last executing test programs: 29.902896099s ago: executing program 3 (id=738): openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r1) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[0x0], 0x0, 0x0, 0x86, &(0x7f0000000500), 0x0, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64, @ANYRES32, @ANYRESHEX=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004000000000000000002000000000000000000000000000003000000000300000001000000000000000000e1432cbd4802d2366cf2c03d75a3c01b5ac168e5e9895bda4d508fca73e78ad4060c521aac39f82dab2e8b4f84b4b49b8aab693d1d0c9ac8014e81f5b7f20fae4b4cff715b58688354d506e80c6b39960cc967c2481f7a410eb98a585ec9dc286bbf5e21c6038cf841334e03c5f671f461130fd2ba8d56092f0990f2fe8271be70e275b6a0dc9dc1d6516893f2cdf5f83aec9041fdc0440595350b4fb90ff598"], 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001340)={&(0x7f00000013c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x57, 0x57, 0x7, [@ptr={0x5, 0x0, 0x0, 0x2, 0x5}, @ptr={0x10, 0x0, 0x0, 0x2, 0x2}, @enum={0x10}, @restrict={0xf}, @datasec={0x1, 0x1, 0x0, 0xf, 0x3, [{0x2, 0x3, 0x1}], "896850"}, @fwd={0xb}]}, {0x0, [0x2e, 0x0, 0x30, 0x30, 0x0]}}, &(0x7f0000001480)=""/167, 0x77, 0xa7, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x9, 0x4564, 0x0, 0x3, 0xc100, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x5, 0x0, @value=r3, @void, @void, @value}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r4}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 29.63698202s ago: executing program 3 (id=743): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000a50000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300)}, 0x0, 0x80000000c8, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000500)=ANY=[@ANYRES16=r1, @ANYRESDEC], 0xfdef) 29.520039273s ago: executing program 3 (id=745): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839", 0x5}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000b00)={0x0, 0x25, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) 29.452201771s ago: executing program 3 (id=746): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f0000050000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000209987f53d6a76a6520000000000000000"], 0x48) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="190000000400000004000000ffff010000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffffa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYRESOCT=r3, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000980), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x2b, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000340)=0xfffffffffffff001) 29.449555361s ago: executing program 4 (id=747): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000120000002400000008000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='rss_stat\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x10, 0x4, &(0x7f0000001300)=ANY=[@ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="851000000400000095000000000000001800000000000000000000000000000095000000000000008510000028fcffffffd500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r3, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000001680)=[0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) write$cgroup_int(r2, &(0x7f00000001c0)=0x8200000000000000, 0xfffffdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) 29.163246314s ago: executing program 0 (id=749): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839", 0x5}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) 29.162630144s ago: executing program 0 (id=750): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) socketpair(0xa, 0x2, 0x0, &(0x7f0000000180)={0x0, 0x0}) (fail_nth: 7) 29.076978285s ago: executing program 2 (id=751): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x4, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="18000000000000000000000000000000711206000000000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000fc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x168, 0x168, 0x5, [@var={0xd, 0x0, 0x0, 0xe, 0x2, 0x2}, @float={0x1, 0x0, 0x0, 0x10, 0xc}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0xf, 0x1}, {0xb, 0x12000}, {0x7, 0x1}, {0x10, 0x3}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2, 0x2}}, @enum64={0x9, 0x7, 0x0, 0x13, 0x0, 0x4, [{0xa, 0x1000, 0x6}, {0xc, 0x1, 0x3}, {0xc, 0x5, 0x3ff}, {0x5, 0xe1, 0x7d8}, {0x9, 0xa5a0, 0x80000001}, {0x1, 0xe34, 0x1000}, {0x5, 0x10001, 0x5}]}, @var={0x9, 0x0, 0x0, 0xe, 0x4, 0x2}, @ptr={0xa, 0x0, 0x0, 0x2, 0x2}, @enum={0x5, 0x8, 0x0, 0x6, 0x4, [{0x8, 0xff}, {0x3, 0x4}, {0x9, 0x8001}, {0xa, 0x527}, {0x0, 0x8}, {0xf, 0x5}, {0x10, 0x5}, {0xd, 0x8001}]}, @enum64={0x7, 0x3, 0x0, 0x13, 0x1, 0x8, [{0xa, 0x1, 0xfff}, {0x2, 0x8, 0xd0f}, {0xa, 0x383, 0xfffffffd}]}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x5b, 0x0, 0x19, 0x1}]}, {0x0, [0x30, 0x61, 0x2e]}}, &(0x7f0000000900)=""/253, 0x185, 0xfd, 0x1, 0x5, 0x0, @void, @value}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x5, 0xff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r8}, 0x10) write$cgroup_subtree(r6, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff010000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000000000000000000000000000181100", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000c00)=ANY=[@ANYRES32, @ANYRESOCT, @ANYRES8=r10, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRESOCT, @ANYRESDEC, @ANYRESHEX=0x0, @ANYRESDEC], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r9, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000f00)={0x1d, 0x32, &(0x7f0000000b00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @exit, @ldst={0x0, 0x1, 0x4, 0x7, 0x7, 0x2, 0x8}, @map_fd={0x18, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x10}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000cc0)='syzkaller\x00', 0x9, 0xed, &(0x7f0000000d00)=""/237, 0x40f00, 0x8, '\x00', r9, @fallback=0x1c, r5, 0x8, &(0x7f0000000e00)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000e40)={0x3, 0xf, 0x10000, 0x3d}, 0x10, 0x0, r8, 0x5, 0x0, &(0x7f0000000e80)=[{0x5, 0xca72, 0xe, 0x3}, {0x2, 0x5, 0xd}, {0x3, 0x4, 0x0, 0x2}, {0x0, 0x2, 0x3, 0x6}, {0x1, 0x5, 0x10, 0x5}], 0x10, 0x7, @void, @value}, 0x94) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x125}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup(r2, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 28.743305963s ago: executing program 0 (id=752): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0xff, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40010) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001400)={{}, 0x0, &(0x7f00000013c0)}, 0x20) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) recvmsg(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/163, 0xa3}], 0x300}, 0x0) 28.731509244s ago: executing program 3 (id=753): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000700)={&(0x7f00000002c0)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000000540)=""/66, 0x42}, {&(0x7f0000000680)=""/95, 0x5f}], 0x2, &(0x7f0000000400)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}, 0x12022) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x80000000, 0x80, 0x9, 0x401, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0xde9c, 0x4, 0x5, 0x5, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r4}, &(0x7f00000008c0), &(0x7f0000000900)=r3}, 0x20) 28.583066722s ago: executing program 0 (id=754): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000000000000000001811", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB=' \x00\x00\x00\x00\x00'], 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2802, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="06000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000008000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c5f159}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r6}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='!\x00') 28.582498552s ago: executing program 4 (id=755): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000a50000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300)}, 0x0, 0x80000000c8, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000500)=ANY=[@ANYRES16=r1, @ANYRESDEC], 0xfdef) 28.543059626s ago: executing program 4 (id=757): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb0100180000000061cf51aa91d786009c24d88e000000020000000200000604000000040000003a19000003000000090000000d0000200024050b000000000000110400000005000000002e5f004157d500"/103], &(0x7f0000000280)=""/137, 0x58, 0x89, 0x0, 0x80000000, 0x10000, @value}, 0x28) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1200000004170000080000008effffffde000000", @ANYRES32, @ANYBLOB="b300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1801000000bae3000000000000000000850000007b00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000540)="6cb03084dfa70240a53e1aaa81bd3233184bb27e88cd12b9ed3f40b155cfb0e4cec6ae49f1f83043e2da72f091d1e6b74db31b1360aa2d0ea67085a54af6f57c1523a4dd0806fcf5cc96acec0b0d657ffe8436661b0841597df79c499d8c9778cd8f23ae0ce42d06af64410f96806c9e634d9cb5ccee326224d0e4f1df2ae649324db0be39ca578edea21d0c214166533bbe0dcbe5ad700529514aa363c57006e9c0e9ffaea4cf7aac", &(0x7f0000000680)=""/229, 0x4}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000640)='kfree\x00', r1}, 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r0}, &(0x7f0000000480), &(0x7f00000004c0)=r1}, 0x20) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) 28.431515039s ago: executing program 4 (id=759): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r0}, &(0x7f0000000000), &(0x7f0000000200)=r1}, 0x1f) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000, 0x0, 0xf, &(0x7f0000000000), &(0x7f00000002c0)="1dd947114a7482a7ca170baa1c5a5b"}, 0x50) 28.409764102s ago: executing program 0 (id=760): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000000000000000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000005000000020000000700000002"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x20075, r2}, 0x38) (fail_nth: 7) 28.404738032s ago: executing program 4 (id=761): openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1, 0x0, 0x0, @void, @value}, 0x20) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003280)={r1, 0xe0, &(0x7f0000003180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003040)=[0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000030c0), &(0x7f0000003100), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r3) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r2, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[0x0], 0x0, 0x0, 0x86, &(0x7f0000000500), 0x0, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64, @ANYRES32, @ANYRESHEX=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004000000000000000002000000000000000000000000000003000000000300000001000000000000000000e1432cbd4802d2366cf2c03d75a3c01b5ac168e5e9895bda4d508fca73e78ad4060c521aac39f82dab2e8b4f84b4b49b8aab693d1d0c9ac8014e81f5b7f20fae4b4cff715b58688354d506e80c6b39960cc967c2481f7a410eb98a585ec9dc286bbf5e21c6038cf841334e03c5f671f461130fd2ba8d56092f0990f2fe8271be70e275b6a0dc9dc1d6516893f2cdf5f83aec9041fdc0440595350b4fb90ff598"], 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001340)={&(0x7f00000013c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x57, 0x57, 0x7, [@ptr={0x5, 0x0, 0x0, 0x2, 0x5}, @ptr={0x10, 0x0, 0x0, 0x2, 0x2}, @enum={0x10}, @restrict={0xf}, @datasec={0x1, 0x1, 0x0, 0xf, 0x3, [{0x2, 0x3, 0x1}], "896850"}, @fwd={0xb}]}, {0x0, [0x2e, 0x0, 0x30, 0x30, 0x0]}}, &(0x7f0000001480)=""/167, 0x77, 0xa7, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0xe, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 28.044675974s ago: executing program 2 (id=762): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x4d, 0x1, 0x3}, {0x61}, {}, {0x0, 0x0, 0x2}, {0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000008040000cd00000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000e2260057db"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) write$cgroup_subtree(r2, 0x0, 0x66) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000007000000040000000000000700000000000000000000000a01000000040000000000000f0200000000000000000000002e61"], &(0x7f0000000580)=""/237, 0x47, 0xed, 0x1, 0x0, 0x0, @void, @value}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7903"], 0xfdef) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x6, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="b700000010e7ffffbca30000000000002403000040feffff720af0ff0000000071a4f0ff000000001f040000000000002e0a0200000000002604fdffffff000061140800000000001d430000000000007a0a00fe0000001f6114000000000000b503f7fff80000009500000000000000033bc065b78111c6dfa041b63af4a3912435f1a864a7aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168e5181554a090f30002af51efd601b6bf01c8e8b1fee5bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e65440000000000000000028610643a98d9ec21ead2ed51b104d4d91af25b845b9f7d08d123deda88c658d42ecbf28bf7076c15b463bebc72f526dd70252e79166d858fcd0e06dd31af9612fa402d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f0177184b6a89adaf17b0a6041bdef728f5089048ddff6da40f9411fe7226a40409d6e37c4f46756d31cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10076443d643649393bf52d2105bd901128c7e0ec82701c8204a1deeed4155617572652d950ad31928b0b036dc2869f478341d02d0f5ad94b081fcd507acb4b9c67382f13d000000225d85ae49cee383dc5049076b98fb6853ab39a21514da60d2ae20cfb91d6a49964757cdf538f9ce2bdbb9893a5de817101ab062cd54e67051d355d84ce97bb0c6b6a595e487a2cc47c0efbb2d71cde2c10f0bc6980fe78683ac5c0c31032599dd273863be9261eee52216d009f4c52048ef8c126aeef5f510a8f1aded94a129e4aec6e8d9ab06faffc3a15d91c2ea3e2e04cfe031b287539d0540059fe6c7fe7cd8697502c7596566d674e425da5e7f009602a9f61d3804b3e0a1053abdc31282dfb15eb6841bb64a1b3045024a982f3c48153baae244e7bf573eac34b781337ad5901a4cad2422ee965a38f7defbd2960242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44022a579dfc0229cc0dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc48899b212c55318294270a1ad10c80fef7c24d47afcc829ba0f85da6d888f18ea40ab959f6074ab2a40d85d1501783a7ab51380d7b4ead35a385e0b4a26b702396df7e0c1e02b88c114f244a9bf93f04bf072f0861f5c0b000000000000eedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba3401e6a52acb1188883ad2a3b1832371fe5bc621426d1ed01b389708165b9cdbae2ed9dc7358f0ebadde0b727f27feeb7464dcc536cbae2f5c7d951680f6f2f9a6a8346962a350845ffa0d82884f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010ae20e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d648532869d701723fedcbada1ee7baa19faf67256b56a41fd355b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2654026c6ea08b83b123145ab5703dad844ceb201efeb6dc5f6a9037d2283c42efc54fa84323afc4c10eff462c8843187f1dd48ef0900000000000000ff0f4000000000f00700003c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538c6ee6ba65893ff1f908ba7554ba583ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738612e4fee18a22da19fcdb4c1011e32f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f62e96753b639a924599c1f69219927ea5301fff0a6063d427180d61542c2571f983e96635600000554f327a3535e7c7542799493c31ac05a7b57f03ca91a01ba2a30ca99e969d6fd09dc28ebc15edb4d91675767999d146aef7799738b292fd64bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a794963442aece449a0d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2869291b7d12096833d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e16e637d4219ef7ec61261173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ecab5d232f89fe0120f64c62e8e3ed8bcb45202c204bbec8d722824c0ebca8db1ea4a05e41f6016ab5bbe4fe7ff5d785d0128171c90d9900ca2532b0f9d01c4b45294fbba468df3e1b393cb4e62e753b4172ba7ac1f2b51c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addbc4b3093c91b8068c5adfcb0d7fd849904568916694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a881192292ffff5392ab3d1311b82432662806add87047f601fa888400000000000000000000000000006acc19808d7cf29bc974b0ea92499a41b9b9a7c2bca311a28ee4952f2d325a56397c78f12205db653a536f0100e0eda300a43a13bd1b9f3322405d1efd78e578dc6b3fb84f3738a4b6caa800000087efa51c5d95ecba4e50e529d1e8c89600e809dc3d0a2f65579e23457949a50f2d0455cf799b3746979f99f6a1527f004f37e84fb478199dc1020f4beb98b8074bf7df8b5e783637daf121f175a81cffff4ac55a4385e9a617aa6c8e10d4202c5afeb06e2f9115558ea12f92d7ae633d44086b3f03b20d546fa66a72e38207c9d20035abc46271a30f1240de52536941242d23896ab74a3c6670fdc49c14f34fc4eadd6db8d80eba439772bf60a1db18c472dafc5569adc282928d2a1ffe29f1a57d3f18f4edaeb5d37918e6fddcd821da67a0785585a4443440dc65600e64a6a274000000000000000000000000000000000000000000000009dd14b38f2f4426d7cf5075047c31f6ce6adddfe3ac649c0643c8bfbeb14ba1fd7a485aa893915cf81e29aaf375e904bbe52691a4120260ffcd8f1d04166d291ebcef893e1b9ccb6797d0646fe0e7274434f28efb43e06e64f0698caca42f4e6018a455736c482a017e2b13dac4a90faa109f0e87cc94e3efb649692456463ca74aa6ad4bf50c1acb3928143be1c1023a375e528285544d0064b98646f3109e9a4942ce42c6e7ec84b664f6c2770803f10baa804a707f0a1fcbfc309381aeba191950bae71f37f1eb7ceeffb3c0547ac6571603adbfde4c8b5f8d7f4b854441613633b48865b65bdc415e1e0dcf672d68cf4cebf04f4bc1eebf560a26d3b332240d450fdb0a9a69f432e277f3a0386eb2bd1305c821c64757f786b79fef54dbe64c67d73934bc80b2133fb3c04cc7ea48bf97a6243c9f95dcbddecf45f008f1822c7868e1ff5a3cff5d6b6898335792749df7b1f51e91f8c1c3b1b93b33aaa3fab69cef08a9f6f6cf39dea3d878b2ed42545421970cc426e644332bc956d1c6adefdf0ede2c5c94aa632646ae225accdf031f611d01622921f1b922a5ac887cca3136133dce8d9f5f4da7bed2ea5d94362200000000000000000000f296b0c1484e5f781ad26bff696b05ff0a5e2270e07e18b04273bd4075ea38ab463bfa6a38e7c537498ba3e4df8dfc9e8c0a0d213c3ffad44d2a376def42e41e9fc3167a257e040fa7cf32c221aaac6cfdeb33c27500001a0000000000000000000017350000c11ae694b0f7a4f9c2f6790044a357e785af6e153d5f1ea460af92c7cbbd6295afe740f5e154346d483e0d10522a7a945b93fb705b95b6aae27a8fab1e6984c8bdc12360627137ab6737b68ab08acb29a74dc36b51209cfbc87f61182bbeb2772e9d5a1ffc477179be481ffe46a4ce86be0b1f8eee42a611a3d44ca450b14586ed63dd92005c79e4a8ab8a94f0b74903580ac987fd637c80d6c7d0de4614195e40d797c0348dd70f36a220e8b3710fb5358c27e90793bcb9ee6319342c4b239ca8cbc6fc83d32e6eb62ad92e43991f2447be9c2a1ae1119eafb901a43d57e885116d19aa152bfb89f8d0b2516f80120a1cddff771657f3d0288ec3899f1e3ba0151c4037148fb479de703fd52b6573349c28d1b107d859b4961324c17756dde99de1924a1d2b7095d34a55060f47f4407d89acf9f285b20c2e6b3d0491d0d3591b0d94713332b6b79c8297117b0d14eff64e0aca8a4b4aa773d8fba1217e9519952419bb9dd998d0ec870ff00b6d556018602738fbc6cec89d6dd13cf55b96f6fe9a137d2d6a56ad78e52c23ed080000000000002bc261a781fd14126c146a0aac4221839a4b9bbf61e4bba695a41e2109eba8e40c370267cc51ffadbd15cafc97a4d3edfdcb9b5729307c6bdaf7b69325fb05fa8a9869de0600ee477d71bf3e36d1d9019edfa27aae24b632f251df210c86a18fae731ecb8b0d48357378caf2b6789509b1bacfd4fa812fc341875cfa5e798bbf59770000000000000000c8a594ea3c3347962d9113b1fecdfad5a8da641053f02e49456f5d21674521e67a5b18ea451eccf69dd6af928d2d68da9304a296c22fdcea26498d26229110b1aade386b113045033a6188d56e675564d8cb8d5b40114b0f5bf1"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r0) syz_clone(0x200, &(0x7f0000001880)="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", 