last executing test programs: 10.608282998s ago: executing program 2 (id=2614): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x23, 0x4, 0x9, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x40000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) close(r2) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x7f, 0x7, 0x0, 0x0, 0x0, 0x0, 0xac041, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000280), 0xf}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x800, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000200)=0x7fff) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x20300000, &(0x7f0000001100)="6182062d904bb7ec9345d9e682ebc0c3e66f1d80f4c2d57f03eb1e4a28e1eb96c01309836b5983ddab68ec400586021806e88718ca761e7825cccb5eea705bf31b8c60d9d3cf8cdb92303e2d01922c1053292a7161d11f944dd527543dce940bb9eb24e4abf129a3abaf5342486e34b00d9e0b21f9062982c1a2f0722f76f491758f27860011997ab197bfc195399f6db06d6969590ee705284509594319c388cb693a5a4c006608833fa82c0b0e2f79be65d59a51370113e6cb1755a5c28fb04510ccab052096f6c02cc762df664baae3650f6390f5fb8fa64514ef830b3f0da3a21315b4d14dbff7cd0ad285595c360b19fd036071", 0xf6, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000001000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000600)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000080), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[@ANYBLOB='+pids'], 0x6) write$cgroup_subtree(r6, &(0x7f0000000500)={[{0x2d, 'pids'}, {0x2b, 'cpu'}]}, 0xb) 10.594622029s ago: executing program 2 (id=2615): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000008000000010000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 '], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000b40)=ANY=[@ANYBLOB="b33e29d3ad2d9d1cf4650fcbde5bfc34e4bf96700e64eeb76f9c84415731cd92cc6adccb88fe8bece785c92df3ae9d14db11d7ee456d939ad68aa13367ef9771896f22bf664970bdfc9c2baefaa1498ce36655bff251ce629bf1985b5041850dea4368bcb6efa866173e63c0b85b30470d3b4e9404932a576b04eaf7ea61b9161f69f7b279581d65277f86f11f7ea2e5dd034f1ff44bba389a1904b5139a689081ddf613959affc4e7e561cf", @ANYRES64=r0, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRESDEC=r0, @ANYRES8=r0, @ANYRESOCT], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000001000000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000004000000000000000000000002"], 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0, r2}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080000040200000eef064f3f94e3a9c53bf3ca136ca9224ca342b47aef50702523825bcd07a415df0d774dfdce88356961e0a243f3d0342904d670dc50d620b129ee573c2c0a97563be85e70c8242431b6de985011e18e19bcd08623852ecb00cbe5d9e4d62eb8842f46fa98030efdaf397f33ead1b1df72eff658a1bd5cb4b4eb8f88d8108768eb178b3a858780bc2701ed5a1c43a16", @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\a\x00'/28], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001001000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000001c0)='kmem_cache_free\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000080"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x40, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000002000000030000000180ffff17010000", @ANYRES32, @ANYBLOB="010000000000000000000003000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300000003000000030000000f00"/28], 0x48) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000900)={'bridge0\x00', @random="000000000100"}) socketpair(0x6, 0x5, 0x6a0a2332, &(0x7f0000000340)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8940, &(0x7f0000000900)={'bridge0\x00', @broadcast}) socketpair(0x28, 0x2, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18020000fcffffff000000000000210085000000360000009500070000000000b83f3584230b8f5ec8921327291cf4880dd3a91af830f8a476ba1b51d4eb67103b000000000000000000000000000000640f9922d207e93470686f20ad"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r9, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0xc00d, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) 9.740203984s ago: executing program 4 (id=2619): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x86, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000980)='fsi_master_gpio_clock_zeros\x00', r1, 0x0, 0x10}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000380)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={0xffffffffffffffff, 0x18000000000002a0, 0xe40, 0x2e, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r2, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000004c0)=[0x0], 0x0, 0x5d, &(0x7f0000000500)=[{}, {}], 0x10, 0x10, &(0x7f0000000540), &(0x7f00000005c0), 0x8, 0xfc, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) getpid() perf_event_open$cgroup(&(0x7f0000000880)={0x0, 0x80, 0x3, 0x4, 0x8, 0x8, 0x0, 0x6, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x5, 0x3}, 0x82, 0xfffffffffffffff8, 0x6, 0x7, 0x8, 0x81, 0x6, 0x0, 0x2, 0x0, 0x7fff}, r0, 0x7, r3, 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001080)=ANY=[@ANYBLOB="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", @ANYRESHEX=r3], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 9.619061615s ago: executing program 2 (id=2620): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{}, &(0x7f0000000000), &(0x7f00000005c0)}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="18000000040000000000000000000000950000000000000080ba3bdf9959cb175ef54debfc48d1d02bb7e650a520bf130cee2b69808663d35842263af6abc46462cd16097b028862119ef2949c12ae88b23893e735020e7f901173449f9061c5f8cd412ea28cf62af0d3e17627321dddb7b28c15a3d20376f3170fc4796760b41fead473fe4e4c314c2f73480dc97326a4a5cfc48cb5a431ded00cd1bcf82f47054f2d3adec558188ed3d819f88d00"/188], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 8.720437943s ago: executing program 4 (id=2622): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{}, &(0x7f0000000000), &(0x7f00000005c0)}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="18000000040000000000000000000000950000000000000080ba3bdf9959cb175ef54debfc48d1d02bb7e650a520bf130cee2b69808663d35842263af6abc46462cd16097b028862119ef2949c12ae88b23893e735020e7f901173449f9061c5f8cd412ea28cf62af0d3e17627321dddb7b28c15a3d20376f3170fc4796760b41fead473fe4e4c314c2f73480dc97326a4a5cfc48cb5a431ded00cd1bcf82f47054f2d3adec558188ed3d819f88d00"/188], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 8.371065074s ago: executing program 0 (id=2625): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x86, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000980)='fsi_master_gpio_clock_zeros\x00', r1, 0x0, 0x10}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000380)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={0xffffffffffffffff, 0x18000000000002a0, 0xe40, 0x2e, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r2, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000004c0)=[0x0], 0x0, 0x5d, &(0x7f0000000500)=[{}, {}], 0x10, 0x10, &(0x7f0000000540), &(0x7f00000005c0), 0x8, 0xfc, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) getpid() perf_event_open$cgroup(&(0x7f0000000880)={0x0, 0x80, 0x3, 0x4, 0x8, 0x8, 0x0, 0x6, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x5, 0x3}, 0x82, 0xfffffffffffffff8, 0x6, 0x7, 0x8, 0x81, 0x6, 0x0, 0x2, 0x0, 0x7fff}, r0, 0x7, r3, 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001080)=ANY=[@ANYBLOB="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", @ANYRESHEX=r3], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 5.617277576s ago: executing program 1 (id=2631): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000008000000010000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 '], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000b40)=ANY=[@ANYBLOB="b33e29d3ad2d9d1cf4650fcbde5bfc34e4bf96700e64eeb76f9c84415731cd92cc6adccb88fe8bece785c92df3ae9d14db11d7ee456d939ad68aa13367ef9771896f22bf664970bdfc9c2baefaa1498ce36655bff251ce629bf1985b5041850dea4368bcb6efa866173e63c0b85b30470d3b4e9404932a576b04eaf7ea61b9161f69f7b279581d65277f86f11f7ea2e5dd034f1ff44bba389a1904b5139a689081ddf613959affc4e7e561cf", @ANYRES64=r0, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRESDEC=r0, @ANYRES8=r0, @ANYRESOCT], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000001000000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000004000000000000000000000002"], 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0, r2}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080000040200000eef064f3f94e3a9c53bf3ca136ca9224ca342b47aef50702523825bcd07a415df0d774dfdce88356961e0a243f3d0342904d670dc50d620b129ee573c2c0a97563be85e70c8242431b6de985011e18e19bcd08623852ecb00cbe5d9e4d62eb8842f46fa98030efdaf397f33ead1b1df72eff658a1bd5cb4b4eb8f88d8108768eb178b3a858780bc2701ed5a1c43a16", @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\a\x00'/28], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001001000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000001c0)='kmem_cache_free\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000080"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x40, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000002000000030000000180ffff17010000", @ANYRES32, @ANYBLOB="010000000000000000000003000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300000003000000030000000f00"/28], 0x48) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000900)={'bridge0\x00', @random="000000000100"}) socketpair(0x6, 0x5, 0x6a0a2332, &(0x7f0000000340)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8940, &(0x7f0000000900)={'bridge0\x00', @broadcast}) socketpair(0x28, 0x2, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18020000fcffffff000000000000210085000000360000009500070000000000b83f3584230b8f5ec8921327291cf4880dd3a91af830f8a476ba1b51d4eb67103b000000000000000000000000000000640f9922d207e93470686f20ad"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r9, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0xc00d, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) 5.616582686s ago: executing program 2 (id=2632): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) syz_clone(0x40080000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x9, 0x3, 0xf4, 0x7fff, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@generic={&(0x7f00000002c0)='./file0\x00'}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) openat$cgroup_freezer_state(r3, &(0x7f00000006c0), 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x15) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x10, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='GPL\x00', 0x1eb9, 0xa, &(0x7f00000001c0)=""/10, 0x40f00, 0x6a, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000200)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0xa, 0x3, 0x205}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000340)=[r6, r3, r0, 0xffffffffffffffff], &(0x7f00000004c0)=[{0x1, 0x2, 0x5, 0xc}, {0x4, 0x3, 0xf, 0xc}, {0x1, 0x5, 0x2, 0xc}, {0x1, 0x3, 0x1, 0x7}, {0x5, 0x1, 0x4, 0x1}, {0x1, 0x1, 0xe}, {0x3, 0x5, 0x6, 0x3}, {0x5, 0x2, 0xd, 0x1}], 0x10, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c40)={{r5}, &(0x7f0000000700), &(0x7f0000000c00)}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd"], 0xfdef) openat$cgroup_int(r4, &(0x7f0000000600)='cpuset.cpu_exclusive\x00', 0x2, 0x0) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0x15) 5.562453481s ago: executing program 3 (id=2633): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x86, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000980)='fsi_master_gpio_clock_zeros\x00', r1, 0x0, 0x10}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000380)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={0xffffffffffffffff, 0x18000000000002a0, 0xe40, 0x2e, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r2, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000004c0)=[0x0], 0x0, 0x5d, &(0x7f0000000500)=[{}, {}], 0x10, 0x10, &(0x7f0000000540), &(0x7f00000005c0), 0x8, 0xfc, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) getpid() perf_event_open$cgroup(&(0x7f0000000880)={0x0, 0x80, 0x3, 0x4, 0x8, 0x8, 0x0, 0x6, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x5, 0x3}, 0x82, 0xfffffffffffffff8, 0x6, 0x7, 0x8, 0x81, 0x6, 0x0, 0x2, 0x0, 0x7fff}, r0, 0x7, r3, 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001080)=ANY=[@ANYBLOB="61106800000000006113740000000000bfa00000000000000700000008ffffffd503010017740040950000000000000069163a0000000000bf67000000000000350607000fff07201706000020190000160300000ee60060bf050000000000007b650000000000006507f9ff01000000070700004d83dde4c375000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f17540faf80250aa20c669a5e12814cb1cea5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369226066812b8e007e733a9a48c9eaf3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000400c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71c206438b8ef4901fd03c16dfda44221b235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20ceddf4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10fd7ed6735154beb4000000000000000000000000004000bc00f6746a9709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43ea0ffb567b40407d000000210000000000000000005f37d8703f37ca364a601ae899a56715a0a62a34c1d926a0f6a5480a55c22fe3a5ac00000000000000000000000500002000000000fb79ea00000000000000000000e4007be511fe32fbc90e23", @ANYRESHEX=r3], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 4.88847013s ago: executing program 2 (id=2634): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{}, &(0x7f0000000000), &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="18000000040000000000000000000000950000000000000080ba3bdf9959cb175ef54debfc48d1d02bb7e650a520bf130cee2b69808663d35842263af6abc46462cd16097b028862119ef2949c12ae88b23893e735020e7f901173449f9061c5f8cd412ea28cf62af0d3e17627321dddb7b28c15a3d20376f3170fc4796760b41fead473fe4e4c314c2f73480dc97326a4a5cfc48cb5a431ded00cd1bcf82f47054f2d3adec558188ed3d819f88d00"/188], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 4.379145625s ago: executing program 1 (id=2635): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)=""/44, 0x2c}], 0x1}, 0x40fd) 3.766306699s ago: executing program 1 (id=2636): r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x9}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r5, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r3}, 0x20) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000004440)={&(0x7f0000000ec0)=@id={0x1e, 0x3, 0x0, {0x0, 0x3}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0xc081}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) close(r0) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) 2.480895762s ago: executing program 4 (id=2637): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x86, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000980)='fsi_master_gpio_clock_zeros\x00', r1, 0x0, 0x10}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000380)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={0xffffffffffffffff, 0x18000000000002a0, 0xe40, 0x2e, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r2, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000004c0)=[0x0], 0x0, 0x5d, &(0x7f0000000500)=[{}, {}], 0x10, 0x10, &(0x7f0000000540), &(0x7f00000005c0), 0x8, 0xfc, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) getpid() perf_event_open$cgroup(&(0x7f0000000880)={0x0, 0x80, 0x3, 0x4, 0x8, 0x8, 0x0, 0x6, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x5, 0x3}, 0x82, 0xfffffffffffffff8, 0x6, 0x7, 0x8, 0x81, 0x6, 0x0, 0x2, 0x0, 0x7fff}, r0, 0x7, r3, 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001080)=ANY=[@ANYBLOB="61106800000000006113740000000000bfa00000000000000700000008ffffffd503010017740040950000000000000069163a0000000000bf67000000000000350607000fff07201706000020190000160300000ee60060bf050000000000007b650000000000006507f9ff01000000070700004d83dde4c375000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f17540faf80250aa20c669a5e12814cb1cea5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369226066812b8e007e733a9a48c9eaf3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000400c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71c206438b8ef4901fd03c16dfda44221b235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20ceddf4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10fd7ed6735154beb4000000000000000000000000004000bc00f6746a9709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43ea0ffb567b40407d000000210000000000000000005f37d8703f37ca364a601ae899a56715a0a62a34c1d926a0f6a5480a55c22fe3a5ac00000000000000000000000500002000000000fb79ea00000000000000000000e4007be511fe32fbc90e23", @ANYRESHEX=r3], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 2.476261722s ago: executing program 0 (id=2648): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x86, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000980)='fsi_master_gpio_clock_zeros\x00', r1, 0x0, 0x10}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000380)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={0xffffffffffffffff, 0x18000000000002a0, 0xe40, 0x2e, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r2, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000004c0)=[0x0], 0x0, 0x5d, 0x0, 0x0, 0x10, &(0x7f0000000540), &(0x7f00000005c0), 0x8, 0xfc, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) getpid() perf_event_open$cgroup(&(0x7f0000000880)={0x0, 0x80, 0x3, 0x4, 0x8, 0x8, 0x0, 0x6, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x5, 0x3}, 0x82, 0xfffffffffffffff8, 0x6, 0x7, 0x8, 0x81, 0x6, 0x0, 0x2, 0x0, 0x7fff}, r0, 0x7, r3, 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001080)=ANY=[@ANYBLOB="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", @ANYRESHEX=r3], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 2.032868691s ago: executing program 1 (id=2638): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x23, 0x4, 0x9, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x40000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) close(r2) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x7f, 0x7, 0x0, 0x0, 0x0, 0x0, 0xac041, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000280), 0xf}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x800, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x0, 0x0, 0x0, &(0x7f0000000440), 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000200)=0x7fff) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x20300000, &(0x7f0000001100)="6182062d904bb7ec9345d9e682ebc0c3e66f1d80f4c2d57f03eb1e4a28e1eb96c01309836b5983ddab68ec400586021806e88718ca761e7825cccb5eea705bf31b8c60d9d3cf8cdb92303e2d01922c1053292a7161d11f944dd527543dce940bb9eb24e4abf129a3abaf5342486e34b00d9e0b21f9062982c1a2f0722f76f491758f27860011997ab197bfc195399f6db06d6969590ee705284509594319c388cb693a5a4c006608833fa82c0b0e2f79be65d59a51370113e6cb1755a5c28fb04510ccab052096f6c02cc762df664baae3650f6390f5fb8fa64514ef830b3f0da3a21315b4d14dbff7cd0ad285595c360b19fd036071", 0xf6, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000001000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000600)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000080), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[@ANYBLOB='+pids'], 0x6) write$cgroup_subtree(r6, &(0x7f0000000500)={[{0x2d, 'pids'}, {0x2b, 'cpu'}]}, 0xb) 2.019956972s ago: executing program 0 (id=2639): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x50, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f00000300000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000060000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000240)={{r9, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000000)='%pS \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r10, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x16, 0x10, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000ffff0b867b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r11, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_freezer_state(r0, &(0x7f0000000380), 0x2, 0x0) r12 = openat$cgroup_freezer_state(r0, &(0x7f0000002b00), 0x2, 0x0) close(r12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x1f2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7", 0x0}, 0x50) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x1, 0x40, 0x40, 0x41, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000180), 0x1003, r13}, 0x38) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000b80)={r13, &(0x7f0000000a80), &(0x7f0000000b40)=""/31}, 0x20) 1.915601821s ago: executing program 4 (id=2641): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000800000002000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@bloom_filter={0x1e, 0x7, 0x8000, 0xf677, 0x20288, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x4, 0xd, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000200000000000000000818110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='freezer.self_freezing\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0xfc, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x8000, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x9, 0x4, 0x6296, 0x4, 0xffffffffffffffff, 0x681d, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x0, 0xf, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000140)=ANY=[], 