last executing test programs: 20.975398923s ago: executing program 4 (id=716): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x40000f0, 0xe40, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0x8001}, 0x28) 19.284221321s ago: executing program 4 (id=716): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x40000f0, 0xe40, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0x8001}, 0x28) 16.745141508s ago: executing program 4 (id=716): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x40000f0, 0xe40, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0x8001}, 0x28) 13.344791204s ago: executing program 4 (id=716): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x40000f0, 0xe40, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0x8001}, 0x28) 7.453953244s ago: executing program 4 (id=716): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x40000f0, 0xe40, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0x8001}, 0x28) 4.081585708s ago: executing program 4 (id=716): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x40000f0, 0xe40, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0x8001}, 0x28) 3.102878158s ago: executing program 1 (id=909): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x8000, 0x7, 0x6, 0x80, 0xffffffffffffffff, 0x8a7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x5, 0xd}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={0x0}, 0x10) (async, rerun: 32) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) (rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES64=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xa, 0x4, 0x7, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='kfree_skb\x00', r4}, 0x10) (async) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xaf, 0x6, 0x0, 0x0, 0x0, 0x0, 0x22202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0xfffffffb}, 0x0, 0x7, 0xffffffffffffffff, 0x0) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000f1ffffff0000000000100000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x9}, 0x118ac, 0xc8, 0x0, 0x0, 0x2, 0xfffffffd, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) (async, rerun: 64) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (rerun: 64) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) 3.031191394s ago: executing program 1 (id=912): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7f, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x20000000}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000440)='kfree\x00', r4}, 0x10) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8943, &(0x7f0000000080)) 2.969192739s ago: executing program 1 (id=913): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xee, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="85000000130000005d0000000000000095000000000000000a621cf434b9eaafdc2a00e9bfde908990817b364e51afe9c8dab05b16a6437211f9f0570759f1cae63487ff68fffffffffffe8e3932e2b75a25a4cf8a9456aa8a701c318c67edb6e9330b53c0eeba8644311ba7541189070000f50c000000d8e5b1dc91c5499be2097784a94b6cc2d272ac751d8bce5db4862c1b2eab7007ceea158dbc329bab5f8450147b2b9629fdd6cdb5507d3a76dbaf6f93d161caa513f8aa41f795507856ea0015166c56ea0103220ed5a66834be086ef206a8606b04fc8462cbbe8233f381b4eefbdbdac708c1f4959cb6c008397006da8e243ec9fb19f3fab2b0f46d73a9f2d7c674cdbe4d7f76f5fbd05043e81f435fccf5063a93aa9b4c7f68670594"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x3, 0x0, 0x7, 0x1801, r1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0xffffffff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000fc0)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000c0000000a00000000000002040000000e000000030000040f0400000000000001000000070000000d0000000400000009000000050000000200000007000000002e3061002e2e2e5f613000194060104200c14721b5bd0dc9a99ae007e89209074f689108a76279e230e5c86f"], &(0x7f0000000780)=""/110, 0x60, 0x6e, 0x1, 0x26}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000800)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x77, &(0x7f00000008c0)=[{}], 0x8, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x76, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d80)={0x6, 0x16, &(0x7f0000000b40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x9, 0x8, 0x4, 0xfffffffffffffffc}, @ringbuf_query, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @ringbuf_query, @map_idx={0x18, 0x1, 0x5, 0x0, 0xd}]}, &(0x7f0000000c00)='syzkaller\x00', 0x5, 0xd0, &(0x7f0000000c40)=""/208, 0x40f00, 0x4c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000d40)=[{0x3, 0x4, 0x4, 0x5}], 0x10, 0x9}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000f00)={0x14, 