0x1000, &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000001200)="d5800789d0b309b614403f535b647fe56a89c1d38807d86f3f8b72fcae0cac7d19448eee706fb5e7269e82b104acd36a7dac3fbeef3d40600e0b") 28.043701024s ago: executing program 0 (id=763): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f0000050000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000209987f53d6a76a6520000000000000000"], 0x48) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="190000000400000004000000ffff010000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffffa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYRESOCT=r3, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000980), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x2b, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000340)=0xfffffffffffff001) 28.043027304s ago: executing program 2 (id=764): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffeca50000007d000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000070000000100010009"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/420], &(0x7f0000000100)='GPL\x00', 0x40000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 28.007875348s ago: executing program 1 (id=765): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff077, 0x0, 0x0, 0x1f, 0x0, &(0x7f0000000040)="43dbbfbf4552df6108b061062f3e9d6fb363a017442b5e3901668a0fabfd11", 0x2}, 0x9) 27.978136631s ago: executing program 1 (id=766): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000500)=ANY=[@ANYBLOB="1802000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x200000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 27.933485386s ago: executing program 2 (id=767): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300)}, 0x0, 0x80000000c8, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000500)=ANY=[@ANYRES16=r1, @ANYRESDEC], 0xfdef) 27.930983277s ago: executing program 1 (id=768): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) sendmsg$unix(r2, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 27.930441427s ago: executing program 2 (id=769): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x81, 0x81, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) write$cgroup_subtree(r3, &(0x7f0000000000), 0x15) (fail_nth: 4) 27.90276923s ago: executing program 1 (id=770): recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800e9ffffffffffffff", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x2000000000000000, 0x0, 0x0) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x1, 0x9, 0xb8, 0x2001, r1, 0xfffffff7, '\x00', 0x0, r2, 0x0, 0x5, 0x0, 0x9, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="2b6370752047714f2845c87fb0e60b74e6a66cbe20bb7c9807d2f0907bd122f6aa3547725cf71d2296bac6ee1ef5cc88b8be8a7ff396ae13646ba7842d"], 0x5) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x18, 0x3, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='9p_client_req\x00', r7}, 0x10) r9 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r8}, 0x8) setsockopt$sock_attach_bpf(r6, 0x1, 0x14, &(0x7f0000000040)=r9, 0x3b) 27.892059731s ago: executing program 4 (id=771): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000008000000000000000000000181100", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB=' \x00\x00\x00\x00\x00'], 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2802, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="06000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000008000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c5f159}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r6}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='!\x00') 27.63956064s ago: executing program 3 (id=772): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000178500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00', 0x52d35ce30131f272}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000f447333de39c7095758218a68bc5142f0cb2229fa6c8b0d7c8126aee6d3def94cd964218564fb1d255bce6cef9bea8322326039744a98eead8c59bc75bb5b42123eef53ae4bc331b0ad09a8efc4175c484ad74df9158ff1882cdd83c97c03a35e91c30a0"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000d80)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1f, 0xf, &(0x7f00000004c0)=ANY=[@ANYRES32=r2, @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x58b1, 0x6, 0x0, 0x50, 0xffffffffffffffff, 0x40000005, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x1, 0x3, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001100)={0xffffffffffffffff, 0x20, &(0x7f00000010c0)={&(0x7f0000000f40)=""/254, 0xfe, 0x0, &(0x7f0000001040)=""/124, 0x7c}}, 0x10) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001140)={0xffffffffffffffff, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x15, 0x13, &(0x7f0000000dc0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x1}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @map_val={0x18, 0xa, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @jmp={0x5, 0x1, 0x7, 0x8, 0x4, 0xfffffffffffffffe, 0x1}], &(0x7f0000000380)='syzkaller\x00', 0xfffff000, 0x0, &(0x7f0000000e80), 0x0, 0x2, '\x00', r5, @fallback=0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000ec0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000f00)={0x2, 0xd, 0xd, 0x1200000}, 0x10, r6, r4, 0x6, &(0x7f0000001180)=[r7, r1, r0, r2, r1, r2], &(0x7f00000011c0)=[{0x0, 0x3, 0xe, 0x4}, {0x4, 0x1, 0x2, 0x9}, {0x1, 0x5, 0x7, 0xb}, {0x2, 0x5, 0xb, 0x7}, {0x3, 0x2, 0x2}, {0x1, 0x5, 0x2, 0xa}], 0x10, 0x1cfd2c22, @void, @value}, 0x94) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800082}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f00000005c0)=[0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0], 0x0, 0xa4, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0x87, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000700)=r11, 0x4) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b40)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1, 0x0, @void, @value, @void, @value}, 0x50) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@bloom_filter={0x1e, 0x8e, 0x2, 0x7, 0x502, r3, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x5, 0xe, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0xc}, @func={0x85, 0x0, 0x1, 0x0, 0x68f70c42}]}, &(0x7f00000003c0)='GPL\x00', 0xd, 0x43, &(0x7f0000000540)=""/67, 0x41000, 0x10, '\x00', r8, 0x1b, r10, 0x8, &(0x7f0000000940)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x1, 0x10, 0x2, 0x6}, 0x10, r11, 0x0, 0x1, &(0x7f0000000c40)=[r12, r13], &(0x7f0000000c80)=[{0x2, 0x1, 0x8, 0x9}], 0x10, 0x7, @void, @value}, 0x94) 27.607828194s ago: executing program 1 (id=773): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB="a0a6fbf12c27000000b4ff000000f4a56d36f2b1263100", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0xfffffff9, r3, 0x4}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) 27.566912879s ago: executing program 1 (id=774): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) sendmsg$tipc(r0, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x12000000, 0x2}}, 0x10, 0x0}, 0x0) 27.520452164s ago: executing program 2 (id=775): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001cc0), 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0700000004000000080000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r4}, &(0x7f00000008c0), &(0x7f0000000900)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r6}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc6, 0x9}, 0x0, 0xc8, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) 2.493474503s ago: executing program 32 (id=763): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f0000050000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000209987f53d6a76a6520000000000000000"], 0x48) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="190000000400000004000000ffff010000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffffa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYRESOCT=r3, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000980), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x2b, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000340)=0xfffffffffffff001) 2.493368803s ago: executing program 33 (id=774): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) sendmsg$tipc(r0, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x12000000, 0x2}}, 0x10, 0x0}, 0x0) 2.469699065s ago: executing program 34 (id=775): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001cc0), 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0700000004000000080000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r4}, &(0x7f00000008c0), &(0x7f0000000900)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r6}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc6, 0x9}, 0x0, 0xc8, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) 2.445700518s ago: executing program 35 (id=772): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000178500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00', 0x52d35ce30131f272}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000f447333de39c7095758218a68bc5142f0cb2229fa6c8b0d7c8126aee6d3def94cd964218564fb1d255bce6cef9bea8322326039744a98eead8c59bc75bb5b42123eef53ae4bc331b0ad09a8efc4175c484ad74df9158ff1882cdd83c97c03a35e91c30a0"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000d80)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1f, 0xf, &(0x7f00000004c0)=ANY=[@ANYRES32=r2, @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x58b1, 0x6, 0x0, 0x50, 0xffffffffffffffff, 0x40000005, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x1, 0x3, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001100)={0xffffffffffffffff, 0x20, &(0x7f00000010c0)={&(0x7f0000000f40)=""/254, 0xfe, 0x0, &(0x7f0000001040)=""/124, 0x7c}}, 0x10) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001140)={0xffffffffffffffff, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x15, 0x13, &(0x7f0000000dc0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x1}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @map_val={0x18, 0xa, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @jmp={0x5, 0x1, 0x7, 0x8, 0x4, 0xfffffffffffffffe, 0x1}], &(0x7f0000000380)='syzkaller\x00', 0xfffff000, 0x0, &(0x7f0000000e80), 0x0, 0x2, '\x00', r5, @fallback=0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000ec0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000f00)={0x2, 0xd, 0xd, 0x1200000}, 0x10, r6, r4, 0x6, &(0x7f0000001180)=[r7, r1, r0, r2, r1, r2], &(0x7f00000011c0)=[{0x0, 0x3, 0xe, 0x4}, {0x4, 0x1, 0x2, 0x9}, {0x1, 0x5, 0x7, 0xb}, {0x2, 0x5, 0xb, 0x7}, {0x3, 0x2, 0x2}, {0x1, 0x5, 0x2, 0xa}], 0x10, 0x1cfd2c22, @void, @value}, 0x94) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800082}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f00000005c0)=[0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0], 0x0, 0xa4, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0x87, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000700)=r11, 0x4) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b40)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1, 0x0, @void, @value, @void, @value}, 0x50) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@bloom_filter={0x1e, 0x8e, 0x2, 0x7, 0x502, r3, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x5, 0xe, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0xc}, @func={0x85, 0x0, 0x1, 0x0, 0x68f70c42}]}, &(0x7f00000003c0)='GPL\x00', 0xd, 0x43, &(0x7f0000000540)=""/67, 0x41000, 0x10, '\x00', r8, 0x1b, r10, 0x8, &(0x7f0000000940)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x1, 0x10, 0x2, 0x6}, 0x10, r11, 0x0, 0x1, &(0x7f0000000c40)=[r12, r13], &(0x7f0000000c80)=[{0x2, 0x1, 0x8, 0x9}], 0x10, 0x7, @void, @value}, 0x94) 2.42119787s ago: executing program 36 (id=771): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000008000000000000000000000181100", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB=' \x00\x00\x00\x00\x00'], 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2802, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="06000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000008000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c5f159}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r6}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='!\x00') 280.838268ms ago: executing program 8 (id=779): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r3 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r3, &(0x7f00000000c0)=ANY=[], 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000002c0)="7b16add0559f8ea10154f2a024e67fff2b5247b08bdc667c8466a09def4f7112a92427e7115b72cb0bae17327052f7b3c8e6a002fa980b096d2d802d39698feb33522d9543cfbd600b4e5e722e2757be4ca51acdf3e88a88163c3f50f8106913e02b69289cd83e0e41b9f60a5d799adc37139cc8b0101268af2359f9736923a1d192550486e3fb8f08a594476906", 0x8e}, {&(0x7f0000000380)="7b119a9b48cd059425e07cc840dce23905de3b482aa78f60a34834f5cc968e20e67aa4f59ad06f385837bb86a245b2408e413927a810ba33e16542ec28ed76408e9db77a2215a407c08ba74c5ac4d181d7feadcf8937aec375e1b586f6575de05a8abddd4d52c136e3fef196502a40395d8f5a00bf52eb0838df4099ba0b5ca2367d347324ba33d7fc3ff67301a2c77d7a786b58b3d0c92a7ceb44be9683", 0x9e}, {&(0x7f0000000440)="e48e4d1d9cebf077b6140549180cc1e74806faf06d00be66dce44a99c91cff1f4af0776e4e2695fa9021f4a80589d6d4e457139806ecff6c3ed85091bc75256050cd49d39e6d383ab616a09c394b9ce920c570ac576742e495ba4d752dc096c97974", 0x62}, {&(0x7f00000004c0)="868a75268b687e7df4bd441c96094d2bed03ae2d8eb024b8dd170e83eaef5cbe3c6f9d3046fbeb6ed9ec272a50095e129c", 0x31}], 0x4}, 0x20000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x2e, &(0x7f0000000140)=r5, 0x4) recvmsg(r5, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x42) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) r6 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(r6, &(0x7f0000000140)='ns/time\x00') 206.405526ms ago: executing program 7 (id=778): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8fff8ffb703000008000000b7040000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='sched_process_fork\x00', r1}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r5, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) r7 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000b00)=ANY=[@ANYRES32=r7, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000d50a0000000000009500000000000000f970c54f22271468098f3efd58b84c17594764d55ed5a118284844a8da8cfc87c2acc56bc85de0701bf1782571a243bf1f5bd8229244087f5ac3e3ca030ecf07984dddaa3c6d2d8bf5cfde812bd9b869a138e5ab9c344a608caade223ae66dbc2fbdc5d76bdaf1afebd2c4a1cbb530687ec4296690c0811d93"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_clone(0x0, &(0x7f0000000880), 0x0, 0x0, &(0x7f0000000800), &(0x7f0000001a40)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="170000000000000004000000476c000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000500000001000000000000000200000000000000"], 0x50) 205.675147ms ago: executing program 9 (id=780): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) sendmsg$unix(r2, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 136.912415ms ago: executing program 9 (id=781): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300)}, 0x0, 0x80000000c8, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000500)=ANY=[@ANYRES16=r1, @ANYRESDEC], 0xfdef) 104.990008ms ago: executing program 9 (id=782): mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$PROG_LOAD(0x2, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0, r0}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000079104800000000006104000000000000950000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x86, &(0x7f0000000340)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x1400000000000000, &(0x7f0000000740)=@base={0xf, 0x4, 0x4, 0x10004, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x50) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0a00000004000000040000000200000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000000080791aa8910dcb4083233c000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=r2], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="0f060b7988d0e433454eac5b3bf9aa281383a37e35de94df591b29965d3d2e3a077018eacb73ff67ac4742e179043ccdc728de39e454f8761e58601ed395dc781e49ec1c24df917950f19a9606eb8ec436c15c8c262b7802f6cfbf5e50cf405840675e563541", 0xff8d}], 0x1}, 0x40) recvmsg(r9, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/78, 0x4e}], 0x1, 0x0, 0xe}, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x9, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000bd822bb7cb9a8cc6fa9d4492be6945b1aa8f47078e045232e385a4336af155312a95f7a05fa944844f7aaee7e9b38d98ece08809dff51f1dd36e10f0ad880d7d8fa7daec5093", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRESDEC=r12, @ANYRES32=r12], 0x48) r13 = openat$cgroup_freezer_state(r12, &(0x7f0000000180), 0x2, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000480)={@cgroup=r13, r10, 0x1a, 0x0, 0x0, @void, @value}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000001c0)=0xb4f5) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r11}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) sendmsg$inet(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)}, 