last executing test programs: 18.624732305s ago: executing program 3 (id=802): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x0, 0x5}, 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_es_lookup_extent_exit\x00'}, 0x10) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) (async, rerun: 64) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000080), 0x0}, 0x20) (async, rerun: 64) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_service_bytes\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) (async, rerun: 64) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x8001, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4}, 0x0, 0x2000, 0xffffffffffffffff, 0x0) (async) close(0xffffffffffffffff) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x3, &(0x7f0000001400)=ANY=[@ANYBLOB="18000000000000000000002e080000009500000000000000"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x37, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x90) (async, rerun: 32) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x20001400) (rerun: 32) 18.285803843s ago: executing program 3 (id=809): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000800)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) 15.793804789s ago: executing program 3 (id=809): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000800)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) 11.41346046s ago: executing program 3 (id=809): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000800)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) 7.342663425s ago: executing program 3 (id=809): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000800)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) 3.858088112s ago: executing program 3 (id=809): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000800)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000790000000000000018000000000000000000000000000000950000000000000005000000000000009500000000000000f9e3d2fb113f53c361c3543f7b67d987480a053481c2c608d406cdeec27156b8d8a304b5632dc50faf46fc7e7d67f830178cf5478f1aba0799450e38e040300200000000000000bec422c2cc5e56be4599b03ba228fe302239966a8910c72235507355f460e1148a8521ade6ce0379a5643fc8f66dd138a02c5418352bcf6694070a1c9aa56c457cb4f97be7a2c0f6ac7e8b3e7e422c0580904e0d657a2f47310d291ea2171daf6c734fa2cf7ec5599cf24cbc1cb463ee40aaf1de8262c1dd3eccd7406fa25fed928e835fb105c7f3925a2afa9eb3283fef94aa33078da4d1e921e54da61ce3e26a"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) 3.337662325s ago: executing program 0 (id=922): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400e900b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='fib6_table_lookup\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x11c0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x91a0166ad5a52b64) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@bloom_filter={0x1e, 0x8, 0x2, 0x0, 0x140, 0xffffffffffffffff, 0x33, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x0, 0xf}, 0x48) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x40}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xa) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r4, &(0x7f0000000000), 0xfffffd26) 2.466311397s ago: executing program 0 (id=928): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@int={0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x0, 0x3}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x4, 0x4}]}]}, {0x0, [0x0, 0x0, 0xda]}}, &(0x7f0000000340)=""/142, 0x45, 0x8e}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000680), 0x8) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0xf, &(0x7f0000000d80)=ANY=[@ANYBLOB="1808000000000000000000090000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000062000000bc0900000000000035090100000000009500000000000000bf4800000000000056080000000000008500000000000000b7000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x17, 0x10, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@call={0x85, 0x0, 0x0, 0xd3}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000480)='GPL\x00', 0xfff, 0xe9, &(0x7f00000004c0)=""/233, 0x41000, 0x40, '\x00', 0x0, 0x28, r1, 0x8, &(0x7f00000006c0), 0x8, 0x10, &(0x7f0000000700)={0x5, 0xb, 0x7}, 0x10, 0x0, r2, 0x3, &(0x7f0000000ac0)=[0xffffffffffffffff], &(0x7f0000000b00)=[{0x0, 0x2, 0x8, 0x1}, {0x1, 0x2, 0xe}, {0x2, 0x0, 0x10, 0x9}], 0x10, 0x9}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/pid\x00') socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r4) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70200000000f400850000008600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) write$cgroup_subtree(r8, &(0x7f0000000000), 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x4, &(0x7f0000001640)=ANY=[@ANYRES16], 0x0, 0x5539, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f56f67987999b94, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffc}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001180)) 2.176937881s ago: executing program 4 (id=931): perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x47, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000400)='cpu&-0\t&&') r1 = perf_event_open(&(0x7f0000001040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{0x1, 0xffffffffffffffff}, &(0x7f0000000380), 0x0}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x0, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="0700000000000000000000020000000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085100000f8ffffff18680000050000000000000002000000428000000100000018240000", @ANYRES32, @ANYBLOB="00000000ff030000d90d000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000700)='GPL\x00', 0x7fff, 0xe7, &(0x7f0000000740)=""/231, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000840)={0x2, 0xd, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f00000008c0)=[{0x0, 0x0, 0x1}], 0x10, 0x9}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x17}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x80) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000e80)=0xffffffffffffffff, 0x4) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000f80)=@generic={&(0x7f0000000f40)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000010c0)={0x11, 0x11, &(0x7f0000000b00)=ANY=[@ANYBLOB="180000003f000000000000000204000300110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000002000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x5602, 0xea, &(0x7f0000000c00)=""/234, 0x41100, 0x1, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000ec0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000f00)={0x4, 0xf, 0xffffff01, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000fc0)=[r7, r5, r4, r4, r4, r3], 0x0, 0x10, 0x7ff}, 0x90) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001000)='cgroup.threads\x00', 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0xffd, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1b}, {{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6, 0x2, 0x0, r8}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.176461851s ago: executing program 0 (id=932): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000e000001000000000000000007010000080700007500fcff0000000095000000d3031a00041f8ea47c2eb2b7639c2ad3a4c89eb40634ab9b5ade7978eb59ff70cd62adbe9c31865cf39dc9e93813d9433f34dad576b1897b3533f883f9e873d9c435ab89afdd4ff0c24c0053f1721e9dc694f461734e10ea76584696317ca540336bc0e60e7d6d44484e01102b1c830d2630c3932755946ba8848b0d93caec1f4d89f99dcd2e9cb4d3646bc48d7ece5cbb87cdd67955cf5c813c05411a276d6afe065ac5849c64aebf30294fc59168bcb9a25164a1826a81cf45e576ef4dd94e292cbbf69d0787fa4b596ce132d7e976b136871cebb77ad2e34ffcf52557e6a0403769815ed13ca7b6c9f2fd7d11461997a57b35715cee9809008af9df0690f5d42d2e0f2d967aa4bc96a7d4b343411ef4d962699ffc5c434cf53339430fe9d668405875e14bea5c4aea70b9de7b9fb36561bdc896a0cc666f0d9b49832984ed9effda637edfb97defbd3219055f5a7ee877c79ec93133f0109e9746acd0cba749390a9b575a129f1838688c21ea8db8"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x2000}, 0x23) 1.840631539s ago: executing program 1 (id=934): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000008007b8af8ff00000000bfa200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9febd6e618000000000000002400000024000000030000003d0018270691b082ab8b6e2f00"], &(0x7f0000000440)=""/130, 0x3f, 0x82, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x9, 0x1}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x1, 0x4, 0x4, 0x8, 0x1}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x0, r2}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x5, &(0x7f00000000c0)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x79, 0x10, 0xa8}, [@map_fd={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001400a685b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000005c0), 0x6, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r6}, 0x10) 1.650811864s ago: executing program 4 (id=935): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000008007b8af8ff00000000bfa200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9febd6e618000000000000002400000024000000030000003d0018270691b082ab8b6e2f00"], &(0x7f0000000440)=""/130, 0x3f, 0x82, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x9, 0x1}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x1, 0x4, 0x4, 0x8, 0x1}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x0, r2}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x5, &(0x7f00000000c0)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x79, 0x10, 0xa8}, [@map_fd={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001400a685b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000005c0), 0x6, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r6}, 0x10) 1.389914746s ago: executing program 2 (id=936): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000080)) 1.358888608s ago: executing program 2 (id=937): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xb, &(0x7f0000000500)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x700}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={0x0}, 0x10) 1.307321453s ago: executing program 1 (id=938): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xb, &(0x7f0000000500)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x700}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={0x0}, 0x10) 1.253815217s ago: executing program 0 (id=939): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffee6, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f0000000080)) 1.252927787s ago: executing program 4 (id=940): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000008007b8af8ff00000000bfa200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9febd6e618000000000000002400000024000000030000003d0018270691b082ab8b6e2f00"], &(0x7f0000000440)=""/130, 0x3f, 0x82, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x9, 0x1}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x1, 0x4, 0x4, 0x8, 0x1}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x0, r2}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x5, &(0x7f00000000c0)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x79, 0x10, 0xa8}, [@map_fd={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001400a685b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000005c0), 0x6, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r6}, 0x10) 1.165079304s ago: executing program 0 (id=941): perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x25}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000540)={r2, r1}, 0xc) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000e5850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840), 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x0, 0x80f, 0x0, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x810100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="b40500000000edfff1107b000000000066000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) 886.918507ms ago: executing program 2 (id=942): perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x25}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000540)={r2, r1}, 0xc) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000e5850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840), 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x0, 0x80f, 0x0, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x810100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="b40500000000edfff1107b000000000066000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) 640.100238ms ago: executing program 1 (id=943): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) 