0x28, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000003000000000000000200000018110000", @ANYRES32=r4, @ANYBLOB="0100000000000080b702000014000000b703000000e1ffff8400000083000000bf090000000000005509010000000000950000000000000085000000c8000000182b0000", @ANYRES32=r4, @ANYBLOB="000000000900000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000b7080000000000007b8af8ff00000000b7080000050000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f00000002c0)='GPL\x00', 0x396, 0x4d, &(0x7f0000000380)=""/77, 0x41000, 0x40, '\x00', r5, 0x8, r6, 0x8, &(0x7f0000000480)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, r7, r8, 0x8, &(0x7f0000000e40)=[0xffffffffffffffff], &(0x7f0000000e80)=[{0x5, 0x1, 0x5, 0x3}, {0x0, 0x3, 0xa, 0x7}, {0x5, 0x1, 0xc, 0x5}, {0x4, 0x4, 0x2}, {0x1, 0x1, 0x7, 0x5}, {0x4, 0x1, 0x9, 0x8}, {0x2, 0x5, 0x9, 0xb}, {0x4, 0x2, 0x0, 0xc}], 0x10, 0x4708}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b40)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xe5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xd00, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200}, 0x28) 2.841431419s ago: executing program 2 (id=914): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x74ab}, 0x0, 0x0, 0x0, 0x0, 0x8000000000000002, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3efa9766}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x1}, 0x0, 0x0, 0x0, 0xc, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, r1, 0x3) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/235, 0xeb}], 0x1}, 0x40000020) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d80)={0xffffffffffffffff, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000b00)=[0x0, 0x0], &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xce, &(0x7f0000000b80), 0x0, 0x10, &(0x7f0000000bc0), &(0x7f0000000c00), 0x8, 0xab, 0x8, 0x8, &(0x7f0000000c40)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001100)=@base={0x15, 0xfffffffe, 0xe, 0x5, 0x1b34, r4, 0x2, '\x00', r5, 0xffffffffffffffff, 0x2, 0x0, 0x6}, 0x48) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb0100180000ed5b0eff0000005300000054000000030000000f00000009000006040000000800000006000000c289e1864b940da605bfe9f1eae66b6106000000030000000e00000009000000050000b40000000004002103050000000a000000163400000a000000000800000a"], &(0x7f0000000540)=""/216, 0x6f, 0xd8, 0x1, 0x7ff}, 0x20) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='freezer.state\x00', 0x0, 0x0) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, '\x00', 0x0, r7, 0x0, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000014001100b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x0, 0x3, 0x9, 0x0, 0x1, 0x0, '\x00', r10, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x3}, 0x2d) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000004c0), &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x86, &(0x7f0000000540)=[{}, {}], 0x10, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x69, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r13 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0xf, &(0x7f0000000800)=ANY=[@ANYBLOB="180000000800000000000000070000001801000020206925000000000020205b7b1af8ff0000000071d500000000000007010000f8ffffffb702000008000000b703000000000080850000000600000018140000", @ANYRES32=0x1, @ANYBLOB="0000000000000000185a00000900000000000000000000009500000000000000"], &(0x7f0000000880)='syzkaller\x00', 0x0, 0xee, &(0x7f00000008c0)=""/238, 0x41000, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000009c0)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000a00)=[0x1, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1], &(0x7f0000000a40)=[{0x1, 0x2, 0xc, 0x6}, {0x1, 0x4, 0x3, 0x9}, {0x3, 0x3, 0xf, 0x4}, {0x5, 0x1, 0x4, 0x6}], 0x10, 0xff}, 0x90) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=@bloom_filter={0x1e, 0x3, 0x100, 0x2, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0xd}, 0x48) r15 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0xc, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000001811000063d8db0191cee0640b008c0f2b506ad530fda3dc4f6853c2c4d21e9b219acbce0d0cf62e3676e20739ed5d8080928231ddd7602e63f386f4d62dba2160a270d2693ff63f44aa195eed218163421ae718abc5335c34de2c6d9d8538b03f0cf0ad9bb0898ebfea5f922a32941bba752ba20190e53a26a1f3d73d909329dacf0cad5fd02776cc79e98e33bf9ba6b18b8fce918639144323391ec20a729900f2f62fd443e249ac33704f9b8723b28d8fe163582587ded372d5b9b40aae9abee6fad2e841181b9cb7f4d25b400856", @ANYRES32=r15, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r16 