0x0) 61.899743ms ago: executing program 6 (id=777): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x5, 0x5, 0x2, 0x3410, r0, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x2, 0x8, @void, @value, @void, @value}, 0x50) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00'}, 0x10) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000a50000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="00000000000000020000000000000399870000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000000000850000000500000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008004000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r3}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={0x0}, 0x10) r5 = perf_event_open$cgroup(&(0x7f0000000940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x4082, 0x0, 0x81, 0x0, 0x0, 0x80000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x4008240b, &(0x7f00000013c0)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000540)='\x00') (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x1, 0x9, 0xae, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'pim6reg0\x00', 0x2}) r7 = getpid() syz_open_procfs$namespace(r7, &(0x7f0000000440)='ns/pid_for_children\x00') write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) (async) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4002, 0x0, r6, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 457.43µs ago: executing program 7 (id=783): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe49, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f00000000c0)={'veth0_vlan\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) 0s ago: executing program 5 (id=776): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000000000000fcffffff18110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbcd1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f00000008c0)={&(0x7f00000005c0)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000280)="61358cbe399bcdf6e10f14c1b872259a1132523660ccf7a6aa654800756d8f4629416b2f793b81e39103000000afdd0b", 0x30}, {&(0x7f0000000240), 0xffffffffffffffa7}], 0x2}, 0x4008854) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r3, &(0x7f0000000180)=ANY=[], 0xfdef) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.198' (ED25519) to the list of known hosts. [ 17.848725][ T30] audit: type=1400 audit(1729841986.385:66): avc: denied { integrity } for pid=278 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 17.857463][ T30] audit: type=1400 audit(1729841986.395:67): avc: denied { mounton } for pid=278 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 17.858429][ T278] cgroup: Unknown subsys name 'net' [ 17.865185][ T30] audit: type=1400 audit(1729841986.395:68): avc: denied { mount } for pid=278 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 17.880228][ T30] audit: type=1400 audit(1729841986.415:69): avc: denied { unmount } for pid=278 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 17.880312][ T278] cgroup: Unknown subsys name 'devices' [ 18.020687][ T278] cgroup: Unknown subsys name 'hugetlb' [ 18.026101][ T278] cgroup: Unknown subsys name 'rlimit' [ 18.186032][ T30] audit: type=1400 audit(1729841986.725:70): avc: denied { setattr } for pid=278 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 18.209502][ T30] audit: type=1400 audit(1729841986.725:71): avc: denied { mounton } for pid=278 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 18.214953][ T281] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 18.234673][ T30] audit: type=1400 audit(1729841986.725:72): avc: denied { mount } for pid=278 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 18.266400][ T30] audit: type=1400 audit(1729841986.785:73): avc: denied { relabelto } for pid=281 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.292147][ T30] audit: type=1400 audit(1729841986.785:74): avc: denied { write } for pid=281 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.321513][ T30] audit: type=1400 audit(1729841986.865:75): avc: denied { read } for pid=278 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.347555][ T278] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 19.154215][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.161370][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.168516][ T287] device bridge_slave_0 entered promiscuous mode [ 19.176262][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.183147][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.190277][ T287] device bridge_slave_1 entered promiscuous mode [ 19.229755][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.236682][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.243979][ T288] device bridge_slave_0 entered promiscuous mode [ 19.251843][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.258678][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.266454][ T288] device bridge_slave_1 entered promiscuous mode [ 19.292359][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.299301][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.306569][ T292] device bridge_slave_0 entered promiscuous mode [ 19.324281][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.331354][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.338445][ T292] device bridge_slave_1 entered promiscuous mode [ 19.446668][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.453679][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.461067][ T290] device bridge_slave_0 entered promiscuous mode [ 19.470356][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.477201][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.484682][ T290] device bridge_slave_1 entered promiscuous mode [ 19.509881][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.516921][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.524229][ T291] device bridge_slave_0 entered promiscuous mode [ 19.546315][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.553244][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.560421][ T291] device bridge_slave_1 entered promiscuous mode [ 19.607474][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.614329][ T288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.621460][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.628287][ T288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.659998][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.667274][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.674377][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.681444][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.719714][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.726582][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.733717][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.740492][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.758103][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.765089][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.772811][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.779673][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.808607][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.815703][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.822984][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.830258][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.837246][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.844594][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.851590][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.858879][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.866045][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.888051][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.900857][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.908958][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.915821][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.934046][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.942196][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.949026][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.956395][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.964626][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.971566][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.979278][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.988286][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.995313][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.003884][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.011220][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.021837][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.046332][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.055132][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.062732][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.070957][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.077797][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.085104][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.093104][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.099975][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.107451][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.115761][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.124299][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.132429][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.139468][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.146759][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.155153][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.186545][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 20.194499][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.202466][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 20.210466][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.218172][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 20.226647][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.234676][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.241603][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.248850][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 20.257396][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.265586][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.272679][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.279990][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 20.287814][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.295467][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 20.303414][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.311466][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 20.319918][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.327857][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.334730][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.342055][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 20.349926][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.366097][ T292] device veth0_vlan entered promiscuous mode [ 20.378613][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 20.387026][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.395103][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.403634][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.412040][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.419967][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.428612][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.437387][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.445844][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.453505][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.462236][ T287] device veth0_vlan entered promiscuous mode [ 20.473103][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.481191][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.488967][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.497462][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.505788][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.513372][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.525375][ T288] device veth0_vlan entered promiscuous mode [ 20.533747][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.541547][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.551193][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.558605][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.572468][ T291] device veth0_vlan entered promiscuous mode [ 20.579303][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.587316][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.594924][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.602419][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.610807][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.619886][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.627942][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.636436][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.656521][ T287] device veth1_macvtap entered promiscuous mode [ 20.663722][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.671883][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.680086][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.688043][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.695774][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.704615][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.712877][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.720919][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.729214][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.737273][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.745069][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.752431][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.762727][ T292] device veth1_macvtap entered promiscuous mode [ 20.770720][ T288] device veth1_macvtap entered promiscuous mode [ 20.779286][ T291] device veth1_macvtap entered promiscuous mode [ 20.793933][ T290] device veth0_vlan entered promiscuous mode [ 20.800768][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.808254][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.815858][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.824141][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.832425][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.840751][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.850382][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.858848][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.870269][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.878555][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.887564][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.896484][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.916155][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.924847][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.933510][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.941891][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.950614][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.958904][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.996142][ T290] device veth1_macvtap entered promiscuous mode [ 21.004469][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.019195][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.037277][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.077167][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.079078][ C1] hrtimer: interrupt took 35523 ns [ 21.147428][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.553454][ T342] device pim6reg1 entered promiscuous mode [ 22.167236][ T367] device veth1_macvtap left promiscuous mode [ 22.223731][ T369] device veth1_macvtap entered promiscuous mode [ 22.279291][ T369] device macsec0 entered promiscuous mode [ 23.045876][ T390] device syzkaller0 entered promiscuous mode [ 23.230798][ T334] syz.3.4 (334) used greatest stack depth: 21800 bytes left [ 23.501974][ T411] device syzkaller0 entered promiscuous mode [ 23.568265][ T30] kauditd_printk_skb: 42 callbacks suppressed [ 23.568282][ T30] audit: type=1400 audit(1729841992.105:118): avc: denied { create } for pid=415 comm="syz.3.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 23.643865][ T30] audit: type=1400 audit(1729841992.115:119): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 23.980777][ T30] audit: type=1400 audit(1729841992.525:120): avc: denied { create } for pid=434 comm="syz.4.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 24.334793][ T30] audit: type=1400 audit(1729841992.865:121): avc: denied { create } for pid=437 comm="syz.4.