418.394535ms ago: executing program 1 (id=944): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x6f, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000b98cad95850000000300000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000000000c50000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) sendmsg$unix(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x8}, 0x48) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0x2}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x18, 0x5, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000000079100000000000006300e0ff0000000095000000000000005842adc8a0fe04e538050999fc973f6fbdbbbaceaf36a20cb40ee3bf32fd6f86c1784388b85300cc8db37b1f5fb7dcceee30181489b4d45a06f8dce87e2987a7f9a16b33447efe245c51f7508244ddcd30d8c854d955dd7bfe4c56fb5acc92dc627e289521ec4e54da6b9c16660d9510c2303c7ca17aae738cd321"], &(0x7f0000000100)='GPL\x00', 0xb}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) 401.215247ms ago: executing program 2 (id=945): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 358.13643ms ago: executing program 2 (id=946): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x2000000000000000, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@bloom_filter={0x1e, 0x1, 0x8, 0x10001, 0x482, r0, 0xedde, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x2, 0xe}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d40)={0x11, 0x15, &(0x7f0000000a40)=@raw=[@printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xfffff454}, @generic={0x7, 0xb, 0x3, 0x7, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffc018}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f0000000b40)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x30, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x3, 0x7, 0xd}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000cc0)=[r0, r0, r2], &(0x7f0000000d00)=[{0x2, 0x3, 0x6, 0xa}, {0x3, 0x5, 0xb}, {0x2, 0x3, 0xa, 0xc}, {0x2, 0x4, 0x8, 0x1}], 0x10, 0x9}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x7, 0xfff}, 0x18) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xff86, &(0x7f0000000f00)='\xe7\xce\x99\x8cW4\xb4\x7fG\xaf\x9a;G\xec,((8\x02\xd1\xfb\x88\xd5\x98\xd5\xbay\xcf\x82\x97\x92\x11\x06\xdf\x8f\x8f\xe0\xee\xd9\x9c\xffc\xebN\x03oS\xf0R\xa7R\xf0*\xdc\xdf\xc0\xfa;=j\xf8`\xe6\xe2\xac\xa3\xe8\xf74\x1ag\xb2\x82\x05\xd2l\xc3\xc6\xcb\x0fuI\xa3X=L\x8b\x8c\x01J9)\x04~\x83\xef?\xd8\x8bHKR<\xf1\xe1\xa3R\x9dC\xad\x14\xce\x12\xcc\x91\xc79\xf02\x13\xfa\xa9C\x04d\xa9\xf5\xae\x9b(\x84\xff.\"\xb5A\xbb\xa8*\x8fr\xd7\xbe\xe0z\x95\xcd\xcb\xc4\xd1\xdab\x15,\xed\x03\xee\x84\xf9xq\xef\xafbJFm\xc7\x90U FI\xb2+FaQ^*\xee\x1c\xaa\x18\x1fE\x1a\x108\xadG\xc6\xc9\xc0\x04$\a\xb5H\xd7\xec\xfbD\x92G\xa87\xd9\xddG\x83\xb4\x03\xb8\xe3d'}, 0x30) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) write$cgroup_subtree(r7, &(0x7f00000001c0)=ANY=[@ANYBLOB="2d7f707520"], 0x5) r8 = openat$cgroup_type(r5, &(0x7f0000000040), 0x2, 0x0) write$cgroup_type(r8, &(0x7f0000000080), 0x9) syz_clone(0x24001100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000980), 0x40, 0x0) getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/pid\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r4, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000540)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000b80)=[0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xab, &(0x7f0000000600)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0xca, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0xd, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="180000000700000000000000f7ffffff18110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000819280000400000018480000fcffffff000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000000000008500000086ce01c1dbd342d582c7cb8b000000bf91000000000000b7020000020000008500000084000000b70000000000000095e2ff0000000000b66f03470189efb9ad4ac56c8683a2a7cc7ad981252c4de3c9558fbd2dc26c26bbf097bbd415d2c0374bd5f2c6a5f557229199549be93dd9ad0eaf9a54826b6589f991966e3bc08a8895ac180217c7d7c2c0c9e6cc0cebf17a7014049b9ebdc66e7f3845ad8782ad5afbfe031e66702aaa36cba8a6ce00603149b704e717ba9cad9f812a1636c96438477d9fe0c0f0cf1a3b5c91fad94a"], &(0x7f0000000340)='GPL\x00', 0x1, 0xb7, &(0x7f0000000380)=""/183, 0x40f00, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0x9, 0x7de, 0x10000}, 0x10, r9, r1, 0x1, &(0x7f0000000840)=[r3], &(0x7f0000000880)=[{0x4, 0x5, 0xb, 0x3}], 0x10, 0x3}, 0x90) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) recvmsg(r10, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x1800000000000000) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 355.464221ms ago: executing program 4 (id=947): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200000100", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) sendmsg$unix(r4, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 310.152394ms ago: executing program 1 (id=948): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000000000000000001811", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 259.278659ms ago: executing program 4 (id=949): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x5, 0x2, 0x7}, 0x48) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x6f, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000b98cad95850000000300000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000000000c50000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0), 0x4) sendmsg$unix(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x8}, 0x48) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0x2}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x18, 0x5, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000000079100000000000006300e0ff0000000095000000000000005842adc8a0fe04e538050999fc973f6fbdbbbaceaf36a20cb40ee3bf32fd6f86c1784388b85300cc8db37b1f5fb7dcceee30181489b4d45a06f8dce87e2987a7f9a16b33447efe245c51f7508244ddcd30d8c854d955dd7bfe4c56fb5acc92dc627e289521ec4e54da6b9c16660d9510c2303c7ca17aae738cd321"], &(0x7f0000000100)='GPL\x00', 0xb}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) 258.194919ms ago: executing program 1 (id=950): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x3, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r2, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc7, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0xcf, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES64=r2, @ANYRES64=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 190.706304ms ago: executing program 4 (id=951): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x2000000000000000, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@bloom_filter={0x1e, 0x1, 0x8, 0x10001, 0x482, r0, 0xedde, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x2, 0xe}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d40)={0x11, 0x15, &(0x7f0000000a40)=@raw=[@printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xfffff454}, @generic={0x7, 0xb, 0x3, 0x7, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffc018}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f0000000b40)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x3, 0x7, 0xd}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000cc0)=[r0, r0, r2], &(0x7f0000000d00)=[{0x2, 0x3, 0x6, 0xa}, {0x3, 0x5, 0xb}, {0x2, 0x3, 0xa, 0xc}, {0x2, 0x4, 0x8, 0x1}], 0x10, 0x9}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x7, 0xfff}, 0x18) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xff86, &(0x7f0000000f00)='\xe7\xce\x99\x8cW4\xb4\x7fG\xaf\x9a;G\xec,((8\x02\xd1\xfb\x88\xd5\x98\xd5\xbay\xcf\x82\x97\x92\x11\x06\xdf\x8f\x8f\xe0\xee\xd9\x9c\xffc\xebN\x03oS\xf0R\xa7R\xf0*\xdc\xdf\xc0\xfa;=j\xf8`\xe6\xe2\xac\xa3\xe8\xf74\x1ag\xb2\x82\x05\xd2l\xc3\xc6\xcb\x0fuI\xa3X=L\x8b\x8c\x01J9)\x04~\x83\xef?\xd8\x8bHKR<\xf1\xe1\xa3R\x9dC\xad\x14\xce\x12\xcc\x91\xc79\xf02\x13\xfa\xa9C\x04d\xa9\xf5\xae\x9b(\x84\xff.\"\xb5A\xbb\xa8*\x8fr\xd7\xbe\xe0z\x95\xcd\xcb\xc4\xd1\xdab\x15,\xed\x03\xee\x84\xf9xq\xef\xafbJFm\xc7\x90U FI\xb2+FaQ^*\xee\x1c\xaa\x18\x1fE\x1a\x108\xadG\xc6\xc9\xc0\x04$\a\xb5H\xd7\xec\xfbD\x92G\xa87\xd9\xddG\x83\xb4\x03\xb8\xe3d'}, 0x30) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) write$cgroup_subtree(r7, &(0x7f00000001c0)=ANY=[@ANYBLOB="2d7f707520"], 0x5) r8 = openat$cgroup_type(r5, &(0x7f0000000040), 0x2, 0x0) write$cgroup_type(r8, &(0x7f0000000080), 0x9) syz_clone(0x24001100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000980), 0x40, 0x0) getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/pid\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r4, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000540)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000b80)=[0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xab, &(0x7f0000000600)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0xca, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0xd, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="180000000700000000000000f7ffffff18110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000819280000400000018480000fcffffff000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000000000008500000086ce01c1dbd342d582c7cb8b000000bf91000000000000b7020000020000008500000084000000b70000000000000095e2ff0000000000b66f03470189efb9ad4ac56c8683a2a7cc7ad981252c4de3c9558fbd2dc26c26bbf097bbd415d2c0374bd5f2c6a5f557229199549be93dd9ad0eaf9a54826b6589f991966e3bc08a8895ac180217c7d7c2c0c9e6cc0cebf17a7014049b9ebdc66e7f3845ad8782ad5afbfe031e66702aaa36cba8a6ce00603149b704e717ba9cad9f812a1636c96438477d9fe0c0f0cf1a3b5c91fad94a"], &(0x7f0000000340)='GPL\x00', 0x1, 0xb7, &(0x7f0000000380)=""/183, 0x40f00, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0x9, 0x7de, 0x10000}, 0x10, r9, r1, 0x1, &(0x7f0000000840)=[r3], &(0x7f0000000880)=[{0x4, 0x5, 0xb, 0x3}], 0x10, 0x3}, 0x90) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) recvmsg(r10, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x1800000000000000) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 66.052705ms ago: executing program 0 (id=952): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r2}, &(0x7f0000000040), &(0x7f0000000140)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_freezer_state(r0, &(0x7f0000000380), 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = openat$cgroup_freezer_state(r0, &(0x7f0000002b00), 0x2, 0x0) close(r4) 0s ago: executing program 2 (id=953): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000008007b8af8ff00000000bfa200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9febd6e618000000000000002400000024000000030000003d0018270691b082ab8b6e2f00"], &(0x7f0000000440)=""/130, 0x3f, 0x82, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x9, 0x1}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x1, 0x4, 0x4, 0x8, 0x1}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x0, r2}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x5, &(0x7f00000000c0)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x79, 0x10, 0xa8}, [@map_fd={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) close(r4) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001400a685b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000005c0), 0x6, r6}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r7}, 0x10) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.213' (ED25519) to the list of known hosts. [ 21.246160][ T30] audit: type=1400 audit(1721865335.332:66): avc: denied { integrity } for pid=280 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 21.269791][ T30] audit: type=1400 audit(1721865335.362:67): avc: denied { mounton } for pid=280 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.271635][ T280] cgroup: Unknown subsys name 'net' [ 21.292333][ T30] audit: type=1400 audit(1721865335.362:68): avc: denied { mount } for pid=280 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.319254][ T30] audit: type=1400 audit(1721865335.392:69): avc: denied { unmount } for pid=280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.319464][ T280] cgroup: Unknown subsys name 'devices' [ 21.429185][ T280] cgroup: Unknown subsys name 'hugetlb' [ 21.434584][ T280] cgroup: Unknown subsys name 'rlimit' [ 21.626492][ T30] audit: type=1400 audit(1721865335.712:70): avc: denied { setattr } for pid=280 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.649830][ T30] audit: type=1400 audit(1721865335.712:71): avc: denied { mounton } for pid=280 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.674323][ T30] audit: type=1400 audit(1721865335.712:72): avc: denied { mount } for pid=280 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.680819][ T283] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 21.705894][ T30] audit: type=1400 audit(1721865335.792:73): avc: denied { relabelto } for pid=283 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.731181][ T30] audit: type=1400 audit(1721865335.792:74): avc: denied { write } for pid=283 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.759881][ T30] audit: type=1400 audit(1721865335.852:75): avc: denied { read } for pid=280 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.760619][ T280] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.279287][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.286227][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.293474][ T291] device bridge_slave_0 entered promiscuous mode [ 22.309207][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.316039][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.323313][ T289] device bridge_slave_0 entered promiscuous mode [ 22.329759][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.336589][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.343927][ T291] device bridge_slave_1 entered promiscuous mode [ 22.357155][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.363977][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.371205][ T289] device bridge_slave_1 entered promiscuous mode [ 22.449301][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.456159][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.463389][ T290] device bridge_slave_0 entered promiscuous mode [ 22.474608][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.481631][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.488881][ T292] device bridge_slave_0 entered promiscuous mode [ 22.499075][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.505906][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.513120][ T290] device bridge_slave_1 entered promiscuous mode [ 22.525809][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.532947][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.540163][ T292] device bridge_slave_1 entered promiscuous mode [ 22.546449][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.553327][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.560505][ T293] device bridge_slave_0 entered promiscuous mode [ 22.567162][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.573991][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.581222][ T293] device bridge_slave_1 entered promiscuous mode [ 22.749948][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.756876][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.764031][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.770788][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.779445][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.786285][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.793415][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.800187][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.818240][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.825170][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.832297][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.839089][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.855648][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.862504][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.869612][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.876376][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.886415][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.893257][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.900356][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.907164][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.945956][ T63] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.953396][ T63] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.960437][ T63] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.968141][ T63] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.975052][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.982540][ T63] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.989544][ T63] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.996622][ T63] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.003751][ T63] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.010932][ T63] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.017984][ T63] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.047922][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.056075][ T42] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.062942][ T42] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.070107][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.078613][ T42] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.085444][ T42] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.110441][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.119616][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.126813][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.134102][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.142051][ T42] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.148891][ T42] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.156023][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.163978][ T42] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.170834][ T42] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.178040][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.185297][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.192608][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.200584][ T42] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.207593][ T42] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.214869][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.222877][ T42] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.229710][ T42] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.236826][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.244962][ T42] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.251813][ T42] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.259066][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.267020][ T42] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.273839][ T42] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.307908][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.315816][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.324240][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.332468][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.340353][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.348203][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.355877][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.363774][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.371552][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.379495][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.387265][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.394469][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.401814][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.409952][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.417981][ T42] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.424798][ T42] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.432007][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.439904][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.447722][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.455816][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.463847][ T42] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.470674][ T42] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.477850][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.485688][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.500300][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.508451][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.522013][ T290] device veth0_vlan entered promiscuous mode [ 23.531126][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.539503][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.547824][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.555477][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.563429][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.571338][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.579098][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.586774][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.594787][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.602123][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.609561][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.616760][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.627847][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.635709][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.643817][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.651841][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.660894][ T293] device veth0_vlan entered promiscuous mode [ 23.676734][ T290] device veth1_macvtap entered promiscuous mode [ 23.689182][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.697436][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.705579][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.713797][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.721670][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.729626][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.736932][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.745042][ T289] device veth0_vlan entered promiscuous mode [ 23.763725][ T291] device veth0_vlan entered promiscuous mode [ 23.772478][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.780451][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.787665][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.795003][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.803382][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.812074][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.820212][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.828263][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.835962][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.844018][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.851266][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.859357][ T292] device veth0_vlan entered promiscuous mode [ 23.869330][ T293] device veth1_macvtap entered promiscuous mode [ 23.877539][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.885533][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.893923][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.902287][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.910396][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.920528][ T289] device veth1_macvtap entered promiscuous mode [ 23.927062][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.935050][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.943305][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.974638][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.982702][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.991202][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.999722][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.007789][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.015776][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.023933][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.031963][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.042013][ T291] device veth1_macvtap entered promiscuous mode [ 24.054471][ T292] device veth1_macvtap entered promiscuous mode [ 24.074762][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.085752][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.094213][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.102350][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.110942][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.119239][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.127390][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.163400][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.188038][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.196188][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.214451][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.398827][ C1] hrtimer: interrupt took 29165 ns [ 24.836907][ T343] syz.4.9 (343) used greatest stack depth: 22424 bytes left [ 26.031359][ T399] device syzkaller0 entered promiscuous mode [ 28.297556][ T466] bridge_slave_1: mtu less than device minimum [ 29.867312][ T30] kauditd_printk_skb: 36 callbacks suppressed [ 29.867327][ T30] audit: type=1400 audit(1721865343.962:112): avc: denied { setopt } for pid=489 comm="syz.4.