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x9, 0x40, 0x1, 0x6, 0x48, 0xffffffffffffffff, 0xf, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1c, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000100000000000000080000001811f900", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000006964180001000000bc7006000800000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000400000085000000060000001d8780000f00000018200000", @ANYRES32=r9, @ANYBLOB="000000000b000000bf91000000000000b7020000000000008500000084455825b7000000000000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x1, 0xff, &(0x7f0000000380)=""/255, 0x41100, 0x2, '\x00', r10, 0x14, r11, 0x8, &(0x7f00000002c0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0x0, 0x8001, 0x5}, 0x10, r12, r13, 0x0, &(0x7f0000000cc0)=[r14, r15, r16, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x8000, 0x9, 0x3, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x5}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x3, &(0x7f0000000f80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x5, 0x3a, &(0x7f0000000200)=""/58, 0x40f00, 0x75, '\x00', r5, 0x10, r7, 0x8, &(0x7f0000000380)={0x4, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0xc, 0xffffffdc, 0x3}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f0000000700)=[0x1, 0xffffffffffffffff, r17, r18, 0xffffffffffffffff], &(0x7f0000000740), 0x10, 0x686}, 0x90) sendmsg$tipc(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8085}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='neigh_update\x00', r0}, 0x10) 2.770928685s ago: executing program 1 (id=915): bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffda8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00', 0x0}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup, r1, 0x2}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r2, r3, 0x2, 0x2}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x46, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0xb, 0x9, 0x0, 0x2c4, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x78, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"/2356], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x17, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYRES8=r0, @ANYRES32=r7], 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000200)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_unlink_exit\x00', r9}, 0x10) unlink(0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001100)={0x0, r8}, 0xb) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x10) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000580), 0x12) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0795, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x75b9f028, 0x0, 0x4, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2.687992682s ago: executing program 1 (id=916): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000023"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x5}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000038000000380000000300000001000000000000010000ffff0f000000000000000000000105000000100000000000000000000003000000000100000002"], 0x0, 0x53}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r3}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8922, &(0x7f0000000080)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r5, &(0x7f0000000180)="954c3e29abc0441acea009122158c7ce04ec38ffd5569b068bdd867e772fd460a0e02b0cde7ebd18917de77b1143c563d5eea1d3d0fad0982feb9725636bdce28b8eb5de613c23e0539d662df2befd09c2a4b668b65a186805b438628b96a3fc579827dc4294eb8a6fcb829640a641bf767b33f5a7959a259faf9db0d7b26026d1b216882d48a022e2e23a2e"}, 0x20) 2.565061422s ago: executing program 1 (id=918): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x8, 0x0, 0x4, 0xff, 0x188d, 0xffffffffffffffff, 0x2000000}, 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x8, 0x0, 0x4, 0xff, 0x188d, 0xffffffffffffffff, 0x2000000}, 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1}, 0x0, &(0x7f00000002c0)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000001200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) syz_clone(0x4d100000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000007b111000000000009500396baa80e499"], &(0x7f0000001240)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='mm_page_free_batched\x00', r8}, 