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 24.537780][ T453] FAULT_INJECTION: forcing a failure. [ 24.537780][ T453] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 24.550798][ T453] CPU: 1 PID: 453 Comm: syz.3.38 Not tainted 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 24.560462][ T453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 24.570364][ T453] Call Trace: [ 24.573491][ T453] [ 24.576264][ T453] dump_stack_lvl+0x151/0x1c0 [ 24.580794][ T453] ? io_uring_drop_tctx_refs+0x190/0x190 [ 24.586241][ T453] ? __kasan_check_read+0x11/0x20 [ 24.591119][ T453] dump_stack+0x15/0x20 [ 24.595101][ T453] should_fail+0x3c6/0x510 [ 24.599436][ T453] should_fail_usercopy+0x1a/0x20 [ 24.604471][ T453] copy_page_from_iter_atomic+0x423/0x10e0 [ 24.610568][ T453] ? pipe_zero+0x4e0/0x4e0 [ 24.614889][ T453] generic_perform_write+0x337/0x5a0 [ 24.620488][ T453] ? grab_cache_page_write_begin+0xa0/0xa0 [ 24.626296][ T453] ? file_remove_privs+0x610/0x610 [ 24.631610][ T453] ? rwsem_write_trylock+0x153/0x340 [ 24.636986][ T453] ? rwsem_mark_wake+0x770/0x770 [ 24.642032][ T453] __generic_file_write_iter+0x25b/0x4b0 [ 24.647668][ T453] generic_file_write_iter+0xaf/0x1c0 [ 24.653231][ T453] vfs_write+0xd5d/0x1110 [ 24.657487][ T453] ? putname+0xfa/0x150 [ 24.661477][ T453] ? file_end_write+0x1c0/0x1c0 [ 24.666348][ T453] ? mutex_lock+0xb6/0x1e0 [ 24.670675][ T453] ? wait_for_completion_killable_timeout+0x10/0x10 [ 24.677102][ T453] ? __fdget_pos+0x2e7/0x3a0 [ 24.681620][ T453] ? ksys_write+0x77/0x2c0 [ 24.686041][ T453] ksys_write+0x199/0x2c0 [ 24.690216][ T453] ? __ia32_sys_read+0x90/0x90 [ 24.695083][ T453] ? debug_smp_processor_id+0x17/0x20 [ 24.700378][ T453] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 24.706541][ T453] __x64_sys_write+0x7b/0x90 [ 24.711226][ T453] x64_sys_call+0x2f/0x9a0 [ 24.715478][ T453] do_syscall_64+0x3b/0xb0 [ 24.719822][ T453] ? clear_bhb_loop+0x35/0x90 [ 24.724420][ T453] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 24.730151][ T453] RIP: 0033:0x7f451886a719 [ 24.734409][ T453] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 24.754205][ T453] RSP: 002b:00007f45174e3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 24.762654][ T453] RAX: ffffffffffffffda RBX: 00007f4518a21f80 RCX: 00007f451886a719 [ 24.770453][ T453] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000008 [ 24.778521][ T453] RBP: 00007f45174e3090 R08: 0000000000000000 R09: 0000000000000000 [ 24.786431][ T453] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 24.794349][ T453] R13: 0000000000000000 R14: 00007f4518a21f80 R15: 00007ffce4d1e0c8 [ 24.802225][ T453] [ 24.812610][ T470] device veth1_macvtap left promiscuous mode [ 24.819350][ T30] audit: type=1400 audit(1729841993.345:122): avc: denied { create } for pid=469 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 24.852829][ T470] device veth1_macvtap entered promiscuous mode [ 24.859513][ T470] device macsec0 entered promiscuous mode [ 24.901009][ T30] audit: type=1400 audit(1729841993.445:123): avc: denied { ioctl } for pid=474 comm="syz.4.47" path="/dev/ppp" dev="devtmpfs" ino=150 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.069540][ T30] audit: type=1400 audit(1729841993.615:124): avc: denied { write } for pid=487 comm="syz.0.51" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.088932][ T488] geneve1: tun_chr_ioctl cmd 1074025672 [ 25.108431][ T488] geneve1: ignored: set checksum enabled [ 25.148534][ T491] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.158144][ T491] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.236062][ T491] device bridge_slave_1 left promiscuous mode [ 25.273020][ T491] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.329871][ T491] device bridge_slave_0 left promiscuous mode [ 25.337724][ T491] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.441210][ T499] device veth1_macvtap left promiscuous mode [ 25.447129][ T499] device macsec0 left promiscuous mode [ 25.456109][ T500] device veth1_macvtap entered promiscuous mode [ 25.462344][ T500] device macsec0 entered promiscuous mode [ 26.949048][ C0] sched: RT throttling activated [ 29.166005][ T543] device veth0_vlan left promiscuous mode [ 29.171917][ T543] device veth0_vlan entered promiscuous mode [ 29.720202][ T556] device syzkaller0 entered promiscuous mode [ 29.793846][ T564] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 29.851745][ T30] audit: type=1400 audit(1729841998.395:125): avc: denied { create } for pid=561 comm="syz.3.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 32.051827][ T582] FAULT_INJECTION: forcing a failure. [ 32.051827][ T582] name failslab, interval 1, probability 0, space 0, times 1 [ 32.065600][ T582] CPU: 0 PID: 582 Comm: syz.4.80 Not tainted 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 32.075413][ T582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 32.085304][ T582] Call Trace: [ 32.088427][ T582] [ 32.091210][ T582] dump_stack_lvl+0x151/0x1c0 [ 32.095718][ T582] ? io_uring_drop_tctx_refs+0x190/0x190 [ 32.101191][ T582] ? dev_queue_xmit+0x20/0x20 [ 32.105742][ T582] dump_stack+0x15/0x20 [ 32.109785][ T582] should_fail+0x3c6/0x510 [ 32.114293][ T582] __should_failslab+0xa4/0xe0 [ 32.118895][ T582] ? skb_clone+0x1d1/0x360 [ 32.123157][ T582] should_failslab+0x9/0x20 [ 32.127489][ T582] slab_pre_alloc_hook+0x37/0xd0 [ 32.132261][ T582] ? skb_clone+0x1d1/0x360 [ 32.136513][ T582] kmem_cache_alloc+0x44/0x200 [ 32.141117][ T582] skb_clone+0x1d1/0x360 [ 32.145201][ T582] bpf_clone_redirect+0xa6/0x390 [ 32.150176][ T582] bpf_prog_6893982b85ceadf7+0x56/0x43c [ 32.155749][ T582] ? swiotlb_late_init_with_tbl+0x1e0/0x340 [ 32.161494][ T582] ? __stack_depot_save+0x34/0x470 [ 32.166446][ T582] ? __kasan_slab_alloc+0xc3/0xe0 [ 32.171394][ T582] ? __kasan_slab_alloc+0xb1/0xe0 [ 32.176252][ T582] ? slab_post_alloc_hook+0x53/0x2c0 [ 32.181373][ T582] ? kmem_cache_alloc+0xf5/0x200 [ 32.186147][ T582] ? __build_skb+0x2a/0x300 [ 32.190673][ T582] ? build_skb+0x25/0x1f0 [ 32.194930][ T582] ? bpf_prog_test_run_skb+0x38e/0x1420 [ 32.201362][ T582] ? bpf_prog_test_run+0x3b0/0x630 [ 32.206304][ T582] ? __sys_bpf+0x525/0x760 [ 32.210555][ T582] ? __x64_sys_bpf+0x7c/0x90 [ 32.214984][ T582] ? x64_sys_call+0x87f/0x9a0 [ 32.219796][ T582] ? do_syscall_64+0x3b/0xb0 [ 32.224186][ T582] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 32.230255][ T582] ? __kasan_check_read+0x11/0x20 [ 32.235548][ T582] ? bpf_test_timer_continue+0x140/0x460 [ 32.241104][ T582] bpf_test_run+0x478/0xa10 [ 32.245445][ T582] ? convert___skb_to_skb+0x570/0x570 [ 32.250651][ T582] ? eth_type_trans+0x2e4/0x620 [ 32.255352][ T582] ? eth_get_headlen+0x240/0x240 [ 32.260119][ T582] ? convert___skb_to_skb+0x44/0x570 [ 32.265251][ T582] bpf_prog_test_run_skb+0xb41/0x1420 [ 32.270582][ T582] ? __kasan_check_write+0x14/0x20 [ 32.275874][ T582] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 32.281686][ T582] ? __kasan_check_write+0x14/0x20 [ 32.286637][ T582] ? fput_many+0x160/0x1b0 [ 32.291065][ T582] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 32.296790][ T582] bpf_prog_test_run+0x3b0/0x630 [ 32.301668][ T582] ? bpf_prog_query+0x220/0x220 [ 32.306358][ T582] ? selinux_bpf+0xd2/0x100 [ 32.310696][ T582] ? security_bpf+0x82/0xb0 [ 32.315028][ T582] __sys_bpf+0x525/0x760 [ 32.319116][ T582] ? fput_many+0x160/0x1b0 [ 32.323365][ T582] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 32.328962][ T582] ? debug_smp_processor_id+0x17/0x20 [ 32.334163][ T582] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 32.340314][ T582] __x64_sys_bpf+0x7c/0x90 [ 32.344563][ T582] x64_sys_call+0x87f/0x9a0 [ 32.349164][ T582] do_syscall_64+0x3b/0xb0 [ 32.353689][ T582] ? clear_bhb_loop+0x35/0x90 [ 32.358190][ T582] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 32.364023][ T582] RIP: 0033:0x7f2878fd6719 [ 32.368449][ T582] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 32.388259][ T582] RSP: 002b:00007f2877c4f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 32.396670][ T582] RAX: ffffffffffffffda RBX: 00007f287918df80 RCX: 00007f2878fd6719 [ 32.404481][ T582] RDX: 000000000000002c RSI: 0000000020000080 RDI: 000000000000000a [ 32.412470][ T582] RBP: 00007f2877c4f090 R08: 0000000000000000 R09: 0000000000000000 [ 32.420278][ T582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 32.428193][ T582] R13: 0000000000000000 R14: 00007f287918df80 R15: 00007fff3e6072d8 [ 32.436256][ T582] [ 32.588791][ T30] audit: type=1400 audit(1729842001.125:126): avc: denied { create } for pid=590 comm="syz.2.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 33.421743][ T30] audit: type=1400 audit(1729842001.965:127): avc: denied { create } for pid=625 comm="syz.2.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 33.449260][ T30] audit: type=1400 audit(1729842001.985:128): avc: denied { create } for pid=625 comm="syz.2.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 33.475205][ T30] audit: type=1400 audit(1729842001.985:129): avc: denied { create } for pid=625 comm="syz.2.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 33.586553][ T30] audit: type=1400 audit(1729842002.125:130): avc: denied { create } for pid=631 comm="syz.4.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.652637][ T30] audit: type=1400 audit(1729842002.165:131): avc: denied { setopt } for pid=631 comm="syz.4.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.686374][ T30] audit: type=1400 audit(1729842002.215:132): avc: denied { write } for pid=635 comm="syz.2.96" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 34.075629][ T30] audit: type=1400 audit(1729842002.615:133): avc: denied { read } for pid=652 comm="syz.3.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 34.170860][ T657] device syzkaller0 entered promiscuous mode [ 34.188031][ T655] device pim6reg1 entered promiscuous mode [ 34.911174][ T30] audit: type=1400 audit(1729842003.455:134): avc: denied { ioctl } for pid=683 comm="syz.4.112" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 35.231889][ T700] device pim6reg1 entered promiscuous mode [ 36.020418][ T728] ÿÿÿÿÿÿ: renamed from vlan1 [ 36.028573][ T30] audit: type=1400 audit(1729842004.565:135): avc: denied { create } for pid=730 comm="syz.1.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 36.165541][ T30] audit: type=1400 audit(1729842004.705:136): avc: denied { create } for pid=740 comm="syz.3.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 37.245632][ T790] FAULT_INJECTION: forcing a failure. [ 37.245632][ T790] name failslab, interval 1, probability 0, space 0, times 0 [ 37.258209][ T790] CPU: 0 PID: 790 Comm: syz.0.148 Not tainted 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 37.268050][ T790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 37.278369][ T790] Call Trace: [ 37.281495][ T790] [ 37.284271][ T790] dump_stack_lvl+0x151/0x1c0 [ 37.289072][ T790] ? io_uring_drop_tctx_refs+0x190/0x190 [ 37.294611][ T790] ? arch_stack_walk+0x101/0x140 [ 37.299387][ T790] dump_stack+0x15/0x20 [ 37.303462][ T790] should_fail+0x3c6/0x510 [ 37.307813][ T790] __should_failslab+0xa4/0xe0 [ 37.312413][ T790] ? dst_alloc+0x164/0x1e0 [ 37.316669][ T790] should_failslab+0x9/0x20 [ 37.321018][ T790] slab_pre_alloc_hook+0x37/0xd0 [ 37.325780][ T790] ? dst_alloc+0x164/0x1e0 [ 37.330124][ T790] kmem_cache_alloc+0x44/0x200 [ 37.334807][ T790] ? ipv6_sysctl_rtcache_flush+0xf0/0xf0 [ 37.340449][ T790] dst_alloc+0x164/0x1e0 [ 37.344534][ T790] ip6_pol_route+0xc2a/0x14b0 [ 37.349324][ T790] ? sock_alloc_send_pskb+0x915/0xa50 [ 37.354598][ T790] ? fib6_table_lookup+0xaf0/0xaf0 [ 37.359807][ T790] ? _raw_spin_unlock+0x4d/0x70 [ 37.364502][ T790] ip6_pol_route_input+0x55/0x80 [ 37.369270][ T790] fib6_rule_lookup+0x25a/0x620 [ 37.373955][ T790] ? fault_around_bytes_set+0xc0/0xc0 [ 37.379160][ T790] ? ip6_route_input_lookup+0xd0/0xd0 [ 37.384546][ T790] ? fib6_lookup+0x3f0/0x3f0 [ 37.389059][ T790] ? __local_bh_enable_ip+0x58/0x80 [ 37.394183][ T790] ? local_bh_enable+0x1f/0x30 [ 37.398801][ T790] ? ip6t_do_table+0x1662/0x1850 [ 37.403557][ T790] ? ip6_route_input+0x245/0xb60 [ 37.408611][ T790] ? __ipv6_addr_type+0x244/0x2f0 [ 37.413533][ T790] ip6_route_input+0x724/0xb60 [ 37.418060][ T790] ? ip6_multipath_l3_keys+0x610/0x610 [ 37.423983][ T790] ? sk_setup_caps+0x430/0x430 [ 37.428793][ T790] ip6_rcv_finish+0x150/0x350 [ 37.433399][ T790] ipv6_rcv+0xeb/0x270 [ 37.437284][ T790] ? ip6_rcv_finish+0x350/0x350 [ 37.441969][ T790] ? refcount_add+0x80/0x80 [ 37.446314][ T790] ? ip6_rcv_finish+0x350/0x350 [ 37.451169][ T790] __netif_receive_skb+0x1c6/0x530 [ 37.456119][ T790] ? deliver_ptype_list_skb+0x3b0/0x3b0 [ 37.461681][ T790] ? _copy_from_iter+0x1d1/0xdc0 [ 37.466535][ T790] netif_receive_skb+0xb0/0x480 [ 37.471482][ T790] ? _copy_from_iter+0x34d/0xdc0 [ 37.476456][ T790] ? netif_receive_skb_core+0x210/0x210 [ 37.481842][ T790] tun_rx_batched+0x6d9/0x870 [ 37.486533][ T790] ? eth_type_trans+0x2e4/0x620 [ 37.491313][ T790] ? local_bh_enable+0x30/0x30 [ 37.496076][ T790] tun_get_user+0x2cb7/0x3aa0 [ 37.501200][ T790] ? _kstrtoull+0x3a0/0x4a0 [ 37.505537][ T790] ? tun_do_read+0x2010/0x2010 [ 37.510220][ T790] ? kstrtouint_from_user+0x20a/0x2a0 [ 37.515606][ T790] ? kstrtol_from_user+0x310/0x310 [ 37.520644][ T790] ? __kasan_check_write+0x14/0x20 [ 37.525850][ T790] ? avc_policy_seqno+0x1b/0x70 [ 37.530547][ T790] ? selinux_file_permission+0x2c4/0x570 [ 37.536004][ T790] tun_chr_write_iter+0x1e1/0x2e0 [ 37.541047][ T790] vfs_write+0xd5d/0x1110 [ 37.545206][ T790] ? __traceiter_kmem_cache_free+0x32/0x50 [ 37.550857][ T790] ? file_end_write+0x1c0/0x1c0 [ 37.555539][ T790] ? __fdget_pos+0x209/0x3a0 [ 37.560244][ T790] ? ksys_write+0x77/0x2c0 [ 37.564648][ T790] ksys_write+0x199/0x2c0 [ 37.568862][ T790] ? __ia32_sys_read+0x90/0x90 [ 37.573500][ T790] ? debug_smp_processor_id+0x17/0x20 [ 37.578714][ T790] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 37.584939][ T790] __x64_sys_write+0x7b/0x90 [ 37.589614][ T790] x64_sys_call+0x2f/0x9a0 [ 37.593852][ T790] do_syscall_64+0x3b/0xb0 [ 37.598288][ T790] ? clear_bhb_loop+0x35/0x90 [ 37.602966][ T790] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 37.608742][ T790] RIP: 0033:0x7f500072e719 [ 37.612962][ T790] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 37.632650][ T790] RSP: 002b:00007f4fff3a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 37.640986][ T790] RAX: ffffffffffffffda RBX: 00007f50008e5f80 RCX: 00007f500072e719 [ 37.649708][ T790] RDX: 000000000000fdef RSI: 0000000020000200 RDI: 00000000000000c8 [ 37.658635][ T790] RBP: 00007f4fff3a7090 R08: 0000000000000000 R09: 0000000000000000 [ 37.666543][ T790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 37.674433][ T790] R13: 0000000000000000 R14: 00007f50008e5f80 R15: 00007ffc73fa13f8 [ 37.682433][ T790] [ 37.969490][ T803] bridge0: port 3(veth0_to_batadv) entered blocking state [ 37.986869][ T803] bridge0: port 3(veth0_to_batadv) entered disabled state [ 38.031137][ T803] device veth0_to_batadv entered promiscuous mode [ 38.080406][ T803] bridge0: port 3(veth0_to_batadv) entered blocking state [ 38.087773][ T803] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 38.231042][ T806] device veth0_to_batadv left promiscuous mode [ 38.244944][ T806] bridge0: port 3(veth0_to_batadv) entered disabled state [ 38.447643][ T821] device veth1_macvtap left promiscuous mode [ 38.498032][ T821] device veth1_macvtap entered promiscuous mode [ 38.506029][ T821] device macsec0 entered promiscuous mode [ 38.559083][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 39.305454][ T838] device syzkaller0 entered promiscuous mode [ 39.323828][ T30] audit: type=1400 audit(1729842007.865:137): avc: denied { create } for pid=840 comm="syz.0.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 40.890108][ T879] device veth0_vlan left promiscuous mode [ 40.913142][ T879] device veth0_vlan entered promiscuous mode [ 41.205002][ T892] device syzkaller0 entered promiscuous mode [ 41.362997][ T896] device veth1_macvtap left promiscuous mode [ 41.370822][ T896] device macsec0 left promiscuous mode [ 41.475055][ T896] device veth1_macvtap entered promiscuous mode [ 41.482103][ T896] device macsec0 entered promiscuous mode [ 42.136010][ T926] FAULT_INJECTION: forcing a failure. [ 42.136010][ T926] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 42.197921][ T930] device veth1_macvtap left promiscuous mode [ 42.226342][ T926] CPU: 1 PID: 926 Comm: syz.2.195 Not tainted 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 42.236163][ T926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 42.246243][ T926] Call Trace: [ 42.249454][ T926] [ 42.252221][ T926] dump_stack_lvl+0x151/0x1c0 [ 42.256750][ T926] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 42.262381][ T926] ? io_uring_drop_tctx_refs+0x190/0x190 [ 42.267941][ T926] ? __wake_up_klogd+0xd5/0x110 [ 42.272632][ T926] dump_stack+0x15/0x20 [ 42.276609][ T926] should_fail+0x3c6/0x510 [ 42.280865][ T926] should_fail_alloc_page+0x5a/0x80 [ 42.285903][ T926] prepare_alloc_pages+0x15c/0x700 [ 42.290845][ T926] ? __alloc_pages+0x8f0/0x8f0 [ 42.295533][ T926] ? __alloc_pages_bulk+0xe40/0xe40 [ 42.300573][ T926] __alloc_pages+0x18c/0x8f0 [ 42.304996][ T926] ? prep_new_page+0x110/0x110 [ 42.309595][ T926] ? __kasan_kmalloc+0x9/0x10 [ 42.314108][ T926] ? __kmalloc+0x13a/0x270 [ 42.318373][ T926] ? __vmalloc_node_range+0x2d6/0x8d0 [ 42.323575][ T926] __vmalloc_node_range+0x482/0x8d0 [ 42.328616][ T926] bpf_map_area_alloc+0xd9/0xf0 [ 42.333379][ T926] ? array_map_alloc+0x278/0x6d0 [ 42.338251][ T926] array_map_alloc+0x278/0x6d0 [ 42.342847][ T926] ? bpf_map_meta_alloc+0x161/0x8b0 [ 42.347974][ T926] array_of_map_alloc+0x55/0xc0 [ 42.352658][ T926] map_create+0x411/0x2050 [ 42.356914][ T926] __sys_bpf+0x296/0x760 [ 42.360988][ T926] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 42.366207][ T926] ? debug_smp_processor_id+0x17/0x20 [ 42.371409][ T926] __x64_sys_bpf+0x7c/0x90 [ 42.375664][ T926] x64_sys_call+0x87f/0x9a0 [ 42.379998][ T926] do_syscall_64+0x3b/0xb0 [ 42.384251][ T926] ? clear_bhb_loop+0x35/0x90 [ 42.388770][ T926] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 42.394669][ T926] RIP: 0033:0x7fdfb9109719 [ 42.399015][ T926] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 42.418632][ T926] RSP: 002b:00007fdfb7d82038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 42.426967][ T926] RAX: ffffffffffffffda RBX: 00007fdfb92c0f80 RCX: 00007fdfb9109719 [ 42.434776][ T926] RDX: 0000000000000048 RSI: 0000000020000040 RDI: 0000000000000000 [ 42.442674][ T926] RBP: 00007fdfb7d82090 R08: 0000000000000000 R09: 0000000000000000 [ 42.450480][ T926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 42.458463][ T926] R13: 0000000000000000 R14: 00007fdfb92c0f80 R15: 00007ffc71252ee8 [ 42.466461][ T926] [ 42.510228][ T936] device veth1_macvtap entered promiscuous mode [ 42.517884][ T936] device macsec0 entered promiscuous mode [ 42.598158][ T30] audit: type=1400 audit(1729842011.135:138): avc: denied { create } for pid=944 comm="syz.0.201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 43.218064][ T983] device syzkaller0 entered promiscuous mode [ 43.482558][ T1019] FAULT_INJECTION: forcing a failure. [ 43.482558][ T1019] name failslab, interval 1, probability 0, space 0, times 0 [ 43.496074][ T1019] CPU: 0 PID: 1019 Comm: syz.4.229 Not tainted 