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.222227][ T30] audit: type=1400 audit(1721865345.312:113): avc: denied { cpu } for pid=529 comm="syz.4.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 32.091880][ T545] syz.3.74[545] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.091948][ T545] syz.3.74[545] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.208197][ T547] syz.3.74[547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.293058][ T30] audit: type=1400 audit(1721865346.382:114): avc: denied { read } for pid=544 comm="syz.3.74" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 32.307421][ T547] syz.3.74[547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.392964][ T30] audit: type=1400 audit(1721865346.432:115): avc: denied { open } for pid=544 comm="syz.3.74" path="/dev/ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 33.465168][ T587] device veth0_vlan left promiscuous mode [ 33.487479][ T587] device veth0_vlan entered promiscuous mode [ 33.495085][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.515148][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 33.585696][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 34.054109][ T612] device veth0_vlan left promiscuous mode [ 34.100528][ T612] device veth0_vlan entered promiscuous mode [ 34.299019][ T30] audit: type=1400 audit(1721865348.392:116): avc: denied { relabelfrom } for pid=621 comm="syz.3.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 34.492096][ T30] audit: type=1400 audit(1721865348.472:117): avc: denied { relabelto } for pid=621 comm="syz.3.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 34.537771][ T622] device syzkaller0 entered promiscuous mode [ 35.251901][ T641] device veth0_vlan left promiscuous mode [ 35.258815][ T641] device veth0_vlan entered promiscuous mode [ 36.889143][ T683] device veth0_vlan left promiscuous mode [ 36.970748][ T683] device veth0_vlan entered promiscuous mode [ 37.038288][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.046430][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.143233][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.664967][ T704] syz.3.128 (704) used greatest stack depth: 22064 bytes left [ 38.597313][ T732] device veth0_vlan left promiscuous mode [ 38.603214][ T732] device veth0_vlan entered promiscuous mode [ 38.887348][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.895499][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 38.989210][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.507744][ T774] device veth0_vlan left promiscuous mode [ 40.572359][ T774] device veth0_vlan entered promiscuous mode [ 41.974868][ T808] device veth0_vlan left promiscuous mode [ 42.005015][ T808] device veth0_vlan entered promiscuous mode [ 42.082269][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 42.096122][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 42.150154][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 43.730953][ T849] device veth0_vlan left promiscuous mode [ 43.765220][ T849] device veth0_vlan entered promiscuous mode [ 43.947267][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 43.965750][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 44.008326][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 44.101576][ T856] device pim6reg1 entered promiscuous mode [ 46.127821][ T898] device veth0_vlan left promiscuous mode [ 46.167623][ T898] device veth0_vlan entered promiscuous mode [ 46.208574][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.221881][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.247249][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.752317][ T926] device veth0_vlan left promiscuous mode [ 46.796415][ T926] device veth0_vlan entered promiscuous mode [ 48.261600][ T966] device veth0_vlan left promiscuous mode [ 48.355589][ T966] device veth0_vlan entered promiscuous mode [ 48.519667][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.544855][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.647481][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 50.718292][ T30] audit: type=1400 audit(1721865364.802:118): avc: denied { create } for pid=1012 comm="syz.2.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 51.849164][ T289] syz-executor (289) used greatest stack depth: 20880 bytes left [ 51.999008][ T1047] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.093689][ T1047] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.210801][ T1047] device bridge_slave_0 entered promiscuous mode [ 52.297358][ T1047] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.387134][ T1047] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.520369][ T1047] device bridge_slave_1 entered promiscuous mode [ 52.972668][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 52.982229][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.019803][ T45] device bridge_slave_1 left promiscuous mode [ 53.028070][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.071573][ T45] device bridge_slave_0 left promiscuous mode [ 53.112934][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.163335][ T45] device veth1_macvtap left promiscuous mode [ 53.198327][ T45] device veth0_vlan left promiscuous mode [ 53.645824][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.657312][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.674159][ T63] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.681076][ T63] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.735728][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.798297][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.806387][ T63] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.813288][ T63] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.904296][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.971172][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.026454][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 54.075423][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.168051][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 54.267329][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 54.352067][ T1047] device veth0_vlan entered promiscuous mode [ 54.409158][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 54.416869][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 54.525421][ T1047] device veth1_macvtap entered promiscuous mode [ 54.547503][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 54.555009][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 54.566724][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 54.689626][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 54.739936][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 54.962384][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 55.004621][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 55.066863][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 55.188041][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 55.558749][ T1124] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.565948][ T1124] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.765211][ T1125] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.772194][ T1125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.779317][ T1125] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.786156][ T1125] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.887134][ T1125] device bridge0 entered promiscuous mode [ 59.347465][ T1209] device veth0_vlan left promiscuous mode [ 59.558417][ T1209] device veth0_vlan entered promiscuous mode [ 59.907108][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.977354][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 59.984713][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 60.135219][ T1224] device pim6reg1 entered promiscuous mode [ 60.712862][ T30] audit: type=1400 audit(1721865374.802:119): avc: denied { write } for pid=1234 comm="syz.4.301" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 62.097092][ T1255] device veth0_vlan left promiscuous mode [ 62.136547][ T1255] device veth0_vlan entered promiscuous mode [ 64.443145][ T1307] device veth0_vlan left promiscuous mode [ 64.457489][ T1307] device veth0_vlan entered promiscuous mode [ 65.825940][ T1342] ------------[ cut here ]------------ [ 65.858004][ T1342] trace type BPF program uses run-time allocation [ 65.929359][ T1342] WARNING: CPU: 1 PID: 1342 at kernel/bpf/verifier.c:11656 check_map_prog_compatibility+0x6f1/0x890 [ 65.941090][ T1346] device veth0_vlan left promiscuous mode [ 65.946871][ T1346] device veth0_vlan entered promiscuous mode [ 65.972771][ T1342] Modules linked in: [ 65.993234][ T1342] CPU: 1 PID: 1342 Comm: syz.1.337 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 66.007673][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 66.015923][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 66.037026][ T1342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 66.059937][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 66.080291][ T1342] RIP: 0010:check_map_prog_compatibility+0x6f1/0x890 [ 66.114787][ T1342] Code: db e9 f9 fc ff ff e8 fe 39 ed ff 31 db e9 ed fc ff ff e8 f2 39 ed ff c6 05 8d 76 80 05 01 48 c7 c7 40 c4 67 85 e8 bf 71 be ff <0f> 0b e9 5a fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 84 f9 ff [ 66.173420][ T1342] RSP: 0018:ffffc900007b7348 EFLAGS: 00010246 [ 66.184890][ T1342] RAX: a137cf87695a0b00 RBX: 0000000000000001 RCX: 0000000000040000 [ 66.200411][ T1342] RDX: ffffc9000139d000 RSI: 0000000000000986 RDI: 0000000000000987 [ 66.230696][ T1342] RBP: ffffc900007b7390 R08: ffffffff81576b95 R09: ffffed103ee265e8 [ 66.277909][ T1342] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 66.320220][ T1342] R13: ffff88811916f800 R14: ffffc900000de000 R15: dffffc0000000000 [ 66.393323][ T1342] FS: 00007fcb2feba6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 66.407471][ T1342] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 66.424010][ T1342] CR2: 0000001b2e11aff8 CR3: 000000012720f000 CR4: 00000000003506a0 [ 66.434112][ T1342] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 66.460311][ T1342] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 66.468928][ T1342] Call Trace: [ 66.472079][ T1342] [ 66.474808][ T1342] ? show_regs+0x58/0x60 [ 66.479499][ T1342] ? __warn+0x160/0x2f0 [ 66.483795][ T1342] ? check_map_prog_compatibility+0x6f1/0x890 [ 66.489974][ T1342] ? report_bug+0x3d9/0x5b0 [ 66.494366][ T1342] ? check_map_prog_compatibility+0x6f1/0x890 [ 66.500813][ T1342] ? handle_bug+0x41/0x70 [ 66.505355][ T1342] ? exc_invalid_op+0x1b/0x50 [ 66.510099][ T1342] ? asm_exc_invalid_op+0x1b/0x20 [ 66.515290][ T1342] ? __wake_up_klogd+0xd5/0x110 [ 66.527397][ T1342] ? check_map_prog_compatibility+0x6f1/0x890 [ 66.559469][ T1342] ? check_map_prog_compatibility+0x6f1/0x890 [ 66.619620][ T1342] resolve_pseudo_ldimm64+0x671/0x1240 [ 66.661996][ T1342] ? check_attach_btf_id+0xef0/0xef0 [ 66.684463][ T1342] ? __mark_reg_known+0x1b0/0x1b0 [ 66.693828][ T1342] ? security_capable+0x87/0xb0 [ 66.703621][ T1342] bpf_check+0x3174/0x12bf0 [ 66.712411][ T1342] ? is_bpf_text_address+0x172/0x190 [ 66.724569][ T1342] ? stack_trace_save+0x1c0/0x1c0 [ 66.805724][ T1342] ? __kernel_text_address+0x9b/0x110 [ 66.846457][ T1342] ? unwind_get_return_address+0x4d/0x90 [ 66.896271][ T1342] ? bpf_get_btf_vmlinux+0x60/0x60 [ 66.937294][ T1342] ? arch_stack_walk+0xf3/0x140 [ 67.005922][ T1342] ? stack_trace_save+0x113/0x1c0 [ 67.069393][ T1342] ? stack_trace_snprint+0xf0/0xf0 [ 67.131479][ T1342] ? stack_trace_snprint+0xf0/0xf0 [ 67.147315][ T1342] ? __stack_depot_save+0x34/0x470 [ 67.162399][ T1342] ? ____kasan_kmalloc+0xed/0x110 [ 67.213019][ T1342] ? ____kasan_kmalloc+0xdb/0x110 [ 67.254119][ T1342] ? __kasan_kmalloc+0x9/0x10 [ 67.264111][ T1342] ? kmem_cache_alloc_trace+0x115/0x210 [ 67.275419][ T1342] ? selinux_bpf_prog_alloc+0x51/0x140 [ 67.286129][ T1342] ? security_bpf_prog_alloc+0x62/0x90 [ 67.296265][ T1342] ? bpf_prog_load+0x9ee/0x1b50 [ 67.304990][ T1342] ? __sys_bpf+0x4bc/0x760 [ 67.349242][ T1342] ? __x64_sys_bpf+0x7c/0x90 [ 67.353759][ T1342] ? do_syscall_64+0x3d/0xb0 [ 67.380506][ T1342] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 67.386443][ T1342] ? __kasan_kmalloc+0x9/0x10 [ 67.399143][ T1342] ? memset+0x35/0x40 [ 67.402952][ T1342] ? bpf_obj_name_cpy+0x196/0x1e0 [ 67.408374][ T1342] bpf_prog_load+0x12ac/0x1b50 [ 67.413007][ T1342] ? map_freeze+0x370/0x370 [ 67.424444][ T1342] ? selinux_bpf+0xcb/0x100 [ 67.428928][ T1342] ? security_bpf+0x82/0xb0 [ 67.433251][ T1342] __sys_bpf+0x4bc/0x760 [ 67.444068][ T1342] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 67.450675][ T1342] ? __kasan_check_read+0x11/0x20 [ 67.455587][ T1342] __x64_sys_bpf+0x7c/0x90 [ 67.459982][ T1342] do_syscall_64+0x3d/0xb0 [ 67.464297][ T1342] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 67.473242][ T1342] RIP: 0033:0x7fcb31259f19 [ 67.482122][ T1342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 67.509728][ T1342] RSP: 002b:00007fcb2feba048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 67.518015][ T1342] RAX: ffffffffffffffda RBX: 00007fcb313ea038 RCX: 00007fcb31259f19 [ 67.525948][ T1342] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 67.534450][ T1342] RBP: 00007fcb312c8e68 R08: 0000000000000000 R09: 0000000000000000 [ 67.552672][ T1342] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 67.566035][ T1342] R13: 000000000000006e R14: 00007fcb313ea038 R15: 00007ffe5cfe9dc8 [ 67.632733][ T1342] [ 67.648581][ T1342] ---[ end trace 1aff045f01e8a833 ]--- [ 69.786255][ T1439] device syzkaller0 entered promiscuous mode [ 71.184790][ T1497] device veth0_vlan left promiscuous mode [ 71.217387][ T1497] device veth0_vlan entered promiscuous mode [ 71.238552][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 71.257378][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 71.311144][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 71.661668][ T1511] device veth0_vlan left promiscuous mode [ 71.697062][ T1511] device veth0_vlan entered promiscuous mode [ 72.642614][ T1537] device veth0_vlan left promiscuous mode [ 72.699081][ T1537] device veth0_vlan entered promiscuous mode [ 72.907463][ T1479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.915652][ T1479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 73.007541][ T1479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 73.437913][ T1551] device veth0_vlan left promiscuous mode [ 73.506719][ T1551] device veth0_vlan entered promiscuous mode [ 73.678758][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 73.711059][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 73.757656][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 75.119670][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 77.052130][ T1634] device veth0_vlan left promiscuous mode [ 77.132893][ T1634] device veth0_vlan entered promiscuous mode [ 77.204655][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 77.239967][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 77.277458][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 81.680464][ T1745] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.184719][ T30] audit: type=1400 audit(1721865397.272:120): avc: denied { create } for pid=1782 comm="syz.2.481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 83.403063][ T1791] device pim6reg1 entered promiscuous mode [ 85.195454][ T1831] device pim6reg1 entered promiscuous mode [ 88.860350][ T1916] device pim6reg1 entered promiscuous mode [ 90.624930][ T1971] device veth1_macvtap left promiscuous mode [ 90.691714][ T1971] device veth1_macvtap entered promiscuous mode [ 90.698307][ T1971] device macsec0 entered promiscuous mode [ 92.565048][ T30] audit: type=1400 audit(1721865406.652:121): avc: denied { create } for pid=2020 comm="syz.4.560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 93.572109][ T30] audit: type=1400 audit(1721865407.662:122): avc: denied { read } for pid=82 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 94.607675][ T30] audit: type=1400 audit(1721865408.702:123): avc: denied { create } for pid=2056 comm="syz.1.572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 94.998732][ T2063] device pim6reg1 entered promiscuous mode [ 96.297409][ T2110] device veth0_vlan left promiscuous mode [ 96.384823][ T2110] device veth0_vlan entered promiscuous mode [ 96.516748][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 96.536230][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 96.601156][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 96.708115][ T2119] device veth0_vlan left promiscuous mode [ 96.716484][ T2119] device veth0_vlan entered promiscuous mode [ 96.734396][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 96.746146][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 96.771219][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 98.976956][ C0] sched: RT throttling activated [ 99.331278][ T2156] device syzkaller0 entered promiscuous mode [ 104.113159][ T2211] device wg2 entered promiscuous mode [ 105.940398][ T30] audit: type=1400 audit(1721865420.032:124): avc: denied { ioctl } for pid=2231 comm="syz.0.637" path="/dev/ppp" dev="devtmpfs" ino=134 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 115.151165][ T2340] device veth0_vlan left promiscuous mode [ 115.223718][ T2340] device veth0_vlan entered promiscuous mode [ 115.324140][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 115.338918][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 115.375876][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 126.757526][ T2709] syz.1.807[2709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.757606][ T2709] syz.1.807[2709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.783047][ T2709] syz.1.807[2709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.836200][ T2709] syz.1.807[2709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.990894][ T2716] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.009324][ T2716] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.016825][ T2716] device bridge_slave_0 entered promiscuous mode [ 127.023701][ T2716] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.031085][ T2716] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.039235][ T2716] device bridge_slave_1 entered promiscuous mode [ 127.607558][ T8] device bridge_slave_1 left promiscuous mode [ 127.613531][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.747553][ T8] device bridge_slave_0 left promiscuous mode [ 127.817551][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.920448][ T8] device veth1_macvtap left promiscuous mode [ 127.926303][ T8] device veth0_vlan left promiscuous mode [ 128.228580][ T2740] device veth1_macvtap left promiscuous mode [ 128.281820][ T2741] device veth1_macvtap entered promiscuous mode [ 128.297418][ T2741] device macsec0 entered promiscuous mode [ 128.352555][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 128.360903][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 128.395229][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 128.413658][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 128.459829][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.466703][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.492269][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 128.535734][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 128.579536][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.586418][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.627112][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 128.635412][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 128.643646][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 128.651802][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 128.802595][ T2716] device veth0_vlan entered promiscuous mode [ 128.834399][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 128.842753][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 128.850929][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 128.858732][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 128.866196][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 128.874946][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 128.893344][ T2716] device veth1_macvtap entered promiscuous mode [ 128.923188][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 128.948212][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 128.966484][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 129.002007][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 129.010355][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 129.044324][ T30] audit: type=1400 audit(1721865443.132:125): avc: denied { mounton } for pid=2716 comm="syz-executor" path="/root/syzkaller.UDF2G9/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 129.201273][ T30] audit: type=1400 audit(1721865443.162:126): avc: denied { mount } for pid=2716 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 129.437369][ T30] audit: type=1400 audit(1721865443.182:127): avc: denied { mounton } for pid=2716 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 129.738385][ T8] device bridge_slave_1 left promiscuous mode [ 129.750337][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.823779][ T8] device bridge_slave_0 left promiscuous mode [ 129.854422][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.944904][ T8] device veth1_macvtap left promiscuous mode [ 129.958581][ T8] device veth0_vlan left promiscuous mode [ 130.235584][ T2789] device pim6reg1 entered promiscuous mode [ 130.461069][ T2783] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.472115][ T2783] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.479989][ T2783] device bridge_slave_0 entered promiscuous mode [ 130.492526][ T2783] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.514619][ T2783] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.574279][ T2783] device bridge_slave_1 entered promiscuous mode [ 131.750882][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 131.770995][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.927455][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 131.945556][ T30] audit: type=1400 audit(1721865446.032:128): avc: denied { create } for pid=2830 comm="syz.2.845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 131.967369][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 131.985550][ T314] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.992437][ T314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.019924][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 132.034770][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.045703][ T314] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.052587][ T314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.138817][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 132.146374][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 132.202037][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.252554][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 132.303049][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.386193][ T2783] device veth0_vlan entered promiscuous mode [ 132.459303][ T1471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 132.487709][ T1471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 132.574437][ T1471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 132.665657][ T1471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.744106][ T2783] device veth1_macvtap entered promiscuous mode [ 132.863810][ T1471] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 132.894102][ T1471] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 132.977408][ T1471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 133.066889][ T1471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 133.148014][ T1471] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 133.305194][ T1471] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 133.323949][ T1471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 133.346763][ T1471] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 133.359345][ T1471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 134.642463][ T2879] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.707630][ T2879] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.761874][ T2879] device bridge_slave_0 entered promiscuous mode [ 134.849870][ T2879] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.856717][ T2879] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.000061][ T2879] device bridge_slave_1 entered promiscuous mode [ 135.009278][ T10] device bridge_slave_1 left promiscuous mode [ 135.015226][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.107153][ T10] device bridge_slave_0 left promiscuous mode [ 