0x10) syz_clone(0x8001500, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x8001500, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r4, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000001280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) (async) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000001280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{}, &(0x7f0000000000), &(0x7f0000000200)=r9}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000200)=r9}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, r10}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, r10}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r11}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r12) r13 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r13, &(0x7f0000000300)=0xffffffffffffffff, 0x12) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)) 2.303071043s ago: executing program 0 (id=921): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xee, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x3, 0x0, 0x7, 0x1801, r2, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0xffffffff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000fc0)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000c0000000a00000000000002040000000e000000030000040f0400000000000001000000070000000d0000000400000009000000050000000200000007000000002e3061002e2e2e5f613000194060104200c14721b5bd0dc9a99ae007e89209074f689108a76279e230e5c86f"], &(0x7f0000000780)=""/110, 0x60, 0x6e, 0x1, 0x26}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000800)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x77, &(0x7f00000008c0)=[{}], 0x8, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x76, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d80)={0x6, 0x16, &(0x7f0000000b40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x9, 0x8, 0x4, 0xfffffffffffffffc}, @ringbuf_query, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @ringbuf_query, @map_idx={0x18, 0x1, 0x5, 0x0, 0xd}]}, &(0x7f0000000c00)='syzkaller\x00', 0x5, 0xd0, &(0x7f0000000c40)=""/208, 0x40f00, 0x4c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000d40)=[{0x3, 0x4, 0x4, 0x5}], 0x10, 0x9}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000f00)={0x14, 0x28, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000003000000000000000200000018110000", @ANYRES32=r5, @ANYBLOB="0100000000000080b702000014000000b703000000e1ffff8400000083000000bf090000000000005509010000000000950000000000000085000000c8000000182b0000", @ANYRES32=r5, @ANYBLOB="000000000900000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000b7080000000000007b8af8ff00000000b7080000050000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f00000002c0)='GPL\x00', 0x396, 0x4d, &(0x7f0000000380)=""/77, 0x41000, 0x40, '\x00', r6, 0x8, r7, 0x8, &(0x7f0000000480)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, r8, r9, 0x8, &(0x7f0000000e40)=[0xffffffffffffffff], &(0x7f0000000e80)=[{0x5, 0x1, 0x5, 0x3}, {0x0, 0x3, 0xa, 0x7}, {0x5, 0x1, 0xc, 0x5}, {0x4, 0x4, 0x2}, {0x1, 0x1, 0x7, 0x5}, {0x4, 0x1, 0x9, 0x8}, {0x2, 0x5, 0x9, 0xb}, {0x4, 0x2, 0x0, 0xc}], 0x10, 0x4708}, 0x90) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b40)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xe5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x20, 0x14, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @jmp={0x5, 0x1, 0xa, 0x3, 0x8, 0x4, 0x8}]}, &(0x7f0000000300)='GPL\x00', 0x4, 0x8c, &(0x7f0000000580)=""/140, 0x40f00, 0x5, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x4, 0x6, 0xb26c, 0x5}, 0x10, r8, r0, 0x9, &(0x7f0000000840)=[r10, r3, r4, r2], &(0x7f0000000bc0)=[{0x0, 0x2, 0x9, 0x4}, {0x0, 0x2, 0x1, 0x9}, {0x4, 0x4, 0xc}, {0x4, 0x2, 0xa, 0x6}, {0x0, 0x5, 0xd, 0x1}, {0x1, 0x5, 0x3, 0xc}, {0x1, 0x2, 0x6, 0x2}, {0x3, 0x4, 0x3, 0x1}, {0x4, 0x3, 0x0, 0x5}], 0x10, 0xaf9}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xd00, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200}, 0x28) 2.156251315s ago: executing program 3 (id=922): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x19, 0x4, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x15}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1, 0xffffffffffffffff}, 0x0, &(0x7f0000000240)=r0}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r2, 0x58, &(0x7f0000000580)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x3a, &(0x7f0000000300)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000500), 0x8, 0x13, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0xff00, 0x0, 0x0, 0x0, 0x3f000000}, {{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r6}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 2.144434126s ago: executing program 0 (id=923): openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, &(0x7f00000002c0)}, 