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 43.506141][ T1019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 43.516036][ T1019] Call Trace: [ 43.519499][ T1019] [ 43.522276][ T1019] dump_stack_lvl+0x151/0x1c0 [ 43.527075][ T1019] ? io_uring_drop_tctx_refs+0x190/0x190 [ 43.532703][ T1019] ? kmem_cache_free+0x116/0x2e0 [ 43.537700][ T1019] ? kfree_skb+0xc2/0x360 [ 43.541984][ T1019] ? vti6_tnl_xmit+0x12a3/0x1860 [ 43.546891][ T1019] ? dev_hard_start_xmit+0x228/0x620 [ 43.552092][ T1019] ? dev_queue_xmit+0x17/0x20 [ 43.556826][ T1019] ? __bpf_redirect+0x690/0xe60 [ 43.561552][ T1019] ? bpf_clone_redirect+0x24d/0x390 [ 43.566771][ T1019] ? bpf_prog_6893982b85ceadf7+0x56/0x360 [ 43.572409][ T1019] dump_stack+0x15/0x20 [ 43.576481][ T1019] should_fail+0x3c6/0x510 [ 43.580733][ T1019] __should_failslab+0xa4/0xe0 [ 43.585426][ T1019] ? dst_alloc+0x164/0x1e0 [ 43.589795][ T1019] should_failslab+0x9/0x20 [ 43.594097][ T1019] slab_pre_alloc_hook+0x37/0xd0 [ 43.598874][ T1019] ? dst_alloc+0x164/0x1e0 [ 43.603127][ T1019] kmem_cache_alloc+0x44/0x200 [ 43.607727][ T1019] dst_alloc+0x164/0x1e0 [ 43.611890][ T1019] ip_route_output_key_hash_rcu+0x129a/0x20b0 [ 43.617990][ T1019] ip_route_output_key_hash+0x142/0x210 [ 43.623456][ T1019] ? ip_route_input_rcu+0x29b0/0x29b0 [ 43.628742][ T1019] vti6_tnl_xmit+0xd91/0x1860 [ 43.633436][ T1019] ? vti6_dev_uninit+0x360/0x360 [ 43.638211][ T1019] ? netif_skb_features+0x7fc/0xb70 [ 43.643241][ T1019] dev_hard_start_xmit+0x228/0x620 [ 43.648361][ T1019] __dev_queue_xmit+0x18b4/0x2e70 [ 43.653227][ T1019] ? dev_queue_xmit+0x20/0x20 [ 43.657752][ T1019] ? __kasan_check_write+0x14/0x20 [ 43.662773][ T1019] ? skb_release_data+0x1c3/0xa80 [ 43.667739][ T1019] ? __kasan_check_write+0x14/0x20 [ 43.672693][ T1019] ? pskb_expand_head+0xc8f/0x1240 [ 43.677640][ T1019] dev_queue_xmit+0x17/0x20 [ 43.681970][ T1019] __bpf_redirect+0x690/0xe60 [ 43.686584][ T1019] bpf_clone_redirect+0x24d/0x390 [ 43.691612][ T1019] bpf_prog_6893982b85ceadf7+0x56/0x360 [ 43.697076][ T1019] ? swiotlb_late_init_with_tbl+0x1e0/0x340 [ 43.702809][ T1019] ? __stack_depot_save+0x34/0x470 [ 43.707755][ T1019] ? __kasan_slab_alloc+0xc3/0xe0 [ 43.712612][ T1019] ? __kasan_slab_alloc+0xb1/0xe0 [ 43.717478][ T1019] ? slab_post_alloc_hook+0x53/0x2c0 [ 43.723168][ T1019] ? kmem_cache_alloc+0xf5/0x200 [ 43.727929][ T1019] ? __build_skb+0x2a/0x300 [ 43.732272][ T1019] ? build_skb+0x25/0x1f0 [ 43.736437][ T1019] ? bpf_prog_test_run_skb+0x38e/0x1420 [ 43.741907][ T1019] ? bpf_prog_test_run+0x3b0/0x630 [ 43.747028][ T1019] ? __sys_bpf+0x525/0x760 [ 43.751476][ T1019] ? __x64_sys_bpf+0x7c/0x90 [ 43.755879][ T1019] ? x64_sys_call+0x87f/0x9a0 [ 43.760570][ T1019] ? do_syscall_64+0x3b/0xb0 [ 43.764993][ T1019] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 43.770900][ T1019] ? __kasan_check_read+0x11/0x20 [ 43.775765][ T1019] ? bpf_test_timer_continue+0x140/0x460 [ 43.781249][ T1019] bpf_test_run+0x478/0xa10 [ 43.785587][ T1019] ? convert___skb_to_skb+0x570/0x570 [ 43.790890][ T1019] ? eth_type_trans+0x2e4/0x620 [ 43.795736][ T1019] ? eth_get_headlen+0x240/0x240 [ 43.800510][ T1019] ? convert___skb_to_skb+0x44/0x570 [ 43.805616][ T1019] bpf_prog_test_run_skb+0xb41/0x1420 [ 43.811011][ T1019] ? __kasan_check_write+0x14/0x20 [ 43.816138][ T1019] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 43.822066][ T1019] ? __kasan_check_write+0x14/0x20 [ 43.827189][ T1019] ? fput_many+0x160/0x1b0 [ 43.831438][ T1019] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 43.837169][ T1019] bpf_prog_test_run+0x3b0/0x630 [ 43.842029][ T1019] ? bpf_prog_query+0x220/0x220 [ 43.846803][ T1019] ? selinux_bpf+0xd2/0x100 [ 43.851145][ T1019] ? security_bpf+0x82/0xb0 [ 43.855568][ T1019] __sys_bpf+0x525/0x760 [ 43.859646][ T1019] ? fput_many+0x160/0x1b0 [ 43.864103][ T1019] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 43.869405][ T1019] ? debug_smp_processor_id+0x17/0x20 [ 43.874869][ T1019] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 43.880954][ T1019] __x64_sys_bpf+0x7c/0x90 [ 43.885212][ T1019] x64_sys_call+0x87f/0x9a0 [ 43.889719][ T1019] do_syscall_64+0x3b/0xb0 [ 43.893967][ T1019] ? clear_bhb_loop+0x35/0x90 [ 43.898477][ T1019] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 43.904296][ T1019] RIP: 0033:0x7f2878fd6719 [ 43.908559][ T1019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 43.928084][ T1019] RSP: 002b:00007f2877c4f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 43.936585][ T1019] RAX: ffffffffffffffda RBX: 00007f287918df80 RCX: 00007f2878fd6719 [ 43.944744][ T1019] RDX: 000000000000002c RSI: 0000000020000080 RDI: 000000000000000a [ 43.952742][ T1019] RBP: 00007f2877c4f090 R08: 0000000000000000 R09: 0000000000000000 [ 43.960725][ T1019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 43.968730][ T1019] R13: 0000000000000000 R14: 00007f287918df80 R15: 00007fff3e6072d8 [ 43.976641][ T1019] [ 44.098105][ T1029] device syzkaller0 entered promiscuous mode [ 45.197755][ T1075] device syzkaller0 entered promiscuous mode [ 45.297523][ T30] audit: type=1400 audit(1729842013.835:139): avc: denied { create } for pid=1078 comm="syz.3.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 45.853806][ T1107] device syzkaller0 entered promiscuous mode [ 45.886171][ T30] audit: type=1400 audit(1729842014.425:140): avc: denied { create } for pid=1108 comm="syz.3.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 46.146847][ T1126] syz.0.266[1126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.146911][ T1126] syz.0.266[1126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.397226][ T1143] device syzkaller0 entered promiscuous mode [ 46.516760][ T1158] FAULT_INJECTION: forcing a failure. [ 46.516760][ T1158] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 46.529922][ T1158] CPU: 1 PID: 1158 Comm: syz.0.278 Not tainted 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 46.540128][ T1158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 46.550394][ T1158] Call Trace: [ 46.553845][ T1158] [ 46.556743][ T1158] dump_stack_lvl+0x151/0x1c0 [ 46.561404][ T1158] ? io_uring_drop_tctx_refs+0x190/0x190 [ 46.566879][ T1158] ? __kmalloc+0x13a/0x270 [ 46.571211][ T1158] ? kvmalloc_node+0x1f0/0x4d0 [ 46.575988][ T1158] dump_stack+0x15/0x20 [ 46.579986][ T1158] should_fail+0x3c6/0x510 [ 46.584234][ T1158] should_fail_usercopy+0x1a/0x20 [ 46.589091][ T1158] _copy_from_user+0x20/0xd0 [ 46.593608][ T1158] btf_new_fd+0x360/0x910 [ 46.597869][ T1158] bpf_btf_load+0x6f/0x90 [ 46.602111][ T1158] __sys_bpf+0x50e/0x760 [ 46.606191][ T1158] ? fput_many+0x160/0x1b0 [ 46.610567][ T1158] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 46.615795][ T1158] ? debug_smp_processor_id+0x17/0x20 [ 46.621059][ T1158] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 46.627488][ T1158] __x64_sys_bpf+0x7c/0x90 [ 46.631741][ T1158] x64_sys_call+0x87f/0x9a0 [ 46.636080][ T1158] do_syscall_64+0x3b/0xb0 [ 46.640420][ T1158] ? clear_bhb_loop+0x35/0x90 [ 46.644934][ T1158] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 46.650698][ T1158] RIP: 0033:0x7f500072e719 [ 46.655010][ T1158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 46.674802][ T1158] RSP: 002b:00007f4fff3a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 46.683050][ T1158] RAX: ffffffffffffffda RBX: 00007f50008e5f80 RCX: 00007f500072e719 [ 46.691066][ T1158] RDX: 0000000000000020 RSI: 0000000020000140 RDI: 0000000000000012 [ 46.698852][ T1158] RBP: 00007f4fff3a7090 R08: 0000000000000000 R09: 0000000000000000 [ 46.706845][ T1158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 46.714731][ T1158] R13: 0000000000000000 R14: 00007f50008e5f80 R15: 00007ffc73fa13f8 [ 46.722634][ T1158] [ 46.896472][ T1176] device syzkaller0 entered promiscuous mode [ 47.183651][ T1187] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.193083][ T1187] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.294625][ T1187] device bridge_slave_1 left promiscuous mode [ 47.301352][ T1187] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.311553][ T1187] device bridge_slave_0 left promiscuous mode [ 47.318004][ T1187] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.565514][ T1203] device syzkaller0 entered promiscuous mode [ 47.625423][ T1207] FAULT_INJECTION: forcing a failure. [ 47.625423][ T1207] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 47.639126][ T1207] CPU: 0 PID: 1207 Comm: syz.4.299 Not tainted 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 47.649812][ T1207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 47.659706][ T1207] Call Trace: [ 47.662827][ T1207] [ 47.665606][ T1207] dump_stack_lvl+0x151/0x1c0 [ 47.670119][ T1207] ? io_uring_drop_tctx_refs+0x190/0x190 [ 47.675677][ T1207] ? has_cap_mac_admin+0x3c0/0x3c0 [ 47.680624][ T1207] dump_stack+0x15/0x20 [ 47.684613][ T1207] should_fail+0x3c6/0x510 [ 47.689004][ T1207] should_fail_usercopy+0x1a/0x20 [ 47.693846][ T1207] _copy_from_user+0x20/0xd0 [ 47.698275][ T1207] get_user_ifreq+0xd5/0x230 [ 47.702821][ T1207] sock_ioctl+0x60d/0x740 [ 47.706961][ T1207] ? sock_poll+0x400/0x400 [ 47.711207][ T1207] ? security_file_ioctl+0x84/0xb0 [ 47.716153][ T1207] ? sock_poll+0x400/0x400 [ 47.720406][ T1207] __se_sys_ioctl+0x114/0x190 [ 47.724918][ T1207] __x64_sys_ioctl+0x7b/0x90 [ 47.729346][ T1207] x64_sys_call+0x98/0x9a0 [ 47.733644][ T1207] do_syscall_64+0x3b/0xb0 [ 47.737938][ T1207] ? clear_bhb_loop+0x35/0x90 [ 47.742549][ T1207] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 47.748281][ T1207] RIP: 0033:0x7f2878fd6719 [ 47.752620][ T1207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 47.772238][ T1207] RSP: 002b:00007f2877c4f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 47.780482][ T1207] RAX: ffffffffffffffda RBX: 00007f287918df80 RCX: 00007f2878fd6719 [ 47.788291][ T1207] RDX: 0000000020000080 RSI: 00000000000089f3 RDI: 0000000000000004 [ 47.796194][ T1207] RBP: 00007f2877c4f090 R08: 0000000000000000 R09: 0000000000000000 [ 47.804003][ T1207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 47.811909][ T1207] R13: 0000000000000000 R14: 00007f287918df80 R15: 00007fff3e6072d8 [ 47.819825][ T1207] [ 48.462447][ T1233] device pim6reg1 entered promiscuous mode [ 48.555277][ T1242] device syzkaller0 entered promiscuous mode [ 48.653995][ T1251] syz.2.315[1251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.654071][ T1251] syz.2.315[1251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.713840][ T1251] FAULT_INJECTION: forcing a failure. [ 48.713840][ T1251] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 48.820611][ T1251] CPU: 0 PID: 1251 Comm: syz.2.315 Not tainted 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 48.830521][ T1251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 48.840424][ T1251] Call Trace: [ 48.843539][ T1251] [ 48.846400][ T1251] dump_stack_lvl+0x151/0x1c0 [ 48.851096][ T1251] ? io_uring_drop_tctx_refs+0x190/0x190 [ 48.856561][ T1251] dump_stack+0x15/0x20 [ 48.860553][ T1251] should_fail+0x3c6/0x510 [ 48.864900][ T1251] should_fail_alloc_page+0x5a/0x80 [ 48.869925][ T1251] prepare_alloc_pages+0x15c/0x700 [ 48.874957][ T1251] ? __alloc_pages+0x8f0/0x8f0 [ 48.879561][ T1251] ? __alloc_pages_bulk+0xe40/0xe40 [ 48.884712][ T1251] __alloc_pages+0x18c/0x8f0 [ 48.889112][ T1251] ? __x64_sys_bpf+0x7c/0x90 [ 48.893531][ T1251] ? prep_new_page+0x110/0x110 [ 48.898133][ T1251] ? __kasan_check_write+0x14/0x20 [ 48.903093][ T1251] __get_free_pages+0x10/0x30 [ 48.907675][ T1251] kasan_populate_vmalloc_pte+0x39/0x130 [ 48.913315][ T1251] ? __apply_to_page_range+0x8ca/0xbe0 [ 48.918610][ T1251] __apply_to_page_range+0x8dd/0xbe0 [ 48.923740][ T1251] ? kasan_populate_vmalloc+0x70/0x70 [ 48.928951][ T1251] ? kasan_populate_vmalloc+0x70/0x70 [ 48.934237][ T1251] apply_to_page_range+0x3b/0x50 [ 48.939034][ T1251] kasan_populate_vmalloc+0x65/0x70 [ 48.944061][ T1251] alloc_vmap_area+0x192f/0x1a80 [ 48.949004][ T1251] ? vm_map_ram+0xa90/0xa90 [ 48.953419][ T1251] ? kmem_cache_alloc_trace+0x115/0x210 [ 48.958803][ T1251] ? __get_vm_area_node+0x117/0x360 [ 48.963836][ T1251] __get_vm_area_node+0x158/0x360 [ 48.968701][ T1251] ? selinux_capset+0xf0/0xf0 [ 48.973206][ T1251] __vmalloc_node_range+0xe2/0x8d0 [ 48.978275][ T1251] ? array_map_alloc+0x278/0x6d0 [ 48.983044][ T1251] ? cap_capable+0x1d2/0x270 [ 48.987563][ T1251] bpf_map_area_alloc+0xd9/0xf0 [ 48.992329][ T1251] ? array_map_alloc+0x278/0x6d0 [ 48.997496][ T1251] array_map_alloc+0x278/0x6d0 [ 49.002157][ T1251] map_create+0x411/0x2050 [ 49.006413][ T1251] __sys_bpf+0x296/0x760 [ 49.010489][ T1251] ? fput_many+0x160/0x1b0 [ 49.014784][ T1251] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 49.019954][ T1251] __x64_sys_bpf+0x7c/0x90 [ 49.024205][ T1251] x64_sys_call+0x87f/0x9a0 [ 49.028543][ T1251] do_syscall_64+0x3b/0xb0 [ 49.032885][ T1251] ? clear_bhb_loop+0x35/0x90 [ 49.037686][ T1251] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 49.043384][ T1251] RIP: 0033:0x7fdfb9109719 [ 49.047640][ T1251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 49.067275][ T1251] RSP: 002b:00007fdfb7d82038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 49.075705][ T1251] RAX: ffffffffffffffda RBX: 00007fdfb92c0f80 RCX: 00007fdfb9109719 [ 49.083519][ T1251] RDX: 0000000000000048 RSI: 0000000020004080 RDI: 0b00000000000000 [ 49.091442][ T1251] RBP: 00007fdfb7d82090 R08: 0000000000000000 R09: 0000000000000000 [ 49.099572][ T1251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 49.107854][ T1251] R13: 0000000000000000 R14: 00007fdfb92c0f80 R15: 00007ffc71252ee8 [ 49.116012][ T1251] [ 49.135444][ T30] audit: type=1400 audit(1729842017.675:141): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 49.161739][ T30] audit: type=1400 audit(1729842017.675:142): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 49.389950][ T1282] device syzkaller0 entered promiscuous mode [ 49.769838][ T1307] device pim6reg1 entered promiscuous mode [ 49.791798][ T1307] FAULT_INJECTION: forcing a failure. [ 49.791798][ T1307] name failslab, interval 1, probability 0, space 0, times 0 [ 49.817095][ T1307] CPU: 0 PID: 1307 Comm: syz.2.336 Not tainted 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 49.827006][ T1307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 49.836982][ T1307] Call Trace: [ 49.840111][ T1307] [ 49.842889][ T1307] dump_stack_lvl+0x151/0x1c0 [ 49.847403][ T1307] ? io_uring_drop_tctx_refs+0x190/0x190 [ 49.852893][ T1307] ? memcpy+0x56/0x70 [ 49.856686][ T1307] dump_stack+0x15/0x20 [ 49.860693][ T1307] should_fail+0x3c6/0x510 [ 49.865505][ T1307] __should_failslab+0xa4/0xe0 [ 49.870073][ T1307] should_failslab+0x9/0x20 [ 49.874582][ T1307] slab_pre_alloc_hook+0x37/0xd0 [ 49.879355][ T1307] ? netlink_trim+0x19b/0x230 [ 49.883865][ T1307] __kmalloc_track_caller+0x6c/0x260 [ 49.888987][ T1307] ? netlink_trim+0x19b/0x230 [ 49.893591][ T1307] ? netlink_trim+0x19b/0x230 [ 49.898298][ T1307] pskb_expand_head+0x113/0x1240 [ 49.903142][ T1307] netlink_trim+0x19b/0x230 [ 49.907482][ T1307] netlink_broadcast_filtered+0x66/0x1220 [ 49.913204][ T1307] ? __kasan_kmalloc+0x9/0x10 [ 49.917719][ T1307] ? rtmsg_ifinfo_build_skb+0xd4/0x180 [ 49.923014][ T1307] nlmsg_notify+0x101/0x1c0 [ 49.927353][ T1307] rtmsg_ifinfo+0xe7/0x120 [ 49.931614][ T1307] __dev_notify_flags+0xdd/0x610 [ 49.936378][ T1307] ? __dev_change_flags+0x6e0/0x6e0 [ 49.941524][ T1307] ? __dev_change_flags+0x569/0x6e0 [ 49.946552][ T1307] ? avc_denied+0x1b0/0x1b0 [ 49.950889][ T1307] ? dev_get_flags+0x1e0/0x1e0 [ 49.955683][ T1307] ? _kstrtoull+0x3a0/0x4a0 [ 49.960022][ T1307] dev_change_flags+0xf0/0x1a0 [ 49.964800][ T1307] dev_ifsioc+0x147/0x10c0 [ 49.969134][ T1307] ? dev_ioctl+0xe70/0xe70 [ 49.973468][ T1307] ? mutex_lock+0xb6/0x1e0 [ 49.977817][ T1307] ? wait_for_completion_killable_timeout+0x10/0x10 [ 49.984341][ T1307] dev_ioctl+0x54d/0xe70 [ 49.988463][ T1307] sock_do_ioctl+0x34f/0x5a0 [ 49.993021][ T1307] ? sock_show_fdinfo+0xa0/0xa0 [ 49.997822][ T1307] ? selinux_file_ioctl+0x3cc/0x540 [ 50.002831][ T1307] sock_ioctl+0x455/0x740 [ 50.007174][ T1307] ? sock_poll+0x400/0x400 [ 50.011594][ T1307] ? __fget_files+0x31e/0x380 [ 50.016374][ T1307] ? security_file_ioctl+0x84/0xb0 [ 50.021402][ T1307] ? sock_poll+0x400/0x400 [ 50.025654][ T1307] __se_sys_ioctl+0x114/0x190 [ 50.030178][ T1307] __x64_sys_ioctl+0x7b/0x90 [ 50.034981][ T1307] x64_sys_call+0x98/0x9a0 [ 50.039232][ T1307] do_syscall_64+0x3b/0xb0 [ 50.043487][ T1307] ? clear_bhb_loop+0x35/0x90 [ 50.048001][ T1307] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 50.053729][ T1307] RIP: 0033:0x7fdfb9109719 [ 50.057986][ T1307] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 50.077422][ T1307] RSP: 002b:00007fdfb7d82038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 50.085856][ T1307] RAX: ffffffffffffffda RBX: 00007fdfb92c0f80 RCX: 00007fdfb9109719 [ 50.093665][ T1307] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000007 [ 50.101583][ T1307] RBP: 00007fdfb7d82090 R08: 0000000000000000 R09: 0000000000000000 [ 50.109469][ T1307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 50.117367][ T1307] R13: 0000000000000000 R14: 00007fdfb92c0f80 R15: 00007ffc71252ee8 [ 50.125187][ T1307] [ 50.991534][ T1332] device syzkaller0 entered promiscuous mode [ 51.572306][ T1367] device veth1_macvtap left promiscuous mode [ 51.612586][ T1367] device veth1_macvtap entered promiscuous mode [ 51.640335][ T1367] device macsec0 entered promiscuous mode [ 51.809900][ T1371] device syzkaller0 entered promiscuous mode [ 52.065243][ T1381] device syzkaller0 entered promiscuous mode [ 52.272834][ T1402] device veth1_macvtap left promiscuous mode [ 52.278917][ T1402] device macsec0 left promiscuous mode [ 52.340296][ T1406] device syzkaller0 entered promiscuous mode [ 52.347925][ T1402] device veth1_macvtap entered promiscuous mode [ 52.361852][ T1402] device macsec0 entered promiscuous mode [ 52.392289][ T1416] FAULT_INJECTION: forcing a failure. [ 52.392289][ T1416] name failslab, interval 1, probability 0, space 0, times 0 [ 52.405271][ T1416] CPU: 1 PID: 1416 Comm: syz.0.374 Not tainted 