0xfffffdef) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xa) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r6, &(0x7f0000000980), 0x20000992) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) 1.876648955s ago: executing program 1 (id=2642): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x23, 0x4, 0x9, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x40000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) close(r2) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x7f, 0x7, 0x0, 0x0, 0x0, 0x0, 0xac041, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000280), 0xf}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x800, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x0, 0x13, 0x0, &(0x7f0000000440)="cc9f4d42ef21760fc9ae7ef1558f46be00d0b5", 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000200)=0x7fff) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x20300000, &(0x7f0000001100)="6182062d904bb7ec9345d9e682ebc0c3e66f1d80f4c2d57f03eb1e4a28e1eb96c01309836b5983ddab68ec400586021806e88718ca761e7825cccb5eea705bf31b8c60d9d3cf8cdb92303e2d01922c1053292a7161d11f944dd527543dce940bb9eb24e4abf129a3abaf5342486e34b00d9e0b21f9062982c1a2f0722f76f491758f27860011997ab197bfc195399f6db06d6969590ee705284509594319c388cb693a5a4c006608833fa82c0b0e2f79be65d59a51370113e6cb1755a5c28fb04510ccab052096f6c02cc762df664baae3650f6390f5fb8fa64514ef830b3f0da3a21315b4d14dbff7cd0ad285595c360b19fd036071", 0xf6, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000001000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000600)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000080), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[@ANYBLOB='+pids'], 0x6) write$cgroup_subtree(r6, &(0x7f0000000500)={[{0x2d, 'pids'}, {0x2b, 'cpu'}]}, 0xb) 1.683188482s ago: executing program 1 (id=2643): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x86, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000980)='fsi_master_gpio_clock_zeros\x00', r1, 0x0, 0x10}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000380)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={0xffffffffffffffff, 0x18000000000002a0, 0xe40, 0x2e, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r2, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000004c0)=[0x0], 0x0, 0x5d, &(0x7f0000000500)=[{}, {}], 0x10, 0x10, &(0x7f0000000540), &(0x7f00000005c0), 0x8, 0xfc, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) getpid() perf_event_open$cgroup(&(0x7f0000000880)={0x0, 0x80, 0x3, 0x4, 0x8, 0x8, 0x0, 0x6, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x5, 0x3}, 0x82, 0xfffffffffffffff8, 0x6, 0x7, 0x8, 0x81, 0x6, 0x0, 0x2, 0x0, 0x7fff}, r0, 0x7, r3, 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001080)=ANY=[@ANYBLOB="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", @ANYRESHEX=r3], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 1.681881852s ago: executing program 0 (id=2654): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000008000000010000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 '], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000b40)=ANY=[@ANYBLOB="b33e29d3ad2d9d1cf4650fcbde5bfc34e4bf96700e64eeb76f9c84415731cd92cc6adccb88fe8bece785c92df3ae9d14db11d7ee456d939ad68aa13367ef9771896f22bf664970bdfc9c2baefaa1498ce36655bff251ce629bf1985b5041850dea4368bcb6efa866173e63c0b85b30470d3b4e9404932a576b04eaf7ea61b9161f69f7b279581d65277f86f11f7ea2e5dd034f1ff44bba389a1904b5139a689081dd", @ANYRES64=r0, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRESDEC=r0, @ANYRES8=r0, @ANYRESOCT], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000001000000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000004000000000000000000000002"], 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0, r2}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080000040200000eef064f3f94e3a9c53bf3ca136ca9224ca342b47aef50702523825bcd07a415df0d774dfdce88356961e0a243f3d0342904d670dc50d620b129ee573c2c0a97563be85e70c8242431b6de985011e18e19bcd08623852ecb00cbe5d9e4d62eb8842f46fa98030efdaf397f33ead1b1df72eff658a1bd5cb4b4eb8f88d8108768eb178b3a858780bc2701ed5a1c43a16", @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\a\x00'/28], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001001000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000001c0)='kmem_cache_free\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000080"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x40, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r7) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000002000000030000000180ffff17010000", @ANYRES32, @ANYBLOB="010000000000000000000003000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300000003000000030000000f00"/28], 0x48) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000900)={'bridge0\x00', @random="000000000100"}) socketpair(0x6, 0x5, 0x6a0a2332, &(0x7f0000000340)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8940, &(0x7f0000000900)={'bridge0\x00', @broadcast}) socketpair(0x28, 0x2, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18020000fcffffff000000000000210085000000360000009500070000000000b83f3584230b8f5ec8921327291cf4880dd3a91af830f8a476ba1b51d4eb67103b000000000000000000000000000000640f9922d207e93470686f20ad"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r10, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0xc00d, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.223002222s ago: executing program 3 (id=2644): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) gettid() bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000a50000007b8af8ff00000000bfa200000000000007020000f8ff9c3ab703000008000000b7040000002000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x64ff19f6f4efb695, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x200402, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1282, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0500000007000000200000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000200000000000000"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000ec0)={{r3}, &(0x7f0000000e40), &(0x7f0000000e80)='%ps \x00'}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r3, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100004b028ee7000000000000ea04850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], 0x0, 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1.145881059s ago: executing program 0 (id=2645): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYRESDEC, @ANYRES32, @ANYRES8=0x0], 0x0, 0x384d, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e00000008000000f8fffffff8ffffff00020000", @ANYRESOCT=r0, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200000000000000030000000a00"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000900)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x33, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x5452, 0x20001439) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000008, 0x4}, 0x100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x228, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100a07, 0x0, 0x5, 0x8, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000000000000000000010000000000140000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b7040000000000008500000001"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x13, &(0x7f00000004c0)=ANY=[@ANYRES64=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000e472ed49ea89e6010000000000005f000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000014c0)={0x0, 0x10, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000800000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000009500000000000000bf91000000000000b7020000000000008500000000000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f00000007c0)=ANY=[@ANYRESDEC, @ANYRES64=r0, @ANYRES8, @ANYRES16=0x0, @ANYRES16, @ANYRES8=r4, @ANYBLOB="905b1e759957959572e21e17062644125670a4c15b8a514b9d25e766872ae21bf1fe36086a10ed54bd10f82d05dab7cac714b01c2999738ba486fd9e199a742fb592320287659b024e218d6c281a79d5e7204d2c90d27385dc6f4e9e2ec26de25c970395fcbe341683453b808995cb429941e07e60a892a2819c982c3bbb6a9ab1d0391a766d3eb8e2c7a8e11b9850955daeb327abdcd6c86fd4b07cb96f7566f1f7cb14", @ANYRESDEC=r2, @ANYBLOB="bfebb8abeb4befb867992bea0b67bcf34abef5bec67a97926fe0664dc7d47de6c9cf42217b2ec86ae543606169b42b37c07adfd1a0465a9d354415692b9ef071cea13017f7f1d44ec874c2d03b812ba1ae56a3d75463d00158"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x19, 0x0, 0x0, 0x8000, 0x1300, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000797d00"/20, @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='task_rename\x00', r6}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffeffffffff}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000280)={'veth0_to_team\x00', @multicast}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) 1.080371875s ago: executing program 3 (id=2646): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000800000002000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@bloom_filter={0x1e, 0x7, 0x8000, 0xf677, 0x20288, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x4, 0xd, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000200000000000000000818110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='freezer.self_freezing\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0xfc, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x8000, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x9, 0x4, 0x6296, 0x4, 0xffffffffffffffff, 0x681d, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x0, 0xf, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000140)=ANY=[], 0xfffffdef) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xa) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r6, &(0x7f0000000980), 0x20000992) close(r3) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r7, 0xffffffffffffffff, 0x26}, 0x10) 936.710677ms ago: executing program 4 (id=2647): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)=""/44, 0x2c}], 0x1}, 0x40fd) 578.108099ms ago: executing program 4 (id=2649): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{}, &(0x7f0000000000), &(0x7f00000005c0)}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = openat$cgroup_procs(r3, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r5, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000300)={r6, &(0x7f0000000240), 0x0}, 0x20) write$cgroup_pid(r4, &(0x7f00000005c0), 0x12) openat$cgroup_ro(r3, &(0x7f0000000380)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="18000000040000000000000000000000950000000000000080ba3bdf9959cb175ef54debfc48d1d02bb7e650a520bf130cee2b69808663d35842263af6abc46462cd16097b028862119ef2949c12ae88b23893e735020e7f901173449f9061c5f8cd412ea28cf62af0d3e17627321dddb7b28c15a3d20376f3170fc4796760b41fead473fe4e4c314c2f73480dc97326a4a5cfc48cb5a431ded00cd1bcf82f47054f2d3adec558188ed3d819f88d00"/188], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 567.443ms ago: executing program 3 (id=2650): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="090000000800000001000000010000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 '], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000b40)=ANY=[@ANYBLOB="b33e29d3ad2d9d1cf4650fcbde5bfc34e4bf96700e64eeb76f9c84415731cd92cc6adccb88fe8bece785c92df3ae9d14db11d7ee456d939ad68aa13367ef9771896f22bf664970bdfc9c2baefaa1498ce36655bff251ce629bf1985b5041850dea4368bcb6efa866173e63c0b85b30470d3b4e9404932a576b04eaf7ea61b9161f69f7b279581d65277f86f11f7ea2e5dd034f1ff44bba389a1904b5139a689081ddf613959affc4e7e561cf", @ANYRES64=r0, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRESDEC=r0, @ANYRES8=r0, @ANYRESOCT], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000001000000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000004000000000000000000000002"], 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0, r2}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080000040200000eef064f3f94e3a9c53bf3ca136ca9224ca342b47aef50702523825bcd07a415df0d774dfdce88356961e0a243f3d0342904d670dc50d620b129ee573c2c0a97563be85e70c8242431b6de985011e18e19bcd08623852ecb00cbe5d9e4d62eb8842f46fa98030efdaf397f33ead1b1df72eff658a1bd5cb4b4eb8f88d8108768eb178b3a858780bc2701ed5a1c43a16", @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\a\x00'/28], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001001000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000001c0)='kmem_cache_free\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000080"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x40, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r7) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000002000000030000000180ffff17010000", @ANYRES32, @ANYBLOB="010000000000000000000003000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300000003000000030000000f00"/28], 0x48) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000900)={'bridge0\x00', @random="000000000100"}) socketpair(0x6, 0x5, 0x6a0a2332, &(0x7f0000000340)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8940, &(0x7f0000000900)={'bridge0\x00', @broadcast}) socketpair(0x28, 0x2, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18020000fcffffff000000000000210085000000360000009500070000000000b83f3584230b8f5ec8921327291cf4880dd3a91af830f8a476ba1b51d4eb67103b000000000000000000000000000000640f9922d207e93470686f20ad"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r10, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0xc00d, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) 432.849502ms ago: executing program 0 (id=2651): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000800000002000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@bloom_filter={0x1e, 0x7, 0x8000, 0xf677, 0x20288, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x4, 0xd, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000200000000000000000818110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='freezer.self_freezing\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0xfc, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x8000, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x9, 0x4, 0x6296, 0x4, 0xffffffffffffffff, 0x681d, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x0, 0xf, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000140)=ANY=[], 0xfffffdef) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xa) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r6, &(0x7f0000000980), 0x20000992) close(r3) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r7, 0xffffffffffffffff, 0x26}, 0x10) 292.847274ms ago: executing program 2 (id=2652): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYRESDEC, @ANYRES32, @ANYRES8=0x0], 0x0, 0x384d, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e00000008000000f8fffffff8ffffff00020000", @ANYRESOCT=r0, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200000000000000030000000a00"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000900)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x33, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x5452, 0x20001439) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000008, 0x4}, 0x100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x228, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100a07, 0x0, 0x5, 0x8, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000000000000000000010000000000140000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b7040000000000008500000001"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x13, &(0x7f00000004c0)=ANY=[@ANYRES64=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000e472ed49ea89e6010000000000005f000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f00000007c0)=ANY=[@ANYRESDEC, @ANYRES64=r0, @ANYRES8, @ANYRES16=0x0, @ANYRES16, @ANYRES8, @ANYBLOB="905b1e759957959572e21e17062644125670a4c15b8a514b9d25e766872ae21bf1fe36086a10ed54bd10f82d05dab7cac714b01c2999738ba486fd9e199a742fb592320287659b024e218d6c281a79d5e7204d2c90d27385dc6f4e9e2ec26de25c970395fcbe341683453b808995cb429941e07e60a892a2819c982c3bbb6a9ab1d0391a766d3eb8e2c7a8e11b9850955daeb327abdcd6c86fd4b07cb96f7566f1f7cb14", @ANYRESDEC=r3, @ANYBLOB="bfebb8abeb4befb867992bea0b67bcf34abef5bec67a97926fe0664dc7d47de6c9cf42217b2ec86ae543606169b42b37c07adfd1a0465a9d354415692b9ef071cea13017f7f1d44ec874c2d03b812ba1ae56a3d75463d00158"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x19, 0x0, 0x0, 0x8000, 0x1300, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000797d00"/20, @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='task_rename\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffeffffffff}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000280)={'veth0_to_team\x00', @multicast}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) 137.726288ms ago: executing program 3 (id=2653): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x23, 0x4, 0x9, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x40000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) close(r2) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x7f, 0x7, 0x0, 0x0, 0x0, 0x0, 0xac041, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000280), 0xf}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x800, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001100)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000400000000000e1ff95000000000000002ba76bb3019c1341056bd8174b79603123751c4e345c652fbc1626cca2a2ad75806150ae0209e62751ee00aa19ce670d25010000020000040000009fc404000000c788b277beee1cbf9b0a4def23d410f6accd3641110bec4e90a6341965dac05c04683712a0b09ec39e9ef8f6e396ad200e011ea665c45a3449abe802f5ab3e89cf40b8580218ce740068720000074e468eea3fcfcf498278a315f5b87e1c26433a8acd715f5888b2007f00000000000000000100000000000000010015d60605000053350000000034a70c2ab40c7cf5691db43a5c00000000000000f030007ce2c6f800000000000000e75a89faff01218087560cce39bf405f1e846c1242000000000040cad326ad7add65873d9f87463ad6f7c2e8ee1a39244960b318778f2a047f6d5bef5d7d617da7a6520655a805608df4d431623c850af895abba14f6fbd7fb5e2a431ab9142f3a06d55740a43088696daaed74b9c5c29647d2f950a959cf050000008600a62e96b7cb8e52cbdc2ba9d580609e31c30879d6fce424c2208af6c3784a1975fa657de38a3a32e4fd67ce446adb431d07db79241aca1dd9ba02453bbb5ee8babe1745e645f091231b986e952afdac972f342c6f184777d05d988d6edc71df0100000013a38300cabf2b554380ad215c789bef4cc574109b8df8d9a9db669557b3809d8c396d2c0361629d1822f722ec23812770d72cd00100000078a75dea785be550dbb420287e0789b8c7044f563a1f68d4efe895fdbc463f747c08f4010586903500000000000000e800000000000000000000000000000000000000003ddf4aa4b1c8b8a0ae6fb5425f1d581961471cdb51f8940290e99ccff4123f955267fe4a75c11448741f064fc7ce7e62ee4df874e086287547d4099aeec9f1538ee25a2a5ccf4a9b604e88e12ff25184d4e3c6f7f623559435b2c505fb711300000000040000000000000000000000000000e67ccc02148a4fc43021cce9f24f4b2f9492c32e7a92a557ac2b44b84e88bbf7a49789906d923e4916f390ab7edcd3f5b9fe14446dd446a52131c464f2c08efb46d934615c8631b7c42efd029406000000433f5c899119ec0c0acef5385c5a2720caeb68f1e9c05b0591d89467ded84da092dea262e51811e2d7fa515722516bd5ef6c8c4966e5937562a5648a696ad3a042a7097ddefe0671a5767014b09ddbf69b78f977fb145890f5bf41ba92b8c4c8b14f0d4a880ef4518bb32879d326497e21e041254f06bd7f3a067e147e82e841dba3867da8bfbc101d3960e07d282f483e7b49991be06b950ccd48f4e49833f3c4a02bbd06c84680549f9eb16682ecb722e8ffaca907a3eaaebfc8e0a47c0076d7cc9d32b3cc96aa751d890881c3c33bd91f6ecf45ab3f12f816318346f9b883427b9190024edc1eddd68f34ce3bfedb5fe5d7beae4d3ca561e37570587783f9673e7ab17f5a09efc1114777d2707d2996961203aedff1c52108d9c0d51dc30209872ec602af42eb29d54a37be0fdfdcd74c2d859a566ee5c30677173a2592a4617ae08bec07422d52d2ba7271550a5c20e3a8d1c8c8fd3025ff00607b2249ae9a18391e01b21b36169790b8e96f7955754b6b01a75165d3573d1dec5cf1b08b6115b43203a5654cce2277eb4c02ef4817b4cb989ac178895810eff7b697f2dc9b308aa2460e3cb85cdc4833571a62bf310700000000000000cc7f923284230ada8c756096a66119d4b6b2f159585c3cf8e7bfdd619e294b1d21cd491b8cfd4a253856e485fe29c6ad177a9fb078ca905782b9ed3c30675b89a784bb8031cac0de95178a5acff029a0f0fe972df22b20afe95fba722056f94ab15f1cf605c33df627311f1b614684d77549"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x0, 0x0, 0x0, &(0x7f0000000440), 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000200)=0x7fff) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x20300000, &(0x7f0000001100)="6182062d904bb7ec9345d9e682ebc0c3e66f1d80f4c2d57f03eb1e4a28e1eb96c01309836b5983ddab68ec400586021806e88718ca761e7825cccb5eea705bf31b8c60d9d3cf8cdb92303e2d01922c1053292a7161d11f944dd527543dce940bb9eb24e4abf129a3abaf5342486e34b00d9e0b21f9062982c1a2f0722f76f491758f27860011997ab197bfc195399f6db06d6969590ee705284509594319c388cb693a5a4c006608833fa82c0b0e2f79be65d59a51370113e6cb1755a5c28fb04510ccab052096f6c02cc762df664baae3650f6390f5fb8fa64514ef830b3f0da3a21315b4d14dbff7cd0ad285595c360b19fd036071", 0xf6, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000001000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000600)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000080), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[@ANYBLOB='+pids'], 0x6) write$cgroup_subtree(r6, &(0x7f0000000500)={[{0x2d, 'pids'}, {0x2b, 'cpu'}]}, 0xb) 0s ago: executing program 3 (id=2655): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x50, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f00000300000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000060000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000240)={{r9, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000000)='%pS \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r10, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x16, 0x10, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000ffff0b867b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r11, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_freezer_state(r0, &(0x7f0000000380), 0x2, 0x0) r12 = openat$cgroup_freezer_state(r0, &(0x7f0000002b00), 0x2, 0x0) close(r12) kernel console output (not intermixed with test programs): .127433][ T1786] dump_stack+0x15/0x20 [ 85.131424][ T1786] should_fail+0x3c6/0x510 [ 85.135675][ T1786] __should_failslab+0xa4/0xe0 [ 85.140274][ T1786] should_failslab+0x9/0x20 [ 85.144651][ T1786] slab_pre_alloc_hook+0x37/0xd0 [ 85.149390][ T1786] ? do_vfs_ioctl+0x162c/0x2a80 [ 85.154080][ T1786] __kmalloc_track_caller+0x6c/0x260 [ 85.159201][ T1786] ? do_vfs_ioctl+0x162c/0x2a80 [ 85.163969][ T1786] memdup_user+0x25/0xb0 [ 85.168050][ T1786] do_vfs_ioctl+0x162c/0x2a80 [ 85.172563][ T1786] ? kstrtol_from_user+0x310/0x310 [ 85.177514][ T1786] ? __x64_compat_sys_ioctl+0x90/0x90 [ 85.182720][ T1786] ? __kasan_check_write+0x14/0x20 [ 85.187665][ T1786] ? proc_fail_nth_write+0x20b/0x290 [ 85.192783][ T1786] ? selinux_file_permission+0x2c4/0x570 [ 85.198250][ T1786] ? ioctl_has_perm+0x1f8/0x560 [ 85.202948][ T1786] ? ioctl_has_perm+0x3f5/0x560 [ 85.207635][ T1786] ? has_cap_mac_admin+0x3c0/0x3c0 [ 85.212575][ T1786] ? file_end_write+0x1c0/0x1c0 [ 85.217262][ T1786] ? selinux_file_ioctl+0x3cc/0x540 [ 85.222293][ T1786] ? __mutex_lock_slowpath+0x10/0x10 [ 85.227415][ T1786] ? selinux_file_alloc_security+0x120/0x120 [ 85.233233][ T1786] ? __fget_files+0x31e/0x380 [ 85.237752][ T1786] ? security_file_ioctl+0x84/0xb0 [ 85.242691][ T1786] __se_sys_ioctl+0x99/0x190 [ 85.247119][ T1786] __x64_sys_ioctl+0x7b/0x90 [ 85.251626][ T1786] x64_sys_call+0x98/0x9a0 [ 85.255881][ T1786] do_syscall_64+0x3b/0xb0 [ 85.260138][ T1786] ? clear_bhb_loop+0x35/0x90 [ 85.264660][ T1786] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 85.270376][ T1786] RIP: 0033:0x7ff4fd491ef9 [ 85.274630][ T1786] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 85.294073][ T1786] RSP: 002b:00007ff4fc10b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 85.302314][ T1786] RAX: ffffffffffffffda RBX: 00007ff4fd649f80 RCX: 00007ff4fd491ef9 [ 85.310125][ T1786] RDX: 000000001ffffffc RSI: 00000000c0189436 RDI: 0000000000000005 [ 85.317940][ T1786] RBP: 00007ff4fc10b090 R08: 0000000000000000 R09: 0000000000000000 [ 85.325855][ T1786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 85.333996][ T1786] R13: 0000000000000000 R14: 00007ff4fd649f80 R15: 00007ffe81bbe188 [ 85.341809][ T1786] [ 85.653451][ T1804] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 87.294474][ T1840] FAULT_INJECTION: forcing a failure. [ 87.294474][ T1840] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 87.308569][ T1840] CPU: 1 PID: 1840 Comm: syz.4.456 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 87.318194][ T1840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 87.328089][ T1840] Call Trace: [ 87.331213][ T1840] [ 87.333988][ T1840] dump_stack_lvl+0x151/0x1c0 [ 87.338504][ T1840] ? io_uring_drop_tctx_refs+0x190/0x190 [ 87.343974][ T1840] dump_stack+0x15/0x20 [ 87.348052][ T1840] should_fail+0x3c6/0x510 [ 87.352301][ T1840] should_fail_usercopy+0x1a/0x20 [ 87.357162][ T1840] _copy_from_user+0x20/0xd0 [ 87.361593][ T1840] ___sys_recvmsg+0x150/0x690 [ 87.366105][ T1840] ? __sys_recvmsg+0x260/0x260 [ 87.370709][ T1840] ? __fdget+0x1bc/0x240 [ 87.374786][ T1840] __x64_sys_recvmsg+0x1dc/0x2b0 [ 87.379782][ T1840] ? ___sys_recvmsg+0x690/0x690 [ 87.384466][ T1840] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 87.390375][ T1840] ? exit_to_user_mode_prepare+0x39/0xa0 [ 87.395844][ T1840] x64_sys_call+0x171/0x9a0 [ 87.400177][ T1840] do_syscall_64+0x3b/0xb0 [ 87.404441][ T1840] ? clear_bhb_loop+0x35/0x90 [ 87.408941][ T1840] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 87.414670][ T1840] RIP: 0033:0x7f38e8f26ef9 [ 87.418920][ T1840] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 87.438547][ T1840] RSP: 002b:00007f38e7ba0038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 87.446796][ T1840] RAX: ffffffffffffffda RBX: 00007f38e90def80 RCX: 00007f38e8f26ef9 [ 87.454601][ T1840] RDX: 0000000000000000 RSI: 0000000020000900 RDI: 0000000000000009 [ 87.462416][ T1840] RBP: 00007f38e7ba0090 R08: 0000000000000000 R09: 0000000000000000 [ 87.470234][ T1840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 87.478043][ T1840] R13: 0000000000000000 R14: 00007f38e90def80 R15: 00007ffe42ea40f8 [ 87.485850][ T1840] [ 88.631982][ T1871] FAULT_INJECTION: forcing a failure. [ 88.631982][ T1871] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 88.717726][ T1871] CPU: 1 PID: 1871 Comm: syz.2.466 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 88.727374][ T1871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 88.737261][ T1871] Call Trace: [ 88.740391][ T1871] [ 88.743162][ T1871] dump_stack_lvl+0x151/0x1c0 [ 88.747676][ T1871] ? io_uring_drop_tctx_refs+0x190/0x190 [ 88.753148][ T1871] dump_stack+0x15/0x20 [ 88.757134][ T1871] should_fail+0x3c6/0x510 [ 88.761389][ T1871] should_fail_usercopy+0x1a/0x20 [ 88.766255][ T1871] _copy_to_user+0x20/0x90 [ 88.770514][ T1871] simple_read_from_buffer+0xc7/0x150 [ 88.775711][ T1871] proc_fail_nth_read+0x1a3/0x210 [ 88.780571][ T1871] ? proc_fault_inject_write+0x390/0x390 [ 88.786040][ T1871] ? fsnotify_perm+0x470/0x5d0 [ 88.790646][ T1871] ? security_file_permission+0x86/0xb0 [ 88.796116][ T1871] ? proc_fault_inject_write+0x390/0x390 [ 88.801576][ T1871] vfs_read+0x27d/0xd40 [ 88.805569][ T1871] ? kernel_read+0x1f0/0x1f0 [ 88.809993][ T1871] ? __kasan_check_write+0x14/0x20 [ 88.815120][ T1871] ? mutex_lock+0xb6/0x1e0 [ 88.819368][ T1871] ? wait_for_completion_killable_timeout+0x10/0x10 [ 88.825795][ T1871] ? __fdget_pos+0x2e7/0x3a0 [ 88.830214][ T1871] ? ksys_read+0x77/0x2c0 [ 88.834384][ T1871] ksys_read+0x199/0x2c0 [ 88.838464][ T1871] ? __blkcg_punt_bio_submit+0x180/0x180 [ 88.843931][ T1871] ? vfs_write+0x1110/0x1110 [ 88.848443][ T1871] __x64_sys_read+0x7b/0x90 [ 88.852794][ T1871] x64_sys_call+0x28/0x9a0 [ 88.857034][ T1871] do_syscall_64+0x3b/0xb0 [ 88.861284][ T1871] ? clear_bhb_loop+0x35/0x90 [ 88.865801][ T1871] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 88.871528][ T1871] RIP: 0033:0x7f418e57b93c [ 88.875783][ T1871] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 88.895230][ T1871] RSP: 002b:00007f418d1f6030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 88.903468][ T1871] RAX: ffffffffffffffda RBX: 00007f418e734f80 RCX: 00007f418e57b93c [ 88.911279][ T1871] RDX: 000000000000000f RSI: 00007f418d1f60a0 RDI: 0000000000000008 [ 88.919100][ T1871] RBP: 00007f418d1f6090 R08: 0000000000000000 R09: 0000000000000000 [ 88.926908][ T1871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 88.934715][ T1871] R13: 0000000000000000 R14: 00007f418e734f80 R15: 00007ffe6f6039b8 [ 88.942537][ T1871] [ 107.963419][ T290] syz-executor (290) used greatest stack depth: 20880 bytes left [ 108.045716][ T289] syz-executor (289) used greatest stack depth: 20800 bytes left [ 108.111561][ T1931] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.118412][ T1931] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.125734][ T1931] device bridge_slave_0 entered promiscuous mode [ 108.133782][ T1931] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.140965][ T1931] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.148193][ T1931] device bridge_slave_1 entered promiscuous mode [ 108.170692][ T1932] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.177532][ T1932] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.184850][ T1932] device bridge_slave_0 entered promiscuous mode [ 108.193003][ T1932] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.200009][ T1932] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.207040][ T1932] device bridge_slave_1 entered promiscuous mode [ 108.225096][ T1934] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.232012][ T1934] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.239332][ T1934] device bridge_slave_0 entered promiscuous mode [ 108.246964][ T1934] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.253959][ T1934] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.261156][ T1934] device bridge_slave_1 entered promiscuous mode [ 108.325121][ T1933] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.332005][ T1933] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.339255][ T1933] device bridge_slave_0 entered promiscuous mode [ 108.355925][ T1930] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.362801][ T1930] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.370018][ T1930] device bridge_slave_0 entered promiscuous mode [ 108.376447][ T1933] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.383460][ T1933] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.390642][ T1933] device bridge_slave_1 entered promiscuous mode [ 108.401448][ T1930] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.408282][ T1930] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.415566][ T1930] device bridge_slave_1 entered promiscuous mode [ 108.562116][ T1931] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.569509][ T1931] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.576595][ T1931] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.583397][ T1931] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.607854][ T1934] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.614727][ T1934] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.621847][ T1934] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.628608][ T1934] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.638357][ T432] device bridge_slave_1 left promiscuous mode [ 108.644517][ T432] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.651774][ T432] device bridge_slave_0 left promiscuous mode [ 108.657684][ T432] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.665160][ T432] device veth1_macvtap left promiscuous mode [ 108.671060][ T432] device veth0_vlan left promiscuous mode [ 108.731108][ T1932] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.738156][ T1932] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.745571][ T1932] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.752435][ T1932] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.763834][ T1933] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.770707][ T1933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.777898][ T1933] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.784694][ T1933] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.805419][ T1930] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.812290][ T1930] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.819409][ T1930] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.826155][ T1930] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.876229][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 108.883814][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 108.891654][ T314] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.898626][ T314] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.905923][ T314] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.912968][ T314] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.920054][ T314] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.927177][ T314] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.934502][ T314] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.941471][ T314] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.948419][ T314] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.955387][ T314] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.981043][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 108.989145][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 108.997328][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.005701][ T416] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.012649][ T416] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.019897][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.028005][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.036329][ T416] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.043171][ T416] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.050370][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 109.058158][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 109.066456][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 109.074269][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 109.082054][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 109.089325][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.096500][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.104628][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.112539][ T416] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.119373][ T416] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.126550][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.134680][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.142610][ T416] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.149447][ T416] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.165286][ T1933] device veth0_vlan entered promiscuous mode [ 109.181070][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 109.189532][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 109.197218][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 109.205151][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 109.212422][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 109.220132][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.228153][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.236109][ T314] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.242944][ T314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.250165][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.258220][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.266224][ T314] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.273067][ T314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.280320][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 109.302968][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 109.310323][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.317467][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 109.325385][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 109.333355][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 109.341179][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.349312][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.357232][ T415] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.364087][ T415] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.371493][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.379670][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.387560][ T415] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.394326][ T415] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.405771][ T1931] device veth0_vlan entered promiscuous mode [ 109.415152][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 109.423000][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 109.430372][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 109.438009][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 109.445960][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 109.455443][ T1933] device veth1_macvtap entered promiscuous mode [ 109.474379][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 109.482710][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 109.490763][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.498076][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.506294][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.514462][ T416] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.521299][ T416] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.528560][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.536761][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.544713][ T416] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.551555][ T416] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.558701][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 109.566515][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 109.580557][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 109.596012][ T1931] device veth1_macvtap entered promiscuous mode [ 109.608289][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 109.617669][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 109.625872][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 109.634006][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 109.644464][ T1934] device veth0_vlan entered promiscuous mode [ 109.658537][ T1930] device veth0_vlan entered promiscuous mode [ 109.665184][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 109.673056][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 109.680602][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 109.688100][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 109.695956][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 109.704008][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 109.712397][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 109.720767][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 109.728029][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 109.743146][ T30] audit: type=1400 audit(1725949622.187:132): avc: denied { mounton } for pid=1931 comm="syz-executor" path="/root/syzkaller.ocNLRV/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 109.768288][ T30] audit: type=1400 audit(1725949622.197:133): avc: denied { mount } for pid=1931 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 109.790472][ T30] audit: type=1400 audit(1725949622.207:134): avc: denied { mounton } for pid=1931 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 109.818087][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 109.826737][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 109.835643][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 109.843978][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 109.865790][ T1934] device veth1_macvtap entered promiscuous mode [ 109.877167][ T1932] device veth0_vlan entered promiscuous mode [ 109.889031][ T1930] device veth1_macvtap entered promiscuous mode [ 109.909044][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 109.917831][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 109.926102][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 110.009827][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 110.093772][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 110.152490][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 110.295232][ T1932] device veth1_macvtap entered promiscuous mode [ 110.502277][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 110.535117][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 110.604797][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 110.652759][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 110.704011][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 110.784709][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 110.792971][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 110.800602][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 110.809492][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 110.817725][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 110.825996][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 111.059273][ T417] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 111.067406][ T417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 111.092709][ T417] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 111.101284][ T417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 111.205285][ T1968] FAULT_INJECTION: forcing a failure. [ 111.205285][ T1968] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 111.243477][ T1968] CPU: 1 PID: 1968 Comm: syz.2.479 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 111.253109][ T1968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 111.263008][ T1968] Call Trace: [ 111.266127][ T1968] [ 111.268906][ T1968] dump_stack_lvl+0x151/0x1c0 [ 111.273421][ T1968] ? io_uring_drop_tctx_refs+0x190/0x190 [ 111.274205][ T30] audit: type=1400 audit(1725949623.687:135): avc: denied { create } for pid=1971 comm="syz.0.485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 111.278885][ T1968] dump_stack+0x15/0x20 [ 111.278907][ T1968] should_fail+0x3c6/0x510 [ 111.306233][ T1968] should_fail_usercopy+0x1a/0x20 [ 111.311087][ T1968] _copy_from_user+0x20/0xd0 [ 111.313249][ T30] audit: type=1400 audit(1725949623.687:136): avc: denied { setopt } for pid=1971 comm="syz.0.485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 111.315512][ T1968] __sys_bpf+0x1e9/0x760 [ 111.338685][ T1968] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 111.343897][ T1968] ? debug_smp_processor_id+0x17/0x20 [ 111.349098][ T1968] __x64_sys_bpf+0x7c/0x90 [ 111.353350][ T1968] x64_sys_call+0x87f/0x9a0 [ 111.357691][ T1968] do_syscall_64+0x3b/0xb0 [ 111.361944][ T1968] ? clear_bhb_loop+0x35/0x90 [ 111.366458][ T1968] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 111.372186][ T1968] RIP: 0033:0x7f6c33024ef9 [ 111.376440][ T1968] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 111.395890][ T1968] RSP: 002b:00007f6c31c9e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 111.404131][ T1968] RAX: ffffffffffffffda RBX: 00007f6c331dcf80 RCX: 00007f6c33024ef9 [ 111.411945][ T1968] RDX: 0000000000000038 RSI: 00000000200003c0 RDI: 0000000000000018 [ 111.419747][ T1968] RBP: 00007f6c31c9e090 R08: 0000000000000000 R09: 0000000000000000 [ 111.427559][ T1968] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 111.435371][ T1968] R13: 0000000000000000 R14: 00007f6c331dcf80 R15: 00007fffffe948e8 [ 111.443193][ T1968] [ 111.487201][ T1972] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.495870][ T1972] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.049676][ T30] audit: type=1400 audit(1725949624.497:137): avc: denied { write } for pid=1989 comm="syz.0.490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 112.286895][ T30] audit: type=1400 audit(1725949624.597:138): avc: denied { read } for pid=1989 comm="syz.0.490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 113.017436][ T2019] FAULT_INJECTION: forcing a failure. [ 113.017436][ T2019] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 113.220584][ T2019] CPU: 1 PID: 2019 Comm: syz.3.497 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 113.230223][ T2019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 113.240119][ T2019] Call Trace: [ 113.243240][ T2019] [ 113.246034][ T2019] dump_stack_lvl+0x151/0x1c0 [ 113.250540][ T2019] ? io_uring_drop_tctx_refs+0x190/0x190 [ 113.256002][ T2019] ? enqueue_hrtimer+0xca/0x240 [ 113.260694][ T2019] dump_stack+0x15/0x20 [ 113.264684][ T2019] should_fail+0x3c6/0x510 [ 113.268931][ T2019] should_fail_usercopy+0x1a/0x20 [ 113.273794][ T2019] _copy_from_user+0x20/0xd0 [ 113.278218][ T2019] __sys_bpf+0x1e9/0x760 [ 113.282297][ T2019] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 113.287508][ T2019] ? debug_smp_processor_id+0x17/0x20 [ 113.292715][ T2019] __x64_sys_bpf+0x7c/0x90 [ 113.296968][ T2019] x64_sys_call+0x87f/0x9a0 [ 113.301307][ T2019] do_syscall_64+0x3b/0xb0 [ 113.305553][ T2019] ? clear_bhb_loop+0x35/0x90 [ 113.310072][ T2019] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 113.315799][ T2019] RIP: 0033:0x7f8990319ef9 [ 113.320053][ T2019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 113.339493][ T2019] RSP: 002b:00007f898ef93038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 113.347737][ T2019] RAX: ffffffffffffffda RBX: 00007f89904d1f80 RCX: 00007f8990319ef9 [ 113.355546][ T2019] RDX: 0000000000000038 RSI: 00000000200003c0 RDI: 0000000000000018 [ 113.363362][ T2019] RBP: 00007f898ef93090 R08: 0000000000000000 R09: 0000000000000000 [ 113.371169][ T2019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 113.378988][ T2019] R13: 0000000000000000 R14: 00007f89904d1f80 R15: 00007ffc4d143a08 [ 113.386797][ T2019] [ 113.756154][ T432] device bridge_slave_1 left promiscuous mode [ 113.769354][ T432] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.793348][ T432] device bridge_slave_0 left promiscuous mode [ 113.800713][ T432] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.808544][ T432] device bridge_slave_1 left promiscuous mode [ 113.853391][ T432] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.874432][ T432] device bridge_slave_0 left promiscuous mode [ 113.883244][ T432] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.898048][ T432] device bridge_slave_1 left promiscuous mode [ 113.908386][ T432] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.927656][ T432] device bridge_slave_0 left promiscuous mode [ 113.959382][ T432] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.970364][ T432] device bridge_slave_1 left promiscuous mode [ 113.976473][ T432] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.075713][ T432] device bridge_slave_0 left promiscuous mode [ 114.137477][ T432] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.219869][ T432] device veth1_macvtap left promiscuous mode [ 114.277068][ T432] device veth0_vlan left promiscuous mode [ 114.352475][ T432] device veth1_macvtap left promiscuous mode [ 114.358310][ T432] device veth0_vlan left promiscuous mode [ 114.432331][ T432] device veth1_macvtap left promiscuous mode [ 114.481294][ T432] device veth0_vlan left promiscuous mode [ 114.542105][ T432] device veth1_macvtap left promiscuous mode [ 114.567673][ T432] device veth0_vlan left promiscuous mode [ 116.566008][ T2065] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.588007][ T2065] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.655549][ T2092] FAULT_INJECTION: forcing a failure. [ 117.655549][ T2092] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 117.739356][ T2092] CPU: 1 PID: 2092 Comm: syz.0.519 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 117.749022][ T2092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 117.758059][ T100] udevd[100]: worker [1922] terminated by signal 33 (Unknown signal 33) [ 117.758920][ T2092] Call Trace: [ 117.758927][ T2092] [ 117.758934][ T2092] dump_stack_lvl+0x151/0x1c0 [ 117.777491][ T2092] ? io_uring_drop_tctx_refs+0x190/0x190 [ 117.782960][ T2092] dump_stack+0x15/0x20 [ 117.786946][ T2092] should_fail+0x3c6/0x510 [ 117.791201][ T2092] should_fail_usercopy+0x1a/0x20 [ 117.794704][ T100] udevd[100]: worker [1922] failed while handling '/devices/virtual/block/loop0' [ 117.796063][ T2092] _copy_from_user+0x20/0xd0 [ 117.809425][ T2092] ___sys_recvmsg+0x150/0x690 [ 117.813939][ T2092] ? __sys_recvmsg+0x260/0x260 [ 117.818540][ T2092] ? __fdget+0x1bc/0x240 [ 117.822615][ T2092] __x64_sys_recvmsg+0x1dc/0x2b0 [ 117.827388][ T2092] ? ___sys_recvmsg+0x690/0x690 [ 117.832083][ T2092] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 117.837990][ T2092] ? exit_to_user_mode_prepare+0x39/0xa0 [ 117.843535][ T2092] x64_sys_call+0x171/0x9a0 [ 117.847871][ T2092] do_syscall_64+0x3b/0xb0 [ 117.852123][ T2092] ? clear_bhb_loop+0x35/0x90 [ 117.856637][ T2092] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 117.862365][ T2092] RIP: 0033:0x7f7376520ef9 [ 117.866620][ T2092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 117.886060][ T2092] RSP: 002b:00007f737519a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 117.894304][ T2092] RAX: ffffffffffffffda RBX: 00007f73766d8f80 RCX: 00007f7376520ef9 [ 117.902115][ T2092] RDX: 0000000000000000 RSI: 0000000020000900 RDI: 0000000000000009 [ 117.909926][ T2092] RBP: 00007f737519a090 R08: 0000000000000000 R09: 0000000000000000 [ 117.917737][ T2092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 117.925548][ T2092] R13: 0000000000000000 R14: 00007f73766d8f80 R15: 00007ffeb6ce2d18 [ 117.933364][ T2092] [ 117.940298][ T100] udevd[100]: worker [2094] terminated by signal 33 (Unknown signal 33) [ 117.948580][ T100] udevd[100]: worker [2094] failed while handling '/devices/virtual/block/loop4' [ 118.552927][ T2116] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.573917][ T2116] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.246485][ T2131] FAULT_INJECTION: forcing a failure. [ 119.246485][ T2131] name failslab, interval 1, probability 0, space 0, times 0 [ 119.289245][ T2131] CPU: 1 PID: 2131 Comm: syz.0.531 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 119.298879][ T2131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 119.308769][ T2131] Call Trace: [ 119.311894][ T2131] [ 119.314672][ T2131] dump_stack_lvl+0x151/0x1c0 [ 119.319184][ T2131] ? io_uring_drop_tctx_refs+0x190/0x190 [ 119.324652][ T2131] dump_stack+0x15/0x20 [ 119.328643][ T2131] should_fail+0x3c6/0x510 [ 119.332898][ T2131] __should_failslab+0xa4/0xe0 [ 119.337498][ T2131] should_failslab+0x9/0x20 [ 119.341837][ T2131] slab_pre_alloc_hook+0x37/0xd0 [ 119.346611][ T2131] __kmalloc+0x6d/0x270 [ 119.350601][ T2131] ? __vmalloc_node_range+0x2d6/0x8d0 [ 119.355810][ T2131] __vmalloc_node_range+0x2d6/0x8d0 [ 119.360846][ T2131] bpf_map_area_alloc+0xd9/0xf0 [ 119.365529][ T2131] ? sock_hash_alloc+0x2bf/0x560 [ 119.370303][ T2131] sock_hash_alloc+0x2bf/0x560 [ 119.374904][ T2131] map_create+0x411/0x2050 [ 119.379159][ T2131] __sys_bpf+0x296/0x760 [ 119.383237][ T2131] ? fput_many+0x160/0x1b0 [ 119.387493][ T2131] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 119.392702][ T2131] ? debug_smp_processor_id+0x17/0x20 [ 119.397905][ T2131] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 119.403807][ T2131] __x64_sys_bpf+0x7c/0x90 [ 119.408059][ T2131] x64_sys_call+0x87f/0x9a0 [ 119.412399][ T2131] do_syscall_64+0x3b/0xb0 [ 119.416652][ T2131] ? clear_bhb_loop+0x35/0x90 [ 119.421162][ T2131] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 119.426899][ T2131] RIP: 0033:0x7f7376520ef9 [ 119.431319][ T2131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 119.450772][ T2131] RSP: 002b:00007f737519a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 119.459005][ T2131] RAX: ffffffffffffffda RBX: 00007f73766d8f80 RCX: 00007f7376520ef9 [ 119.466814][ T2131] RDX: 0000000000000048 RSI: 0000000020000600 RDI: 0000000000000000 [ 119.474627][ T2131] RBP: 00007f737519a090 R08: 0000000000000000 R09: 0000000000000000 [ 119.482525][ T2131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 119.490345][ T2131] R13: 0000000000000000 R14: 00007f73766d8f80 R15: 00007ffeb6ce2d18 [ 119.498158][ T2131] [ 119.505825][ T2138] device bridge_slave_1 left promiscuous mode [ 119.524820][ T2138] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.579850][ T2138] device bridge_slave_0 left promiscuous mode [ 119.585844][ T2138] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.617609][ T2164] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.630762][ T2164] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.156683][ T2188] FAULT_INJECTION: forcing a failure. [ 121.156683][ T2188] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 121.190929][ T2188] CPU: 0 PID: 2188 Comm: syz.0.548 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 121.200565][ T2188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 121.210473][ T2188] Call Trace: [ 121.213583][ T2188] [ 121.216371][ T2188] dump_stack_lvl+0x151/0x1c0 [ 121.220874][ T2188] ? io_uring_drop_tctx_refs+0x190/0x190 [ 121.226344][ T2188] dump_stack+0x15/0x20 [ 121.230335][ T2188] should_fail+0x3c6/0x510 [ 121.234592][ T2188] should_fail_usercopy+0x1a/0x20 [ 121.239446][ T2188] _copy_from_user+0x20/0xd0 [ 121.243878][ T2188] __sys_bpf+0x1e9/0x760 [ 121.247952][ T2188] ? fput_many+0x160/0x1b0 [ 121.252204][ T2188] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 121.257422][ T2188] ? debug_smp_processor_id+0x17/0x20 [ 121.262619][ T2188] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 121.268523][ T2188] __x64_sys_bpf+0x7c/0x90 [ 121.272776][ T2188] x64_sys_call+0x87f/0x9a0 [ 121.277115][ T2188] do_syscall_64+0x3b/0xb0 [ 121.281372][ T2188] ? clear_bhb_loop+0x35/0x90 [ 121.286191][ T2188] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 121.291924][ T2188] RIP: 0033:0x7f7376520ef9 [ 121.296257][ T2188] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 121.315874][ T2188] RSP: 002b:00007f737519a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 121.324114][ T2188] RAX: ffffffffffffffda RBX: 00007f73766d8f80 RCX: 00007f7376520ef9 [ 121.331926][ T2188] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000004 [ 121.339740][ T2188] RBP: 00007f737519a090 R08: 0000000000000000 R09: 0000000000000000 [ 121.347552][ T2188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 121.355361][ T2188] R13: 0000000000000000 R14: 00007f73766d8f80 R15: 00007ffeb6ce2d18 [ 121.363182][ T2188] [ 122.040940][ T30] audit: type=1400 audit(1725949634.487:139): avc: denied { create } for pid=2198 comm="syz.2.552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 123.414436][ T2218] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.421466][ T2218] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.912285][ T2242] FAULT_INJECTION: forcing a failure. [ 123.912285][ T2242] name failslab, interval 1, probability 0, space 0, times 0 [ 123.957893][ T2242] CPU: 0 PID: 2242 Comm: syz.4.564 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 123.967530][ T2242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 123.977603][ T2242] Call Trace: [ 123.980721][ T2242] [ 123.983581][ T2242] dump_stack_lvl+0x151/0x1c0 [ 123.988095][ T2242] ? io_uring_drop_tctx_refs+0x190/0x190 [ 123.993562][ T2242] ? __kasan_check_write+0x14/0x20 [ 123.998508][ T2242] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 124.003804][ T2242] dump_stack+0x15/0x20 [ 124.007796][ T2242] should_fail+0x3c6/0x510 [ 124.012050][ T2242] __should_failslab+0xa4/0xe0 [ 124.016649][ T2242] ? dup_task_struct+0x53/0xc60 [ 124.021342][ T2242] should_failslab+0x9/0x20 [ 124.025673][ T2242] slab_pre_alloc_hook+0x37/0xd0 [ 124.030448][ T2242] ? dup_task_struct+0x53/0xc60 [ 124.035232][ T2242] kmem_cache_alloc+0x44/0x200 [ 124.039833][ T2242] dup_task_struct+0x53/0xc60 [ 124.044346][ T2242] ? __kasan_check_write+0x14/0x20 [ 124.049299][ T2242] copy_process+0x5c4/0x3290 [ 124.053723][ T2242] ? __kasan_check_write+0x14/0x20 [ 124.058731][ T2242] ? selinux_file_permission+0x2c4/0x570 [ 124.064134][ T2242] ? proc_fail_nth_read+0x210/0x210 [ 124.069171][ T2242] ? fsnotify_perm+0x6a/0x5d0 [ 124.073685][ T2242] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 124.078627][ T2242] ? vfs_write+0x9ec/0x1110 [ 124.082971][ T2242] kernel_clone+0x21e/0x9e0 [ 124.087309][ T2242] ? __kasan_check_write+0x14/0x20 [ 124.092255][ T2242] ? create_io_thread+0x1e0/0x1e0 [ 124.097117][ T2242] __x64_sys_clone+0x23f/0x290 [ 124.101717][ T2242] ? __do_sys_vfork+0x130/0x130 [ 124.106404][ T2242] ? debug_smp_processor_id+0x17/0x20 [ 124.111611][ T2242] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 124.117600][ T2242] ? exit_to_user_mode_prepare+0x39/0xa0 [ 124.123069][ T2242] x64_sys_call+0x1b0/0x9a0 [ 124.127405][ T2242] do_syscall_64+0x3b/0xb0 [ 124.131659][ T2242] ? clear_bhb_loop+0x35/0x90 [ 124.136175][ T2242] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 124.141900][ T2242] RIP: 0033:0x7f344a969ef9 [ 124.146157][ T2242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 124.165596][ T2242] RSP: 002b:00007f34495e2fe8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 124.173925][ T2242] RAX: ffffffffffffffda RBX: 00007f344ab21f80 RCX: 00007f344a969ef9 [ 124.181743][ T2242] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7016 [ 124.189553][ T2242] RBP: 00007f34495e3090 R08: 0000000000000000 R09: 0000000000000000 [ 124.197360][ T2242] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001 [ 124.205174][ T2242] R13: 0000000000000000 R14: 00007f344ab21f80 R15: 00007fffcbe62148 [ 124.212989][ T2242] [ 124.335882][ T2248] device pim6reg1 entered promiscuous mode [ 125.378935][ T2284] FAULT_INJECTION: forcing a failure. [ 125.378935][ T2284] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 125.419275][ T2284] CPU: 1 PID: 2284 Comm: syz.0.575 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 125.428911][ T2284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 125.438807][ T2284] Call Trace: [ 125.441930][ T2284] [ 125.444706][ T2284] dump_stack_lvl+0x151/0x1c0 [ 125.449219][ T2284] ? io_uring_drop_tctx_refs+0x190/0x190 [ 125.454706][ T2284] dump_stack+0x15/0x20 [ 125.458886][ T2284] should_fail+0x3c6/0x510 [ 125.463138][ T2284] should_fail_usercopy+0x1a/0x20 [ 125.468007][ T2284] _copy_from_user+0x20/0xd0 [ 125.472426][ T2284] __sys_bpf+0x1e9/0x760 [ 125.476502][ T2284] ? fput_many+0x160/0x1b0 [ 125.480769][ T2284] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 125.486399][ T2284] ? debug_smp_processor_id+0x17/0x20 [ 125.491604][ T2284] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 125.497507][ T2284] __x64_sys_bpf+0x7c/0x90 [ 125.501769][ T2284] x64_sys_call+0x87f/0x9a0 [ 125.506099][ T2284] do_syscall_64+0x3b/0xb0 [ 125.510352][ T2284] ? clear_bhb_loop+0x35/0x90 [ 125.514863][ T2284] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 125.520591][ T2284] RIP: 0033:0x7f7376520ef9 [ 125.524844][ T2284] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 125.544292][ T2284] RSP: 002b:00007f737519a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 125.552533][ T2284] RAX: ffffffffffffffda RBX: 00007f73766d8f80 RCX: 00007f7376520ef9 [ 125.560344][ T2284] RDX: 0000000000000048 RSI: 00000000200000c0 RDI: 0000000000000000 [ 125.568156][ T2284] RBP: 00007f737519a090 R08: 0000000000000000 R09: 0000000000000000 [ 125.575962][ T2284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 125.583812][ T2284] R13: 0000000000000001 R14: 00007f73766d8f80 R15: 00007ffeb6ce2d18 [ 125.591593][ T2284] [ 126.638872][ T2328] FAULT_INJECTION: forcing a failure. [ 126.638872][ T2328] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 126.864764][ T2328] CPU: 1 PID: 2328 Comm: syz.1.591 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 126.874406][ T2328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 126.884302][ T2328] Call Trace: [ 126.887422][ T2328] [ 126.890292][ T2328] dump_stack_lvl+0x151/0x1c0 [ 126.894802][ T2328] ? io_uring_drop_tctx_refs+0x190/0x190 [ 126.900271][ T2328] dump_stack+0x15/0x20 [ 126.904261][ T2328] should_fail+0x3c6/0x510 [ 126.908514][ T2328] should_fail_usercopy+0x1a/0x20 [ 126.913374][ T2328] _copy_from_user+0x20/0xd0 [ 126.917800][ T2328] __sys_bpf+0x1e9/0x760 [ 126.921879][ T2328] ? fput_many+0x160/0x1b0 [ 126.926132][ T2328] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 126.931344][ T2328] ? debug_smp_processor_id+0x17/0x20 [ 126.936547][ T2328] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 126.942459][ T2328] __x64_sys_bpf+0x7c/0x90 [ 126.946790][ T2328] x64_sys_call+0x87f/0x9a0 [ 126.951126][ T2328] do_syscall_64+0x3b/0xb0 [ 126.955392][ T2328] ? clear_bhb_loop+0x35/0x90 [ 126.959892][ T2328] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 126.965654][ T2328] RIP: 0033:0x7f44b8fa4ef9 [ 126.969876][ T2328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 126.989412][ T2328] RSP: 002b:00007f44b7c1e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 126.997648][ T2328] RAX: ffffffffffffffda RBX: 00007f44b915cf80 RCX: 00007f44b8fa4ef9 [ 127.005459][ T2328] RDX: 0000000000000048 RSI: 00000000200000c0 RDI: 0000000000000000 [ 127.013444][ T2328] RBP: 00007f44b7c1e090 R08: 0000000000000000 R09: 0000000000000000 [ 127.021257][ T2328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 127.029061][ T2328] R13: 0000000000000001 R14: 00007f44b915cf80 R15: 00007fff30234b38 [ 127.036881][ T2328] [ 127.740954][ T2362] FAULT_INJECTION: forcing a failure. [ 127.740954][ T2362] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 127.805058][ T2362] CPU: 0 PID: 2362 Comm: syz.1.601 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 127.814697][ T2362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 127.824592][ T2362] Call Trace: [ 127.827713][ T2362] [ 127.830494][ T2362] dump_stack_lvl+0x151/0x1c0 [ 127.835012][ T2362] ? io_uring_drop_tctx_refs+0x190/0x190 [ 127.840482][ T2362] dump_stack+0x15/0x20 [ 127.844463][ T2362] should_fail+0x3c6/0x510 [ 127.848766][ T2362] should_fail_usercopy+0x1a/0x20 [ 127.853578][ T2362] _copy_from_user+0x20/0xd0 [ 127.858013][ T2362] ___sys_recvmsg+0x150/0x690 [ 127.862521][ T2362] ? __sys_recvmsg+0x260/0x260 [ 127.867140][ T2362] ? __fdget+0x1bc/0x240 [ 127.871203][ T2362] __x64_sys_recvmsg+0x1dc/0x2b0 [ 127.875976][ T2362] ? ___sys_recvmsg+0x690/0x690 [ 127.880661][ T2362] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 127.886560][ T2362] ? exit_to_user_mode_prepare+0x39/0xa0 [ 127.892028][ T2362] x64_sys_call+0x171/0x9a0 [ 127.896364][ T2362] do_syscall_64+0x3b/0xb0 [ 127.900615][ T2362] ? clear_bhb_loop+0x35/0x90 [ 127.905158][ T2362] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 127.910860][ T2362] RIP: 0033:0x7f44b8fa4ef9 [ 127.915113][ T2362] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 127.934552][ T2362] RSP: 002b:00007f44b7c1e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 127.942797][ T2362] RAX: ffffffffffffffda RBX: 00007f44b915cf80 RCX: 00007f44b8fa4ef9 [ 127.950608][ T2362] RDX: 0000000000000000 RSI: 0000000020000900 RDI: 0000000000000009 [ 127.958443][ T2362] RBP: 00007f44b7c1e090 R08: 0000000000000000 R09: 0000000000000000 [ 127.966231][ T2362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 127.974041][ T2362] R13: 0000000000000000 R14: 00007f44b915cf80 R15: 00007fff30234b38 [ 127.981858][ T2362] [ 128.661153][ T2386] FAULT_INJECTION: forcing a failure. [ 128.661153][ T2386] name failslab, interval 