0xfffffffffffffe9e) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000f3ff0000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102036c00fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x58, &(0x7f0000000300)}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r7}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000800)='fib6_table_lookup\x00', r2}, 0x10) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x7ffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) 2.09083284s ago: executing program 0 (id=924): bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffda8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5, r2}, 0x38) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) (async) perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_unlink_exit\x00', r1}, 0x10) (async) unlink(0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfdef) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x10) (async) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000580), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000800)="72add0ac91978df642f4c3b6b68dfc84c70329e0eff6b39e74239de297b12dbd4acc32317de65f3b", &(0x7f00000008c0)=""/148}, 0x20) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) (async) sendmsg$inet(r4, &(0x7f0000000980)={&(0x7f00000001c0)={0x2, 0x4e21, @empty}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000300)='*', 0x1}, {&(0x7f00000003c0)}, {&(0x7f00000006c0)="bebbc11363c79d4d7f3c33bf1aa81879466e89eaacb094f196dfa19a33fd612767de2cffa178d157e30d51ddd9399420542dad80b61193ac2f0770fc07737fbf58146333e60ce611226ce4bef15cecff9fca985a17ddb6510c083d8377d36b7a90b09331335801df8a6d354c8fd3333634dfe07eb3f65bea68c19525ec0caa775afe5565092441ced85e2b9b9b704c7fdbb122f602a5c8be32f345d063f71ce307c4b23eb7809819fc1892b01cc525f317d0", 0xb2}], 0x3}, 0x20000044) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) 2.027025426s ago: executing program 0 (id=925): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xee, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x3, 0x0, 0x7, 0x1801, r2, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0xffffffff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000fc0)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000c0000000a00000000000002040000000e000000030000040f0400000000000001000000070000000d0000000400000009000000050000000200000007000000002e3061002e2e2e5f613000194060104200c14721b5bd0dc9a99ae007e89209074f689108a76279e230e5c86f"], &(0x7f0000000780)=""/110, 0x60, 0x6e, 0x1, 0x26}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000800)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x77, &(0x7f00000008c0)=[{}], 0x8, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x76, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d80)={0x6, 0x16, &(0x7f0000000b40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x9, 0x8, 0x4, 0xfffffffffffffffc}, @ringbuf_query, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @ringbuf_query, @map_idx={0x18, 0x1, 0x5, 0x0, 0xd}]}, &(0x7f0000000c00)='syzkaller\x00', 0x5, 0xd0, &(0x7f0000000c40)=""/208, 0x40f00, 0x4c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000d40)=[{0x3, 0x4, 0x4, 0x5}], 0x10, 0x9}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000f00)={0x14, 0x28, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000003000000000000000200000018110000", @ANYRES32=r6, @ANYBLOB="0100000000000080b702000014000000b703000000e1ffff8400000083000000bf090000000000005509010000000000950000000000000085000000c8000000182b0000", @ANYRES32=r6, @ANYBLOB="000000000900000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000b7080000000000007b8af8ff00000000b7080000050000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f00000002c0)='GPL\x00', 0x396, 0x4d, &(0x7f0000000380)=""/77, 0x41000, 0x40, '\x00', r7, 0x8, r8, 0x8, &(0x7f0000000480)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, r9, r10, 0x8, &(0x7f0000000e40)=[0xffffffffffffffff], &(0x7f0000000e80)=[{0x5, 0x1, 0x5, 0x3}, {0x0, 0x3, 0xa, 0x7}, {0x5, 0x1, 0xc, 0x5}, {0x4, 0x4, 0x2}, {0x1, 0x1, 0x7, 0x5}, {0x4, 0x1, 0x9, 0x8}, {0x2, 0x5, 0x9, 0xb}, {0x4, 0x2, 0x0, 0xc}], 0x10, 0x4708}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x20, 0x14, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @jmp={0x5, 0x1, 0xa, 0x3, 0x8, 0x4, 0x8}]}, &(0x7f0000000300)='GPL\x00', 0x4, 0x8c, &(0x7f0000000580)=""/140, 0x40f00, 0x5, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x4, 0x6, 0xb26c, 0x5}, 0x10, r9, r0, 0x9, &(0x7f0000000840)=[0xffffffffffffffff, r3, r4, r2], &(0x7f0000000bc0)=[{0x0, 0x2, 0x9, 