470 [ 53.023107][ T1356] __x64_sys_clone+0x23f/0x290 [ 53.037984][ T1356] ? __do_sys_vfork+0x130/0x130 [ 53.059175][ T1356] ? perf_trace_sys_enter+0x129/0x140 [ 53.097481][ T1356] x64_sys_call+0x1b0/0x9a0 [ 53.149805][ T1356] do_syscall_64+0x3b/0xb0 [ 53.154067][ T1356] ? clear_bhb_loop+0x35/0x90 [ 53.163561][ T1406] FAULT_INJECTION: forcing a failure. [ 53.163561][ T1406] name failslab, interval 1, probability 0, space 0, times 0 [ 53.221536][ T1406] CPU: 0 PID: 1406 Comm: syz.1.381 Not tainted 5.15.178-syzkaller-00193-g058abb720bd1 #0 [ 53.231181][ T1406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 53.241081][ T1406] Call Trace: [ 53.244222][ T1406] [ 53.246975][ T1406] dump_stack_lvl+0x151/0x1c0 [ 53.251493][ T1406] ? io_uring_drop_tctx_refs+0x190/0x190 [ 53.256957][ T1406] ? x64_sys_call+0x87f/0x9a0 [ 53.261475][ T1406] dump_stack+0x15/0x20 [ 53.265462][ T1406] should_fail+0x3c6/0x510 [ 53.269718][ T1406] __should_failslab+0xa4/0xe0 [ 53.274318][ T1406] should_failslab+0x9/0x20 [ 53.277685][ T1356] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 53.278661][ T1406] slab_pre_alloc_hook+0x37/0xd0 [ 53.289156][ T1406] ? skb_ensure_writable+0x2d0/0x440 [ 53.294279][ T1406] __kmalloc_track_caller+0x6c/0x2c0 [ 53.294595][ T1356] RIP: 0033:0x7fb8d95c9de9 [ 53.299391][ T1406] ? skb_ensure_writable+0x2d0/0x440 [ 53.299414][ T1406] ? skb_ensure_writable+0x2d0/0x440 [ 53.299433][ T1406] pskb_expand_head+0x113/0x1240 [ 53.314819][ T1356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 53.318665][ T1406] ? __kasan_check_write+0x14/0x20 [ 53.318697][ T1406] skb_ensure_writable+0x2d0/0x440 [ 53.318720][ T1406] bpf_clone_redirect+0x117/0x390 [ 53.352986][ T1406] bpf_prog_64e505a7b7f97a05+0x55/0x2e4 [ 53.358362][ T1406] ? dma_alloc_contiguous+0xc0/0x130 [ 53.363654][ T1406] ? __stack_depot_save+0x34/0x470 [ 53.368599][ T1406] ? __kasan_slab_alloc+0xc3/0xe0 [ 53.373453][ T1406] ? __kasan_slab_alloc+0xb1/0xe0 [ 53.378313][ T1406] ? slab_post_alloc_hook+0x53/0x2c0 [ 53.379118][ T1356] RSP: 002b:00007fb8d7c33fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 53.383430][ T1406] ? kmem_cache_alloc+0xf5/0x250 [ 53.396454][ T1406] ? __build_skb+0x2a/0x300 [ 53.400796][ T1406] ? build_skb+0x25/0x1f0 [ 53.404962][ T1406] ? bpf_prog_test_run_skb+0x38e/0x1420 [ 53.410338][ T1406] ? bpf_prog_test_run+0x3b0/0x630 [ 53.415286][ T1406] ? __sys_bpf+0x525/0x760 [ 53.419538][ T1406] ? __x64_sys_bpf+0x7c/0x90 [ 53.423969][ T1406] ? x64_sys_call+0x87f/0x9a0 [ 53.427776][ T1356] RAX: ffffffffffffffda RBX: 00007fb8d97e2fa0 RCX: 00007fb8d95c9de9 [ 53.428477][ T1406] ? do_syscall_64+0x3b/0xb0 [ 53.440728][ T1406] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 53.446635][ T1406] ? __kasan_check_read+0x11/0x20 [ 53.451480][ T1406] ? bpf_test_timer_continue+0x140/0x460 [ 53.454784][ T1356] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000004d100000 [ 