1, probability 0, space 0, times 0 [ 128.689270][ T2386] CPU: 0 PID: 2386 Comm: syz.0.608 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 128.698904][ T2386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 128.708796][ T2386] Call Trace: [ 128.711923][ T2386] [ 128.714697][ T2386] dump_stack_lvl+0x151/0x1c0 [ 128.719213][ T2386] ? io_uring_drop_tctx_refs+0x190/0x190 [ 128.724687][ T2386] dump_stack+0x15/0x20 [ 128.728669][ T2386] should_fail+0x3c6/0x510 [ 128.733097][ T2386] __should_failslab+0xa4/0xe0 [ 128.737696][ T2386] should_failslab+0x9/0x20 [ 128.742036][ T2386] slab_pre_alloc_hook+0x37/0xd0 [ 128.746810][ T2386] ? do_vfs_ioctl+0x162c/0x2a80 [ 128.751497][ T2386] __kmalloc_track_caller+0x6c/0x260 [ 128.756617][ T2386] ? do_vfs_ioctl+0x162c/0x2a80 [ 128.761306][ T2386] memdup_user+0x25/0xb0 [ 128.765382][ T2386] do_vfs_ioctl+0x162c/0x2a80 [ 128.769912][ T2386] ? kstrtol_from_user+0x310/0x310 [ 128.774846][ T2386] ? __x64_compat_sys_ioctl+0x90/0x90 [ 128.780056][ T2386] ? __kasan_check_write+0x14/0x20 [ 128.784999][ T2386] ? proc_fail_nth_write+0x20b/0x290 [ 128.790118][ T2386] ? selinux_file_permission+0x2c4/0x570 [ 128.795586][ T2386] ? ioctl_has_perm+0x1f8/0x560 [ 128.800274][ T2386] ? ioctl_has_perm+0x3f5/0x560 [ 128.804960][ T2386] ? has_cap_mac_admin+0x3c0/0x3c0 [ 128.809911][ T2386] ? file_end_write+0x1c0/0x1c0 [ 128.814598][ T2386] ? selinux_file_ioctl+0x3cc/0x540 [ 128.819630][ T2386] ? __mutex_lock_slowpath+0x10/0x10 [ 128.824750][ T2386] ? selinux_file_alloc_security+0x120/0x120 [ 128.830564][ T2386] ? __fget_files+0x31e/0x380 [ 128.835080][ T2386] ? security_file_ioctl+0x84/0xb0 [ 128.840027][ T2386] __se_sys_ioctl+0x99/0x190 [ 128.844454][ T2386] __x64_sys_ioctl+0x7b/0x90 [ 128.848877][ T2386] x64_sys_call+0x98/0x9a0 [ 128.853132][ T2386] do_syscall_64+0x3b/0xb0 [ 128.857384][ T2386] ? clear_bhb_loop+0x35/0x90 [ 128.861900][ T2386] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 128.867622][ T2386] RIP: 0033:0x7f7376520ef9 [ 128.871879][ T2386] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 128.891318][ T2386] RSP: 002b:00007f737519a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 128.899563][ T2386] RAX: ffffffffffffffda RBX: 00007f73766d8f80 RCX: 00007f7376520ef9 [ 128.907376][ T2386] RDX: 000000001ffffffc RSI: 00000000c0189436 RDI: 0000000000000007 [ 128.915185][ T2386] RBP: 00007f737519a090 R08: 0000000000000000 R09: 0000000000000000 [ 128.922996][ T2386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 128.930810][ T2386] R13: 0000000000000000 R14: 00007f73766d8f80 R15: 00007ffeb6ce2d18 [ 128.938625][ T2386] [ 131.307851][ T2447] FAULT_INJECTION: forcing a failure. [ 131.307851][ T2447] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 131.418095][ T2447] CPU: 0 PID: 2447 Comm: syz.1.623 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 131.427815][ T2447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 131.437714][ T2447] Call Trace: [ 131.440839][ T2447] [ 131.443616][ T2447] dump_stack_lvl+0x151/0x1c0 [ 131.448126][ T2447] ? io_uring_drop_tctx_refs+0x190/0x190 [ 131.453598][ T2447] dump_stack+0x15/0x20 [ 131.457587][ T2447] should_fail+0x3c6/0x510 [ 131.461841][ T2447] should_fail_usercopy+0x1a/0x20 [ 131.466696][ T2447] _copy_from_user+0x20/0xd0 [ 131.471128][ T2447] __sys_bpf+0x1e9/0x760 [ 131.475208][ T2447] ? dev_map_hash_lookup_elem+0x116/0x180 [ 131.480847][ T2447] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 131.486059][ T2447] __x64_sys_bpf+0x7c/0x90 [ 131.490307][ T2447] x64_sys_call+0x87f/0x9a0 [ 131.494648][ T2447] do_syscall_64+0x3b/0xb0 [ 131.498901][ T2447] ? clear_bhb_loop+0x35/0x90 [ 131.503409][ T2447] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 131.509139][ T2447] RIP: 0033:0x7f44b8fa4ef9 [ 131.513394][ T2447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 131.532832][ T2447] RSP: 002b:00007f44b7bfd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 131.541075][ T2447] RAX: ffffffffffffffda RBX: 00007f44b915d058 RCX: 00007f44b8fa4ef9 [ 131.548892][ T2447] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0c00000000000000 [ 131.556697][ T2447] RBP: 00007f44b7bfd090 R08: 0000000000000000 R09: 0000000000000000 [ 131.564508][ T2447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 131.572320][ T2447] R13: 0000000000000001 R14: 00007f44b915d058 R15: 00007fff30234b38 [ 131.580135][ T2447] [ 132.450606][ T2488] FAULT_INJECTION: forcing a failure. [ 132.450606][ T2488] name failslab, interval 1, probability 0, space 0, times 0 [ 132.590670][ T2488] CPU: 1 PID: 2488 Comm: syz.0.638 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 132.600306][ T2488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 132.610196][ T2488] Call Trace: [ 132.613321][ T2488] [ 132.616096][ T2488] dump_stack_lvl+0x151/0x1c0 [ 132.620635][ T2488] ? io_uring_drop_tctx_refs+0x190/0x190 [ 132.626086][ T2488] dump_stack+0x15/0x20 [ 132.630071][ T2488] should_fail+0x3c6/0x510 [ 132.634325][ T2488] __should_failslab+0xa4/0xe0 [ 132.638924][ T2488] ? __alloc_skb+0xbe/0x550 [ 132.643433][ T2488] should_failslab+0x9/0x20 [ 132.647770][ T2488] slab_pre_alloc_hook+0x37/0xd0 [ 132.652544][ T2488] ? __alloc_skb+0xbe/0x550 [ 132.656883][ T2488] kmem_cache_alloc+0x44/0x200 [ 132.661482][ T2488] ? __kasan_slab_free+0x11/0x20 [ 132.666255][ T2488] __alloc_skb+0xbe/0x550 [ 132.670421][ T2488] inet_netconf_notify_devconf+0x173/0x220 [ 132.676064][ T2488] inetdev_event+0x79d/0x10a0 [ 132.680575][ T2488] ? ipv4_doint_and_flush+0x150/0x150 [ 132.685782][ T2488] ? up_read+0x5d/0x220 [ 132.689777][ T2488] raw_notifier_call_chain+0x8c/0xf0 [ 132.694900][ T2488] unregister_netdevice_many+0xe0a/0x17c0 [ 132.700456][ T2488] ? synchronize_rcu+0x120/0x120 [ 132.705228][ T2488] ? alloc_netdev_mqs+0xc90/0xc90 [ 132.710177][ T2488] ? locks_remove_file+0x41a/0x1180 [ 132.715209][ T2488] ? __kasan_check_read+0x11/0x20 [ 132.720072][ T2488] unregister_netdevice_queue+0x2e6/0x350 [ 132.725620][ T2488] ? linkwatch_urgent_event+0x65/0x4d0 [ 132.730918][ T2488] ? list_netdevice+0x4c0/0x4c0 [ 132.735603][ T2488] __tun_detach+0xd14/0x1510 [ 132.740030][ T2488] ? wait_for_completion_killable_timeout+0x10/0x10 [ 132.746454][ T2488] tun_chr_close+0x92/0x140 [ 132.750787][ T2488] ? tun_chr_open+0x530/0x530 [ 132.755304][ T2488] __fput+0x3fe/0x910 [ 132.759127][ T2488] ____fput+0x15/0x20 [ 132.762942][ T2488] task_work_run+0x129/0x190 [ 132.767367][ T2488] exit_to_user_mode_loop+0xc4/0xe0 [ 132.772400][ T2488] exit_to_user_mode_prepare+0x5a/0xa0 [ 132.777694][ T2488] syscall_exit_to_user_mode+0x26/0x160 [ 132.783076][ T2488] do_syscall_64+0x47/0xb0 [ 132.787326][ T2488] ? clear_bhb_loop+0x35/0x90 [ 132.791840][ T2488] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 132.797567][ T2488] RIP: 0033:0x7f7376520ef9 [ 132.801823][ T2488] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 132.821262][ T2488] RSP: 002b:00007f737519a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 132.829710][ T2488] RAX: 0000000000000000 RBX: 00007f73766d8f80 RCX: 00007f7376520ef9 [ 132.837520][ T2488] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 132.845336][ T2488] RBP: 00007f737519a090 R08: 0000000000000000 R09: 0000000000000000 [ 132.853145][ T2488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 132.860956][ T2488] R13: 0000000000000000 R14: 00007f73766d8f80 R15: 00007ffeb6ce2d18 [ 132.868770][ T2488] [ 133.848665][ T2513] FAULT_INJECTION: forcing a failure. [ 133.848665][ T2513] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 133.890163][ T2513] CPU: 1 PID: 2513 Comm: syz.4.645 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 133.899819][ T2513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 133.909696][ T2513] Call Trace: [ 133.912818][ T2513] [ 133.915681][ T2513] dump_stack_lvl+0x151/0x1c0 [ 133.920203][ T2513] ? io_uring_drop_tctx_refs+0x190/0x190 [ 133.925664][ T2513] dump_stack+0x15/0x20 [ 133.929653][ T2513] should_fail+0x3c6/0x510 [ 133.933909][ T2513] should_fail_usercopy+0x1a/0x20 [ 133.938770][ T2513] _copy_from_user+0x20/0xd0 [ 133.943197][ T2513] __sys_bpf+0x1e9/0x760 [ 133.947275][ T2513] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 133.952480][ T2513] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 133.958471][ T2513] __x64_sys_bpf+0x7c/0x90 [ 133.962721][ T2513] x64_sys_call+0x87f/0x9a0 [ 133.967059][ T2513] do_syscall_64+0x3b/0xb0 [ 133.971312][ T2513] ? clear_bhb_loop+0x35/0x90 [ 133.975825][ T2513] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 133.981554][ T2513] RIP: 0033:0x7f344a969ef9 [ 133.985804][ T2513] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 134.005251][ T2513] RSP: 002b:00007f34495e3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 134.013576][ T2513] RAX: ffffffffffffffda RBX: 00007f344ab21f80 RCX: 00007f344a969ef9 [ 134.021387][ T2513] RDX: 0000000000000080 RSI: 0000000020003480 RDI: 0000000000000005 [ 134.029199][ T2513] RBP: 00007f34495e3090 R08: 0000000000000000 R09: 0000000000000000 [ 134.037095][ T2513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 134.044919][ T2513] R13: 0000000000000000 R14: 00007f344ab21f80 R15: 00007fffcbe62148 [ 134.052733][ T2513] [ 134.243106][ T2526] device bridge_slave_1 left promiscuous mode [ 134.308105][ T2526] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.500324][ T2526] device bridge_slave_0 left promiscuous mode [ 134.600555][ T2526] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.063744][ T2568] FAULT_INJECTION: forcing a failure. [ 136.063744][ T2568] name failslab, interval 1, probability 0, space 0, times 0 [ 136.077056][ T2568] CPU: 1 PID: 2568 Comm: syz.0.661 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 136.086683][ T2568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 136.096582][ T2568] Call Trace: [ 136.099697][ T2568] [ 136.102477][ T2568] dump_stack_lvl+0x151/0x1c0 [ 136.107164][ T2568] ? io_uring_drop_tctx_refs+0x190/0x190 [ 136.112638][ T2568] dump_stack+0x15/0x20 [ 136.116621][ T2568] should_fail+0x3c6/0x510 [ 136.120879][ T2568] __should_failslab+0xa4/0xe0 [ 136.125488][ T2568] ? __alloc_skb+0xbe/0x550 [ 136.129817][ T2568] should_failslab+0x9/0x20 [ 136.134158][ T2568] slab_pre_alloc_hook+0x37/0xd0 [ 136.139052][ T2568] ? __alloc_skb+0xbe/0x550 [ 136.143363][ T2568] kmem_cache_alloc+0x44/0x200 [ 136.147955][ T2568] __alloc_skb+0xbe/0x550 [ 136.152121][ T2568] tipc_msg_create+0x4c/0x530 [ 136.156636][ T2568] ? tipc_node_remove_conn+0x2fc/0x420 [ 136.161930][ T2568] ? __tipc_shutdown+0xbc1/0x1510 [ 136.166800][ T2568] ? __tipc_shutdown+0xc02/0x1510 [ 136.171652][ T2568] __tipc_shutdown+0x11ca/0x1510 [ 136.176432][ T2568] ? tipc_recvstream+0xf70/0xf70 [ 136.181199][ T2568] ? sock_init_data+0xc0/0xc0 [ 136.185713][ T2568] ? wait_woken+0x170/0x170 [ 136.190054][ T2568] ? tipc_release+0x7e/0x1300 [ 136.194562][ T2568] tipc_release+0xd7/0x1300 [ 136.198902][ T2568] ? rwsem_write_trylock+0x153/0x340 [ 136.204023][ T2568] ? tipc_sock_destruct+0x190/0x190 [ 136.209060][ T2568] sock_close+0xdf/0x270 [ 136.213134][ T2568] ? sock_mmap+0xa0/0xa0 [ 136.217213][ T2568] __fput+0x3fe/0x910 [ 136.221050][ T2568] ____fput+0x15/0x20 [ 136.224855][ T2568] task_work_run+0x129/0x190 [ 136.229281][ T2568] exit_to_user_mode_loop+0xc4/0xe0 [ 136.234312][ T2568] exit_to_user_mode_prepare+0x5a/0xa0 [ 136.239609][ T2568] syscall_exit_to_user_mode+0x26/0x160 [ 136.244987][ T2568] do_syscall_64+0x47/0xb0 [ 136.249242][ T2568] ? clear_bhb_loop+0x35/0x90 [ 136.253783][ T2568] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 136.259484][ T2568] RIP: 0033:0x7f7376520ef9 [ 136.263783][ T2568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 136.283186][ T2568] RSP: 002b:00007f737519a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 136.291597][ T2568] RAX: 0000000000000000 RBX: 00007f73766d8f80 RCX: 00007f7376520ef9 [ 136.299403][ T2568] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 136.307216][ T2568] RBP: 00007f737519a090 R08: 0000000000000000 R09: 0000000000000000 [ 136.315030][ T2568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 136.322842][ T2568] R13: 0000000000000000 R14: 00007f73766d8f80 R15: 00007ffeb6ce2d18 [ 136.330656][ T2568] [ 136.401600][ T2571] device bridge_slave_1 left promiscuous mode [ 136.419347][ T2571] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.500220][ T2571] device bridge_slave_0 left promiscuous mode [ 136.506266][ T2571] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.270804][ T2590] FAULT_INJECTION: forcing a failure. [ 137.270804][ T2590] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 137.284421][ T2590] CPU: 1 PID: 2590 Comm: syz.0.667 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 137.294042][ T2590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 137.303935][ T2590] Call Trace: [ 137.307056][ T2590] [ 137.309836][ T2590] dump_stack_lvl+0x151/0x1c0 [ 137.314348][ T2590] ? io_uring_drop_tctx_refs+0x190/0x190 [ 137.319818][ T2590] ? __perf_event_task_sched_in+0x219/0x2a0 [ 137.325554][ T2590] ? perf_pmu_sched_task+0x190/0x190 [ 137.330676][ T2590] ? sched_clock+0x9/0x10 [ 137.334833][ T2590] ? native_set_ldt+0x360/0x360 [ 137.339519][ T2590] dump_stack+0x15/0x20 [ 137.343512][ T2590] should_fail+0x3c6/0x510 [ 137.347764][ T2590] should_fail_usercopy+0x1a/0x20 [ 137.352621][ T2590] _copy_from_user+0x20/0xd0 [ 137.357046][ T2590] __sys_bpf+0x1e9/0x760 [ 137.361125][ T2590] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 137.366334][ T2590] ? __kasan_check_read+0x11/0x20 [ 137.371194][ T2590] __x64_sys_bpf+0x7c/0x90 [ 137.375451][ T2590] x64_sys_call+0x87f/0x9a0 [ 137.379788][ T2590] do_syscall_64+0x3b/0xb0 [ 137.384039][ T2590] ? clear_bhb_loop+0x35/0x90 [ 137.388552][ T2590] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 137.394280][ T2590] RIP: 0033:0x7f7376520ef9 [ 137.398535][ T2590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.417976][ T2590] RSP: 002b:00007f737519a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 137.426220][ T2590] RAX: ffffffffffffffda RBX: 00007f73766d8f80 RCX: 00007f7376520ef9 [ 137.434031][ T2590] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 2000000000000000 [ 137.441844][ T2590] RBP: 00007f737519a090 R08: 0000000000000000 R09: 0000000000000000 [ 137.449665][ T2590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 137.457473][ T2590] R13: 0000000000000000 R14: 00007f73766d8f80 R15: 00007ffeb6ce2d18 [ 137.465281][ T2590] [ 139.365767][ T2652] FAULT_INJECTION: forcing a failure. [ 139.365767][ T2652] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 139.459458][ T2652] CPU: 1 PID: 2652 Comm: syz.2.684 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 139.469097][ T2652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 139.479079][ T2652] Call Trace: [ 139.482200][ T2652] [ 139.484978][ T2652] dump_stack_lvl+0x151/0x1c0 [ 139.489489][ T2652] ? io_uring_drop_tctx_refs+0x190/0x190 [ 139.495051][ T2652] dump_stack+0x15/0x20 [ 139.499038][ T2652] should_fail+0x3c6/0x510 [ 139.503305][ T2652] should_fail_usercopy+0x1a/0x20 [ 139.508160][ T2652] _copy_from_user+0x20/0xd0 [ 139.512585][ T2652] ___sys_recvmsg+0x150/0x690 [ 139.517160][ T2652] ? __sys_recvmsg+0x260/0x260 [ 139.521703][ T2652] ? __fdget+0x1bc/0x240 [ 139.525768][ T2652] __x64_sys_recvmsg+0x1dc/0x2b0 [ 139.530542][ T2652] ? ___sys_recvmsg+0x690/0x690 [ 139.535233][ T2652] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 139.541131][ T2652] ? exit_to_user_mode_prepare+0x39/0xa0 [ 139.546601][ T2652] x64_sys_call+0x171/0x9a0 [ 139.551023][ T2652] do_syscall_64+0x3b/0xb0 [ 139.555279][ T2652] ? clear_bhb_loop+0x35/0x90 [ 139.559792][ T2652] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 139.565520][ T2652] RIP: 0033:0x7f6c33024ef9 [ 139.569775][ T2652] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 139.589217][ T2652] RSP: 002b:00007f6c31c9e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 139.597461][ T2652] RAX: ffffffffffffffda RBX: 00007f6c331dcf80 RCX: 00007f6c33024ef9 [ 139.605281][ T2652] RDX: 0000000000000000 RSI: 0000000020000900 RDI: 0000000000000007 [ 139.613083][ T2652] RBP: 00007f6c31c9e090 R08: 0000000000000000 R09: 0000000000000000 [ 139.620895][ T2652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 139.628793][ T2652] R13: 0000000000000000 R14: 00007f6c331dcf80 R15: 00007fffffe948e8 [ 139.636609][ T2652] [ 140.793488][ T2671] device veth0_to_team entered promiscuous mode [ 140.814777][ T2681] FAULT_INJECTION: forcing a failure. [ 140.814777][ T2681] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 141.021095][ T2681] CPU: 1 PID: 2681 Comm: syz.2.694 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 141.030730][ T2681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 141.040622][ T2681] Call Trace: [ 141.043747][ T2681] [ 141.046524][ T2681] dump_stack_lvl+0x151/0x1c0 [ 141.051038][ T2681] ? io_uring_drop_tctx_refs+0x190/0x190 [ 141.056508][ T2681] dump_stack+0x15/0x20 [ 141.060505][ T2681] should_fail+0x3c6/0x510 [ 141.064752][ T2681] should_fail_usercopy+0x1a/0x20 [ 141.069609][ T2681] _copy_from_user+0x20/0xd0 [ 141.074040][ T2681] __sys_bpf+0x1e9/0x760 [ 141.078116][ T2681] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 141.083330][ T2681] __x64_sys_bpf+0x7c/0x90 [ 141.087576][ T2681] x64_sys_call+0x87f/0x9a0 [ 141.091916][ T2681] do_syscall_64+0x3b/0xb0 [ 141.096165][ T2681] ? clear_bhb_loop+0x35/0x90 [ 141.100680][ T2681] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 141.106409][ T2681] RIP: 0033:0x7f6c33024ef9 [ 141.110665][ T2681] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 141.130101][ T2681] RSP: 002b:00007f6c31c9e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 141.138354][ T2681] RAX: ffffffffffffffda RBX: 00007f6c331dcf80 RCX: 00007f6c33024ef9 [ 141.146160][ T2681] RDX: 0000000000000048 RSI: 00000000200000c0 RDI: 0000000000000000 [ 141.153970][ T2681] RBP: 00007f6c31c9e090 R08: 0000000000000000 R09: 0000000000000000 [ 141.161779][ T2681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 141.169600][ T2681] R13: 0000000000000001 R14: 00007f6c331dcf80 R15: 00007fffffe948e8 [ 141.177409][ T2681] [ 143.220605][ T2726] FAULT_INJECTION: forcing a failure. [ 143.220605][ T2726] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 143.325290][ T2726] CPU: 0 PID: 2726 Comm: syz.2.705 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 143.334927][ T2726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 143.344819][ T2726] Call Trace: [ 143.347945][ T2726] [ 143.350722][ T2726] dump_stack_lvl+0x151/0x1c0 [ 143.355234][ T2726] ? io_uring_drop_tctx_refs+0x190/0x190 [ 143.360703][ T2726] ? kstrtouint_from_user+0x20a/0x2a0 [ 143.365910][ T2726] dump_stack+0x15/0x20 [ 143.369901][ T2726] should_fail+0x3c6/0x510 [ 143.374159][ T2726] should_fail_usercopy+0x1a/0x20 [ 143.379014][ T2726] _copy_to_user+0x20/0x90 [ 143.383269][ T2726] simple_read_from_buffer+0xc7/0x150 [ 143.388476][ T2726] proc_fail_nth_read+0x1a3/0x210 [ 143.393341][ T2726] ? proc_fault_inject_write+0x390/0x390 [ 143.398803][ T2726] ? fsnotify_perm+0x470/0x5d0 [ 143.403408][ T2726] ? security_file_permission+0x86/0xb0 [ 143.408785][ T2726] ? proc_fault_inject_write+0x390/0x390 [ 143.414255][ T2726] vfs_read+0x27d/0xd40 [ 143.418246][ T2726] ? kernel_read+0x1f0/0x1f0 [ 143.422673][ T2726] ? __kasan_check_write+0x14/0x20 [ 143.427622][ T2726] ? mutex_lock+0xb6/0x1e0 [ 143.431872][ T2726] ? wait_for_completion_killable_timeout+0x10/0x10 [ 143.438302][ T2726] ? __fdget_pos+0x2e7/0x3a0 [ 143.442728][ T2726] ? ksys_read+0x77/0x2c0 [ 143.446889][ T2726] ksys_read+0x199/0x2c0 [ 143.450967][ T2726] ? vfs_write+0x1110/0x1110 [ 143.455393][ T2726] ? debug_smp_processor_id+0x17/0x20 [ 143.460609][ T2726] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 143.466507][ T2726] __x64_sys_read+0x7b/0x90 [ 143.470842][ T2726] x64_sys_call+0x28/0x9a0 [ 143.475099][ T2726] do_syscall_64+0x3b/0xb0 [ 143.479345][ T2726] ? clear_bhb_loop+0x35/0x90 [ 143.483862][ T2726] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 143.489590][ T2726] RIP: 0033:0x7f6c3302393c [ 143.493842][ T2726] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 143.513281][ T2726] RSP: 002b:00007f6c31c9e030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 143.521524][ T2726] RAX: ffffffffffffffda RBX: 00007f6c331dcf80 RCX: 00007f6c3302393c [ 143.529337][ T2726] RDX: 000000000000000f RSI: 00007f6c31c9e0a0 RDI: 000000000000000b [ 143.537149][ T2726] RBP: 00007f6c31c9e090 R08: 0000000000000000 R09: 0000000000000000 [ 143.544958][ T2726] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 143.552770][ T2726] R13: 0000000000000000 R14: 00007f6c331dcf80 R15: 00007fffffe948e8 [ 143.560585][ T2726] [ 145.451002][ T2774] FAULT_INJECTION: forcing a failure. [ 145.451002][ T2774] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 145.477163][ T2774] CPU: 1 PID: 2774 Comm: syz.1.719 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 145.486800][ T2774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 145.496692][ T2774] Call Trace: [ 145.499813][ T2774] [ 145.502591][ T2774] dump_stack_lvl+0x151/0x1c0 [ 145.507105][ T2774] ? io_uring_drop_tctx_refs+0x190/0x190 [ 145.512664][ T2774] ? avc_has_extended_perms+0xad7/0x10f0 [ 