0x4}, {0x0, 0x2, 0x1, 0x9}, {0x4, 0x4, 0xc}, {0x4, 0x2, 0xa, 0x6}, {0x0, 0x5, 0xd, 0x1}, {0x1, 0x5, 0x3, 0xc}, {0x1, 0x2, 0x6, 0x2}, {0x3, 0x4, 0x3, 0x1}, {0x4, 0x3, 0x0, 0x5}], 0x10, 0xaf9}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xd00, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200}, 0x28) 2.014476267s ago: executing program 2 (id=926): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x7, 0xfff, 0x9}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000008007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000120000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='tlb_flush\x00', r8}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYRESHEX=r7, @ANYRES16=0x0, @ANYBLOB="00000000000a0000b708007cb2d35f00000000007b8aff0100000000bfa200000000000007020000f8ffffffb70300000800ffffff7f000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x57fd}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1a09be3e74b6e71a1d00000000000007010000f8ffffffb702000008000000b70300000000a5df8500f6002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc83, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000380)='task_rename\x00', r2}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r10}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) close(r9) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r5) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 1.787313245s ago: executing program 0 (id=927): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYRES32, @ANYRESDEC=0x0], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0xfffffff6) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYRESOCT, @ANYRESHEX=r0], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES16=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x14, 0x5, 0x400, 0x1, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000713239000000f60063e990fd00000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc}, 0x80) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r7, 0x8010743f, 0x2000000c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r8}, 0x10) 1.401688177s ago: executing program 3 (id=928): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="8f0ccb7907081175f37538e486dd"], 0xfdef) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x10) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0xe9, 0x0, 0x0, 0x0, 0x0, 0xb08e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="110000002096000000000000000001"], 0x60}, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000006c0)={&(0x7f00000002c0)="a52c099854ca2c", 0x0, 0x0, 0x0, 0xffffffff}, 0x38) (async) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[], 0xffbf) (async) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) 1.089379372s ago: executing program 3 (id=929): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x7, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x2}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d00000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) (async) socketpair(0x0, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{}, 0x0, &(0x7f0000000340)='%pK \x00'}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095", @ANYRES64=r2, @ANYRES64=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="00000000000000007b8af8ff00110000bfa200000000000007020000f8ffffffb74d1e803748254fcc556586acc3b12503000008000000b7040000f600000085000000430000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r3}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) (async) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xf, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000c10000000000000004009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa}, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2c, 0x0, 0x0) (async) socketpair(0x18, 0x0, 0x2, &(0x7f0000000040)) 1.038100006s ago: executing program 2 (id=930): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) write$cgroup_freezer_state(r4, &(0x7f00000001c0)='FROZEN\x00', 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00'}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7538e475dd6317cebb03c23c00fe80000000000000875a65969ff57b00000400000000000000040000ac"], 0xfe1b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="c05a1962dfcb2d8cd32962d13e275ce4df2e910398de554bd014750a7f2bea0201e6832f804a3f1fb698246aff6c5618b44eaf3fd094f586d0e58eadfb3c997c81091c7f036d6f0e5a030000000030447e66cb23535818adfe829d43cda5b2f453dc08ddaf3f81459df93b55f0767bb42ce4fa529d3a4cfc7427aa4df83087f40acff65e03300aeb95a611d2b0a403819619", @ANYRES8=r3, @ANYBLOB="0000000000000000950000000000000045", @ANYRESDEC, @ANYBLOB="c7c4eaaf7726b2e04fce19172e09cfb066", @ANYRES32=r1, @ANYBLOB="ef1121e0fee1c776684d2884164413ccaa178701fb6c8055aa7c503ce8", @ANYRES32=r3, @ANYRES64=r0, @ANYRES64], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000010040)}, 