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 52.415196][ T1416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 52.425225][ T1416] Call Trace: [ 52.428352][ T1416] [ 52.431217][ T1416] dump_stack_lvl+0x151/0x1c0 [ 52.435819][ T1416] ? io_uring_drop_tctx_refs+0x190/0x190 [ 52.441380][ T1416] dump_stack+0x15/0x20 [ 52.445546][ T1416] should_fail+0x3c6/0x510 [ 52.449793][ T1416] __should_failslab+0xa4/0xe0 [ 52.454484][ T1416] ? __alloc_skb+0xbe/0x550 [ 52.458909][ T1416] should_failslab+0x9/0x20 [ 52.463259][ T1416] slab_pre_alloc_hook+0x37/0xd0 [ 52.468020][ T1416] ? __alloc_skb+0xbe/0x550 [ 52.472365][ T1416] kmem_cache_alloc+0x44/0x200 [ 52.476994][ T1416] ? __kasan_slab_free+0x11/0x20 [ 52.482298][ T1416] __alloc_skb+0xbe/0x550 [ 52.486735][ T1416] inet_netconf_notify_devconf+0x173/0x220 [ 52.492390][ T1416] inetdev_event+0x79d/0x10a0 [ 52.497123][ T1416] ? ipv4_doint_and_flush+0x150/0x150 [ 52.502769][ T1416] ? up_read+0x5d/0x220 [ 52.506847][ T1416] raw_notifier_call_chain+0x8c/0xf0 [ 52.512044][ T1416] unregister_netdevice_many+0xe0a/0x17c0 [ 52.517687][ T1416] ? synchronize_rcu+0x120/0x120 [ 52.523007][ T1416] ? alloc_netdev_mqs+0xc90/0xc90 [ 52.528061][ T1416] ? locks_remove_file+0x41a/0x1180 [ 52.533453][ T1416] ? __kasan_check_read+0x11/0x20 [ 52.538350][ T1416] unregister_netdevice_queue+0x2e6/0x350 [ 52.543942][ T1416] ? linkwatch_urgent_event+0x65/0x4d0 [ 52.549234][ T1416] ? list_netdevice+0x4c0/0x4c0 [ 52.553944][ T1416] __tun_detach+0xd14/0x1510 [ 52.558442][ T1416] ? wait_for_completion_killable_timeout+0x10/0x10 [ 52.564861][ T1416] ? tun_chr_open+0x530/0x530 [ 52.569376][ T1416] tun_chr_close+0x92/0x140 [ 52.573717][ T1416] __fput+0x228/0x8c0 [ 52.577534][ T1416] ____fput+0x15/0x20 [ 52.581472][ T1416] task_work_run+0x129/0x190 [ 52.585901][ T1416] exit_to_user_mode_loop+0xc4/0xe0 [ 52.590936][ T1416] exit_to_user_mode_prepare+0x5a/0xa0 [ 52.596227][ T1416] syscall_exit_to_user_mode+0x26/0x160 [ 52.601699][ T1416] do_syscall_64+0x47/0xb0 [ 52.605951][ T1416] ? clear_bhb_loop+0x35/0x90 [ 52.610464][ T1416] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 52.616366][ T1416] RIP: 0033:0x7f500072e719 [ 52.620794][ T1416] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.640590][ T1416] RSP: 002b:00007f4fff3a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 52.649292][ T1416] RAX: 0000000000000000 RBX: 00007f50008e5f80 RCX: 00007f500072e719 [ 52.657527][ T1416] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 52.665427][ T1416] RBP: 00007f4fff3a7090 R08: 0000000000000000 R09: 0000000000000000 [ 52.673246][ T1416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 52.681225][ T1416] R13: 0000000000000000 R14: 00007f50008e5f80 R15: 00007ffc73fa13f8 [ 52.689127][ T1416] [ 53.128469][ T1449] device syzkaller0 entered promiscuous mode [ 53.333343][ T1467] FAULT_INJECTION: forcing a failure. [ 53.333343][ T1467] name failslab, interval 1, probability 0, space 0, times 0 [ 53.359914][ T1467] CPU: 1 PID: 1467 Comm: syz.2.393 Not tainted 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 53.369829][ T1467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 53.379827][ T1467] Call Trace: [ 53.382932][ T1467] [ 53.385817][ T1467] dump_stack_lvl+0x151/0x1c0 [ 53.390506][ T1467] ? io_uring_drop_tctx_refs+0x190/0x190 [ 53.396326][ T1467] ? dev_queue_xmit+0x20/0x20 [ 53.400845][ T1467] dump_stack+0x15/0x20 [ 53.404831][ T1467] should_fail+0x3c6/0x510 [ 53.409177][ T1467] __should_failslab+0xa4/0xe0 [ 53.413774][ T1467] ? skb_clone+0x1d1/0x360 [ 53.418030][ T1467] should_failslab+0x9/0x20 [ 53.422367][ T1467] slab_pre_alloc_hook+0x37/0xd0 [ 53.427672][ T1467] ? skb_clone+0x1d1/0x360 [ 53.431869][ T1467] kmem_cache_alloc+0x44/0x200 [ 53.437094][ T1467] skb_clone+0x1d1/0x360 [ 53.441157][ T1467] bpf_clone_redirect+0xa6/0x390 [ 53.446026][ T1467] bpf_prog_6893982b85ceadf7+0x56/0xa80 [ 53.451583][ T1467] ? swiotlb_late_init_with_tbl+0x1e0/0x340 [ 53.457558][ T1467] ? __stack_depot_save+0x34/0x470 [ 53.462514][ T1467] ? __kasan_slab_alloc+0xc3/0xe0 [ 53.467989][ T1467] ? __kasan_slab_alloc+0xb1/0xe0 [ 53.472936][ T1467] ? slab_post_alloc_hook+0x53/0x2c0 [ 53.478042][ T1467] ? kmem_cache_alloc+0xf5/0x200 [ 53.482864][ T1467] ? __build_skb+0x2a/0x300 [ 53.487245][ T1467] ? build_skb+0x25/0x1f0 [ 53.491591][ T1467] ? bpf_prog_test_run_skb+0x38e/0x1420 [ 53.497244][ T1467] ? bpf_prog_test_run+0x3b0/0x630 [ 53.502205][ T1467] ? __sys_bpf+0x525/0x760 [ 53.506542][ T1467] ? __x64_sys_bpf+0x7c/0x90 [ 53.510993][ T1467] ? x64_sys_call+0x87f/0x9a0 [ 53.515475][ T1467] ? do_syscall_64+0x3b/0xb0 [ 53.519906][ T1467] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 53.525896][ T1467] ? __kasan_check_read+0x11/0x20 [ 53.530926][ T1467] ? bpf_test_timer_continue+0x140/0x460 [ 53.536475][ T1467] bpf_test_run+0x478/0xa10 [ 53.540940][ T1467] ? convert___skb_to_skb+0x570/0x570 [ 53.546108][ T1467] ? eth_type_trans+0x2e4/0x620 [ 53.550880][ T1467] ? eth_get_headlen+0x240/0x240 [ 53.555755][ T1467] ? convert___skb_to_skb+0x44/0x570 [ 53.561300][ T1467] bpf_prog_test_run_skb+0xb41/0x1420 [ 53.566499][ T1467] ? __kasan_check_write+0x14/0x20 [ 53.571453][ T1467] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 53.577185][ T1467] ? __kasan_check_write+0x14/0x20 [ 53.582126][ T1467] ? fput_many+0x160/0x1b0 [ 53.586377][ T1467] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 53.592108][ T1467] bpf_prog_test_run+0x3b0/0x630 [ 53.596882][ T1467] ? bpf_prog_query+0x220/0x220 [ 53.601574][ T1467] ? selinux_bpf+0xd2/0x100 [ 53.606094][ T1467] ? security_bpf+0x82/0xb0 [ 53.610585][ T1467] __sys_bpf+0x525/0x760 [ 53.614813][ T1467] ? fput_many+0x160/0x1b0 [ 53.619164][ T1467] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 53.624365][ T1467] ? debug_smp_processor_id+0x17/0x20 [ 53.629568][ T1467] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 53.635644][ T1467] __x64_sys_bpf+0x7c/0x90 [ 53.639901][ T1467] x64_sys_call+0x87f/0x9a0 [ 53.644343][ T1467] do_syscall_64+0x3b/0xb0 [ 53.648930][ T1467] ? clear_bhb_loop+0x35/0x90 [ 53.653418][ T1467] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 53.659164][ T1467] RIP: 0033:0x7fdfb9109719 [ 53.663406][ T1467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 53.683292][ T1467] RSP: 002b:00007fdfb7d82038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 53.691546][ T1467] RAX: ffffffffffffffda RBX: 00007fdfb92c0f80 RCX: 00007fdfb9109719 [ 53.699507][ T1467] RDX: 000000000000002c RSI: 0000000020000080 RDI: 000000000000000a [ 53.707417][ T1467] RBP: 00007fdfb7d82090 R08: 0000000000000000 R09: 0000000000000000 [ 53.715490][ T1467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 53.723389][ T1467] R13: 0000000000000000 R14: 00007fdfb92c0f80 R15: 00007ffc71252ee8 [ 53.731466][ T1467] [ 54.134800][ T1495] device syzkaller0 entered promiscuous mode [ 54.144668][ T30] audit: type=1400 audit(1729842022.685:143): avc: denied { create } for pid=1491 comm="syz.3.401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 54.613906][ T1517] device syzkaller0 entered promiscuous mode [ 56.001268][ T1563] device veth1_macvtap left promiscuous mode [ 56.008060][ T1563] device macsec0 left promiscuous mode [ 56.112558][ T1571] device veth1_macvtap entered promiscuous mode [ 56.172574][ T1571] device macsec0 entered promiscuous mode [ 57.184573][ T1608] device veth1_macvtap left promiscuous mode [ 57.190982][ T1608] device macsec0 left promiscuous mode [ 57.252900][ T1608] device veth1_macvtap entered promiscuous mode [ 57.259691][ T1608] device macsec0 entered promiscuous mode [ 57.446936][ T1620] device veth0_vlan left promiscuous mode [ 57.462720][ T1620] device veth0_vlan entered promiscuous mode [ 57.485332][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 57.505713][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 57.527052][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 58.158482][ T1637] device syzkaller0 entered promiscuous mode [ 58.403560][ T1652] FAULT_INJECTION: forcing a failure. [ 58.403560][ T1652] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 58.486233][ T1652] CPU: 0 PID: 1652 Comm: syz.4.458 Not tainted 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 58.496228][ T1652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 58.506213][ T1652] Call Trace: [ 58.509331][ T1652] [ 58.512110][ T1652] dump_stack_lvl+0x151/0x1c0 [ 58.516625][ T1652] ? io_uring_drop_tctx_refs+0x190/0x190 [ 58.522099][ T1652] ? bpf_probe_read_compat+0x10b/0x180 [ 58.527478][ T1652] dump_stack+0x15/0x20 [ 58.531558][ T1652] should_fail+0x3c6/0x510 [ 58.535808][ T1652] should_fail_usercopy+0x1a/0x20 [ 58.541398][ T1652] _copy_from_user+0x20/0xd0 [ 58.545825][ T1652] ___sys_recvmsg+0x150/0x690 [ 58.550359][ T1652] ? __sys_recvmsg+0x260/0x260 [ 58.554945][ T1652] ? __fdget+0x1bc/0x240 [ 58.559010][ T1652] __x64_sys_recvmsg+0x1dc/0x2b0 [ 58.563796][ T1652] ? ___sys_recvmsg+0x690/0x690 [ 58.568477][ T1652] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 58.574471][ T1652] ? exit_to_user_mode_prepare+0x39/0xa0 [ 58.579945][ T1652] x64_sys_call+0x171/0x9a0 [ 58.584368][ T1652] do_syscall_64+0x3b/0xb0 [ 58.588627][ T1652] ? clear_bhb_loop+0x35/0x90 [ 58.593225][ T1652] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 58.599112][ T1652] RIP: 0033:0x7f2878fd6719 [ 58.603481][ T1652] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 58.624324][ T1652] RSP: 002b:00007f2877c4f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 58.633346][ T1652] RAX: ffffffffffffffda RBX: 00007f287918df80 RCX: 00007f2878fd6719 [ 58.641335][ T1652] RDX: 00000000000040fd RSI: 0000000020000b00 RDI: 0000000000000003 [ 58.649329][ T1652] RBP: 00007f2877c4f090 R08: 0000000000000000 R09: 0000000000000000 [ 58.657220][ T1652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 58.665139][ T1652] R13: 0000000000000000 R14: 00007f287918df80 R15: 00007fff3e6072d8 [ 58.673796][ T1652] [ 58.809760][ T1661] device veth1_macvtap left promiscuous mode [ 58.859432][ T1661] device macsec0 left promiscuous mode [ 58.905011][ T1663] device veth1_macvtap left promiscuous mode [ 58.970294][ T1663] device macsec0 left promiscuous mode [ 59.058075][ T1665] device veth1_macvtap entered promiscuous mode [ 59.067115][ T1665] device macsec0 entered promiscuous mode [ 59.173991][ T1666] device veth1_macvtap entered promiscuous mode [ 59.231947][ T1666] device macsec0 entered promiscuous mode [ 59.422284][ T1683] FAULT_INJECTION: forcing a failure. [ 59.422284][ T1683] name failslab, interval 1, probability 0, space 0, times 0 [ 59.450336][ T1683] CPU: 1 PID: 1683 Comm: syz.2.468 Not tainted 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 59.460506][ T1683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 59.470490][ T1683] Call Trace: [ 59.473613][ T1683] [ 59.476392][ T1683] dump_stack_lvl+0x151/0x1c0 [ 59.480922][ T1683] ? io_uring_drop_tctx_refs+0x190/0x190 [ 59.486457][ T1683] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 59.492463][ T1683] ? __skb_try_recv_datagram+0x495/0x6a0 [ 59.497933][ T1683] dump_stack+0x15/0x20 [ 59.501929][ T1683] should_fail+0x3c6/0x510 [ 59.506181][ T1683] __should_failslab+0xa4/0xe0 [ 59.510777][ T1683] ? skb_clone+0x1d1/0x360 [ 59.515028][ T1683] should_failslab+0x9/0x20 [ 59.519466][ T1683] slab_pre_alloc_hook+0x37/0xd0 [ 59.524231][ T1683] ? skb_clone+0x1d1/0x360 [ 59.528492][ T1683] kmem_cache_alloc+0x44/0x200 [ 59.533169][ T1683] skb_clone+0x1d1/0x360 [ 59.537264][ T1683] sk_psock_verdict_recv+0x53/0x840 [ 59.542373][ T1683] unix_read_sock+0x132/0x370 [ 59.547249][ T1683] ? sk_psock_skb_redirect+0x440/0x440 [ 59.552531][ T1683] ? unix_stream_splice_actor+0x120/0x120 [ 59.558089][ T1683] ? __kasan_check_write+0x14/0x20 [ 59.563033][ T1683] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 59.568347][ T1683] ? sk_psock_skb_redirect+0x440/0x440 [ 59.573627][ T1683] unix_stream_read_sock+0x5e/0x90 [ 59.578568][ T1683] ? unix_set_peek_off+0xa0/0xa0 [ 59.583346][ T1683] sk_psock_verdict_data_ready+0x147/0x1a0 [ 59.588987][ T1683] ? sk_psock_start_verdict+0xc0/0xc0 [ 59.594190][ T1683] ? _raw_spin_lock+0xa4/0x1b0 [ 59.598801][ T1683] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 59.604700][ T1683] ? skb_queue_tail+0xfb/0x120 [ 59.609404][ T1683] unix_stream_sendmsg+0x8fd/0x1060 [ 59.614422][ T1683] ? unix_stream_sendmsg+0x8f1/0x1060 [ 59.619719][ T1683] ? unix_show_fdinfo+0xa0/0xa0 [ 59.624401][ T1683] ? check_stack_object+0x114/0x130 [ 59.629435][ T1683] ? security_socket_sendmsg+0x82/0xb0 [ 59.634815][ T1683] ? unix_show_fdinfo+0xa0/0xa0 [ 59.639590][ T1683] ____sys_sendmsg+0x59e/0x8f0 [ 59.644193][ T1683] ? __sys_sendmsg_sock+0x40/0x40 [ 59.649072][ T1683] ? import_iovec+0xe5/0x120 [ 59.653476][ T1683] ___sys_sendmsg+0x252/0x2e0 [ 59.658000][ T1683] ? __sys_sendmsg+0x260/0x260 [ 59.662601][ T1683] ? __fdget+0x1bc/0x240 [ 59.666736][ T1683] __se_sys_sendmsg+0x19a/0x260 [ 59.671370][ T1683] ? __x64_sys_sendmsg+0x90/0x90 [ 59.676651][ T1683] ? ksys_write+0x260/0x2c0 [ 59.680992][ T1683] ? debug_smp_processor_id+0x17/0x20 [ 59.686288][ T1683] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 59.692290][ T1683] __x64_sys_sendmsg+0x7b/0x90 [ 59.696913][ T1683] x64_sys_call+0x16a/0x9a0 [ 59.701333][ T1683] do_syscall_64+0x3b/0xb0 [ 59.705569][ T1683] ? clear_bhb_loop+0x35/0x90 [ 59.710086][ T1683] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 59.715819][ T1683] RIP: 0033:0x7fdfb9109719 [ 59.720067][ T1683] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 59.739596][ T1683] RSP: 002b:00007fdfb7d82038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 59.748371][ T1683] RAX: ffffffffffffffda RBX: 00007fdfb92c0f80 RCX: 00007fdfb9109719 [ 59.756172][ T1683] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000008 [ 59.763985][ T1683] RBP: 00007fdfb7d82090 R08: 0000000000000000 R09: 0000000000000000 [ 59.771798][ T1683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 59.780127][ T1683] R13: 0000000000000000 R14: 00007fdfb92c0f80 R15: 00007ffc71252ee8 [ 59.787957][ T1683] [ 59.866430][ T1687] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.874967][ T1687] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.491367][ T1771] ÿÿÿÿÿÿ: renamed from vlan1 [ 62.605201][ T1782] FAULT_INJECTION: forcing a failure. [ 62.605201][ T1782] name failslab, interval 1, probability 0, space 0, times 0 [ 62.700610][ T1782] CPU: 1 PID: 1782 Comm: syz.3.504 Not tainted 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 62.710788][ T1782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 62.720874][ T1782] Call Trace: [ 62.723977][ T1782] [ 62.726845][ T1782] dump_stack_lvl+0x151/0x1c0 [ 62.731351][ T1782] ? io_uring_drop_tctx_refs+0x190/0x190 [ 62.736822][ T1782] ? x64_sys_call+0x87f/0x9a0 [ 62.741339][ T1782] dump_stack+0x15/0x20 [ 62.745339][ T1782] should_fail+0x3c6/0x510 [ 62.749582][ T1782] __should_failslab+0xa4/0xe0 [ 62.754275][ T1782] should_failslab+0x9/0x20 [ 62.758619][ T1782] slab_pre_alloc_hook+0x37/0xd0 [ 62.763649][ T1782] ? skb_ensure_writable+0x2d0/0x440 [ 62.769214][ T1782] __kmalloc_track_caller+0x6c/0x260 [ 62.774318][ T1782] ? skb_ensure_writable+0x2d0/0x440 [ 62.779447][ T1782] ? skb_ensure_writable+0x2d0/0x440 [ 62.784580][ T1782] pskb_expand_head+0x113/0x1240 [ 62.789337][ T1782] ? __kasan_check_write+0x14/0x20 [ 62.794383][ T1782] skb_ensure_writable+0x2d0/0x440 [ 62.799319][ T1782] bpf_clone_redirect+0x117/0x390 [ 62.804558][ T1782] bpf_prog_76b644e67229c872+0x56/0x460 [ 62.809933][ T1782] ? swiotlb_late_init_with_tbl+0x1e0/0x340 [ 62.815666][ T1782] ? __stack_depot_save+0x34/0x470 [ 62.820605][ T1782] ? __kasan_slab_alloc+0xc3/0xe0 [ 62.825579][ T1782] ? __kasan_slab_alloc+0xb1/0xe0 [ 62.830572][ T1782] ? slab_post_alloc_hook+0x53/0x2c0 [ 62.835728][ T1782] ? kmem_cache_alloc+0xf5/0x200 [ 62.840497][ T1782] ? __build_skb+0x2a/0x300 [ 62.844843][ T1782] ? build_skb+0x25/0x1f0 [ 62.849092][ T1782] ? bpf_prog_test_run_skb+0x38e/0x1420 [ 62.854493][ T1782] ? bpf_prog_test_run+0x3b0/0x630 [ 62.859545][ T1782] ? __sys_bpf+0x525/0x760 [ 62.863761][ T1782] ? __x64_sys_bpf+0x7c/0x90 [ 62.868187][ T1782] ? x64_sys_call+0x87f/0x9a0 [ 62.872791][ T1782] ? do_syscall_64+0x3b/0xb0 [ 62.877298][ T1782] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 62.883295][ T1782] ? __kasan_check_read+0x11/0x20 [ 62.888150][ T1782] ? bpf_test_timer_continue+0x140/0x460 [ 62.893795][ T1782] bpf_test_run+0x478/0xa10 [ 62.898225][ T1782] ? convert___skb_to_skb+0x570/0x570 [ 62.903873][ T1782] ? eth_type_trans+0x2e4/0x620 [ 62.908909][ T1782] ? eth_get_headlen+0x240/0x240 [ 62.913674][ T1782] ? convert___skb_to_skb+0x44/0x570 [ 62.919162][ T1782] bpf_prog_test_run_skb+0xb41/0x1420 [ 62.924637][ T1782] ? __kasan_check_write+0x14/0x20 [ 62.929672][ T1782] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 62.935392][ T1782] ? __kasan_check_write+0x14/0x20 [ 62.940339][ T1782] ? fput_many+0x160/0x1b0 [ 62.944592][ T1782] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 62.950321][ T1782] bpf_prog_test_run+0x3b0/0x630 [ 62.955094][ T1782] ? bpf_prog_query+0x220/0x220 [ 62.959781][ T1782] ? selinux_bpf+0xd2/0x100 [ 62.964206][ T1782] ? security_bpf+0x82/0xb0 [ 62.968550][ T1782] __sys_bpf+0x525/0x760 [ 62.972717][ T1782] ? fput_many+0x160/0x1b0 [ 62.976968][ T1782] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 62.982268][ T1782] ? debug_smp_processor_id+0x17/0x20 [ 62.987474][ T1782] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 62.993552][ T1782] __x64_sys_bpf+0x7c/0x90 [ 62.997801][ T1782] x64_sys_call+0x87f/0x9a0 [ 63.002146][ T1782] do_syscall_64+0x3b/0xb0 [ 63.006570][ T1782] ? clear_bhb_loop+0x35/0x90 [ 63.011077][ T1782] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 63.016812][ T1782] RIP: 0033:0x7f451886a719 [ 63.021064][ T1782] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 63.040688][ T1782] RSP: 002b:00007f45174e3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 63.049024][ T1782] RAX: ffffffffffffffda RBX: 00007f4518a21f80 RCX: 00007f451886a719 [ 63.056862][ T1782] RDX: 0000000000000050 RSI: 0000000020000080 