145.518137][ T2774] dump_stack+0x15/0x20 [ 145.522120][ T2774] should_fail+0x3c6/0x510 [ 145.526372][ T2774] should_fail_usercopy+0x1a/0x20 [ 145.531234][ T2774] _copy_from_user+0x20/0xd0 [ 145.535660][ T2774] do_vfs_ioctl+0x1d48/0x2a80 [ 145.540177][ T2774] ? cpu_clock_event_read+0x50/0x50 [ 145.545213][ T2774] ? __x64_compat_sys_ioctl+0x90/0x90 [ 145.550420][ T2774] ? ioctl_has_perm+0x1f8/0x560 [ 145.555101][ T2774] ? ioctl_has_perm+0x3f5/0x560 [ 145.559790][ T2774] ? has_cap_mac_admin+0x3c0/0x3c0 [ 145.564734][ T2774] ? enqueue_hrtimer+0xca/0x240 [ 145.569419][ T2774] ? __hrtimer_run_queues+0xa6f/0xad0 [ 145.574632][ T2774] ? selinux_file_ioctl+0x3cc/0x540 [ 145.579663][ T2774] ? lapic_next_event+0x5f/0x70 [ 145.584353][ T2774] ? selinux_file_alloc_security+0x120/0x120 [ 145.590168][ T2774] ? __fget_files+0x31e/0x380 [ 145.594680][ T2774] ? security_file_ioctl+0x84/0xb0 [ 145.599626][ T2774] __se_sys_ioctl+0x99/0x190 [ 145.604051][ T2774] __x64_sys_ioctl+0x7b/0x90 [ 145.608477][ T2774] x64_sys_call+0x98/0x9a0 [ 145.612731][ T2774] do_syscall_64+0x3b/0xb0 [ 145.616990][ T2774] ? clear_bhb_loop+0x35/0x90 [ 145.621497][ T2774] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 145.627226][ T2774] RIP: 0033:0x7f44b8fa4ef9 [ 145.631480][ T2774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 145.651010][ T2774] RSP: 002b:00007f44b7c1e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 145.659250][ T2774] RAX: ffffffffffffffda RBX: 00007f44b915cf80 RCX: 00007f44b8fa4ef9 [ 145.667060][ T2774] RDX: 0000000020000040 RSI: 0000000040305829 RDI: 000000000000000b [ 145.674871][ T2774] RBP: 00007f44b7c1e090 R08: 0000000000000000 R09: 0000000000000000 [ 145.682683][ T2774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 145.690498][ T2774] R13: 0000000000000000 R14: 00007f44b915cf80 R15: 00007fff30234b38 [ 145.698316][ T2774] [ 149.137666][ T2835] FAULT_INJECTION: forcing a failure. [ 149.137666][ T2835] name failslab, interval 1, probability 0, space 0, times 0 [ 149.282912][ T2835] CPU: 0 PID: 2835 Comm: syz.1.737 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 149.292552][ T2835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 149.302442][ T2835] Call Trace: [ 149.305565][ T2835] [ 149.308344][ T2835] dump_stack_lvl+0x151/0x1c0 [ 149.312862][ T2835] ? io_uring_drop_tctx_refs+0x190/0x190 [ 149.318325][ T2835] ? __schedule+0xcd4/0x1590 [ 149.322754][ T2835] dump_stack+0x15/0x20 [ 149.326745][ T2835] should_fail+0x3c6/0x510 [ 149.330997][ T2835] __should_failslab+0xa4/0xe0 [ 149.335596][ T2835] ? dup_task_struct+0x53/0xc60 [ 149.340382][ T2835] should_failslab+0x9/0x20 [ 149.344718][ T2835] slab_pre_alloc_hook+0x37/0xd0 [ 149.349505][ T2835] ? dup_task_struct+0x53/0xc60 [ 149.354188][ T2835] kmem_cache_alloc+0x44/0x200 [ 149.358782][ T2835] dup_task_struct+0x53/0xc60 [ 149.363297][ T2835] copy_process+0x5c4/0x3290 [ 149.367722][ T2835] ? __kasan_check_write+0x14/0x20 [ 149.372673][ T2835] ? selinux_file_permission+0x2c4/0x570 [ 149.378140][ T2835] ? proc_fail_nth_read+0x210/0x210 [ 149.383168][ T2835] ? fsnotify_perm+0x6a/0x5d0 [ 149.387685][ T2835] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 149.392626][ T2835] ? vfs_write+0x9ec/0x1110 [ 149.396969][ T2835] kernel_clone+0x21e/0x9e0 [ 149.401307][ T2835] ? create_io_thread+0x1e0/0x1e0 [ 149.406170][ T2835] __x64_sys_clone+0x23f/0x290 [ 149.410773][ T2835] ? __do_sys_vfork+0x130/0x130 [ 149.415458][ T2835] ? debug_smp_processor_id+0x17/0x20 [ 149.420661][ T2835] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 149.426569][ T2835] ? exit_to_user_mode_prepare+0x39/0xa0 [ 149.432036][ T2835] x64_sys_call+0x1b0/0x9a0 [ 149.436369][ T2835] do_syscall_64+0x3b/0xb0 [ 149.440624][ T2835] ? clear_bhb_loop+0x35/0x90 [ 149.445136][ T2835] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 149.450864][ T2835] RIP: 0033:0x7f44b8fa4ef9 [ 149.455118][ T2835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 149.474559][ T2835] RSP: 002b:00007f44b7c1dfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 149.482804][ T2835] RAX: ffffffffffffffda RBX: 00007f44b915cf80 RCX: 00007f44b8fa4ef9 [ 149.490617][ T2835] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 149.498438][ T2835] RBP: 00007f44b7c1e090 R08: 0000000000000000 R09: 0000000000000000 [ 149.506240][ T2835] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 149.514047][ T2835] R13: 0000000000000000 R14: 00007f44b915cf80 R15: 00007fff30234b38 [ 149.521865][ T2835] [ 151.843156][ T2876] tun0: tun_chr_ioctl cmd 1074025678 [ 151.848423][ T2876] tun0: group set to 0 [ 152.827602][ T2896] device syzkaller0 entered promiscuous mode [ 153.974204][ T2928] FAULT_INJECTION: forcing a failure. [ 153.974204][ T2928] name failslab, interval 1, probability 0, space 0, times 0 [ 154.111191][ T2928] CPU: 0 PID: 2928 Comm: syz.2.765 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 154.120829][ T2928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 154.130720][ T2928] Call Trace: [ 154.133846][ T2928] [ 154.136628][ T2928] dump_stack_lvl+0x151/0x1c0 [ 154.141135][ T2928] ? io_uring_drop_tctx_refs+0x190/0x190 [ 154.146604][ T2928] dump_stack+0x15/0x20 [ 154.150595][ T2928] should_fail+0x3c6/0x510 [ 154.154848][ T2928] __should_failslab+0xa4/0xe0 [ 154.159450][ T2928] ? __kernfs_new_node+0xdb/0x700 [ 154.164313][ T2928] should_failslab+0x9/0x20 [ 154.168650][ T2928] slab_pre_alloc_hook+0x37/0xd0 [ 154.173423][ T2928] ? __kernfs_new_node+0xdb/0x700 [ 154.178281][ T2928] kmem_cache_alloc+0x44/0x200 [ 154.182881][ T2928] __kernfs_new_node+0xdb/0x700 [ 154.187568][ T2928] ? rwsem_write_trylock+0x153/0x340 [ 154.192690][ T2928] ? rwsem_mark_wake+0x770/0x770 [ 154.197461][ T2928] ? kernfs_new_node+0x230/0x230 [ 154.202238][ T2928] ? rwsem_write_trylock+0x153/0x340 [ 154.207360][ T2928] ? up_write+0x7d/0x290 [ 154.211436][ T2928] ? kernfs_activate+0x359/0x370 [ 154.216212][ T2928] kernfs_new_node+0x130/0x230 [ 154.220899][ T2928] kernfs_create_link+0xba/0x210 [ 154.225671][ T2928] sysfs_do_create_link_sd+0x89/0x110 [ 154.230994][ T2928] sysfs_create_link+0x68/0x80 [ 154.235565][ T2928] device_add+0x7bf/0xf10 [ 154.239733][ T2928] netdev_register_kobject+0x177/0x320 [ 154.245025][ T2928] ? raw_notifier_call_chain+0xdf/0xf0 [ 154.250322][ T2928] register_netdevice+0xde9/0x1390 [ 154.255264][ T2928] ? kvmalloc_node+0x1f0/0x4d0 [ 154.259867][ T2928] ? netif_stacked_transfer_operstate+0x240/0x240 [ 154.266114][ T2928] ? xdp_rxq_info_reg+0xfb/0x2c0 [ 154.270890][ T2928] vti6_tnl_create2+0xbd/0x2f0 [ 154.275491][ T2928] ? memcpy+0x56/0x70 [ 154.279308][ T2928] vti6_locate+0x560/0x610 [ 154.283559][ T2928] ? memcpy+0x56/0x70 [ 154.287380][ T2928] ? vti6_link_config+0x580/0x580 [ 154.292243][ T2928] ? vti6_siocdevprivate+0x9de/0x17e0 [ 154.297447][ T2928] ? memcpy+0x56/0x70 [ 154.301270][ T2928] vti6_siocdevprivate+0xa02/0x17e0 [ 154.306301][ T2928] ? _kstrtoull+0x3a0/0x4a0 [ 154.310641][ T2928] ? vti6_tnl_xmit+0x1860/0x1860 [ 154.315415][ T2928] ? __kasan_check_write+0x14/0x20 [ 154.320359][ T2928] ? full_name_hash+0xbd/0xf0 [ 154.324880][ T2928] dev_ifsioc+0xc75/0x10c0 [ 154.329130][ T2928] ? dev_ioctl+0xe70/0xe70 [ 154.333378][ T2928] ? mutex_lock+0xb6/0x1e0 [ 154.337644][ T2928] ? wait_for_completion_killable_timeout+0x10/0x10 [ 154.344076][ T2928] dev_ioctl+0x5f3/0xe70 [ 154.348143][ T2928] sock_ioctl+0x665/0x740 [ 154.352301][ T2928] ? sock_poll+0x400/0x400 [ 154.356558][ T2928] ? security_file_ioctl+0x84/0xb0 [ 154.361498][ T2928] ? sock_poll+0x400/0x400 [ 154.365750][ T2928] __se_sys_ioctl+0x114/0x190 [ 154.370266][ T2928] __x64_sys_ioctl+0x7b/0x90 [ 154.374691][ T2928] x64_sys_call+0x98/0x9a0 [ 154.378941][ T2928] do_syscall_64+0x3b/0xb0 [ 154.383199][ T2928] ? clear_bhb_loop+0x35/0x90 [ 154.387710][ T2928] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 154.393439][ T2928] RIP: 0033:0x7f6c33024ef9 [ 154.397693][ T2928] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 154.417220][ T2928] RSP: 002b:00007f6c31c9e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 154.425465][ T2928] RAX: ffffffffffffffda RBX: 00007f6c331dcf80 RCX: 00007f6c33024ef9 [ 154.433276][ T2928] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000008 [ 154.441088][ T2928] RBP: 00007f6c31c9e090 R08: 0000000000000000 R09: 0000000000000000 [ 154.448904][ T2928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 154.457150][ T2928] R13: 0000000000000000 R14: 00007f6c331dcf80 R15: 00007fffffe948e8 [ 154.464961][ T2928] [ 154.731944][ T2952] FAULT_INJECTION: forcing a failure. [ 154.731944][ T2952] name failslab, interval 1, probability 0, space 0, times 0 [ 154.759017][ T2952] CPU: 0 PID: 2952 Comm: syz.3.772 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 154.769007][ T2952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 154.778895][ T2952] Call Trace: [ 154.782021][ T2952] [ 154.784790][ T2952] dump_stack_lvl+0x151/0x1c0 [ 154.789306][ T2952] ? io_uring_drop_tctx_refs+0x190/0x190 [ 154.794775][ T2952] ? __kasan_slab_alloc+0xc3/0xe0 [ 154.799632][ T2952] ? __kasan_slab_alloc+0xb1/0xe0 [ 154.804493][ T2952] ? slab_post_alloc_hook+0x53/0x2c0 [ 154.809613][ T2952] ? dup_task_struct+0x53/0xc60 [ 154.814297][ T2952] ? copy_process+0x5c4/0x3290 [ 154.818904][ T2952] ? kernel_clone+0x21e/0x9e0 [ 154.823412][ T2952] dump_stack+0x15/0x20 [ 154.827402][ T2952] should_fail+0x3c6/0x510 [ 154.831668][ T2952] __should_failslab+0xa4/0xe0 [ 154.836257][ T2952] should_failslab+0x9/0x20 [ 154.840595][ T2952] slab_pre_alloc_hook+0x37/0xd0 [ 154.845372][ T2952] kmem_cache_alloc_trace+0x48/0x210 [ 154.850493][ T2952] ? __get_vm_area_node+0x117/0x360 [ 154.855525][ T2952] __get_vm_area_node+0x117/0x360 [ 154.860386][ T2952] __vmalloc_node_range+0xe2/0x8d0 [ 154.865331][ T2952] ? copy_process+0x5c4/0x3290 [ 154.869933][ T2952] ? slab_post_alloc_hook+0x72/0x2c0 [ 154.875053][ T2952] ? dup_task_struct+0x53/0xc60 [ 154.879738][ T2952] dup_task_struct+0x416/0xc60 [ 154.884337][ T2952] ? copy_process+0x5c4/0x3290 [ 154.888957][ T2952] ? __kasan_check_write+0x14/0x20 [ 154.893885][ T2952] copy_process+0x5c4/0x3290 [ 154.898313][ T2952] ? __kasan_check_write+0x14/0x20 [ 154.903260][ T2952] ? selinux_file_permission+0x2c4/0x570 [ 154.908730][ T2952] ? proc_fail_nth_read+0x210/0x210 [ 154.913763][ T2952] ? fsnotify_perm+0x6a/0x5d0 [ 154.918276][ T2952] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 154.923223][ T2952] ? vfs_write+0x9ec/0x1110 [ 154.927572][ T2952] kernel_clone+0x21e/0x9e0 [ 154.931902][ T2952] ? __kasan_check_write+0x14/0x20 [ 154.936849][ T2952] ? create_io_thread+0x1e0/0x1e0 [ 154.941712][ T2952] __x64_sys_clone+0x23f/0x290 [ 154.946311][ T2952] ? __do_sys_vfork+0x130/0x130 [ 154.951000][ T2952] ? debug_smp_processor_id+0x17/0x20 [ 154.956207][ T2952] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 154.962106][ T2952] ? exit_to_user_mode_prepare+0x39/0xa0 [ 154.967572][ T2952] x64_sys_call+0x1b0/0x9a0 [ 154.971912][ T2952] do_syscall_64+0x3b/0xb0 [ 154.976164][ T2952] ? clear_bhb_loop+0x35/0x90 [ 154.980680][ T2952] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 154.986406][ T2952] RIP: 0033:0x7f8990319ef9 [ 154.990669][ T2952] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 155.010105][ T2952] RSP: 002b:00007f898ef71fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 155.018349][ T2952] RAX: ffffffffffffffda RBX: 00007f89904d2058 RCX: 00007f8990319ef9 [ 155.026157][ T2952] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 155.033973][ T2952] RBP: 00007f898ef72090 R08: 0000000000000000 R09: 0000000000000000 [ 155.041780][ T2952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 155.049591][ T2952] R13: 0000000000000000 R14: 00007f89904d2058 R15: 00007ffc4d143a08 [ 155.057407][ T2952] [ 155.077536][ T2952] syz.3.772: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz3,mems_allowed=0 [ 155.093119][ T2952] CPU: 0 PID: 2952 Comm: syz.3.772 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 155.102741][ T2952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 155.112633][ T2952] Call Trace: [ 155.115752][ T2952] [ 155.118531][ T2952] dump_stack_lvl+0x151/0x1c0 [ 155.123047][ T2952] ? io_uring_drop_tctx_refs+0x190/0x190 [ 155.128513][ T2952] ? pr_cont_kernfs_name+0xf0/0x100 [ 155.133546][ T2952] dump_stack+0x15/0x20 [ 155.137790][ T2952] warn_alloc+0x21a/0x390 [ 155.141880][ T2952] ? should_failslab+0x9/0x20 [ 155.146390][ T2952] ? zone_watermark_ok_safe+0x270/0x270 [ 155.151774][ T2952] ? __get_vm_area_node+0x347/0x360 [ 155.156815][ T2952] __vmalloc_node_range+0x2c1/0x8d0 [ 155.161841][ T2952] ? slab_post_alloc_hook+0x72/0x2c0 [ 155.166962][ T2952] ? dup_task_struct+0x53/0xc60 [ 155.171648][ T2952] dup_task_struct+0x416/0xc60 [ 155.176252][ T2952] ? copy_process+0x5c4/0x3290 [ 155.180850][ T2952] ? __kasan_check_write+0x14/0x20 [ 155.185800][ T2952] copy_process+0x5c4/0x3290 [ 155.190224][ T2952] ? __kasan_check_write+0x14/0x20 [ 155.195169][ T2952] ? selinux_file_permission+0x2c4/0x570 [ 155.200638][ T2952] ? proc_fail_nth_read+0x210/0x210 [ 155.205675][ T2952] ? fsnotify_perm+0x6a/0x5d0 [ 155.210185][ T2952] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 155.215128][ T2952] ? vfs_write+0x9ec/0x1110 [ 155.219470][ T2952] kernel_clone+0x21e/0x9e0 [ 155.223810][ T2952] ? __kasan_check_write+0x14/0x20 [ 155.228755][ T2952] ? create_io_thread+0x1e0/0x1e0 [ 155.233619][ T2952] __x64_sys_clone+0x23f/0x290 [ 155.238217][ T2952] ? __do_sys_vfork+0x130/0x130 [ 155.242910][ T2952] ? debug_smp_processor_id+0x17/0x20 [ 155.248110][ T2952] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 155.254015][ T2952] ? exit_to_user_mode_prepare+0x39/0xa0 [ 155.259492][ T2952] x64_sys_call+0x1b0/0x9a0 [ 155.263827][ T2952] do_syscall_64+0x3b/0xb0 [ 155.268072][ T2952] ? clear_bhb_loop+0x35/0x90 [ 155.272587][ T2952] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 155.278318][ T2952] RIP: 0033:0x7f8990319ef9 [ 155.282569][ T2952] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 155.302008][ T2952] RSP: 002b:00007f898ef71fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 155.310253][ T2952] RAX: ffffffffffffffda RBX: 00007f89904d2058 RCX: 00007f8990319ef9 [ 155.318063][ T2952] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 155.325879][ T2952] RBP: 00007f898ef72090 R08: 0000000000000000 R09: 0000000000000000 [ 155.333686][ T2952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 155.341498][ T2952] R13: 0000000000000000 R14: 00007f89904d2058 R15: 00007ffc4d143a08 [ 155.349314][ T2952] [ 155.355704][ T2952] Mem-Info: [ 155.358647][ T2952] active_anon:127 inactive_anon:2600 isolated_anon:0 [ 155.358647][ T2952] active_file:22153 inactive_file:3644 isolated_file:0 [ 155.358647][ T2952] unevictable:0 dirty:348 writeback:0 [ 155.358647][ T2952] slab_reclaimable:8497 slab_unreclaimable:72712 [ 155.358647][ T2952] mapped:21011 shmem:187 pagetables:483 bounce:0 [ 155.358647][ T2952] kernel_misc_reclaimable:0 [ 155.358647][ T2952] free:1555962 free_pcp:24799 free_cma:0 [ 155.424702][ T2952] Node 0 active_anon:508kB inactive_anon:10400kB active_file:88612kB inactive_file:14676kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:83944kB dirty:1392kB writeback:0kB shmem:748kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4476kB pagetables:1932kB all_unreclaimable? no [ 156.285276][ T2952] DMA32 free:2974676kB min:62568kB low:78208kB high:93848kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2978988kB mlocked:0kB bounce:0kB free_pcp:4312kB local_pcp:4256kB free_cma:0kB [ 156.530473][ T2984] device syzk entered promiscuous mode [ 156.556587][ T2952] lowmem_reserve[]: 0 3941 3941 [ 156.562500][ T2952] Normal free:3239528kB min:84884kB low:106104kB high:127324kB reserved_highatomic:0KB active_anon:520kB inactive_anon:16588kB active_file:88632kB inactive_file:14672kB unevictable:0kB writepending:284kB present:5242880kB managed:4035584kB mlocked:0kB bounce:0kB free_pcp:97356kB local_pcp:50556kB free_cma:0kB [ 156.790245][ T2952] lowmem_reserve[]: 0 0 0 [ 156.794474][ T2952] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 723*4096kB (M) = 2974676kB [ 156.810237][ T2952] Normal: 2928*4kB (UME) 3253*8kB (UME) 962*16kB (UM) 315*32kB (UME) 149*64kB (UME) 158*128kB (UM) 67*256kB (UM) 43*512kB (UM) 28*1024kB (UM) 9*2048kB (UM) 748*4096kB (UM) = 3243048kB [ 156.828768][ T2952] 26016 total pagecache pages [ 157.041077][ T2952] 0 pages in swap cache [ 157.045780][ T2952] Swap cache stats: add 0, delete 0, find 0/0 [ 157.078364][ T2952] Free swap = 124996kB [ 157.097266][ T2952] Total swap = 124996kB [ 157.109697][ T2952] 2097051 pages RAM [ 157.113327][ T2952] 0 pages HighMem/MovableOnly [ 157.117931][ T2952] 343408 pages reserved [ 157.125769][ T2952] 0 pages cma reserved [ 157.697919][ T30] audit: type=1400 audit(1725949670.137:140): avc: denied { create } for pid=3021 comm="syz.1.794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 158.292466][ T3039] device pim6reg1 entered promiscuous mode [ 158.516421][ T3045] GPL: port 1(erspan0) entered blocking state [ 158.522572][ T3045] GPL: port 1(erspan0) entered disabled state [ 158.528925][ T3045] device erspan0 entered promiscuous mode [ 158.535904][ T3047] GPL: port 1(erspan0) entered blocking state [ 158.541823][ T3047] GPL: port 1(erspan0) entered forwarding state [ 160.377688][ T30] audit: type=1400 audit(1725949672.817:141): avc: denied { create } for pid=3090 comm="syz.0.813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 165.061755][ T3193] device pim6reg1 entered promiscuous mode [ 165.401939][ T3189] device syzkaller0 entered promiscuous mode [ 167.245204][ T3226] device veth0_vlan left promiscuous mode [ 167.635565][ T3226] device veth0_vlan entered promiscuous mode [ 168.180224][ T3247] syz.4.861 uses obsolete (PF_INET,SOCK_PACKET) [ 177.078992][ T3397] device sit0 entered promiscuous mode [ 177.764537][ T3420] device pim6reg1 entered promiscuous mode [ 181.053843][ T3510] FAULT_INJECTION: forcing a failure. [ 181.053843][ T3510] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 181.119219][ T3510] CPU: 1 PID: 3510 Comm: syz.3.944 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 181.128858][ T3510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 181.138753][ T3510] Call Trace: [ 181.141875][ T3510] [ 181.144654][ T3510] dump_stack_lvl+0x151/0x1c0 [ 181.149167][ T3510] ? io_uring_drop_tctx_refs+0x190/0x190 [ 181.154637][ T3510] ? __check_object_size+0x73/0x3d0 [ 181.159666][ T3510] dump_stack+0x15/0x20 [ 181.163659][ T3510] should_fail+0x3c6/0x510 [ 181.167914][ T3510] should_fail_usercopy+0x1a/0x20 [ 181.172771][ T3510] _copy_from_user+0x20/0xd0 [ 181.177196][ T3510] __sys_bpf+0x1e9/0x760 [ 181.181275][ T3510] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 181.186485][ T3510] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 181.192473][ T3510] __x64_sys_bpf+0x7c/0x90 [ 181.196725][ T3510] x64_sys_call+0x87f/0x9a0 [ 181.201063][ T3510] do_syscall_64+0x3b/0xb0 [ 181.205316][ T3510] ? clear_bhb_loop+0x35/0x90 [ 181.209829][ T3510] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 181.215559][ T3510] RIP: 0033:0x7f8990319ef9 [ 181.219815][ T3510] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 181.239257][ T3510] RSP: 002b:00007f898ef93038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 181.247498][ T3510] RAX: ffffffffffffffda RBX: 00007f89904d1f80 RCX: 00007f8990319ef9 [ 181.255309][ T3510] RDX: 0000000000000078 RSI: 0000000020000440 RDI: 0000000000000005 [ 181.263121][ T3510] RBP: 00007f898ef93090 R08: 0000000000000000 R09: 0000000000000000 [ 181.270933][ T3510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 181.279003][ T3510] R13: 0000000000000000 R14: 00007f89904d1f80 R15: 00007ffc4d143a08 [ 181.286822][ T3510] [ 181.962079][ T3526] device pim6reg1 entered promiscuous mode [ 184.150016][ T30] audit: type=1400 audit(1725949696.577:142): avc: denied { create } for pid=3546 comm="syz.2.955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 184.985695][ T3572] FAULT_INJECTION: forcing a failure. [ 184.985695][ T3572] name failslab, interval 1, probability 0, space 0, times 0 [ 185.244166][ T3572] CPU: 0 PID: 3572 Comm: syz.2.961 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 185.253800][ T3572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 185.263703][ T3572] Call Trace: [ 185.266813][ T3572] [ 185.269591][ T3572] dump_stack_lvl+0x151/0x1c0 [ 185.274108][ T3572] ? io_uring_drop_tctx_refs+0x190/0x190 [ 185.279576][ T3572] dump_stack+0x15/0x20 [ 185.283567][ T3572] should_fail+0x3c6/0x510 [ 185.287821][ T3572] __should_failslab+0xa4/0xe0 [ 185.292423][ T3572] should_failslab+0x9/0x20 [ 185.296759][ T3572] slab_pre_alloc_hook+0x37/0xd0 [ 185.301531][ T3572] __kmalloc+0x6d/0x270 [ 185.305524][ T3572] ? security_prepare_creds+0x4d/0x140 [ 185.310819][ T3572] security_prepare_creds+0x4d/0x140 [ 185.315942][ T3572] prepare_creds+0x472/0x6a0 [ 185.320366][ T3572] copy_creds+0xf0/0x630 [ 185.324444][ T3572] ? dup_task_struct+0x7e6/0xc60 [ 185.329219][ T3572] copy_process+0x7c3/0x3290 [ 185.333645][ T3572] ? __kasan_check_write+0x14/0x20 [ 185.338592][ T3572] ? selinux_file_permission+0x2c4/0x570 [ 185.344061][ T3572] ? proc_fail_nth_read+0x210/0x210 [ 185.349093][ T3572] ? fsnotify_perm+0x6a/0x5d0 [ 185.353615][ T3572] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 185.358554][ T3572] ? vfs_write+0x9ec/0x1110 [ 185.362895][ T3572] kernel_clone+0x21e/0x9e0 [ 185.367233][ T3572] ? __kasan_check_write+0x14/0x20 [ 185.372183][ T3572] ? create_io_thread+0x1e0/0x1e0 [ 185.377044][ T3572] __x64_sys_clone+0x23f/0x290 [ 185.381643][ T3572] ? __do_sys_vfork+0x130/0x130 [ 185.386329][ T3572] ? debug_smp_processor_id+0x17/0x20 [ 185.391534][ T3572] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 185.397437][ T3572] ? exit_to_user_mode_prepare+0x39/0xa0 [ 185.402906][ T3572] x64_sys_call+0x1b0/0x9a0 [ 185.407244][ T3572] do_syscall_64+0x3b/0xb0 [ 185.411499][ T3572] ? clear_bhb_loop+0x35/0x90 [ 185.416011][ T3572] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 185.421742][ T3572] RIP: 0033:0x7f6c33024ef9 [ 185.425990][ T3572] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 185.445439][ T3572] RSP: 002b:00007f6c31c7cfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 185.453677][ T3572] RAX: ffffffffffffffda RBX: 00007f6c331dd058 RCX: 00007f6c33024ef9 [ 185.461573][ T3572] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000ea003000 [ 185.469382][ T3572] RBP: 00007f6c31c7d090 R08: 0000000000000000 R09: 0000000000000000 [ 185.477194][ T3572] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 185.485103][ T3572] R13: 0000000000000001 R14: 00007f6c331dd058 R15: 00007fffffe948e8 [ 185.492919][ T3572] [ 185.516082][ T30] audit: type=1400 audit(1725949697.947:143): avc: denied { unlink } for pid=82 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 187.973829][ T3645] FAULT_INJECTION: forcing a failure. [ 187.973829][ T3645] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 188.112893][ T3645] CPU: 0 PID: 3645 Comm: syz.2.987 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 188.122538][ T3645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 188.132429][ T3645] Call Trace: [ 188.135555][ T3645] [ 188.138331][ T3645] dump_stack_lvl+0x151/0x1c0 [ 188.142847][ T3645] ? io_uring_drop_tctx_refs+0x190/0x190 [ 188.148313][ T3645] ? __kasan_check_write+0x14/0x20 [ 188.153259][ T3645] ? __alloc_skb+0x355/0x550 [ 188.157690][ T3645] dump_stack+0x15/0x20 [ 188.161678][ T3645] should_fail+0x3c6/0x510 [ 188.165934][ T3645] should_fail_usercopy+0x1a/0x20 [ 188.170793][ T3645] _copy_from_iter+0x22f/0xdc0 [ 188.175400][ T3645] ? copy_mc_pipe_to_iter+0x760/0x760 [ 188.180602][ T3645] ? __check_object_size+0x2ec/0x3d0 [ 188.185805][ T3645] skb_copy_datagram_from_iter+0x100/0x6d0 [ 188.191540][ T3645] tun_get_user+0x112d/0x3aa0 [ 188.196048][ T3645] ? __kasan_check_write+0x14/0x20 [ 188.200997][ T3645] ? _kstrtoull+0x3a0/0x4a0 [ 188.205336][ T3645] ? tun_do_read+0x2010/0x2010 [ 188.209941][ T3645] ? kstrtouint_from_user+0x20a/0x2a0 [ 188.215144][ T3645] ? kstrtol_from_user+0x310/0x310 [ 188.220094][ T3645] ? avc_policy_seqno+0x1b/0x70 [ 188.224776][ T3645] ? selinux_file_permission+0x2c4/0x570 [ 188.230245][ T3645] tun_chr_write_iter+0x1e1/0x2e0 [ 188.235107][ T3645] vfs_write+0xd5d/0x1110 [ 188.239269][ T3645] ? __traceiter_kmem_cache_free+0x32/0x50 [ 188.244915][ T3645] ? file_end_write+0x1c0/0x1c0 [ 188.249601][ T3645] ? __fdget_pos+0x209/0x3a0 [ 188.254025][ T3645] ? ksys_write+0x77/0x2c0 [ 188.258280][ T3645] ksys_write+0x199/0x2c0 [ 188.262444][ T3645] ? __ia32_sys_read+0x90/0x90 [ 188.267044][ T3645] ? debug_smp_processor_id+0x17/0x20 [ 188.272262][ T3645] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 188.278247][ T3645] __x64_sys_write+0x7b/0x90 [ 188.282666][ T3645] x64_sys_call+0x2f/0x9a0 [ 188.286916][ T3645] do_syscall_64+0x3b/0xb0 [ 188.291170][ T3645] ? clear_bhb_loop+0x35/0x90 [ 188.295686][ T3645] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 188.301411][ T3645] RIP: 0033:0x7f6c33024ef9 [ 188.305667][ T3645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 188.325193][ T3645] RSP: 002b:00007f6c31c9e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 188.333437][ T3645] RAX: ffffffffffffffda RBX: 00007f6c331dcf80 RCX: 00007f6c33024ef9 [ 188.341247][ T3645] RDX: 000000000000fdef RSI: 0000000020000e80 RDI: 00000000000000c8 [ 188.349061][ T3645] RBP: 00007f6c31c9e090 R08: 0000000000000000 R09: 0000000000000000 [ 188.356870][ T3645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 188.364856][ T3645] R13: 0000000000000000 R14: 00007f6c331dcf80 R15: 00007fffffe948e8 [ 188.372685][ T3645] [ 224.231642][ T30] audit: type=1400 audit(1725949736.657:144): avc: denied { write } for pid=4238 comm="syz.4.1172" name="cgroup.subtree_control" dev="cgroup2" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 224.386860][ T30] audit: type=1400 audit(1725949736.687:145): avc: denied { open } for pid=4238 comm="syz.4.1172" path="" dev="cgroup2" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 250.415678][ T4629] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.425226][ T4629] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.521616][ T4629] device bridge_slave_0 entered promiscuous mode [ 250.528482][ T4629] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.609936][ T4629] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.655888][ T4629] device bridge_slave_1 entered promiscuous mode [ 251.732863][ T45] device bridge_slave_1 left promiscuous mode [ 251.738839][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.765816][ T45] device bridge_slave_0 left promiscuous mode [ 251.778277][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.794173][ T45] device veth1_macvtap left promiscuous mode [ 251.806548][ T45] device veth0_vlan left promiscuous mode [ 252.670402][ T417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 252.685723][ T417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.751303][ T417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.767190][ T417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.777670][ T417] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.784552][ T417] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.835030][ T417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 252.899077][ T417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.942834][ T417] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.949733][ T417] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.196785][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 253.204389][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 253.212673][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 253.231302][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 253.240132][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 253.254113][ T4629] device veth0_vlan entered promiscuous mode [ 253.273479][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 253.282502][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 253.291004][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 253.298747][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 253.307159][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 253.314729][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 253.543549][ T4629] device veth1_macvtap entered promiscuous mode [ 253.556149][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 253.564981][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 253.573209][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 253.763753][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 253.771852][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 253.803808][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 253.812121][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 254.975006][ T4695] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.982037][ T4695] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.111572][ T4695] device bridge_slave_1 left promiscuous mode [ 255.139761][ T4695] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.151976][ T4695] device bridge_slave_0 left promiscuous mode [ 255.158254][ T4695] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.655804][ T4842] device veth0_to_team entered promiscuous mode [ 265.350180][ T4890] device veth0_to_team entered promiscuous mode [ 270.159132][ T5005] device veth0_to_team entered promiscuous mode [ 297.076345][ T5458] device pim6reg1 entered promiscuous mode [ 301.485287][ T5514] device pim6reg1 entered promiscuous mode [ 305.295082][ T5576] device pim6reg1 entered promiscuous mode [ 320.171797][ T5850] FAULT_INJECTION: forcing a failure. [ 320.171797][ T5850] name failslab, interval 1, probability 0, space 0, times 0 [ 320.221750][ T5850] CPU: 1 PID: 5850 Comm: syz.2.1661 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 320.231477][ T5850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 320.241462][ T5850] Call Trace: [ 320.244583][ T5850] [ 320.247363][ T5850] dump_stack_lvl+0x151/0x1c0 [ 320.251875][ T5850] ? io_uring_drop_tctx_refs+0x190/0x190 [ 320.257338][ T5850] ? __kasan_slab_alloc+0xc3/0xe0 [ 320.262198][ T5850] ? __kasan_slab_alloc+0xb1/0xe0 [ 320.267059][ T5850] ? slab_post_alloc_hook+0x53/0x2c0 [ 320.272178][ T5850] ? kmem_cache_alloc+0xf5/0x200 [ 320.276952][ T5850] dump_stack+0x15/0x20 [ 320.280946][ T5850] should_fail+0x3c6/0x510 [ 320.285203][ T5850] __should_failslab+0xa4/0xe0 [ 320.289799][ T5850] ? __alloc_skb+0xbe/0x550 [ 320.294134][ T5850] should_failslab+0x9/0x20 [ 320.298475][ T5850] slab_pre_alloc_hook+0x37/0xd0 [ 320.303250][ T5850] ? __alloc_skb+0xbe/0x550 [ 320.307589][ T5850] kmem_cache_alloc+0x44/0x200 [ 320.312189][ T5850] __alloc_skb+0xbe/0x550 [ 320.316355][ T5850] alloc_skb_with_frags+0xa6/0x680 [ 320.321304][ T5850] ? avc_has_perm_noaudit+0x348/0x430 [ 320.326512][ T5850] sock_alloc_send_pskb+0x915/0xa50 [ 320.331550][ T5850] ? sock_kzfree_s+0x60/0x60 [ 320.335974][ T5850] ? __kasan_check_write+0x14/0x20 [ 320.340916][ T5850] ? _raw_spin_lock+0xa4/0x1b0 [ 320.345519][ T5850] ? _raw_spin_trylock_bh+0x190/0x190 [ 320.350728][ T5850] ? avc_has_perm+0x16f/0x260 [ 320.355328][ T5850] unix_dgram_sendmsg+0x6fd/0x2090 [ 320.360278][ T5850] ? unix_dgram_poll+0x710/0x710 [ 320.365050][ T5850] ? kmem_cache_free+0x116/0x2e0 [ 320.369823][ T5850] ? kasan_set_track+0x5d/0x70 [ 320.374423][ T5850] unix_seqpacket_sendmsg+0x120/0x1f0 [ 320.379631][ T5850] ? unix_dgram_peer_wake_me+0x450/0x450 [ 320.385102][ T5850] ____sys_sendmsg+0x59e/0x8f0 [ 320.389699][ T5850] ? __sys_sendmsg_sock+0x40/0x40 [ 320.394557][ T5850] ? import_iovec+0xe5/0x120 [ 320.398987][ T5850] ___sys_sendmsg+0x252/0x2e0 [ 320.403504][ T5850] ? __sys_sendmsg+0x260/0x260 [ 320.408104][ T5850] ? __fdget+0x1bc/0x240 [ 320.412177][ T5850] __se_sys_sendmsg+0x19a/0x260 [ 320.416864][ T5850] ? __x64_sys_sendmsg+0x90/0x90 [ 320.421635][ T5850] ? ksys_write+0x260/0x2c0 [ 320.425978][ T5850] ? debug_smp_processor_id+0x17/0x20 [ 320.431186][ T5850] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 320.437087][ T5850] __x64_sys_sendmsg+0x7b/0x90 [ 320.441682][ T5850] x64_sys_call+0x16a/0x9a0 [ 320.446029][ T5850] do_syscall_64+0x3b/0xb0 [ 320.450281][ T5850] ? clear_bhb_loop+0x35/0x90 [ 320.454789][ T5850] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 320.460519][ T5850] RIP: 0033:0x7efebd041ef9 [ 320.464774][ T5850] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 320.484217][ T5850] RSP: 002b:00007efebbcbb038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 320.492457][ T5850] RAX: ffffffffffffffda RBX: 00007efebd1f9f80 RCX: 00007efebd041ef9 [ 320.500270][ T5850] RDX: 0000000000000000 RSI: 0000000020000580 RDI: 0000000000000004 [ 320.508079][ T5850] RBP: 00007efebbcbb090 R08: 0000000000000000 R09: 0000000000000000 [ 320.515890][ T5850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 320.523701][ T5850] R13: 0000000000000000 R14: 00007efebd1f9f80 R15: 00007ffef34e3f58 [ 320.531517][ T5850] [ 321.256777][ T5861] device veth0_to_team entered promiscuous mode [ 326.205334][ T5997] device pim6reg1 entered promiscuous mode [ 328.813293][ T30] audit: type=1400 audit(1725949841.257:146): avc: denied { create } for pid=6033 comm="syz.4.1716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 329.834230][ T6055] device syzkaller0 entered promiscuous mode [ 336.544655][ T30] audit: type=1400 audit(1725949848.987:147): avc: denied { create } for pid=6186 comm="syz.2.1763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 339.179620][ T6241] bridge0: port 3(veth0) entered blocking state [ 339.265523][ T6241] bridge0: port 3(veth0) entered disabled state [ 339.278710][ T6241] device veth0 entered promiscuous mode [ 353.748631][ T6502] FAULT_INJECTION: forcing a failure. [ 353.748631][ T6502] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 353.762207][ T6502] CPU: 1 PID: 6502 Comm: syz.1.1864 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 353.771914][ T6502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 353.781917][ T6502] Call Trace: [ 353.785040][ T6502] [ 353.787821][ T6502] dump_stack_lvl+0x151/0x1c0 [ 353.792333][ T6502] ? io_uring_drop_tctx_refs+0x190/0x190 [ 353.797800][ T6502] ? 0xffffffffa0002b48 [ 353.801791][ T6502] ? is_bpf_text_address+0x172/0x190 [ 353.806914][ T6502] dump_stack+0x15/0x20 [ 353.810903][ T6502] should_fail+0x3c6/0x510 [ 353.815159][ T6502] should_fail_alloc_page+0x5a/0x80 [ 353.820192][ T6502] prepare_alloc_pages+0x15c/0x700 [ 353.825140][ T6502] ? __alloc_pages+0x8f0/0x8f0 [ 353.829739][ T6502] ? __alloc_pages_bulk+0xe40/0xe40 [ 353.834778][ T6502] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 353.840242][ T6502] __alloc_pages+0x18c/0x8f0 [ 353.844667][ T6502] ? prep_new_page+0x110/0x110 [ 353.849266][ T6502] ? pcpu_chunk_relocate+0x20a/0x430 [ 353.854390][ T6502] pcpu_populate_chunk+0x18c/0xe30 [ 353.859336][ T6502] pcpu_alloc+0x984/0x13e0 [ 353.863592][ T6502] __alloc_percpu_gfp+0x27/0x30 [ 353.868275][ T6502] bpf_map_alloc_percpu+0xe6/0x160 [ 353.873226][ T6502] array_map_alloc+0x3a5/0x6d0 [ 353.877825][ T6502] map_create+0x411/0x2050 [ 353.882079][ T6502] __sys_bpf+0x296/0x760 [ 353.886155][ T6502] ? fput_many+0x160/0x1b0 [ 353.890405][ T6502] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 353.895616][ T6502] ? debug_smp_processor_id+0x17/0x20 [ 353.900958][ T6502] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 353.906857][ T6502] __x64_sys_bpf+0x7c/0x90 [ 353.911108][ T6502] x64_sys_call+0x87f/0x9a0 [ 353.915448][ T6502] do_syscall_64+0x3b/0xb0 [ 353.919704][ T6502] ? clear_bhb_loop+0x35/0x90 [ 353.924213][ T6502] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 353.929942][ T6502] RIP: 0033:0x7f44b8fa4ef9 [ 353.934196][ T6502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 353.953636][ T6502] RSP: 002b:00007f44b7c1e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 353.961879][ T6502] RAX: ffffffffffffffda RBX: 00007f44b915cf80 RCX: 00007f44b8fa4ef9 [ 353.969703][ T6502] RDX: 0000000000000050 RSI: 0000000020000140 RDI: 2000000000000000 [ 353.977501][ T6502] RBP: 00007f44b7c1e090 R08: 0000000000000000 R09: 0000000000000000 [ 353.985314][ T6502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 353.993123][ T6502] R13: 0000000000000000 R14: 00007f44b915cf80 R15: 00007fff30234b38 [ 354.000944][ T6502] [ 355.525630][ T6533] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.619749][ T6533] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.627069][ T6533] device bridge_slave_0 entered promiscuous mode [ 355.675094][ T6533] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.683295][ T6533] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.690709][ T6533] device bridge_slave_1 entered promiscuous mode [ 356.053833][ T6533] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.060705][ T6533] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.067813][ T6533] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.074600][ T6533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.339140][ T416] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.352063][ T416] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.513067][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 356.529567][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 356.605764][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 356.688363][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 356.762322][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.769220][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.884564][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 356.956466][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 357.036925][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.043801][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.057808][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 357.073508][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 357.087121][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 357.095487][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 357.146049][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 357.156689][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 357.168995][ T6533] device veth0_vlan entered promiscuous mode [ 357.176479][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 357.230605][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 357.280105][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 357.319368][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 357.354267][ T6533] device veth1_macvtap entered promiscuous mode [ 357.361403][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 357.370646][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 357.378669][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 357.398107][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 357.406313][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 357.414816][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 357.423178][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 358.885221][ T6625] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.907673][ T6625] bridge0: port 1(bridge_slave_0) entered disabled state [ 359.850737][ T6664] syz.3.1915[6664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 359.850809][ T6664] syz.3.1915[6664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 360.012552][ T6672] syz.3.1915[6672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 360.090308][ T6672] syz.3.1915[6672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.984306][ T6739] ------------[ cut here ]------------ [ 364.139632][ T6739] trace type BPF program uses run-time allocation [ 364.146061][ T6739] WARNING: CPU: 1 PID: 6739 at kernel/bpf/verifier.c:11685 check_map_prog_compatibility+0x6f1/0x890 [ 364.188737][ T6739] Modules linked in: [ 364.274274][ T6739] CPU: 1 PID: 6739 Comm: syz.4.1939 Not tainted 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 364.420409][ T6739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 364.529936][ T6739] RIP: 0010:check_map_prog_compatibility+0x6f1/0x890 [ 364.582201][ T6739] Code: db e9 f9 fc ff ff e8 3e 33 ed ff 31 db e9 ed fc ff ff e8 32 33 ed ff c6 05 7d 1d a3 05 01 48 c7 c7 40 df 87 85 e8 6f 68 be ff <0f> 0b e9 5a fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 84 f9 ff [ 364.750076][ T6739] RSP: 0018:ffffc90000caf328 EFLAGS: 00010246 [ 364.890856][ T6739] RAX: 4546a6e502203900 RBX: 0000000000000001 RCX: 0000000000040000 [ 364.951846][ T6739] RDX: ffffc900060de000 RSI: 0000000000000a45 RDI: 0000000000000a46 [ 365.018545][ T6739] RBP: ffffc90000caf370 R08: ffffffff81579755 R09: ffffed103ee24e93 [ 365.159384][ T6739] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 365.167191][ T6739] R13: ffff88810fd2c000 R14: ffffc9000018d000 R15: dffffc0000000000 [ 365.233084][ T6739] FS: 00007f34495e36c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 365.241936][ T6739] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 365.248276][ T6739] CR2: 00007fa486ee4f98 CR3: 0000000125eaa000 CR4: 00000000003506a0 [ 365.311219][ T6739] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 365.319024][ T6739] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 365.330772][ T6739] Call Trace: [ 365.336839][ T6739] [ 365.409148][ T6739] ? show_regs+0x58/0x60 [ 365.413238][ T6739] ? __warn+0x160/0x2f0 [ 365.417226][ T6739] ? check_map_prog_compatibility+0x6f1/0x890 [ 365.477688][ T6739] ? report_bug+0x3d9/0x5b0 [ 365.495693][ T6739] ? check_map_prog_compatibility+0x6f1/0x890 [ 365.501866][ T6739] ? handle_bug+0x41/0x70 [ 365.509262][ T6739] ? exc_invalid_op+0x1b/0x50 [ 365.523690][ T6739] ? asm_exc_invalid_op+0x1b/0x20 [ 365.528602][ T6739] ? __wake_up_klogd+0xd5/0x110 [ 365.533868][ T6739] ? check_map_prog_compatibility+0x6f1/0x890 [ 365.539850][ T6739] ? check_map_prog_compatibility+0x6f1/0x890 [ 365.545726][ T6739] resolve_pseudo_ldimm64+0x671/0x1240 [ 365.569181][ T6739] ? check_attach_btf_id+0xef0/0xef0 [ 365.579365][ T6739] ? __mark_reg_known+0x1b0/0x1b0 [ 365.584224][ T6739] ? security_capable+0x87/0xb0 [ 365.606939][ T6739] bpf_check+0x3174/0x12bf0 [ 365.614860][ T6739] ? bpf_prog_216c997a1f42e404+0x110/0xff0 [ 365.623959][ T6739] ? is_bpf_text_address+0x172/0x190 [ 365.631798][ T6739] ? stack_trace_save+0x1c0/0x1c0 [ 365.686003][ T6739] ? __kernel_text_address+0x9b/0x110 [ 365.765077][ T6739] ? unwind_get_return_address+0x4d/0x90 [ 365.795460][ T6739] ? bpf_get_btf_vmlinux+0x60/0x60 [ 365.836871][ T6739] ? arch_stack_walk+0xf3/0x140 [ 365.867834][ T6739] ? stack_trace_save+0x113/0x1c0 [ 365.913559][ T6739] ? stack_trace_snprint+0xf0/0xf0 [ 365.918595][ T6739] ? stack_trace_snprint+0xf0/0xf0 [ 366.006061][ T6739] ? __stack_depot_save+0x34/0x470 [ 366.042921][ T6783] device veth0_to_team entered promiscuous mode [ 366.049210][ T6739] ? ____kasan_kmalloc+0xed/0x110 [ 366.054054][ T6739] ? ____kasan_kmalloc+0xdb/0x110 [ 366.058914][ T6739] ? __kasan_kmalloc+0x9/0x10 [ 366.167813][ T6739] ? kmem_cache_alloc_trace+0x115/0x210 [ 366.221958][ T6739] ? selinux_bpf_prog_alloc+0x51/0x140 [ 366.254121][ T6739] ? security_bpf_prog_alloc+0x62/0x90 [ 366.314039][ T6739] ? bpf_prog_load+0x9ee/0x1b50 [ 366.361513][ T6739] ? __sys_bpf+0x4bc/0x760 [ 366.409471][ T6739] ? __x64_sys_bpf+0x7c/0x90 [ 366.413909][ T6739] ? x64_sys_call+0x87f/0x9a0 [ 366.418420][ T6739] ? do_syscall_64+0x3b/0xb0 [ 366.423673][ T6739] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 366.436229][ T6739] ? __kasan_kmalloc+0x9/0x10 [ 366.443759][ T6739] ? memset+0x35/0x40 [ 366.447629][ T6739] ? bpf_obj_name_cpy+0x196/0x1e0 [ 366.482299][ T6739] bpf_prog_load+0x12ac/0x1b50 [ 366.487045][ T6739] ? map_freeze+0x370/0x370 [ 366.575931][ T6739] ? selinux_bpf+0xcb/0x100 [ 366.600854][ T6739] ? security_bpf+0x82/0xb0 [ 366.605204][ T6739] __sys_bpf+0x4bc/0x760 [ 366.629156][ T6739] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 366.634633][ T6739] ? __kasan_check_read+0x11/0x20 [ 366.655150][ T6739] __x64_sys_bpf+0x7c/0x90 [ 366.669163][ T6739] x64_sys_call+0x87f/0x9a0 [ 366.690454][ T6739] do_syscall_64+0x3b/0xb0 [ 366.789378][ T6739] ? clear_bhb_loop+0x35/0x90 [ 366.793904][ T6739] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 366.890262][ T6739] RIP: 0033:0x7f344a969ef9 [ 366.939165][ T6739] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 367.067416][ T6739] RSP: 002b:00007f34495e3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 367.075746][ T6739] RAX: ffffffffffffffda RBX: 00007f344ab21f80 RCX: 00007f344a969ef9 [ 367.083577][ T6739] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 367.091431][ T6739] RBP: 00007f344a9dc9f6 R08: 0000000000000000 R09: 0000000000000000 [ 367.099254][ T6739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 367.107078][ T6739] R13: 0000000000000000 R14: 00007f344ab21f80 R15: 00007fffcbe62148 [ 367.114960][ T6739] [ 367.118478][ T6739] ---[ end trace 529ffc84f3d859d2 ]--- [ 368.970914][ T6846] ip6_vti0: mtu greater than device maximum [ 369.910370][ T6864] FAULT_INJECTION: forcing a failure. [ 369.910370][ T6864] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 370.061762][ T6864] CPU: 0 PID: 6864 Comm: syz.0.1982 Tainted: G W 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 370.072968][ T6864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 370.082869][ T6864] Call Trace: [ 370.085983][ T6864] [ 370.088759][ T6864] dump_stack_lvl+0x151/0x1c0 [ 370.093274][ T6864] ? io_uring_drop_tctx_refs+0x190/0x190 [ 370.098742][ T6864] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 370.104732][ T6864] dump_stack+0x15/0x20 [ 370.108727][ T6864] should_fail+0x3c6/0x510 [ 370.113080][ T6864] should_fail_usercopy+0x1a/0x20 [ 370.117941][ T6864] _copy_from_user+0x20/0xd0 [ 370.122365][ T6864] __sys_bpf+0x1e9/0x760 [ 370.126445][ T6864] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 370.131655][ T6864] ? __kasan_check_read+0x11/0x20 [ 370.136527][ T6864] __x64_sys_bpf+0x7c/0x90 [ 370.140775][ T6864] x64_sys_call+0x87f/0x9a0 [ 370.145108][ T6864] do_syscall_64+0x3b/0xb0 [ 370.149531][ T6864] ? clear_bhb_loop+0x35/0x90 [ 370.154049][ T6864] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 370.159773][ T6864] RIP: 0033:0x7fa48826bef9 [ 370.164028][ T6864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 370.183644][ T6864] RSP: 002b:00007fa486ee5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 370.191886][ T6864] RAX: ffffffffffffffda RBX: 00007fa488423f80 RCX: 00007fa48826bef9 [ 370.199787][ T6864] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 2000000000000000 [ 370.207596][ T6864] RBP: 00007fa486ee5090 R08: 0000000000000000 R09: 0000000000000000 [ 370.215409][ T6864] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 370.223219][ T6864] R13: 0000000000000000 R14: 00007fa488423f80 R15: 00007fff814ddeb8 [ 370.231043][ T6864] [ 372.234358][ T6932] bridge0: port 2(bridge_slave_1) entered blocking state [ 372.241256][ T6932] bridge0: port 2(bridge_slave_1) entered forwarding state [ 372.248356][ T6932] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.255142][ T6932] bridge0: port 1(bridge_slave_0) entered forwarding state [ 372.299278][ T6932] device bridge0 entered promiscuous mode [ 372.630091][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 372.758351][ T6951] device wg2 entered promiscuous mode [ 375.040836][ T7019] bridge0: port 2(bridge_slave_1) entered disabled state [ 375.055835][ T7019] bridge0: port 1(bridge_slave_0) entered disabled state [ 375.076727][ T7019] device bridge0 left promiscuous mode [ 378.377577][ T7109] FAULT_INJECTION: forcing a failure. [ 378.377577][ T7109] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 378.396738][ T7109] CPU: 0 PID: 7109 Comm: syz.3.2059 Tainted: G W 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 378.407853][ T7109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 378.417741][ T7109] Call Trace: [ 378.420870][ T7109] [ 378.423668][ T7109] dump_stack_lvl+0x151/0x1c0 [ 378.428156][ T7109] ? io_uring_drop_tctx_refs+0x190/0x190 [ 378.433810][ T7109] ? migrate_enable+0x1c1/0x2a0 [ 378.438480][ T7109] ? migrate_disable+0x190/0x190 [ 378.443257][ T7109] dump_stack+0x15/0x20 [ 378.447250][ T7109] should_fail+0x3c6/0x510 [ 378.451506][ T7109] should_fail_usercopy+0x1a/0x20 [ 378.456368][ T7109] _copy_from_user+0x20/0xd0 [ 378.460785][ T7109] generic_map_update_batch+0x47e/0x860 [ 378.466255][ T7109] ? generic_map_delete_batch+0x5f0/0x5f0 [ 378.471809][ T7109] ? generic_map_delete_batch+0x5f0/0x5f0 [ 378.477362][ T7109] bpf_map_do_batch+0x4c3/0x620 [ 378.482049][ T7109] __sys_bpf+0x5dc/0x760 [ 378.486129][ T7109] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 378.491340][ T7109] ? debug_smp_processor_id+0x17/0x20 [ 378.496543][ T7109] __x64_sys_bpf+0x7c/0x90 [ 378.500798][ T7109] x64_sys_call+0x87f/0x9a0 [ 378.505140][ T7109] do_syscall_64+0x3b/0xb0 [ 378.509390][ T7109] ? clear_bhb_loop+0x35/0x90 [ 378.513903][ T7109] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 378.519627][ T7109] RIP: 0033:0x7f8990319ef9 [ 378.523882][ T7109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 378.543323][ T7109] RSP: 002b:00007f898ef93038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 378.551573][ T7109] RAX: ffffffffffffffda RBX: 00007f89904d1f80 RCX: 00007f8990319ef9 [ 378.559385][ T7109] RDX: 0000000000000038 RSI: 0000000020000200 RDI: 000000000000001a [ 378.567192][ T7109] RBP: 00007f898ef93090 R08: 0000000000000000 R09: 0000000000000000 [ 378.575001][ T7109] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 378.582812][ T7109] R13: 0000000000000000 R14: 00007f89904d1f80 R15: 00007ffc4d143a08 [ 378.590630][ T7109] [ 379.973401][ T7164] syz.4.2076[7164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.973464][ T7164] syz.4.2076[7164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.120677][ T7170] FAULT_INJECTION: forcing a failure. [ 380.120677][ T7170] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 380.233323][ T7170] CPU: 0 PID: 7170 Comm: syz.2.2078 Tainted: G W 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 380.244436][ T7170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 380.254418][ T7170] Call Trace: [ 380.257542][ T7170] [ 380.260320][ T7170] dump_stack_lvl+0x151/0x1c0 [ 380.264835][ T7170] ? io_uring_drop_tctx_refs+0x190/0x190 [ 380.270302][ T7170] ? kasan_set_track+0x5d/0x70 [ 380.274901][ T7170] ? __kasan_slab_free+0x11/0x20 [ 380.279674][ T7170] ? kmem_cache_free+0x116/0x2e0 [ 380.284446][ T7170] ? putname+0xfa/0x150 [ 380.288439][ T7170] ? do_sys_openat2+0x71c/0x830 [ 380.293126][ T7170] ? x64_sys_call+0x6bf/0x9a0 [ 380.297640][ T7170] dump_stack+0x15/0x20 [ 380.301631][ T7170] should_fail+0x3c6/0x510 [ 380.305885][ T7170] should_fail_usercopy+0x1a/0x20 [ 380.310743][ T7170] _copy_from_user+0x20/0xd0 [ 380.315258][ T7170] iovec_from_user+0xc7/0x330 [ 380.319771][ T7170] __import_iovec+0x6d/0x420 [ 380.324200][ T7170] import_iovec+0xe5/0x120 [ 380.328452][ T7170] ___sys_recvmsg+0x56b/0x690 [ 380.332965][ T7170] ? __sys_recvmsg+0x260/0x260 [ 380.337575][ T7170] ? __fdget+0x1bc/0x240 [ 380.341645][ T7170] __x64_sys_recvmsg+0x1dc/0x2b0 [ 380.346416][ T7170] ? ___sys_recvmsg+0x690/0x690 [ 380.351104][ T7170] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 380.357090][ T7170] ? exit_to_user_mode_prepare+0x39/0xa0 [ 380.362560][ T7170] x64_sys_call+0x171/0x9a0 [ 380.367246][ T7170] do_syscall_64+0x3b/0xb0 [ 380.371497][ T7170] ? clear_bhb_loop+0x35/0x90 [ 380.376012][ T7170] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 380.381738][ T7170] RIP: 0033:0x7efebd041ef9 [ 380.385991][ T7170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 380.405431][ T7170] RSP: 002b:00007efebbcbb038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 380.413679][ T7170] RAX: ffffffffffffffda RBX: 00007efebd1f9f80 RCX: 00007efebd041ef9 [ 380.421489][ T7170] RDX: 0000000000000000 RSI: 0000000020000900 RDI: 0000000000000003 [ 380.429298][ T7170] RBP: 00007efebbcbb090 R08: 0000000000000000 R09: 0000000000000000 [ 380.437108][ T7170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 380.444927][ T7170] R13: 0000000000000000 R14: 00007efebd1f9f80 R15: 00007ffef34e3f58 [ 380.452737][ T7170] [ 382.526769][ T7213] bond_slave_1: mtu less than device minimum [ 384.593586][ T30] audit: type=1400 audit(1725949897.037:148): avc: denied { create } for pid=7304 comm="syz.4.2119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 484.944815][ T8758] device syzkaller0 entered promiscuous mode [ 617.095261][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 123s! [syz.2.2652:9075] [ 617.103321][ C0] Modules linked in: [ 617.107050][ C0] CPU: 0 PID: 9075 Comm: syz.2.2652 Tainted: G W 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 617.118160][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 617.128061][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 617.132829][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 9b ec 12 04 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 617.152885][ C0] RSP: 0018:ffffc90000c57020 EFLAGS: 00000246 [ 617.158782][ C0] RAX: 0000000000000001 RBX: 1ffff9200018ae08 RCX: 1ffffffff0d5ab14 [ 617.166589][ C0] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7038ad4 [ 617.174401][ C0] RBP: ffffc90000c570d0 R08: dffffc0000000000 R09: ffffed103ee0715b [ 617.182213][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 617.190023][ C0] R13: ffff8881f7038ad4 R14: 0000000000000001 R15: 1ffff9200018ae0c [ 617.197840][ C0] FS: 00007efebbc9a6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 617.206626][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 617.213022][ C0] CR2: 0000001b2d21aff8 CR3: 0000000117697000 CR4: 00000000003506b0 [ 617.220840][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 617.228646][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 617.236457][ C0] Call Trace: [ 617.239588][ C0] [ 617.242278][ C0] ? show_regs+0x58/0x60 [ 617.246350][ C0] ? watchdog_timer_fn+0x4b1/0x5f0 [ 617.251297][ C0] ? proc_watchdog_cpumask+0xd0/0xd0 [ 617.256421][ C0] ? __hrtimer_run_queues+0x41a/0xad0 [ 617.261627][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 617.266581][ C0] ? clockevents_program_event+0x22f/0x300 [ 617.272215][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 617.278118][ C0] ? hrtimer_interrupt+0x40c/0xaa0 [ 617.283068][ C0] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 617.289054][ C0] ? sysvec_apic_timer_interrupt+0x95/0xc0 [ 617.294695][ C0] [ 617.297472][ C0] [ 617.300256][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 617.306238][ C0] ? kvm_wait+0x147/0x180 [ 617.310406][ C0] ? asm_common_interrupt+0x27/0x40 [ 617.315437][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 617.320387][ C0] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 617.326291][ C0] ? __kasan_slab_alloc+0x63/0xe0 [ 617.331146][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 617.337395][ C0] ? ____kasan_kmalloc+0xed/0x110 [ 617.342263][ C0] ? __kasan_kmalloc+0x9/0x10 [ 617.346767][ C0] ? __kmalloc+0x13a/0x270 [ 617.351020][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 617.355794][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 617.360830][ C0] sock_map_delete_elem+0x161/0x230 [ 617.365863][ C0] ? sort_r+0x79/0x1310 [ 617.369854][ C0] ? sock_map_update_elem+0x390/0x390 [ 617.375063][ C0] ? kvfree+0x35/0x40 [ 617.378883][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0xfc [ 617.384178][ C0] bpf_trace_run2+0xec/0x210 [ 617.388603][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 617.393289][ C0] ? kvfree+0x35/0x40 [ 617.397106][ C0] ? memset+0x35/0x40 [ 617.400925][ C0] ? verbose+0x194/0x2a0 [ 617.405008][ C0] ? sort+0x37/0x50 [ 617.408660][ C0] ? kvfree+0x35/0x40 [ 617.412471][ C0] __bpf_trace_kfree+0x6f/0x90 [ 617.417072][ C0] ? kvfree+0x35/0x40 [ 617.420887][ C0] kfree+0x1f3/0x220 [ 617.424620][ C0] ? security_capable+0x87/0xb0 [ 617.429311][ C0] kvfree+0x35/0x40 [ 617.432954][ C0] bpf_check+0x4a4e/0x12bf0 [ 617.437298][ C0] ? 0xffffffffa0014f04 [ 617.441288][ C0] ? is_bpf_text_address+0x172/0x190 [ 617.446409][ C0] ? stack_trace_save+0x1c0/0x1c0 [ 617.451264][ C0] ? __kernel_text_address+0x9b/0x110 [ 617.456474][ C0] ? unwind_get_return_address+0x4d/0x90 [ 617.461940][ C0] ? bpf_get_btf_vmlinux+0x60/0x60 [ 617.466887][ C0] ? arch_stack_walk+0xf3/0x140 [ 617.471576][ C0] ? stack_trace_save+0x113/0x1c0 [ 617.476446][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 617.481388][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 617.486331][ C0] ? __stack_depot_save+0x34/0x470 [ 617.491277][ C0] ? ____kasan_kmalloc+0xed/0x110 [ 617.496138][ C0] ? ____kasan_kmalloc+0xdb/0x110 [ 617.500999][ C0] ? __kasan_kmalloc+0x9/0x10 [ 617.505510][ C0] ? kmem_cache_alloc_trace+0x115/0x210 [ 617.510899][ C0] ? selinux_bpf_prog_alloc+0x51/0x140 [ 617.516183][ C0] ? security_bpf_prog_alloc+0x62/0x90 [ 617.521479][ C0] ? bpf_prog_load+0x9ee/0x1b50 [ 617.526176][ C0] ? __sys_bpf+0x4bc/0x760 [ 617.530421][ C0] ? __x64_sys_bpf+0x7c/0x90 [ 617.535281][ C0] ? x64_sys_call+0x87f/0x9a0 [ 617.539792][ C0] ? do_syscall_64+0x3b/0xb0 [ 617.544219][ C0] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 617.550129][ C0] ? __kasan_kmalloc+0x9/0x10 [ 617.554635][ C0] ? memset+0x35/0x40 [ 617.558453][ C0] ? bpf_obj_name_cpy+0x196/0x1e0 [ 617.563312][ C0] bpf_prog_load+0x12ac/0x1b50 [ 617.567920][ C0] ? map_freeze+0x370/0x370 [ 617.572276][ C0] ? selinux_bpf+0xcb/0x100 [ 617.576592][ C0] ? security_bpf+0x82/0xb0 [ 617.580932][ C0] __sys_bpf+0x4bc/0x760 [ 617.585015][ C0] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 617.590221][ C0] ? __kasan_check_read+0x11/0x20 [ 617.595080][ C0] __x64_sys_bpf+0x7c/0x90 [ 617.599333][ C0] x64_sys_call+0x87f/0x9a0 [ 617.603673][ C0] do_syscall_64+0x3b/0xb0 [ 617.607922][ C0] ? clear_bhb_loop+0x35/0x90 [ 617.612438][ C0] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 617.618166][ C0] RIP: 0033:0x7efebd041ef9 [ 617.622431][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 617.641868][ C0] RSP: 002b:00007efebbc9a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 617.650106][ C0] RAX: ffffffffffffffda RBX: 00007efebd1fa058 RCX: 00007efebd041ef9 [ 617.657916][ C0] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 617.665728][ C0] RBP: 00007efebd0b49f6 R08: 0000000000000000 R09: 0000000000000000 [ 617.673539][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 617.681523][ C0] R13: 0000000000000000 R14: 00007efebd1fa058 R15: 00007ffef34e3f58 [ 617.689341][ C0] [ 617.692210][ C0] Sending NMI from CPU 0 to CPUs 1: [ 617.697262][ C1] NMI backtrace for cpu 1 [ 617.697272][ C1] CPU: 1 PID: 9081 Comm: syz.3.2655 Tainted: G W 5.15.158-syzkaller-00979-gc53388f01037 #0 [ 617.697290][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 617.697298][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 617.697318][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 9b ec 12 04 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 617.697331][ C1] RSP: 0018:ffffc90000c975a0 EFLAGS: 00000246 [ 617.697345][ C1] RAX: 0000000000000003 RBX: 1ffff92000192eb8 RCX: ffffffff81552fff [ 617.697356][ C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff88811f219d28 [ 617.697367][ C1] RBP: ffffc90000c97650 R08: dffffc0000000000 R09: ffffed1023e433a6 [ 617.697379][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 617.697390][ C1] R13: ffff88811f219d28 R14: 0000000000000003 R15: 1ffff92000192ebc [ 617.697401][ C1] FS: 00007f898ef726c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 617.697415][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 617.697425][ C1] CR2: 00007f898ef71f98 CR3: 0000000128de4000 CR4: 00000000003506a0 [ 617.697439][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 617.697449][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 617.697458][ C1] Call Trace: [ 617.697463][ C1] [ 617.697470][ C1] ? show_regs+0x58/0x60 [ 617.697486][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 617.697504][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 617.697523][ C1] ? kvm_wait+0x147/0x180 [ 617.697536][ C1] ? kvm_wait+0x147/0x180 [ 617.697550][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 617.697566][ C1] ? nmi_handle+0xa8/0x280 [ 617.697582][ C1] ? kvm_wait+0x147/0x180 [ 617.697595][ C1] ? default_do_nmi+0x69/0x160 [ 617.697610][ C1] ? exc_nmi+0xad/0x100 [ 617.697623][ C1] ? end_repeat_nmi+0x16/0x31 [ 617.697639][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 617.697658][ C1] ? kvm_wait+0x147/0x180 [ 617.697671][ C1] ? kvm_wait+0x147/0x180 [ 617.697685][ C1] ? kvm_wait+0x147/0x180 [ 617.697698][ C1] [ 617.697703][ C1] [ 617.697708][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 617.697723][ C1] ? pv_hash+0x86/0x150 [ 617.697748][ C1] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 617.697767][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 617.697786][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 617.697802][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 617.697818][ C1] ? 0xffffffffa0014f04 [ 617.697828][ C1] ? is_bpf_text_address+0x172/0x190 [ 617.697847][ C1] sock_map_delete_elem+0x161/0x230 [ 617.697866][ C1] ? sock_map_update_elem+0x390/0x390 [ 617.697882][ C1] ? arch_stack_walk+0xf3/0x140 [ 617.697900][ C1] ? sock_map_unref+0x352/0x4d0 [ 617.697916][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0xfc [ 617.697929][ C1] bpf_trace_run2+0xec/0x210 [ 617.697946][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 617.697961][ C1] ? sock_map_unref+0x352/0x4d0 [ 617.697978][ C1] ? __stack_depot_save+0x34/0x470 [ 617.697991][ C1] ? sock_map_unref+0x352/0x4d0 [ 617.698007][ C1] __bpf_trace_kfree+0x6f/0x90 [ 617.698022][ C1] ? sock_map_unref+0x352/0x4d0 [ 617.698038][ C1] kfree+0x1f3/0x220 [ 617.698055][ C1] sock_map_unref+0x352/0x4d0 [ 617.698073][ C1] sock_map_delete_elem+0x191/0x230 [ 617.698090][ C1] ? sock_map_update_elem+0x390/0x390 [ 617.698108][ C1] ? kvfree+0x35/0x40 [ 617.698121][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0xfc [ 617.698133][ C1] bpf_trace_run2+0xec/0x210 [ 617.698149][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 617.698164][ C1] ? kvfree+0x35/0x40 [ 617.698176][ C1] ? migrate_enable+0x1c1/0x2a0 [ 617.698193][ C1] ? kvfree+0x35/0x40 [ 617.698206][ C1] __bpf_trace_kfree+0x6f/0x90 [ 617.698221][ C1] ? kvfree+0x35/0x40 [ 617.698233][ C1] kfree+0x1f3/0x220 [ 617.698247][ C1] ? bpf_map_update_value+0x35c/0x3c0 [ 617.698263][ C1] kvfree+0x35/0x40 [ 617.698275][ C1] map_update_elem+0x653/0x770 [ 617.698291][ C1] __sys_bpf+0x405/0x760 [ 617.698305][ C1] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 617.698324][ C1] ? __kasan_check_read+0x11/0x20 [ 617.698340][ C1] __x64_sys_bpf+0x7c/0x90 [ 617.698354][ C1] x64_sys_call+0x87f/0x9a0 [ 617.698368][ C1] do_syscall_64+0x3b/0xb0 [ 617.698383][ C1] ? clear_bhb_loop+0x35/0x90 [ 617.698396][ C1] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 617.698413][ C1] RIP: 0033:0x7f8990319ef9 [ 617.698426][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 617.698438][ C1] RSP: 002b:00007f898ef72038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 617.698453][ C1] RAX: ffffffffffffffda RBX: 00007f89904d2058 RCX: 00007f8990319ef9 [ 617.698464][ C1] RDX: 0000000000000020 RSI: 0000000020000240 RDI: 0000000000000002 [ 617.698474][ C1] RBP: 00007f899038c9f6 R08: 0000000000000000 R09: 0000000000000000 [ 617.698483][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 617.698492][ C1] R13: 0000000000000000 R14: 00007f89904d2058 R15: 00007ffc4d143a08 [ 617.698506][ C1]