135.163121][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.208133][ T10] device veth1_macvtap left promiscuous mode [ 135.236236][ T10] device veth0_vlan left promiscuous mode [ 135.823370][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 135.832121][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 135.864371][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 135.877484][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 135.944488][ T42] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.951606][ T42] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.061144][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 136.133361][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 136.211363][ T42] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.218257][ T42] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.334095][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 136.386215][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 136.462496][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 136.539484][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 136.617949][ T2879] device veth0_vlan entered promiscuous mode [ 136.652767][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 136.679945][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 136.737641][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 136.751473][ T2879] device veth1_macvtap entered promiscuous mode [ 136.807047][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 136.875774][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 136.949185][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 137.037229][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 137.046503][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 137.227590][ T1470] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 137.235768][ T1470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 139.015483][ T2987] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.022889][ T2987] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.032689][ T2987] device bridge_slave_0 entered promiscuous mode [ 139.040028][ T10] device bridge_slave_1 left promiscuous mode [ 139.046055][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.054060][ T10] device bridge_slave_0 left promiscuous mode [ 139.060135][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.101813][ T10] device veth1_macvtap left promiscuous mode [ 139.125419][ T10] device veth0_vlan left promiscuous mode [ 139.311857][ T2987] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.318895][ T2987] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.326306][ T2987] device bridge_slave_1 entered promiscuous mode [ 139.678176][ T2987] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.685162][ T2987] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.692269][ T2987] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.699029][ T2987] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.987132][ T314] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.006412][ T314] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.244027][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 140.261480][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 140.356787][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 140.370603][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 140.443802][ T314] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.450784][ T314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 140.488544][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 140.513720][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 140.537484][ T314] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.544377][ T314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.561814][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 140.573993][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 140.617081][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 140.625022][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 140.681991][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 140.690391][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 140.698822][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 140.706526][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 140.723517][ T2987] device veth0_vlan entered promiscuous mode [ 140.769844][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 140.815905][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 140.833083][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 140.848959][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 140.873762][ T2987] device veth1_macvtap entered promiscuous mode [ 140.926246][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 140.938115][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 140.955092][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 140.980831][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 141.004949][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 141.778456][ T8] device bridge_slave_1 left promiscuous mode [ 141.794569][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.908973][ T8] device bridge_slave_0 left promiscuous mode [ 141.943281][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.990097][ T8] device veth1_macvtap left promiscuous mode [ 142.025158][ T8] device veth0_vlan left promiscuous mode [ 142.927432][ T3081] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.079977][ T3081] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.131147][ T3081] device bridge_slave_0 entered promiscuous mode [ 143.157927][ T3081] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.164844][ T3081] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.172440][ T3081] device bridge_slave_1 entered promiscuous mode [ 143.801745][ T1471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 143.821524][ T1471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 144.068927][ T1470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 144.118132][ T1470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.171494][ T1470] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.178385][ T1470] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.323817][ T1470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 144.347343][ T1470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.411390][ T1470] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.418278][ T1470] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.456078][ T1470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 144.481803][ T1470] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 144.508692][ T1470] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 144.533483][ T1470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 144.581835][ T3119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 144.630838][ T2276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 144.660870][ T2276] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 144.713758][ T2276] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 144.748982][ T3081] device veth0_vlan entered promiscuous mode [ 144.810322][ T3119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 144.815269][ T3142] syz.2.946[3142] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.823255][ T3142] syz.2.946[3142] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.827330][ T3119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 144.868757][ T3081] device veth1_macvtap entered promiscuous mode [ 144.937094][ T2276] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 144.942545][ T3155] syz.4.951[3155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.948206][ T3155] syz.4.951[3155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.950488][ T2276] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 144.990210][ T2276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 144.998536][ T2276] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 145.006587][ T2276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 245.016933][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 245.023471][ C0] rcu: 0-...!: (10000 ticks this GP) idle=04d/1/0x4000000000000000 softirq=16216/16216 fqs=0 last_accelerate: c327/ea3a dyntick_enabled: 1 [ 245.037517][ C0] (t=10002 jiffies g=18477 q=90) [ 245.042370][ C0] rcu: rcu_preempt kthread timer wakeup didn't happen for 10001 jiffies! g18477 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 [ 245.054522][ C0] rcu: Possible timer handling issue on cpu=0 timer-softirq=4116 [ 245.062158][ C0] rcu: rcu_preempt kthread starved for 10004 jiffies! g18477 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=0 [ 245.073357][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 245.083161][ C0] rcu: RCU grace-period kthread stack dump: [ 245.089064][ C0] task:rcu_preempt state:I stack:28288 pid: 14 ppid: 2 flags:0x00004000 [ 245.098100][ C0] Call Trace: [ 245.101225][ C0] [ 245.103996][ C0] __schedule+0xccc/0x1590 [ 245.108247][ C0] ? __sched_text_start+0x8/0x8 [ 245.112929][ C0] ? __kasan_check_write+0x14/0x20 [ 245.117880][ C0] schedule+0x11f/0x1e0 [ 245.121868][ C0] schedule_timeout+0x18c/0x370 [ 245.126555][ C0] ? _raw_spin_unlock_irq+0x4e/0x70 [ 245.131592][ C0] ? console_conditional_schedule+0x30/0x30 [ 245.137320][ C0] ? update_process_times+0x200/0x200 [ 245.142527][ C0] ? prepare_to_swait_event+0x308/0x320 [ 245.147913][ C0] rcu_gp_fqs_loop+0x2af/0xf80 [ 245.152507][ C0] ? debug_smp_processor_id+0x17/0x20 [ 245.157714][ C0] ? __note_gp_changes+0x4ab/0x920 [ 245.162660][ C0] ? rcu_gp_init+0xc30/0xc30 [ 245.167088][ C0] ? _raw_spin_unlock_irq+0x4e/0x70 [ 245.172145][ C0] ? rcu_gp_init+0x9cf/0xc30 [ 245.176547][ C0] rcu_gp_kthread+0xa4/0x350 [ 245.180972][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 245.185663][ C0] ? wake_nocb_gp+0x1e0/0x1e0 [ 245.190175][ C0] ? __kasan_check_read+0x11/0x20 [ 245.195149][ C0] ? __kthread_parkme+0xb2/0x200 [ 245.200096][ C0] kthread+0x421/0x510 [ 245.204002][ C0] ? wake_nocb_gp+0x1e0/0x1e0 [ 245.208517][ C0] ? kthread_blkcg+0xd0/0xd0 [ 245.212943][ C0] ret_from_fork+0x1f/0x30 [ 245.217200][ C0] [ 245.220073][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 245.226229][ C0] NMI backtrace for cpu 0 [ 245.230392][ C0] CPU: 0 PID: 3158 Comm: syz.0.952 Tainted: G W 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 245.241408][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 245.251305][ C0] Call Trace: [ 245.254427][ C0] [ 245.257122][ C0] dump_stack_lvl+0x151/0x1b7 [ 245.261632][ C0] ? io_uring_drop_tctx_refs+0x190/0x190 [ 245.267104][ C0] dump_stack+0x15/0x17 [ 245.271092][ C0] nmi_cpu_backtrace+0x2f7/0x300 [ 245.275869][ C0] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 245.281860][ C0] ? panic+0x751/0x751 [ 245.285765][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 245.291669][ C0] nmi_trigger_cpumask_backtrace+0x15d/0x270 [ 245.297478][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 245.303380][ C0] arch_trigger_cpumask_backtrace+0x10/0x20 [ 245.309111][ C0] rcu_check_gp_kthread_starvation+0x1e3/0x250 [ 245.315097][ C0] ? rcu_check_gp_kthread_expired_fqs_timer+0x18e/0x230 [ 245.321867][ C0] print_cpu_stall+0x310/0x5f0 [ 245.326467][ C0] rcu_sched_clock_irq+0x989/0x12f0 [ 245.331501][ C0] ? rcu_boost_kthread_setaffinity+0x340/0x340 [ 245.337493][ C0] ? hrtimer_run_queues+0x15f/0x440 [ 245.342525][ C0] update_process_times+0x198/0x200 [ 245.347561][ C0] tick_sched_timer+0x188/0x240 [ 245.352241][ C0] ? tick_setup_sched_timer+0x480/0x480 [ 245.357628][ C0] __hrtimer_run_queues+0x41a/0xad0 [ 245.362674][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 245.367605][ C0] ? clockevents_program_event+0x22f/0x300 [ 245.373246][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 245.379174][ C0] hrtimer_interrupt+0x40c/0xaa0 [ 245.383936][ C0] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 245.389654][ C0] sysvec_apic_timer_interrupt+0x95/0xc0 [ 245.395120][ C0] [ 245.397899][ C0] [ 245.400672][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 245.406497][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 245.411291][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 2b 02 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 245.430703][ C0] RSP: 0018:ffffc900009a7360 EFLAGS: 00000246 [ 245.436602][ C0] RAX: 0000000000000001 RBX: 1ffff92000134e70 RCX: 1ffffffff0d1aa9c [ 245.444419][ C0] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7038ad4 [ 245.452227][ C0] RBP: ffffc900009a7410 R08: dffffc0000000000 