RDI: 000000000000000a [ 63.064816][ T1782] RBP: 00007f45174e3090 R08: 0000000000000000 R09: 0000000000000000 [ 63.072667][ T1782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 63.080543][ T1782] R13: 0000000000000000 R14: 00007f4518a21f80 R15: 00007ffce4d1e0c8 [ 63.088519][ T1782] [ 63.295510][ T1794] device pim6reg1 entered promiscuous mode [ 64.920714][ T1823] FAULT_INJECTION: forcing a failure. [ 64.920714][ T1823] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 64.975290][ T1823] CPU: 0 PID: 1823 Comm: syz.3.516 Not tainted 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 64.985211][ T1823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 64.995273][ T1823] Call Trace: [ 64.998394][ T1823] [ 65.001172][ T1823] dump_stack_lvl+0x151/0x1c0 [ 65.005690][ T1823] ? io_uring_drop_tctx_refs+0x190/0x190 [ 65.011165][ T1823] dump_stack+0x15/0x20 [ 65.015147][ T1823] should_fail+0x3c6/0x510 [ 65.019403][ T1823] should_fail_usercopy+0x1a/0x20 [ 65.024262][ T1823] _copy_from_user+0x20/0xd0 [ 65.028690][ T1823] __sys_bpf+0x1e9/0x760 [ 65.032767][ T1823] ? fput_many+0x160/0x1b0 [ 65.037027][ T1823] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 65.042233][ T1823] ? debug_smp_processor_id+0x17/0x20 [ 65.047437][ T1823] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 65.053348][ T1823] __x64_sys_bpf+0x7c/0x90 [ 65.057693][ T1823] x64_sys_call+0x87f/0x9a0 [ 65.062029][ T1823] do_syscall_64+0x3b/0xb0 [ 65.066280][ T1823] ? clear_bhb_loop+0x35/0x90 [ 65.070986][ T1823] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 65.076766][ T1823] RIP: 0033:0x7f451886a719 [ 65.080995][ T1823] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 65.100675][ T1823] RSP: 002b:00007f45174e3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 65.108916][ T1823] RAX: ffffffffffffffda RBX: 00007f4518a21f80 RCX: 00007f451886a719 [ 65.116826][ T1823] RDX: 0000000000000050 RSI: 00000000200002c0 RDI: 000000000000000a [ 65.124643][ T1823] RBP: 00007f45174e3090 R08: 0000000000000000 R09: 0000000000000000 [ 65.132534][ T1823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 65.140628][ T1823] R13: 0000000000000000 R14: 00007f4518a21f80 R15: 00007ffce4d1e0c8 [ 65.148694][ T1823] [ 65.443117][ T1837] syz.0.523[1837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.443226][ T1837] syz.0.523[1837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.022813][ T1846] ÿÿÿÿÿÿ: renamed from vlan1 [ 66.601781][ T1866] device syzkaller0 entered promiscuous mode [ 68.665320][ T30] audit: type=1400 audit(1729842037.205:144): avc: denied { create } for pid=1964 comm="syz.3.569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 68.813124][ T1980] FAULT_INJECTION: forcing a failure. [ 68.813124][ T1980] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 68.828940][ T1980] CPU: 0 PID: 1980 Comm: syz.4.574 Not tainted 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 68.839219][ T1980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 68.849124][ T1980] Call Trace: [ 68.852405][ T1980] [ 68.855195][ T1980] dump_stack_lvl+0x151/0x1c0 [ 68.859826][ T1980] ? io_uring_drop_tctx_refs+0x190/0x190 [ 68.865254][ T1980] ? vsnprintf+0x1b93/0x1c70 [ 68.869766][ T1980] dump_stack+0x15/0x20 [ 68.873763][ T1980] should_fail+0x3c6/0x510 [ 68.878014][ T1980] should_fail_usercopy+0x1a/0x20 [ 68.882896][ T1980] _copy_to_user+0x20/0x90 [ 68.887228][ T1980] bpf_verifier_vlog+0x1ab/0x330 [ 68.891996][ T1980] __btf_verifier_log+0xd1/0x120 [ 68.896769][ T1980] ? btf_parse_hdr+0x2bf/0x7c0 [ 68.901540][ T1980] ? btf_check_sec_info+0x4f0/0x4f0 [ 68.906667][ T1980] ? kvmalloc_node+0x281/0x4d0 [ 68.911350][ T1980] ? memcpy+0x56/0x70 [ 68.915250][ T1980] btf_parse_hdr+0x31a/0x7c0 [ 68.919684][ T1980] btf_new_fd+0x3fb/0x910 [ 68.924023][ T1980] bpf_btf_load+0x6f/0x90 [ 68.928278][ T1980] __sys_bpf+0x50e/0x760 [ 68.932529][ T1980] ? fput_many+0x160/0x1b0 [ 68.937217][ T1980] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 68.943045][ T1980] ? debug_smp_processor_id+0x17/0x20 [ 68.948433][ T1980] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 68.954339][ T1980] __x64_sys_bpf+0x7c/0x90 [ 68.958590][ T1980] x64_sys_call+0x87f/0x9a0 [ 68.962928][ T1980] do_syscall_64+0x3b/0xb0 [ 68.967210][ T1980] ? clear_bhb_loop+0x35/0x90 [ 68.971695][ T1980] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 68.977593][ T1980] RIP: 0033:0x7f2878fd6719 [ 68.981942][ T1980] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 69.001560][ T1980] RSP: 002b:00007f2877c4f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 69.009807][ T1980] RAX: ffffffffffffffda RBX: 00007f287918df80 RCX: 00007f2878fd6719 [ 69.017863][ T1980] RDX: 0000000000000020 RSI: 0000000020000140 RDI: 0000000000000012 [ 69.025779][ T1980] RBP: 00007f2877c4f090 R08: 0000000000000000 R09: 0000000000000000 [ 69.033586][ T1980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 69.041399][ T1980] R13: 0000000000000000 R14: 00007f287918df80 R15: 00007fff3e6072d8 [ 69.049216][ T1980] [ 70.703464][ T2060] ÿÿÿÿÿÿ: renamed from vlan1 [ 71.101882][ T2087] device veth1_macvtap left promiscuous mode [ 71.122231][ T2087] device macsec0 left promiscuous mode [ 71.185667][ T2087] device veth1_macvtap entered promiscuous mode [ 71.194320][ T2087] device macsec0 entered promiscuous mode [ 71.366051][ T30] audit: type=1400 audit(1729842039.905:145): avc: denied { write } for pid=2096 comm="syz.4.617" name="cgroup.subtree_control" dev="cgroup2" ino=152 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 71.479117][ T30] audit: type=1400 audit(1729842039.935:146): avc: denied { open } for pid=2096 comm="syz.4.617" path="" dev="cgroup2" ino=152 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 72.246065][ T2125] ÿÿÿÿÿÿ: renamed from vlan1 [ 72.596027][ T2151] FAULT_INJECTION: forcing a failure. [ 72.596027][ T2151] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 72.662157][ T2151] CPU: 1 PID: 2151 Comm: syz.2.636 Not tainted 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 72.672070][ T2151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 72.682223][ T2151] Call Trace: [ 72.685349][ T2151] [ 72.688121][ T2151] dump_stack_lvl+0x151/0x1c0 [ 72.693178][ T2151] ? io_uring_drop_tctx_refs+0x190/0x190 [ 72.698647][ T2151] dump_stack+0x15/0x20 [ 72.702635][ T2151] should_fail+0x3c6/0x510 [ 72.707059][ T2151] should_fail_usercopy+0x1a/0x20 [ 72.712088][ T2151] _copy_from_user+0x20/0xd0 [ 72.716519][ T2151] __sys_bpf+0x1e9/0x760 [ 72.720601][ T2151] ? fput_many+0x160/0x1b0 [ 72.724854][ T2151] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 72.730150][ T2151] ? debug_smp_processor_id+0x17/0x20 [ 72.735448][ T2151] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 72.741343][ T2151] __x64_sys_bpf+0x7c/0x90 [ 72.745597][ T2151] x64_sys_call+0x87f/0x9a0 [ 72.749938][ T2151] do_syscall_64+0x3b/0xb0 [ 72.754192][ T2151] ? clear_bhb_loop+0x35/0x90 [ 72.758703][ T2151] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 72.764914][ T2151] RIP: 0033:0x7fdfb9109719 [ 72.769185][ T2151] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 72.789148][ T2151] RSP: 002b:00007fdfb7d82038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 72.797675][ T2151] RAX: ffffffffffffffda RBX: 00007fdfb92c0f80 RCX: 00007fdfb9109719 [ 72.805485][ T2151] RDX: 0000000000000010 RSI: 00000000200002c0 RDI: 0000000000000011 [ 72.813402][ T2151] RBP: 00007fdfb7d82090 R08: 0000000000000000 R09: 0000000000000000 [ 72.821292][ T2151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 72.829105][ T2151] R13: 0000000000000000 R14: 00007fdfb92c0f80 R15: 00007ffc71252ee8 [ 72.836924][ T2151] [ 73.097046][ T2161] FAULT_INJECTION: forcing a failure. [ 73.097046][ T2161] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 73.152871][ T2161] CPU: 0 PID: 2161 Comm: syz.0.640 Not tainted 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 73.162781][ T2161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 73.172683][ T2161] Call Trace: [ 73.175804][ T2161] [ 73.178586][ T2161] dump_stack_lvl+0x151/0x1c0 [ 73.183363][ T2161] ? io_uring_drop_tctx_refs+0x190/0x190 [ 73.188908][ T2161] ? group_send_sig_info+0x1ba/0x460 [ 73.194205][ T2161] ? __lock_task_sighand+0x100/0x100 [ 73.199329][ T2161] dump_stack+0x15/0x20 [ 73.203496][ T2161] should_fail+0x3c6/0x510 [ 73.207759][ T2161] should_fail_usercopy+0x1a/0x20 [ 73.212754][ T2161] _copy_from_user+0x20/0xd0 [ 73.217191][ T2161] __sys_bpf+0x1e9/0x760 [ 73.221520][ T2161] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 73.226733][ T2161] ? debug_smp_processor_id+0x17/0x20 [ 73.232028][ T2161] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 73.238036][ T2161] __x64_sys_bpf+0x7c/0x90 [ 73.242290][ T2161] x64_sys_call+0x87f/0x9a0 [ 73.246635][ T2161] do_syscall_64+0x3b/0xb0 [ 73.251056][ T2161] ? clear_bhb_loop+0x35/0x90 [ 73.255569][ T2161] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 73.261304][ T2161] RIP: 0033:0x7f500072e719 [ 73.265552][ T2161] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 73.285254][ T2161] RSP: 002b:00007f4fff3a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 73.293497][ T2161] RAX: ffffffffffffffda RBX: 00007f50008e5f80 RCX: 00007f500072e719 [ 73.301310][ T2161] RDX: 0000000000000010 RSI: 00000000200002c0 RDI: 0000000000000011 [ 73.309124][ T2161] RBP: 00007f4fff3a7090 R08: 0000000000000000 R09: 0000000000000000 [ 73.316945][ T2161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 73.324835][ T2161] R13: 0000000000000000 R14: 00007f50008e5f80 R15: 00007ffc73fa13f8 [ 73.332755][ T2161] [ 74.114887][ T2191] device syzkaller0 entered promiscuous mode [ 74.165660][ T2199] syz.3.654[2199] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.180910][ T2199] syz.3.654[2199] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.646254][ T30] audit: type=1400 audit(1729842043.185:147): avc: denied { create } for pid=2209 comm="syz.4.658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 74.876156][ T2223] device veth1_macvtap left promiscuous mode [ 74.897800][ T2223] device macsec0 left promiscuous mode [ 75.776790][ T2117] syz.3.624 (2117) used greatest stack depth: 21720 bytes left [ 76.282372][ T2266] device veth1_macvtap left promiscuous mode [ 76.288419][ T2266] device macsec0 left promiscuous mode [ 77.457493][ T30] audit: type=1400 audit(1729842045.995:148): avc: denied { create } for pid=2305 comm="syz.0.694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 77.623471][ T2308] device veth1_macvtap entered promiscuous mode [ 77.779594][ T2308] device macsec0 entered promiscuous mode [ 77.864382][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 79.470257][ T2369] syz.3.717[2369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.470333][ T2369] syz.3.717[2369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.530090][ T2369] device pim6reg1 entered promiscuous mode [ 79.810542][ T2387] FAULT_INJECTION: forcing a failure. [ 79.810542][ T2387] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 79.831266][ T2387] CPU: 1 PID: 2387 Comm: syz.3.723 Not tainted 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 79.841171][ T2387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 79.851175][ T2387] Call Trace: [ 79.854293][ T2387] [ 79.857250][ T2387] dump_stack_lvl+0x151/0x1c0 [ 79.861776][ T2387] ? io_uring_drop_tctx_refs+0x190/0x190 [ 79.867324][ T2387] dump_stack+0x15/0x20 [ 79.871312][ T2387] should_fail+0x3c6/0x510 [ 79.875565][ T2387] should_fail_usercopy+0x1a/0x20 [ 79.880424][ T2387] copy_page_from_iter+0x2eb/0x640 [ 79.885372][ T2387] pipe_write+0x92b/0x1930 [ 79.889745][ T2387] ? pipe_read+0x1040/0x1040 [ 79.894165][ T2387] ? selinux_file_permission+0x450/0x570 [ 79.899633][ T2387] ? fsnotify_perm+0x6a/0x5b0 [ 79.904147][ T2387] ? iov_iter_init+0x53/0x190 [ 79.908748][ T2387] vfs_write+0xd5d/0x1110 [ 79.913014][ T2387] ? putname+0xfa/0x150 [ 79.917184][ T2387] ? file_end_write+0x1c0/0x1c0 [ 79.921965][ T2387] ? __fdget_pos+0x209/0x3a0 [ 79.926472][ T2387] ? ksys_write+0x77/0x2c0 [ 79.930720][ T2387] ksys_write+0x199/0x2c0 [ 79.934884][ T2387] ? __ia32_sys_read+0x90/0x90 [ 79.939494][ T2387] ? debug_smp_processor_id+0x17/0x20 [ 79.944887][ T2387] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 79.950994][ T2387] __x64_sys_write+0x7b/0x90 [ 79.955375][ T2387] x64_sys_call+0x2f/0x9a0 [ 79.959632][ T2387] do_syscall_64+0x3b/0xb0 [ 79.963879][ T2387] ? clear_bhb_loop+0x35/0x90 [ 79.968391][ T2387] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 79.974339][ T2387] RIP: 0033:0x7f451886a719 [ 79.979454][ T2387] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 79.999154][ T2387] RSP: 002b:00007f45174e3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 80.007396][ T2387] RAX: ffffffffffffffda RBX: 00007f4518a21f80 RCX: 00007f451886a719 [ 80.015204][ T2387] RDX: 00000000fffffdef RSI: 00000000200001c0 RDI: 0000000000000000 [ 80.023054][ T2387] RBP: 00007f45174e3090 R08: 0000000000000000 R09: 0000000000000000 [ 80.030841][ T2387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 80.038738][ T2387] R13: 0000000000000000 R14: 00007f4518a21f80 R15: 00007ffce4d1e0c8 [ 80.046822][ T2387] [ 80.243694][ T2400] device pim6reg1 entered promiscuous mode [ 80.752926][ T2410] device pim6reg1 entered promiscuous mode [ 81.549636][ T30] audit: type=1400 audit(1729842050.095:149): avc: denied { relabelfrom } for pid=2439 comm="syz.2.742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 81.582538][ T30] audit: type=1400 audit(1729842050.125:150): avc: denied { relabelto } for pid=2439 comm="syz.2.742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 81.631614][ T2451] ªªªªªª: renamed from vlan0 [ 81.737777][ T2460] FAULT_INJECTION: forcing a failure. [ 81.737777][ T2460] name failslab, interval 1, probability 0, space 0, times 0 [ 81.852628][ T2460] CPU: 0 PID: 2460 Comm: syz.0.750 Not tainted 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 81.862546][ T2460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 81.872722][ T2460] Call Trace: [ 81.875836][ T2460] [ 81.878614][ T2460] dump_stack_lvl+0x151/0x1c0 [ 81.883129][ T2460] ? io_uring_drop_tctx_refs+0x190/0x190 [ 81.888610][ T2460] dump_stack+0x15/0x20 [ 81.892636][ T2460] should_fail+0x3c6/0x510 [ 81.896845][ T2460] __should_failslab+0xa4/0xe0 [ 81.901616][ T2460] ? sk_prot_alloc+0x5f/0x330 [ 81.906477][ T2460] should_failslab+0x9/0x20 [ 81.910814][ T2460] slab_pre_alloc_hook+0x37/0xd0 [ 81.915736][ T2460] ? sk_prot_alloc+0x5f/0x330 [ 81.920442][ T2460] kmem_cache_alloc+0x44/0x200 [ 81.925231][ T2460] sk_prot_alloc+0x5f/0x330 [ 81.929707][ T2460] sk_alloc+0x38/0x430 [ 81.933609][ T2460] ? security_inode_alloc+0xc0/0x120 [ 81.938752][ T2460] inet6_create+0x6c4/0x1120 [ 81.943163][ T2460] __sock_create+0x3a6/0x760 [ 81.947589][ T2460] __sys_socketpair+0x313/0x6e0 [ 81.952273][ T2460] ? __ia32_sys_socket+0x90/0x90 [ 81.957044][ T2460] ? __ia32_sys_read+0x90/0x90 [ 81.961648][ T2460] ? debug_smp_processor_id+0x17/0x20 [ 81.966854][ T2460] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 81.972774][ T2460] __x64_sys_socketpair+0x9b/0xb0 [ 81.977622][ T2460] x64_sys_call+0x19b/0x9a0 [ 81.981971][ T2460] do_syscall_64+0x3b/0xb0 [ 81.986296][ T2460] ? clear_bhb_loop+0x35/0x90 [ 81.991074][ T2460] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 81.996972][ T2460] RIP: 0033:0x7f500072e719 [ 82.001287][ T2460] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 82.021625][ T2460] RSP: 002b:00007f4fff3a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 82.030581][ T2460] RAX: ffffffffffffffda RBX: 00007f50008e5f80 RCX: 00007f500072e719 [ 82.038439][ T2460] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000000a [ 82.046207][ T2460] RBP: 00007f4fff3a7090 R08: 0000000000000000 R09: 0000000000000000 [ 82.054013][ T2460] R10: 0000000020000180 R11: 0000000000000246 R12: 0000000000000001 [ 82.061828][ T2460] R13: 0000000000000000 R14: 00007f50008e5f80 R15: 00007ffc73fa13f8 [ 82.069725][ T2460] [ 82.484123][ T2487] FAULT_INJECTION: forcing a failure. [ 82.484123][ T2487] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 82.507726][ T2487] CPU: 1 PID: 2487 Comm: syz.0.760 Not tainted 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 82.517995][ T2487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 82.528442][ T2487] Call Trace: [ 82.531736][ T2487] [ 82.534612][ T2487] dump_stack_lvl+0x151/0x1c0 [ 82.539385][ T2487] ? io_uring_drop_tctx_refs+0x190/0x190 [ 82.544930][ T2487] dump_stack+0x15/0x20 [ 82.549103][ T2487] should_fail+0x3c6/0x510 [ 82.553776][ T2487] should_fail_usercopy+0x1a/0x20 [ 82.558641][ T2487] _copy_from_user+0x20/0xd0 [ 82.563069][ T2487] generic_map_update_batch+0x4ef/0x860 [ 82.568542][ T2487] ? generic_map_delete_batch+0x5f0/0x5f0 [ 82.574092][ T2487] ? generic_map_delete_batch+0x5f0/0x5f0 [ 82.579643][ T2487] bpf_map_do_batch+0x4c3/0x620 [ 82.584335][ T2487] __sys_bpf+0x5dc/0x760 [ 82.588417][ T2487] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 82.593627][ T2487] ? debug_smp_processor_id+0x17/0x20 [ 82.598829][ T2487] __x64_sys_bpf+0x7c/0x90 [ 82.603080][ T2487] x64_sys_call+0x87f/0x9a0 [ 82.607420][ T2487] do_syscall_64+0x3b/0xb0 [ 82.611772][ T2487] ? clear_bhb_loop+0x35/0x90 [ 82.616448][ T2487] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 82.622275][ T2487] RIP: 0033:0x7f500072e719 [ 82.626572][ T2487] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 82.645965][ T2487] RSP: 002b:00007f4fff3a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 82.654292][ T2487] RAX: ffffffffffffffda RBX: 00007f50008e5f80 RCX: 00007f500072e719 [ 82.662108][ T2487] RDX: 0000000000000038 RSI: 00000000200004c0 RDI: 000000000000001a [ 82.669928][ T2487] RBP: 00007f4fff3a7090 R08: 0000000000000000 R09: 0000000000000000 [ 82.677853][ T2487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 82.685665][ T2487] R13: 0000000000000000 R14: 00007f50008e5f80 R15: 00007ffc73fa13f8 [ 82.693837][ T2487] [ 82.957355][ T2512] FAULT_INJECTION: forcing a failure. [ 82.957355][ T2512] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 