0x38) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc, 0x0, 0x4, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.sectors\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xfb, 0x0, 0x2, 0x0, 0x0, 0x8cd2bb9f04693392, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100003}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r6, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x0) ioctl$PERF_EVENT_IOC_RESET(r7, 0x2403, 0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$SIOCSIFHWADDR(r5, 0x8b34, &(0x7f0000000000)={'wlan1\x00', @random='\\\x00\x00 \x00'}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000dfffffffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.037612066s ago: executing program 3 (id=931): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="61106800000000006113740000000000bfa00000000000000700000008ffffffd503010017740040950000000000000069163a0000000000bf67000000000000350607000fff07201706000020190000160300000ee60060bf050000000000007b650000000000006507f9ff01000000070700004d83dde4c375000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f17540faf80250aa20c669a5e12814cb1cea5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369226066812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000400c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44221b235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20ceddf4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10fd7ed6735154beb4000000000000000000000000004000bc00f6746a9709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43ea0ffb567b40407d000000210000000000000000005f37d8703f37ca364a601ae899a56715a0a62a34c1d926a0f6a5480a55c22fe3a5ac00000000000000000000000500002000000000fb79ea00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e14d90deae46e26c596f84eba90000000000000000fffb0000000082fb0d3cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b06ff7f0000000000007f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a1f37302f3b41eae59809fd05d12f6106f117b062df67d3a6473265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089e0b1c23c0f3cdad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a1a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631d22bad050e9856b48ae3a03a497c37758537650fe6db89da3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0af1cb3f1f815f8989d78854ca4d3116dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4c6ea9604faf0453bedf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c29984864961a57ff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee15620789c524b3baf49a09d8be0fc5beecf153236c19740be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2b4dc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca87ddd9d064e081383409ed2912c811ae63f03212a5331c2a4ead000000000000000000000000000000000000000000000000001386866b311bd144bc32e059658c9f8342c90c1ade31b78072841b8b5a943d62a44cea6b050c42e3c205fad6a23fb43c93da0f49d911877265e6ee443e37397ecf89021e7f579e8d3a74c12b52938d91e9de07fc8eeeb9505f4a9c26266bf5449484ccc1317c7476"], &(0x7f0000000100)='GPL\x00'}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x2000000, 0x4, 0x0, 0x80000001}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x7}, @exit], &(0x7f0000000180)='GPL\x00', 0x3, 0xe5, &(0x7f0000000240)=""/229, 0x0, 0x1c}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FROZEN\x00', 0x7) openat$cgroup_int(r2, &(0x7f00000000c0)='cpu.idle\x00', 0x2, 0x0) mkdirat$cgroup(r2, &(0x7f0000000100)='syz1\x00', 0x1ff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0xb}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='page_pool_state_hold\x00', r1}, 0x10) perf_event_open$cgroup(&(0x7f0000000440)={0x3, 0x80, 0xae, 0x81, 0x1f, 0x0, 0x0, 0x8000000000000000, 0xa02, 0x12, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x80000000, 0x0, @perf_config_ext={0xffff, 0x401}, 0x2008, 0x81, 0x162, 0xc935dc671fc73eea, 0x40, 0xfc6, 0xff}, r3, 0x7, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0), 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) write$cgroup_int(r5, &(0x7f0000000280)=0x5, 0x12) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xfb, 0x9, 0x2, 0x6, 0x0, 0x10000000000, 0x8040, 0x6, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x1, @perf_config_ext={0xfffffffffffffa16, 0x9}, 0x2040, 0x0, 0xffff, 0x0, 0x8001, 