R09: ffffed103ee0715b [ 245.460040][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 245.467853][ C0] R13: ffff8881f7038ad4 R14: 0000000000000001 R15: 1ffff92000134e74 [ 245.475670][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 245.481654][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 245.486598][ C0] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 245.492498][ C0] ? __stack_depot_save+0x34/0x470 [ 245.497456][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 245.503716][ C0] ? slab_post_alloc_hook+0x53/0x2c0 [ 245.508820][ C0] ? seq_open+0x61/0x130 [ 245.512893][ C0] ? kernfs_fop_open+0x50b/0xab0 [ 245.517669][ C0] ? do_dentry_open+0x81c/0xfd0 [ 245.522354][ C0] ? path_openat+0x26f0/0x2f40 [ 245.527041][ C0] ? do_filp_open+0x21c/0x460 [ 245.531573][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 245.536329][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 245.541362][ C0] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 245.546658][ C0] sock_hash_delete_elem+0xb1/0x2f0 [ 245.551690][ C0] ? kernfs_fop_open+0x73c/0xab0 [ 245.556465][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0x48c [ 245.561844][ C0] bpf_trace_run2+0xec/0x210 [ 245.566271][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 245.570957][ C0] ? kernfs_fop_open+0x73c/0xab0 [ 245.575733][ C0] ? kernfs_fop_open+0x73c/0xab0 [ 245.580517][ C0] __bpf_trace_kfree+0x6f/0x90 [ 245.585112][ C0] ? kernfs_fop_open+0x73c/0xab0 [ 245.589986][ C0] kfree+0x1f3/0x220 [ 245.593615][ C0] kernfs_fop_open+0x73c/0xab0 [ 245.598218][ C0] ? kernfs_fop_mmap+0x3c0/0x3c0 [ 245.603077][ C0] do_dentry_open+0x81c/0xfd0 [ 245.607591][ C0] vfs_open+0x73/0x80 [ 245.611414][ C0] path_openat+0x26f0/0x2f40 [ 245.615834][ C0] ? __kasan_slab_alloc+0xb1/0xe0 [ 245.620689][ C0] ? kmem_cache_alloc+0xf5/0x200 [ 245.625467][ C0] ? getname_flags+0xba/0x520 [ 245.629994][ C0] ? __x64_sys_openat+0x243/0x290 [ 245.634839][ C0] ? do_filp_open+0x460/0x460 [ 245.639529][ C0] do_filp_open+0x21c/0x460 [ 245.643878][ C0] ? vfs_tmpfile+0x2c0/0x2c0 [ 245.648302][ C0] do_sys_openat2+0x13f/0x830 [ 245.652808][ C0] ? do_sys_open+0x220/0x220 [ 245.657231][ C0] ? security_bpf+0x82/0xb0 [ 245.661582][ C0] __x64_sys_openat+0x243/0x290 [ 245.666256][ C0] ? __ia32_sys_open+0x270/0x270 [ 245.671040][ C0] ? __kasan_check_read+0x11/0x20 [ 245.675919][ C0] ? exit_to_user_mode_prepare+0x7e/0xa0 [ 245.681533][ C0] do_syscall_64+0x3d/0xb0 [ 245.686393][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 245.692119][ C0] RIP: 0033:0x7f20b7de0f19 [ 245.696493][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 245.716180][ C0] RSP: 002b:00007f20b6a62048 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 245.724423][ C0] RAX: ffffffffffffffda RBX: 00007f20b7f70f60 RCX: 00007f20b7de0f19 [ 245.732232][ C0] RDX: 0000000000000002 RSI: 0000000020002b00 RDI: 0000000000000003 [ 245.740130][ C0] RBP: 00007f20b7e4fe68 R08: 0000000000000000 R09: 0000000000000000 [ 245.748131][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 245.756038][ C0] R13: 000000000000000b R14: 00007f20b7f70f60 R15: 00007fffe7609ec8 [ 245.763860][ C0] [ 245.766741][ C0] NMI backtrace for cpu 0 [ 245.770880][ C0] CPU: 0 PID: 3158 Comm: syz.0.952 Tainted: G W 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 245.781906][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 245.791798][ C0] Call Trace: [ 245.794922][ C0] [ 245.797618][ C0] dump_stack_lvl+0x151/0x1b7 [ 245.802125][ C0] ? io_uring_drop_tctx_refs+0x190/0x190 [ 245.807594][ C0] ? ttwu_do_wakeup+0x187/0x430 [ 245.812285][ C0] dump_stack+0x15/0x17 [ 245.816275][ C0] nmi_cpu_backtrace+0x2f7/0x300 [ 245.821048][ C0] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 245.827034][ C0] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 245.832333][ C0] ? __kasan_check_write+0x14/0x20 [ 245.837276][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 245.841968][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 245.847864][ C0] nmi_trigger_cpumask_backtrace+0x15d/0x270 [ 245.853678][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 245.859580][ C0] arch_trigger_cpumask_backtrace+0x10/0x20 [ 245.865311][ C0] rcu_dump_cpu_stacks+0x1d8/0x330 [ 245.870291][ C0] print_cpu_stall+0x315/0x5f0 [ 245.874857][ C0] rcu_sched_clock_irq+0x989/0x12f0 [ 245.879895][ C0] ? rcu_boost_kthread_setaffinity+0x340/0x340 [ 245.885915][ C0] ? hrtimer_run_queues+0x15f/0x440 [ 245.890913][ C0] update_process_times+0x198/0x200 [ 245.895949][ C0] tick_sched_timer+0x188/0x240 [ 245.900633][ C0] ? tick_setup_sched_timer+0x480/0x480 [ 245.906015][ C0] __hrtimer_run_queues+0x41a/0xad0 [ 245.911053][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 245.915995][ C0] ? clockevents_program_event+0x22f/0x300 [ 245.921639][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 245.927541][ C0] hrtimer_interrupt+0x40c/0xaa0 [ 245.932316][ C0] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 245.938045][ C0] sysvec_apic_timer_interrupt+0x95/0xc0 [ 245.943510][ C0] [ 245.946285][ C0] [ 245.949067][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 245.954878][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 245.959660][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 2b 02 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 245.979097][ C0] RSP: 0018:ffffc900009a7360 EFLAGS: 00000246 [ 245.984996][ C0] RAX: 0000000000000001 RBX: 1ffff92000134e70 RCX: 1ffffffff0d1aa9c [ 245.992806][ C0] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7038ad4 [ 246.000617][ C0] RBP: ffffc900009a7410 R08: dffffc0000000000 R09: ffffed103ee0715b [ 246.008431][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 246.016240][ C0] R13: ffff8881f7038ad4 R14: 0000000000000001 R15: 1ffff92000134e74 [ 246.024062][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 246.030039][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 246.034989][ C0] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 246.040892][ C0] ? __stack_depot_save+0x34/0x470 [ 246.045856][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 246.052084][ C0] ? slab_post_alloc_hook+0x53/0x2c0 [ 246.057208][ C0] ? seq_open+0x61/0x130 [ 246.061284][ C0] ? kernfs_fop_open+0x50b/0xab0 [ 246.066072][ C0] ? do_dentry_open+0x81c/0xfd0 [ 246.070747][ C0] ? path_openat+0x26f0/0x2f40 [ 246.075345][ C0] ? do_filp_open+0x21c/0x460 [ 246.079866][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 246.084632][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 246.089779][ C0] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 246.095074][ C0] sock_hash_delete_elem+0xb1/0x2f0 [ 246.100106][ C0] ? kernfs_fop_open+0x73c/0xab0 [ 246.104883][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0x48c [ 246.110262][ C0] bpf_trace_run2+0xec/0x210 [ 246.114688][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 246.119382][ C0] ? kernfs_fop_open+0x73c/0xab0 [ 246.124147][ C0] ? kernfs_fop_open+0x73c/0xab0 [ 246.128921][ C0] __bpf_trace_kfree+0x6f/0x90 [ 246.133522][ C0] ? kernfs_fop_open+0x73c/0xab0 [ 246.138293][ C0] kfree+0x1f3/0x220 [ 246.142027][ C0] kernfs_fop_open+0x73c/0xab0 [ 246.146626][ C0] ? kernfs_fop_mmap+0x3c0/0x3c0 [ 246.151410][ C0] do_dentry_open+0x81c/0xfd0 [ 246.156009][ C0] vfs_open+0x73/0x80 [ 246.159826][ C0] path_openat+0x26f0/0x2f40 [ 246.164247][ C0] ? __kasan_slab_alloc+0xb1/0xe0 [ 246.169195][ C0] ? kmem_cache_alloc+0xf5/0x200 [ 246.173965][ C0] ? getname_flags+0xba/0x520 [ 246.178480][ C0] ? __x64_sys_openat+0x243/0x290 [ 246.183340][ C0] ? do_filp_open+0x460/0x460 [ 246.187858][ C0] do_filp_open+0x21c/0x460 [ 246.192197][ C0] ? vfs_tmpfile+0x2c0/0x2c0 [ 246.196626][ C0] do_sys_openat2+0x13f/0x830 [ 246.201135][ C0] ? do_sys_open+0x220/0x220 [ 246.205742][ C0] ? security_bpf+0x82/0xb0 [ 246.210075][ C0] __x64_sys_openat+0x243/0x290 [ 246.214848][ C0] ? __ia32_sys_open+0x270/0x270 [ 246.219618][ C0] ? __kasan_check_read+0x11/0x20 [ 246.224480][ C0] ? exit_to_user_mode_prepare+0x7e/0xa0 [ 246.230903][ C0] do_syscall_64+0x3d/0xb0 [ 246.235155][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 246.240883][ C0] RIP: 0033:0x7f20b7de0f19 [ 246.245140][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 246.264577][ C0] RSP: 002b:00007f20b6a62048 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 246.272828][ C0] RAX: ffffffffffffffda RBX: 00007f20b7f70f60 RCX: 00007f20b7de0f19 [ 246.280633][ C0] RDX: 0000000000000002 RSI: 0000000020002b00 RDI: 0000000000000003 [ 246.288445][ C0] RBP: 00007f20b7e4fe68 R08: 0000000000000000 R09: 0000000000000000 [ 246.296254][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 246.304067][ C0] R13: 000000000000000b R14: 00007f20b7f70f60 R15: 00007fffe7609ec8 [ 246.311882][ C0] [ 246.314763][ C0] Sending NMI from CPU 0 to CPUs 1: [ 246.319810][ C1] NMI backtrace for cpu 1 [ 246.319820][ C1] CPU: 1 PID: 3081 Comm: syz-executor Tainted: G W 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 246.319837][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 246.319846][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 246.319866][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 2b 02 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 246.319878][ C1] RSP: 0018:ffffc90000c27340 EFLAGS: 00000246 [ 246.319891][ C1] RAX: 0000000000000003 RBX: 1ffff92000184e6c RCX: ffffffff815504ef [ 246.319903][ C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff888105d8ec18 [ 246.319913][ C1] RBP: ffffc90000c273f0 R08: dffffc0000000000 R09: ffffed1020bb1d84 [ 246.319925][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 246.319954][ C1] R13: ffff888105d8ec18 R14: 0000000000000003 R15: 1ffff92000184e70 [ 246.319965][ C1] FS: 00005555568ac500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 246.319980][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 246.319992][ C1] CR2: 0000001b2d01fffc CR3: 0000000112c9b000 CR4: 00000000003506a0 [ 246.320011][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 246.320021][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 246.320032][ C1] Call Trace: [ 246.320037][ C1] [ 246.320043][ C1] ? show_regs+0x58/0x60 [ 246.320061][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 246.320081][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 246.320102][ C1] ? kvm_wait+0x147/0x180 [ 246.320116][ C1] ? kvm_wait+0x147/0x180 [ 246.320131][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 246.320149][ C1] ? nmi_handle+0xa8/0x280 [ 246.320167][ C1] ? kvm_wait+0x147/0x180 [ 246.320182][ C1] ? default_do_nmi+0x69/0x160 [ 246.320211][ C1] ? exc_nmi+0xaf/0x120 [ 246.320226][ C1] ? end_repeat_nmi+0x16/0x31 [ 246.320242][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 246.320261][ C1] ? kvm_wait+0x147/0x180 [ 246.320275][ C1] ? kvm_wait+0x147/0x180 [ 246.320290][ C1] ? kvm_wait+0x147/0x180 [ 246.320303][ C1] [ 246.320308][ C1] [ 246.320312][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 246.320329][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 246.320344][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 246.320363][ C1] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 246.320383][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 246.320400][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 246.320418][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 246.320431][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 246.320446][ C1] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 246.320466][ C1] sock_hash_delete_elem+0xb1/0x2f0 [ 246.320483][ C1] ? sock_map_unref+0x352/0x4d0 [ 246.320500][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0x48c [ 246.320513][ C1] bpf_trace_run2+0xec/0x210 [ 246.320530][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 246.320545][ C1] ? sock_map_unref+0x352/0x4d0 [ 246.320561][ C1] ? sock_no_sendpage_locked+0x1b0/0x1b0 [ 246.320578][ C1] ? sock_map_unref+0x352/0x4d0 [ 246.320594][ C1] __bpf_trace_kfree+0x6f/0x90 [ 246.320614][ C1] ? sock_map_unref+0x352/0x4d0 [ 246.320630][ C1] kfree+0x1f3/0x220 [ 246.320647][ C1] sock_map_unref+0x352/0x4d0 [ 246.320665][ C1] sock_hash_delete_elem+0x274/0x2f0 [ 246.320683][ C1] ? skb_release_data+0x8a9/0xa80 [ 246.320698][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0x48c [ 246.320710][ C1] bpf_trace_run2+0xec/0x210 [ 246.320726][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 246.320742][ C1] ? skb_release_data+0x8a9/0xa80 [ 246.320756][ C1] ? netlink_dump+0xd10/0xd10 [ 246.320774][ C1] ? avc_has_perm_noaudit+0x430/0x430 [ 246.320791][ C1] ? skb_release_data+0x8a9/0xa80 [ 246.320824][ C1] __bpf_trace_kfree+0x6f/0x90 [ 246.320839][ C1] ? skb_release_data+0x8a9/0xa80 [ 246.320854][ C1] kfree+0x1f3/0x220 [ 246.320872][ C1] skb_release_data+0x8a9/0xa80 [ 246.320890][ C1] consume_skb+0xac/0x250 [ 246.320906][ C1] netlink_unicast+0x8e7/0xac0 [ 246.320925][ C1] ? netlink_detachskb+0x90/0x90 [ 246.320944][ C1] ? security_netlink_send+0x7b/0xa0 [ 246.320960][ C1] netlink_sendmsg+0xa0a/0xd20 [ 246.320977][ C1] ? netlink_getsockopt+0x560/0x560 [ 246.320995][ C1] ? call_rcu+0xd90/0x1310 [ 246.321012][ C1] ? security_socket_sendmsg+0x82/0xb0 [ 246.321028][ C1] ? netlink_getsockopt+0x560/0x560 [ 246.321047][ C1] __sys_sendto+0x564/0x720 [ 246.321064][ C1] ? __ia32_sys_getpeername+0x90/0x90 [ 246.321086][ C1] ? ____fput+0x15/0x20 [ 246.321102][ C1] ? debug_smp_processor_id+0x17/0x20 [ 246.321120][ C1] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 246.321140][ C1] __x64_sys_sendto+0xe5/0x100 [ 246.321156][ C1] do_syscall_64+0x3d/0xb0 [ 246.321172][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 246.321189][ C1] RIP: 0033:0x7fa27222ec53 [ 246.321283][ C1] Code: 64 89 02 48 c7 c0 ff ff ff ff eb b7 66 2e 0f 1f 84 00 00 00 00 00 90 80 3d f1 d8 15 00 00 41 89 ca 74 14 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 75 c3 0f 1f 40 00 55 48 83 ec 30 44 89 4c 24 [ 246.321296][ C1] RSP: 002b:00007ffff9d7bcb8 EFLAGS: 00000202 ORIG_RAX: 000000000000002c [ 246.321312][ C1] RAX: ffffffffffffffda RBX: 00007fa272eeb620 RCX: 00007fa27222ec53 [ 246.321324][ C1] RDX: 0000000000000040 RSI: 00007fa272eeb670 RDI: 0000000000000003 [ 246.321335][ C1] RBP: 0000000000000001 R08: 00007ffff9d7bcd4 R09: 000000000000000c [ 246.321345][ C1] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000003 [ 246.321355][ C1] R13: 0000000000000000 R14: 00007fa272eeb670 R15: 0000000000000000 [ 246.321369][ C1] [ 397.022634][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 246s! [syz.0.952:3158] [ 397.030617][ C0] Modules linked in: [ 397.034350][ C0] CPU: 0 PID: 3158 Comm: syz.0.952 Tainted: G W 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 397.045371][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 397.055272][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 397.060049][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 2b 02 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 397.080090][ C0] RSP: 0018:ffffc900009a7360 EFLAGS: 00000246 [ 397.085988][ C0] RAX: 0000000000000001 RBX: 1ffff92000134e70 RCX: 1ffffffff0d1aa9c [ 397.093800][ C0] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7038ad4 [ 397.101611][ C0] RBP: ffffc900009a7410 R08: dffffc0000000000 R09: ffffed103ee0715b [ 397.109422][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 397.117841][ C0] R13: ffff8881f7038ad4 R14: 0000000000000001 R15: 1ffff92000134e74 [ 397.125654][ C0] FS: 00007f20b6a626c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 397.134420][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 397.140927][ C0] CR2: 0000000020002b00 CR3: 00000001260b9000 CR4: 00000000003506b0 [ 397.148832][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 397.156751][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 397.164561][ C0] Call Trace: [ 397.167689][ C0] [ 397.170379][ C0] ? show_regs+0x58/0x60 [ 397.174454][ C0] ? watchdog_timer_fn+0x4b1/0x5f0 [ 397.179402][ C0] ? proc_watchdog_cpumask+0xd0/0xd0 [ 397.184524][ C0] ? __hrtimer_run_queues+0x41a/0xad0 [ 397.189733][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 397.194677][ C0] ? clockevents_program_event+0x22f/0x300 [ 397.200318][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 397.206222][ C0] ? hrtimer_interrupt+0x40c/0xaa0 [ 397.211172][ C0] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 397.217073][ C0] ? sysvec_apic_timer_interrupt+0x95/0xc0 [ 397.222710][ C0] [ 397.225487][ C0] [ 397.228278][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 397.234263][ C0] ? kvm_wait+0x147/0x180 [ 397.238424][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 397.244414][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 397.249479][ C0] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 397.255511][ C0] ? __stack_depot_save+0x34/0x470 [ 397.260580][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 397.266911][ C0] ? slab_post_alloc_hook+0x53/0x2c0 [ 397.272036][ C0] ? seq_open+0x61/0x130 [ 397.276114][ C0] ? kernfs_fop_open+0x50b/0xab0 [ 397.280890][ C0] ? do_dentry_open+0x81c/0xfd0 [ 397.285582][ C0] ? path_openat+0x26f0/0x2f40 [ 397.290175][ C0] ? do_filp_open+0x21c/0x460 [ 397.294688][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 397.299463][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 397.304581][ C0] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 397.309877][ C0] sock_hash_delete_elem+0xb1/0x2f0 [ 397.314909][ C0] ? kernfs_fop_open+0x73c/0xab0 [ 397.319708][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0x48c [ 397.325064][ C0] bpf_trace_run2+0xec/0x210 [ 397.329493][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 397.334266][ C0] ? kernfs_fop_open+0x73c/0xab0 [ 397.339041][ C0] ? kernfs_fop_open+0x73c/0xab0 [ 397.343814][ C0] __bpf_trace_kfree+0x6f/0x90 [ 397.348419][ C0] ? kernfs_fop_open+0x73c/0xab0 [ 397.353185][ C0] kfree+0x1f3/0x220 [ 397.356920][ C0] kernfs_fop_open+0x73c/0xab0 [ 397.361520][ C0] ? kernfs_fop_mmap+0x3c0/0x3c0 [ 397.366303][ C0] do_dentry_open+0x81c/0xfd0 [ 397.370806][ C0] vfs_open+0x73/0x80 [ 397.374623][ C0] path_openat+0x26f0/0x2f40 [ 397.379054][ C0] ? __kasan_slab_alloc+0xb1/0xe0 [ 397.383998][ C0] ? kmem_cache_alloc+0xf5/0x200 [ 397.388774][ C0] ? getname_flags+0xba/0x520 [ 397.393282][ C0] ? __x64_sys_openat+0x243/0x290 [ 397.398149][ C0] ? do_filp_open+0x460/0x460 [ 397.402659][ C0] do_filp_open+0x21c/0x460 [ 397.406998][ C0] ? vfs_tmpfile+0x2c0/0x2c0 [ 397.411430][ C0] do_sys_openat2+0x13f/0x830 [ 397.415939][ C0] ? do_sys_open+0x220/0x220 [ 397.420361][ C0] ? security_bpf+0x82/0xb0 [ 397.424706][ C0] __x64_sys_openat+0x243/0x290 [ 397.429389][ C0] ? __ia32_sys_open+0x270/0x270 [ 397.434162][ C0] ? __kasan_check_read+0x11/0x20 [ 397.439024][ C0] ? exit_to_user_mode_prepare+0x7e/0xa0 [ 397.444491][ C0] do_syscall_64+0x3d/0xb0 [ 397.448747][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 397.454472][ C0] RIP: 0033:0x7f20b7de0f19 [ 397.458730][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 397.478254][ C0] RSP: 002b:00007f20b6a62048 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 397.486498][ C0] RAX: ffffffffffffffda RBX: 00007f20b7f70f60 RCX: 00007f20b7de0f19 [ 397.494310][ C0] RDX: 0000000000000002 RSI: 0000000020002b00 RDI: 0000000000000003 [ 397.502119][ C0] RBP: 00007f20b7e4fe68 R08: 0000000000000000 R09: 0000000000000000 [ 397.509930][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 397.517864][ C0] R13: 000000000000000b R14: 00007f20b7f70f60 R15: 00007fffe7609ec8 [ 397.525677][ C0] [ 397.528540][ C0] Sending NMI from CPU 0 to CPUs 1: [ 397.533626][ C1] NMI backtrace for cpu 1 [ 397.533637][ C1] CPU: 1 PID: 3081 Comm: syz-executor Tainted: G W 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 397.533656][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 397.533665][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 397.533686][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 2b 02 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 397.533699][ C1] RSP: 0018:ffffc90000c27340 EFLAGS: 00000246 [ 397.533714][ C1] RAX: 0000000000000003 RBX: 1ffff92000184e6c RCX: ffffffff815504ef [ 397.533726][ C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff888105d8ec18 [ 397.533738][ C1] RBP: ffffc90000c273f0 R08: dffffc0000000000 R09: ffffed1020bb1d84 [ 397.533750][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 397.533762][ C1] R13: ffff888105d8ec18 R14: 0000000000000003 R15: 1ffff92000184e70 [ 397.533773][ C1] FS: 00005555568ac500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 397.533788][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 397.533800][ C1] CR2: 0000001b2d01fffc CR3: 0000000112c9b000 CR4: 00000000003506a0 [ 397.533815][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 397.533825][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 397.533836][ C1] Call Trace: [ 397.533841][ C1] [ 397.533847][ C1] ? show_regs+0x58/0x60 [ 397.533866][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 397.533887][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 397.533908][ C1] ? kvm_wait+0x147/0x180 [ 397.533923][ C1] ? kvm_wait+0x147/0x180 [ 397.533939][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 397.533958][ C1] ? nmi_handle+0xa8/0x280 [ 397.533975][ C1] ? kvm_wait+0x147/0x180 [ 397.533990][ C1] ? kvm_wait+0x147/0x180 [ 397.534005][ C1] ? default_do_nmi+0x69/0x160 [ 397.534024][ C1] ? exc_nmi+0xaf/0x120 [ 397.534041][ C1] ? end_repeat_nmi+0x16/0x31 [ 397.534060][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 397.534082][ C1] ? kvm_wait+0x147/0x180 [ 397.534098][ C1] ? kvm_wait+0x147/0x180 [ 397.534124][ C1] ? kvm_wait+0x147/0x180 [ 397.534139][ C1] [ 397.534144][ C1] [ 397.534149][ C1] ? asm_common_interrupt+0x27/0x40 [ 397.534166][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 397.534183][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 397.534203][ C1] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 397.534225][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 397.534245][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 397.534265][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 397.534281][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 397.534297][ C1] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 397.534319][ C1] sock_hash_delete_elem+0xb1/0x2f0 [ 397.534338][ C1] ? sock_map_unref+0x352/0x4d0 [ 397.534357][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0x48c [ 397.534371][ C1] bpf_trace_run2+0xec/0x210 [ 397.534391][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 397.534408][ C1] ? sock_map_unref+0x352/0x4d0 [ 397.534426][ C1] ? sock_no_sendpage_locked+0x1b0/0x1b0 [ 397.534444][ C1] ? sock_map_unref+0x352/0x4d0 [ 397.534462][ C1] __bpf_trace_kfree+0x6f/0x90 [ 397.534484][ C1] ? sock_map_unref+0x352/0x4d0 [ 397.534501][ C1] kfree+0x1f3/0x220 [ 397.534527][ C1] sock_map_unref+0x352/0x4d0 [ 397.534547][ C1] sock_hash_delete_elem+0x274/0x2f0 [ 397.534566][ C1] ? skb_release_data+0x8a9/0xa80 [ 397.534583][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0x48c [ 397.534597][ C1] bpf_trace_run2+0xec/0x210 [ 397.534615][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 397.534633][ C1] ? skb_release_data+0x8a9/0xa80 [ 397.534649][ C1] ? netlink_dump+0xd10/0xd10 [ 397.534668][ C1] ? avc_has_perm_noaudit+0x430/0x430 [ 397.534687][ C1] ? skb_release_data+0x8a9/0xa80 [ 397.534704][ C1] __bpf_trace_kfree+0x6f/0x90 [ 397.534720][ C1] ? skb_release_data+0x8a9/0xa80 [ 397.534736][ C1] kfree+0x1f3/0x220 [ 397.534754][ C1] skb_release_data+0x8a9/0xa80 [ 397.534774][ C1] consume_skb+0xac/0x250 [ 397.534791][ C1] netlink_unicast+0x8e7/0xac0 [ 397.534811][ C1] ? netlink_detachskb+0x90/0x90 [ 397.534830][ C1] ? security_netlink_send+0x7b/0xa0 [ 397.534847][ C1] netlink_sendmsg+0xa0a/0xd20 [ 397.534865][ C1] ? netlink_getsockopt+0x560/0x560 [ 397.534883][ C1] ? call_rcu+0xd90/0x1310 [ 397.534902][ C1] ? security_socket_sendmsg+0x82/0xb0 [ 397.534918][ C1] ? netlink_getsockopt+0x560/0x560 [ 397.534938][ C1] __sys_sendto+0x564/0x720 [ 397.534955][ C1] ? __ia32_sys_getpeername+0x90/0x90 [ 397.534978][ C1] ? ____fput+0x15/0x20 [ 397.534995][ C1] ? debug_smp_processor_id+0x17/0x20 [ 397.535014][ C1] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 397.535034][ C1] __x64_sys_sendto+0xe5/0x100 [ 397.535051][ C1] do_syscall_64+0x3d/0xb0 [ 397.535068][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 397.535085][ C1] RIP: 0033:0x7fa27222ec53 [ 397.535099][ C1] Code: 64 89 02 48 c7 c0 ff ff ff ff eb b7 66 2e 0f 1f 84 00 00 00 00 00 90 80 3d f1 d8 15 00 00 41 89 ca 74 14 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 75 c3 0f 1f 40 00 55 48 83 ec 30 44 89 4c 24 [ 397.535113][ C1] RSP: 002b:00007ffff9d7bcb8 EFLAGS: 00000202 ORIG_RAX: 000000000000002c [ 397.535129][ C1] RAX: ffffffffffffffda RBX: 00007fa272eeb620 RCX: 00007fa27222ec53 [ 397.535142][ C1] RDX: 0000000000000040 RSI: 00007fa272eeb670 RDI: 0000000000000003 [ 397.535153][ C1] RBP: 0000000000000001 R08: 00007ffff9d7bcd4 R09: 000000000000000c [ 397.535164][ C1] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000003 [ 397.535174][ C1] R13: 0000000000000000 R14: 00007fa272eeb670 R15: 0000000000000000 [ 397.535188][ C1]