82.994048][ T2512] CPU: 1 PID: 2512 Comm: syz.2.769 Not tainted 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 83.004050][ T2512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 83.014117][ T2512] Call Trace: [ 83.017334][ T2512] [ 83.020098][ T2512] dump_stack_lvl+0x151/0x1c0 [ 83.024937][ T2512] ? io_uring_drop_tctx_refs+0x190/0x190 [ 83.030431][ T2512] ? kstrtouint_from_user+0x20a/0x2a0 [ 83.035645][ T2512] dump_stack+0x15/0x20 [ 83.039642][ T2512] should_fail+0x3c6/0x510 [ 83.043893][ T2512] should_fail_usercopy+0x1a/0x20 [ 83.048753][ T2512] _copy_to_user+0x20/0x90 [ 83.052998][ T2512] simple_read_from_buffer+0xc7/0x150 [ 83.058214][ T2512] proc_fail_nth_read+0x1a3/0x210 [ 83.063162][ T2512] ? proc_fault_inject_write+0x390/0x390 [ 83.068626][ T2512] ? fsnotify_perm+0x269/0x5b0 [ 83.073309][ T2512] ? security_file_permission+0x86/0xb0 [ 83.078789][ T2512] ? proc_fault_inject_write+0x390/0x390 [ 83.084267][ T2512] vfs_read+0x27d/0xd40 [ 83.088248][ T2512] ? kernel_read+0x1f0/0x1f0 [ 83.092682][ T2512] ? __kasan_check_write+0x14/0x20 [ 83.097623][ T2512] ? mutex_lock+0xb6/0x1e0 [ 83.102137][ T2512] ? wait_for_completion_killable_timeout+0x10/0x10 [ 83.108606][ T2512] ? __fdget_pos+0x2e7/0x3a0 [ 83.112990][ T2512] ? ksys_read+0x77/0x2c0 [ 83.117154][ T2512] ksys_read+0x199/0x2c0 [ 83.121419][ T2512] ? vfs_write+0x1110/0x1110 [ 83.125921][ T2512] ? debug_smp_processor_id+0x17/0x20 [ 83.131608][ T2512] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 83.137515][ T2512] __x64_sys_read+0x7b/0x90 [ 83.141853][ T2512] x64_sys_call+0x28/0x9a0 [ 83.146195][ T2512] do_syscall_64+0x3b/0xb0 [ 83.150542][ T2512] ? clear_bhb_loop+0x35/0x90 [ 83.155227][ T2512] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 83.160947][ T2512] RIP: 0033:0x7fdfb910815c [ 83.165468][ T2512] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 83.185076][ T2512] RSP: 002b:00007fdfb7d82030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 83.193325][ T2512] RAX: ffffffffffffffda RBX: 00007fdfb92c0f80 RCX: 00007fdfb910815c [ 83.201227][ T2512] RDX: 000000000000000f RSI: 00007fdfb7d820a0 RDI: 0000000000000005 [ 83.209122][ T2512] RBP: 00007fdfb7d82090 R08: 0000000000000000 R09: 0000000000000000 [ 83.216932][ T2512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 83.224751][ T2512] R13: 0000000000000000 R14: 00007fdfb92c0f80 R15: 00007ffc71252ee8 [ 83.232578][ T2512] [ 108.560180][ T287] syz-executor (287) used greatest stack depth: 20512 bytes left [ 108.659965][ T2564] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.666819][ T2564] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.674522][ T2564] device bridge_slave_0 entered promiscuous mode [ 108.681541][ T2564] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.688484][ T2564] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.696292][ T2564] device bridge_slave_1 entered promiscuous mode [ 108.727056][ T2561] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.734180][ T2561] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.741697][ T2561] device bridge_slave_0 entered promiscuous mode [ 108.757940][ T2561] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.765006][ T2561] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.772220][ T2561] device bridge_slave_1 entered promiscuous mode [ 108.837941][ T2563] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.844919][ T2563] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.852468][ T2563] device bridge_slave_0 entered promiscuous mode [ 108.861199][ T2562] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.868305][ T2562] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.875819][ T2562] device bridge_slave_0 entered promiscuous mode [ 108.884682][ T2563] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.891798][ T2563] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.899594][ T2563] device bridge_slave_1 entered promiscuous mode [ 108.909600][ T2562] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.916442][ T2562] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.923627][ T2562] device bridge_slave_1 entered promiscuous mode [ 108.952815][ T2565] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.959894][ T2565] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.967228][ T2565] device bridge_slave_0 entered promiscuous mode [ 108.984582][ T2565] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.991606][ T2565] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.998892][ T2565] device bridge_slave_1 entered promiscuous mode [ 109.163332][ T2564] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.170371][ T2564] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.177434][ T2564] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.184629][ T2564] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.200928][ T422] device veth1_macvtap left promiscuous mode [ 109.233222][ T2563] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.240102][ T2563] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.247618][ T2563] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.254440][ T2563] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.269431][ T2561] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.276586][ T2561] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.284243][ T2561] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.291198][ T2561] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.325769][ T2562] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.333027][ T2562] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.340231][ T2562] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.347386][ T2562] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.358199][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.366533][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.373845][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.381137][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.388223][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.396445][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.403456][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.410546][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.417541][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.442148][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.450207][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.457113][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.466357][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.474493][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.481511][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.497968][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.520464][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.554761][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.563438][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.571850][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.578794][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.586159][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.594500][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.602806][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.609816][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.616945][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.625244][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.633210][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.640738][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.649294][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.657531][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.665975][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.672818][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.680451][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 109.688345][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 109.695979][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 109.704125][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 109.712109][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 109.720371][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 109.743887][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 109.751945][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 109.760376][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 109.767996][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.775561][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.783796][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.792009][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.799032][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.806486][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.814770][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.822962][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.829986][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.837234][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 109.844820][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.852200][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.860287][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.868428][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.875294][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.882445][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 109.890679][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.898831][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.907533][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.914404][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.921666][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 109.930049][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 109.938359][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 109.946363][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 109.957466][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 109.965424][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 109.984708][ T2564] device veth0_vlan entered promiscuous mode [ 109.992920][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 110.001393][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 110.009478][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 110.017600][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 110.025611][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 110.033030][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 110.044538][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 110.056902][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 110.065407][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 110.087739][ T2563] device veth0_vlan entered promiscuous mode [ 110.101497][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 110.109946][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 110.117684][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 110.125107][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 110.133129][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 110.141607][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 110.149750][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 110.157490][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 110.165328][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 110.176978][ T2565] device veth0_vlan entered promiscuous mode [ 110.184556][ T2564] device veth1_macvtap entered promiscuous mode [ 110.192222][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 110.200209][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 110.207432][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 110.215160][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 110.223226][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 110.231215][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 110.238738][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 110.254886][ T2561] device veth0_vlan entered promiscuous mode [ 110.274291][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 110.288167][ T2565] device veth1_macvtap entered promiscuous mode [ 110.297650][ T2562] device veth0_vlan entered promiscuous mode [ 110.304394][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 110.312823][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 110.321119][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 110.329963][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 110.337905][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 110.345510][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 110.364391][ T2563] device veth1_macvtap entered promiscuous mode [ 110.376162][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 110.384456][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 110.392767][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 110.407701][ T2562] device veth1_macvtap entered promiscuous mode [ 110.420750][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 110.429672][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 110.437671][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 110.445870][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 110.454249][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 110.462765][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 110.470923][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 110.479540][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 110.489466][ T30] audit: type=1400 audit(1729842079.035:151): avc: denied { mounton } for pid=2564 comm="syz-executor" path="/root/syzkaller.nmpMp1/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 110.516786][ T2561] device veth1_macvtap entered promiscuous mode [ 110.524449][ T30] audit: type=1400 audit(1729842079.035:152): avc: denied { mount } for pid=2564 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 110.546771][ T30] audit: type=1400 audit(1729842079.065:153): avc: denied { mounton } for pid=2564 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 110.572597][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 110.581069][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 110.621924][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 110.630271][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 110.638407][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 110.648921][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 110.696315][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 110.708705][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 110.721847][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 110.730750][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 110.890873][ T2600] device syzkaller0 entered promiscuous mode [ 111.230307][ T422] device bridge_slave_1 left promiscuous mode [ 111.236466][ T422] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.244248][ T422] device bridge_slave_0 left promiscuous mode [ 111.250295][ T422] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.258723][ T422] device bridge_slave_1 left promiscuous mode [ 111.265185][ T422] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.272745][ T422] device bridge_slave_0 left promiscuous mode [ 111.278774][ T422] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.290552][ T422] device bridge_slave_1 left promiscuous mode [ 111.296522][ T422] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.304202][ T422] device bridge_slave_0 left promiscuous mode [ 111.310469][ T422] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.319705][ T422] device veth1_macvtap left promiscuous mode [ 111.326504][ T422] device veth1_macvtap left promiscuous mode [ 111.332844][ T422] device veth1_macvtap left promiscuous mode [ 112.362956][ T30] audit: type=1400 audit(1729842080.905:154): avc: denied { append } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 112.385415][ T30] audit: type=1400 audit(1729842080.905:155): avc: denied { open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 112.408367][ T30] audit: type=1400 audit(1729842080.905:156): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 113.430272][ T422] device bridge_slave_1 left promiscuous mode [ 113.436316][ T422] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.443613][ T422] device bridge_slave_0 left promiscuous mode [ 113.449682][ T422] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.457058][ T422] device bridge_slave_1 left promiscuous mode [ 113.463145][ T422] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.470625][ T422] device bridge_slave_0 left promiscuous mode [ 113.476941][ T422] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.485239][ T422] device bridge_slave_1 left promiscuous mode [ 113.491221][ T422] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.498510][ T422] device bridge_slave_0 left promiscuous mode [ 113.504969][ T422] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.512702][ T422] device bridge_slave_1 left promiscuous mode [ 113.518609][ T422] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.526158][ T422] device bridge_slave_0 left promiscuous mode [ 113.532307][ T422] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.540250][ T422] device bridge_slave_1 left promiscuous mode [ 113.546163][ T422] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.553832][ T422] device bridge_slave_0 left promiscuous mode [ 113.559853][ T422] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.567977][ T422] device veth1_macvtap left promiscuous mode [ 113.573885][ T422] device veth0_vlan left promiscuous mode [ 113.579468][ T422] device veth1_macvtap left promiscuous mode [ 113.585245][ T422] device veth0_vlan left promiscuous mode [ 113.591028][ T422] device veth1_macvtap left promiscuous mode [ 113.596840][ T422] device veth0_vlan left promiscuous mode [ 113.602631][ T422] device veth1_macvtap left promiscuous mode [ 113.608529][ T422] device veth0_vlan left promiscuous mode [ 113.614457][ T422] device veth1_macvtap left promiscuous mode [ 113.620310][ T422] device veth0_vlan left promiscuous mode