53.456945][ T1406] bpf_test_run+0x478/0xa10 [ 53.469192][ T1406] ? convert___skb_to_skb+0x570/0x570 [ 53.474395][ T1406] ? __build_skb+0x2a/0x300 [ 53.475120][ T1356] RBP: 00007fb8d7c34090 R08: 0000000000000000 R09: 0000000000000000 [ 53.478732][ T1406] ? eth_type_trans+0x2e4/0x620 [ 53.478758][ T1406] ? eth_get_headlen+0x240/0x240 [ 53.478778][ T1406] ? bpf_prog_test_run_skb+0x7bd/0x1420 [ 53.496999][ T1356] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 53.501390][ T1406] ? convert___skb_to_skb+0x44/0x570 [ 53.501417][ T1406] ? memcpy+0x56/0x70 [ 53.501440][ T1406] bpf_prog_test_run_skb+0xb41/0x1420 [ 53.516575][ T1356] R13: 0000000000000000 R14: 00007fb8d97e2fa0 R15: 00007ffdb3c93838 [ 53.518140][ T1406] ? __kasan_check_write+0x14/0x20 [ 53.518175][ T1406] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 53.523707][ T1356] [ 53.531159][ T1406] ? __kasan_check_write+0x14/0x20 [ 53.531186][ T1406] ? fput_many+0x160/0x1b0 [ 53.531206][ T1406] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 53.536602][ T1356] ---[ end trace 2fe6c3cd5d44fe73 ]--- [ 53.541911][ T1406] bpf_prog_test_run+0x3b0/0x630 [ 53.541937][ T1406] ? bpf_prog_query+0x220/0x220 [ 53.574551][ T1406] ? selinux_bpf+0xd2/0x100 [ 53.578887][ T1406] ? security_bpf+0x82/0xb0 [ 53.583225][ T1406] __sys_bpf+0x525/0x760 [ 53.587304][ T1406] ? bpf_link_show_fdinfo+0x300/0x300 [ 53.592515][ T1406] ? perf_trace_sys_enter+0x129/0x140 [ 53.597723][ T1406] __x64_sys_bpf+0x7c/0x90 [ 53.601973][ T1406] x64_sys_call+0x87f/0x9a0 [ 53.606309][ T1406] do_syscall_64+0x3b/0xb0 [ 53.610565][ T1406] ? clear_bhb_loop+0x35/0x90 [ 53.615079][ T1406] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 53.620804][ T1406] RIP: 0033:0x7f3521392de9 [ 53.625061][ T1406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 53.644503][ T1406] RSP: 002b:00007f351f9fd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 53.652756][ T1406] RAX: ffffffffffffffda RBX: 00007f35215abfa0 RCX: 00007f3521392de9 [ 53.660566][ T1406] RDX: 0000000000000028 RSI: 00004000000000c0 RDI: 000000000000000a [ 53.668365][ T1406] RBP: 00007f351f9fd090 R08: 0000000000000000 R09: 0000000000000000 [ 53.676178][ T1406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 53.683991][ T1406] R13: 0000000000000000 R14: 00007f35215abfa0 R15: 00007ffcd7773198 [ 53.691813][ T1406] [ 54.341174][ T30] audit: type=1400 audit(1739475193.742:138): avc: denied { tracepoint } for pid=1428 comm="syz.3.390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 54.774612][ T1453] device syzkaller0 entered promiscuous mode [ 55.002321][ T1462] FAULT_INJECTION: forcing a failure. [ 55.002321][ T1462] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 55.017689][ T1462] CPU: 1 PID: 1462 Comm: syz.0.403 Tainted: G W 5.15.178-syzkaller-00193-g058abb720bd1 #0 [ 55.028723][ T1462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 55.038669][ T1462] Call Trace: [ 55.041732][ T1462] [ 55.044509][ T1462] dump_stack_lvl+0x151/0x1c0 [ 55.049023][ T1462] ? io_uring_drop_tctx_refs+0x190/0x190 [ 55.054494][ T1462] ? is_bpf_text_address+0x172/0x190 [ 55.059654][ T1462] dump_stack+0x15/0x20 [ 55.063611][ T1462] should_fail+0x3c6/0x510 [ 55.067858][ T1462] should_fail_alloc_page+0x5a/0x80 [ 55.072890][ T1462] prepare_alloc_pages+0x15c/0x700 [ 55.077844][ T1462] ? __alloc_pages+0x8f0/0x8f0 [ 55.082439][ T1462] ? __alloc_pages_bulk+0xd80/0xd80 [ 55.087473][ T1462] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 55.092945][ T1462] __alloc_pages+0x18c/0x8f0 [ 55.097371][ T1462] ? prep_new_page+0x110/0x110 [ 55.101970][ T1462] ? pcpu_chunk_relocate+0x20a/0x430 [ 55.107267][ T1462] pcpu_populate_chunk+0x18c/0xe30 [ 55.112213][ T1462] pcpu_alloc+0x984/0x13e0 [ 55.116467][ T1462] __alloc_percpu_gfp+0x27/0x30 [ 55.121145][ T1462] bpf_map_alloc_percpu+0xe6/0x160 [ 55.126096][ T1462] array_map_alloc+0x3a5/0x6d0 [ 55.130783][ T1462] map_create+0x411/0x2050 [ 55.135036][ T1462] __sys_bpf+0x296/0x760 [ 55.139111][ T1462] ? fput_many+0x160/0x1b0 [ 55.143364][ T1462] ? bpf_link_show_fdinfo+0x300/0x300 [ 55.148584][ T1462] ? debug_smp_processor_id+0x17/0x20 [ 55.153781][ T1462] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 55.159685][ T1462] __x64_sys_bpf+0x7c/0x90 [ 55.163934][ T1462] x64_sys_call+0x87f/0x9a0 [ 55.168271][ T1462] do_syscall_64+0x3b/0xb0 [ 55.172524][ T1462] ? clear_bhb_loop+0x35/0x90 [ 55.177045][ T1462] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 55.182780][ T1462] RIP: 0033:0x7f4b6a15bde9 [ 55.187019][ T1462] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 55.206549][ T1462] RSP: 002b:00007f4b687c6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 55.214792][ T1462] RAX: ffffffffffffffda RBX: 00007f4b6a374fa0 RCX: 00007f4b6a15bde9 [ 55.222621][ T1462] RDX: 0000000000000050 RSI: 0000400000000140 RDI: 2000000000000000 [ 55.230414][ T1462] RBP: 00007f4b687c6090 R08: 0000000000000000 R09: 0000000000000000 [ 55.238225][ T1462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 55.246036][ T1462] R13: 0000000000000000 R14: 00007f4b6a374fa0 R15: 00007ffca93982c8 [ 55.253856][ T1462] [ 55.666903][ T1476] bond_slave_1: mtu less than device minimum [ 55.728844][ T1486] FAULT_INJECTION: forcing a failure. [ 55.728844][ T1486] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 55.742909][ T1486] CPU: 0 PID: 1486 Comm: syz.2.413 Tainted: G W 5.15.178-syzkaller-00193-g058abb720bd1 #0 [ 55.753940][ T1486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 55.763832][ T1486] Call Trace: [ 55.766955][ T1486] [ 55.769735][ T1486] dump_stack_lvl+0x151/0x1c0 [ 55.774246][ T1486] ? io_uring_drop_tctx_refs+0x190/0x190 [ 55.779711][ T1486] ? __stack_depot_save+0x34/0x470 [ 55.784661][ T1486] dump_stack+0x15/0x20 [ 55.788654][ T1486] should_fail+0x3c6/0x510 [ 55.792902][ T1486] should_fail_alloc_page+0x5a/0x80 [ 55.797940][ T1486] prepare_alloc_pages+0x15c/0x700 [ 55.802889][ T1486] ? __alloc_pages+0x8f0/0x8f0 [ 55.807486][ T1486] ? __alloc_pages_bulk+0xd80/0xd80 [ 55.812638][ T1486] __alloc_pages+0x18c/0x8f0 [ 55.817069][ T1486] ? prep_new_page+0x110/0x110 [ 55.821668][ T1486] ? __kasan_kmalloc+0x9/0x10 [ 55.826170][ T1486] ? __kmalloc+0x13f/0x2c0 [ 55.830426][ T1486] ? __vmalloc_node_range+0x2d6/0x8d0 [ 55.835632][ T1486] __vmalloc_node_range+0x482/0x8d0 [ 55.840672][ T1486] bpf_map_area_alloc+0xd9/0xf0 [ 55.845353][ T1486] ? htab_map_alloc+0x3ed/0x1650 [ 55.850129][ T1486] htab_map_alloc+0x3ed/0x1650 [ 55.854732][ T1486] map_create+0x411/0x2050 [ 55.858979][ T1486] __sys_bpf+0x296/0x760 [ 55.863055][ T1486] ? fput_many+0x160/0x1b0 [ 55.867313][ T1486] ? bpf_link_show_fdinfo+0x300/0x300 [ 55.872521][ T1486] ? debug_smp_processor_id+0x17/0x20 [ 55.877725][ T1486] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 55.883628][ T1486] __x64_sys_bpf+0x7c/0x90 [ 55.887881][ T1486] x64_sys_call+0x87f/0x9a0 [ 55.892220][ T1486] do_syscall_64+0x3b/0xb0 [ 55.896482][ T1486] ? clear_bhb_loop+0x35/0x90 [ 55.900991][ T1486] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 55.906721][ T1486] RIP: 0033:0x7fb207d8bde9 [ 55.910974][ T1486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 55.930409][ T1486] RSP: 002b:00007fb2063f6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 55.938652][ T1486] RAX: ffffffffffffffda RBX: 00007fb207fa4fa0 RCX: 00007fb207d8bde9 [ 55.946463][ T1486] RDX: 0000000000000048 RSI: 0000400000000000 RDI: 0000000000000000 [ 55.954276][ T1486] RBP: 00007fb2063f6090 R08: 0000000000000000 R09: 0000000000000000 [ 55.962093][ T1486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 55.969899][ T1486] R13: 0000000000000001 R14: 00007fb207fa4fa0 R15: 00007ffd04818a98 [ 55.977717][ T1486] [ 56.532511][ T30] audit: type=1400 audit(1739475195.932:139): avc: denied { create } for pid=1498 comm="syz.0.415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 56.618883][ T30] audit: type=1400 audit(1739475195.972:140): avc: denied { create } for pid=1498 comm="syz.0.415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 56.619451][ T1497] device syzkaller0 entered promiscuous mode [ 56.819141][ T1508] bond_slave_1: mtu less than device minimum [ 56.897133][ T1520] device syzkaller0 entered promiscuous mode [ 56.958550][ T30] audit: type=1400 audit(1739475196.362:141): avc: denied { write } for pid=1519 comm="syz.2.423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 56.997852][ T30] audit: type=1400 audit(1739475196.382:142): avc: denied { read } for pid=1519 comm="syz.2.423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 57.082216][ T30] audit: type=1400 audit(1739475196.482:143): avc: denied { setopt } for pid=1536 comm="syz.4.432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 57.223716][ T1545] device macsec0 left promiscuous mode [ 57.319825][ T1548] FAULT_INJECTION: forcing a failure. [ 57.319825][ T1548] name failslab, interval 1, probability 0, space 0, times 0 [ 57.417345][ T1550] device veth1_macvtap entered promiscuous mode [ 57.424576][ T1550] device macsec0 entered promiscuous mode [ 57.443968][ T1548] CPU: 0 PID: 1548 Comm: syz.1.434 Tainted: G W 5.15.178-syzkaller-00193-g058abb720bd1 #0 [ 57.454997][ T1548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 57.464891][ T1548] Call Trace: [ 57.468014][ T1548] [ 57.470800][ T1548] dump_stack_lvl+0x151/0x1c0 [ 57.475308][ T1548] ? io_uring_drop_tctx_refs+0x190/0x190 [ 57.480781][ T1548] dump_stack+0x15/0x20 [ 57.484768][ T1548] should_fail+0x3c6/0x510 [ 57.489021][ T1548] __should_failslab+0xa4/0xe0 [ 57.493704][ T1548] should_failslab+0x9/0x20 [ 57.498048][ T1548] slab_pre_alloc_hook+0x37/0xd0 [ 57.502822][ T1548] kmem_cache_alloc_trace+0x48/0x270 [ 57.507937][ T1548] ? call_usermodehelper_setup+0x8f/0x220 [ 57.513496][ T1548] ? __kasan_kmalloc+0x9/0x10 [ 57.518010][ T1548] call_usermodehelper_setup+0x8f/0x220 [ 57.523389][ T1548] ? __request_module+0x8e0/0x8e0 [ 57.528255][ T1548] __request_module+0x37d/0x8e0 [ 57.532939][ T1548] ? capable+0x78/0xe0 [ 57.536840][ T1548] ? _trace_android_vh_delayacct_thrashing_end+0x120/0x120 [ 57.543875][ T1548] ? has_cap_mac_admin+0x3c0/0x3c0 [ 57.548822][ T1548] ? security_capable+0x87/0xb0 [ 57.553512][ T1548] dev_load+0x5b/0xb0 [ 57.557324][ T1548] dev_ioctl+0x5dc/0xe70 [ 57.561393][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 57.561403][ T1548] sock_ioctl+0x665/0x740 [ 57.572775][ T1548] ? sock_poll+0x400/0x400 [ 57.577026][ T1548] ? security_file_ioctl+0x84/0xb0 [ 57.581969][ T1548] ? sock_poll+0x400/0x400 [ 57.586225][ T1548] __se_sys_ioctl+0x114/0x190 [ 57.590736][ T1548] __x64_sys_ioctl+0x7b/0x90 [ 57.595162][ T1548] x64_sys_call+0x98/0x9a0 [ 57.599423][ T1548] do_syscall_64+0x3b/0xb0 [ 57.603670][ T1548] ? clear_bhb_loop+0x35/0x90 [ 57.608183][ T1548] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 57.613907][ T1548] RIP: 0033:0x7f3521392de9 [ 57.618161][ T1548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 57.637602][ T1548] RSP: 002b:00007f351f9fd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 57.645846][ T1548] RAX: ffffffffffffffda RBX: 00007f35215abfa0 RCX: 00007f3521392de9 [ 57.653669][ T1548] RDX: 0000400000000080 RSI: 00000000000089f3 RDI: 0000000000000007 [ 57.661471][ T1548] RBP: 00007f351f9fd090 R08: 0000000000000000 R09: 0000000000000000 [ 57.669280][ T1548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 57.677093][ T1548] R13: 0000000000000000 R14: 00007f35215abfa0 R15: 00007ffcd7773198 [ 57.684912][ T1548] [ 57.967013][ T1560] tap0: tun_chr_ioctl cmd 1074025675 [ 57.973367][ T1560] tap0: persist enabled [ 58.026970][ T1557] tap0: tun_chr_ioctl cmd 1074025675 [ 58.037681][ T1557] tap0: persist enabled [ 58.085260][ T1560] tap0: tun_chr_ioctl cmd 35108 [ 61.087287][ T1639] device syzkaller0 entered promiscuous mode [ 61.240918][ T1653] FAULT_INJECTION: forcing a failure. [ 61.240918][ T1653] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 61.287711][ T1653] CPU: 0 PID: 1653 Comm: syz.2.469 Tainted: G W 5.15.178-syzkaller-00193-g058abb720bd1 #0 [ 61.298749][ T1653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 61.308644][ T1653] Call Trace: [ 61.311762][ T1653] [ 61.314553][ T1653] dump_stack_lvl+0x151/0x1c0 [ 61.319057][ T1653] ? io_uring_drop_tctx_refs+0x190/0x190 [ 61.324534][ T1653] dump_stack+0x15/0x20 [ 61.328520][ T1653] should_fail+0x3c6/0x510 [ 61.332770][ T1653] should_fail_alloc_page+0x5a/0x80 [ 61.337912][ T1653] prepare_alloc_pages+0x15c/0x700 [ 61.342856][ T1653] ? __alloc_pages+0x8f0/0x8f0 [ 61.347459][ T1653] ? __alloc_pages_bulk+0xd80/0xd80 [ 61.352491][ T1653] ? __schedule+0xcd4/0x1590 [ 61.356917][ T1653] __alloc_pages+0x18c/0x8f0 [ 61.361345][ T1653] ? prep_new_page+0x110/0x110 [ 61.365945][ T1653] ? preempt_schedule+0xd9/0xe0 [ 61.370632][ T1653] ? preempt_schedule+0xd9/0xe0 [ 61.375316][ T1653] ? schedule_preempt_disabled+0x20/0x20 [ 61.380786][ T1653] pcpu_populate_chunk+0x18c/0xe30 [ 61.385732][ T1653] ? preempt_schedule_thunk+0x16/0x18 [ 61.390946][ T1653] pcpu_alloc+0x984/0x13e0 [ 61.395199][ T1653] __alloc_percpu_gfp+0x27/0x30 [ 61.399883][ T1653] bpf_map_alloc_percpu+0xe6/0x160 [ 61.404828][ T1653] array_map_alloc+0x3a5/0x6d0 [ 61.409428][ T1653] map_create+0x411/0x2050 [ 61.413677][ T1653] __sys_bpf+0x296/0x760 [ 61.417756][ T1653] ? bpf_link_show_fdinfo+0x300/0x300 [ 61.422971][ T1653] ? perf_trace_sys_enter+0x129/0x140 [ 61.428188][ T1653] __x64_sys_bpf+0x7c/0x90 [ 61.432426][ T1653] x64_sys_call+0x87f/0x9a0 [ 61.436777][ T1653] do_syscall_64+0x3b/0xb0 [ 61.441012][ T1653] ? clear_bhb_loop+0x35/0x90 [ 61.445524][ T1653] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 61.451256][ T1653] RIP: 0033:0x7fb207d8bde9 [ 61.455509][ T1653] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 61.474954][ T1653] RSP: 002b:00007fb2063f6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 61.483193][ T1653] RAX: ffffffffffffffda RBX: 00007fb207fa4fa0 RCX: 00007fb207d8bde9 [ 61.491006][ T1653] RDX: 0000000000000048 RSI: 0000400000000b00 RDI: 2000000000000000 [ 61.498813][ T1653] RBP: 00007fb2063f6090 R08: 0000000000000000 R09: 0000000000000000 [ 61.506624][ T1653] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 61.514439][ T1653] R13: 0000000000000000 R14: 00007fb207fa4fa0 R15: 00007ffd04818a98 [ 61.522256][ T1653] [ 61.827441][ T1666] syz.2.474[1666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.827539][ T1666] syz.2.474[1666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.861932][ T1663] BUG: unable to handle page fault for address: ffffed1800000021 [ 61.880513][ T1663] #PF: supervisor read access in kernel mode [ 61.886324][ T1663] #PF: error_code(0x0000) - not-present page [ 61.892145][ T1663] PGD 23fff2067 P4D 23fff2067 PUD 0 [ 61.897262][ T1663] Oops: 0000 [#1] PREEMPT SMP KASAN [ 61.902297][ T1663] CPU: 1 PID: 1663 Comm: syz.4.473 Tainted: G W 5.15.178-syzkaller-00193-g058abb720bd1 #0 [ 61.913316][ T1663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 61.923213][ T1663] RIP: 0010:__rb_insert_augmented+0x599/0x610 [ 61.929115][ T1663] Code: 49 89 5d 00 48 83 e3 fc 43 80 3c 26 00 74 08 4c 89 ff e8 5a 53 2a ff 4d 89 2f 48 85 db 74 2a 4c 8d 73 10 4c 89 f0 48 c1 e8 03 <42> 80 3c 20 00 74 08 4c 89 f7 e8 98 52 2a ff 48 8d 43 08 4c 39 7b [ 61.948551][ T1663] RSP: 0018:ffffc90000ca78f8 EFLAGS: 00010a06 [ 61.954456][ T1663] RAX: 1ffff11800000021 RBX: ffff88c0000000f8 RCX: 0000000000080000 [ 61.962266][ T1663] RDX: ffffc90003393000 RSI: 0000000000010fd7 RDI: 0000000000010fd8 [ 61.970080][ T1663] RBP: ffffc90000ca7960 R08: dffffc0000000000 R09: ffff88812a5bf3d8 [ 61.977890][ T1663] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 61.985697][ T1663] R13: ffff88812827e3d0 R14: ffff88c000000108 R15: ffff88811e1b6620 [ 61.993512][ T1663] FS: 00007fb8d7c346c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 62.002274][ T1663] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 62.008699][ T1663] CR2: ffffed1800000021 CR3: 000000013587b000 CR4: 00000000003506a0 [ 62.016521][ T1663] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 62.024324][ T1663] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 62.032130][ T1663] Call Trace: [ 62.035259][ T1663] [ 62.038039][ T1663] ? __die_body+0x62/0xb0 [ 62.042202][ T1663] ? __die+0x7e/0x90 [ 62.045940][ T1663] ? page_fault_oops+0x7f9/0xa90 [ 62.050710][ T1663] ? kernelmode_fixup_or_oops+0xd0/0xd0 [ 62.056087][ T1663] ? 0xffffffffa0028000 [ 62.060077][ T1663] ? is_prefetch+0x47a/0x6d0 [ 62.064509][ T1663] ? __rb_insert_augmented+0x599/0x610 [ 62.069802][ T1663] ? __rb_insert_augmented+0x599/0x610 [ 62.075098][ T1663] ? fixup_exception+0xbb/0x13c0 [ 62.079869][ T1663] ? stack_trace_save+0x113/0x1c0 [ 62.084728][ T1663] ? kernelmode_fixup_or_oops+0xb9/0xd0 [ 62.090111][ T1663] ? __bad_area_nosemaphore+0xc2/0x480 [ 62.095404][ T1663] ? bad_area_nosemaphore+0x2d/0x40 [ 62.100438][ T1663] ? do_kern_addr_fault+0x69/0x80 [ 62.105297][ T1663] ? exc_page_fault+0x4dd/0x7f0 [ 62.109992][ T1663] ? asm_exc_page_fault+0x27/0x30 [ 62.114851][ T1663] ? __rb_insert_augmented+0x599/0x610 [ 62.120141][ T1663] ? __rb_insert_augmented+0x4ad/0x610 [ 62.125435][ T1663] ? anon_vma_interval_tree_iter_next+0x390/0x390 [ 62.131682][ T1663] vma_interval_tree_insert_after+0x2be/0x2d0 [ 62.137585][ T1663] copy_mm+0xba2/0x13e0 [ 62.141582][ T1663] ? copy_signal+0x610/0x610 [ 62.146001][ T1663] ? __init_rwsem+0xfe/0x1d0 [ 62.150429][ T1663] ? copy_signal+0x4e3/0x610 [ 62.154858][ T1663] copy_process+0x1149/0x3290 [ 62.159376][ T1663] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 62.164317][ T1663] kernel_clone+0x21e/0x9e0 [ 62.168669][ T1663] ? __check_object_size+0x73/0x3d0 [ 62.173700][ T1663] ? create_io_thread+0x1e0/0x1e0 [ 62.178560][ T1663] ? memset+0x35/0x40 [ 62.182460][ T1663] __x64_sys_clone+0x23f/0x290 [ 62.187061][ T1663] ? __do_sys_vfork+0x130/0x130 [ 62.191741][ T1663] ? debug_smp_processor_id+0x17/0x20 [ 62.196958][ T1663] ? __bpf_trace_sys_enter+0x62/0x70 [ 62.202070][ T1663] ? __traceiter_sys_enter+0x2a/0x40 [ 62.207190][ T1663] x64_sys_call+0x1b0/0x9a0 [ 62.211553][ T1663] do_syscall_64+0x3b/0xb0 [ 62.215780][ T1663] ? clear_bhb_loop+0x35/0x90 [ 62.220294][ T1663] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 62.226024][ T1663] RIP: 0033:0x7fb8d95c9de9 [ 62.230278][ T1663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 62.249726][ T1663] RSP: 002b:00007fb8d7c33fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 62.257962][ T1663] RAX: ffffffffffffffda RBX: 00007fb8d97e2fa0 RCX: 00007fb8d95c9de9 [ 62.265778][ T1663] RDX: 0000000000000000 RSI: 0000400000001800 RDI: 0000000000000000 [ 62.273583][ T1663] RBP: 00007fb8d964b2a0 R08: 0000000000000000 R09: 0000000000000000 [ 62.281398][ T1663] R10: 0000400000002840 R11: 0000000000000246 R12: 0000000000000000 [ 62.289443][ T1663] R13: 0000000000000000 R14: 00007fb8d97e2fa0 R15: 00007ffdb3c93838 [ 62.297261][ T1663] [ 62.300113][ T1663] Modules linked in: [ 62.303859][ T1663] CR2: ffffed1800000021 [ 62.307848][ T1663] ---[ end trace 2fe6c3cd5d44fe74 ]--- [ 62.313130][ T1663] RIP: 0010:__rb_insert_augmented+0x599/0x610 [ 62.319034][ T1663] Code: 49 89 5d 00 48 83 e3 fc 43 80 3c 26 00 74 08 4c 89 ff e8 5a 53 2a ff 4d 89 2f 48 85 db 74 2a 4c 8d 73 10 4c 89 f0 48 c1 e8 03 <42> 80 3c 20 00 74 08 4c 89 f7 e8 98 52 2a ff 48 8d 43 08 4c 39 7b [ 62.338476][ T1663] RSP: 0018:ffffc90000ca78f8 EFLAGS: 00010a06 [ 62.344374][ T1663] RAX: 1ffff11800000021 RBX: ffff88c0000000f8 RCX: 0000000000080000 [ 62.352186][ T1663] RDX: ffffc90003393000 RSI: 0000000000010fd7 RDI: 0000000000010fd8 [ 62.360010][ T1663] RBP: ffffc90000ca7960 R08: dffffc0000000000 R09: ffff88812a5bf3d8 [ 62.367812][ T1663] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 62.375620][ T1663] R13: ffff88812827e3d0 R14: ffff88c000000108 R15: ffff88811e1b6620 [ 62.383433][ T1663] FS: 00007fb8d7c346c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 62.392197][ T1663] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 62.398619][ T1663] CR2: ffffed1800000021 CR3: 000000013587b000 CR4: 00000000003506a0 [ 62.406434][ T1663] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 62.414243][ T1663] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 62.422094][ T1663] Kernel panic - not syncing: Fatal exception [ 62.428203][ T1663] Kernel Offset: disabled [ 62.432330][ T1663] Rebooting in 86400 seconds..