0xfffffe01, 0x40, 0x0, 0x40, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000340)='syzkaller\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1739, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x5c00, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_bp={0x0}, 0x800, 0x0, 0x0, 0xc, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x3) 801.453165ms ago: executing program 2 (id=932): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000010000000000000000000018110000b2caeb6b4e69625a68bf3f2d941a0abab0fddaeeb8817f08826f092247", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0xc}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0xae9, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@fwd, @volatile]}}, 0x0, 0x32}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r10}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r9}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8922, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r6, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0), ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x0, 0x42, &(0x7f0000000600), 0x0, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x7c, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0xf, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0xb3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}}]}, &(0x7f0000000340)='syzkaller\x00', 0x3, 0x8c, &(0x7f0000000380)=""/140, 0x41000, 0x57, '\x00', r12, 0x25, r5, 0x8, &(0x7f0000000880)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000008c0)=[0xffffffffffffffff, r7, r4], &(0x7f0000000940)=[{0x4, 0x2, 0x20010, 0x5}, {0x2, 0x2, 0x1, 0x7}, {0x2, 0x0, 0x7, 0x6}], 0x10, 0xc1be10ef}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="85000000c50000001862000002000000000000000004000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008070000b7040000020000008500000082000000"], &(0x7f0000000200)='syzkaller\x00', 0x3ff, 0xec, &(0x7f0000000580)=""/236, 0x41100, 0x62, '\x00', r12, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000003c0)={0x5, 0x8, 0x4800, 0xc79b}, 0x10, 0x3ccd, 0xffffffffffffffff, 0x7, 0x0, &(0x7f00000004c0)=[{0x5, 0x5, 0xd, 0x2}, {0x4, 0x5, 0x0, 0x8}, {0x1, 0x2, 0xc, 0xb}, {0x1, 0x1, 0xa, 0x4}, {0x0, 0x3, 0x2, 0xa}, {0x5, 0x4, 0x8000000, 0x4}, {0x2, 0x4, 0x2, 0xc}], 0x10, 0x3}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r3}, &(0x7f0000000040), &(0x7f0000000140)=r2}, 0x20) 376.27528ms ago: executing program 2 (id=933): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x9) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) socketpair(0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000540)="11c1e3b184aa34fda7e5b55f8f332ae16dd7fbc8609e5797df6c6637fb461348e8c7eefc88890f3c45418826c62822d6744539cbb0a63bce49439cdea38d867a860ff7eafcb392d72a38bf6d5f0b2a52055c05d8c875921425b7e1f27495c500da25dbe248aff87fe2bfa47eb82e0d6978213c40a57e7c386d6ba4954b5e9a731b3de477c03794ee45fe831c933525f6881452711886d4144bcb37e08be5bb6fdfb1ff9af59749c9e7d0d5307ca9c3ed9a", 0xb1}, {&(0x7f0000000280)="b774d1aaf507a71ed40ec80c3295ac14bad435027d05ac10b2e65d5c3ff8f07cec4d62f316e8165c91197b2bf2dc10936a2c9adc95aad8543ea31e85bea4124c95d103ae5f9951a75c367e4d793bc980f1215f11c14a7185d9abbe3286f473df67d4b7139cf03e9f7bcbd9903e98d52be86adc", 0x73}], 0x2, &(0x7f0000000600)="ffb781855333a0044d2de1bba340f6af947d6337c6fa008ef59935a5135096cf9660c110e09927269da09d35bf8ff99265af0ae33befd69be85127d0d2a9bb5bd33d6d32504a48327cd0ec3003e7522ba07859a0c9fc6b3b618b15cdb6b8655c44a9175d177ae1e9363e2fe5c354d1703b4eef5185068660d5393e350370f85aadb4c6aa9a4e534649a7a79ae1dd6c3d51ee4ccab4357a55bdc3b6494a474c79", 0xa0, 0x40001}, 0x1) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) 179.217406ms ago: executing program 2 (id=934): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000b98cad95850000000300000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000100000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) sendmsg$unix(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[@ANYBLOB='1-8:5/'], 0x31) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) write$cgroup_subtree(r8, &(0x7f0000000440)=ANY=[], 0xfdef) 167.562977ms ago: executing program 3 (id=935): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000140)=r0}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r4, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r5}, 0x10) r7 = gettid() bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r3, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@struct={0xa, 0x6, 0x0, 0x4, 0x1, 0x8, [{0x1, 0x4, 0x4c42}, {0xa, 0x5, 0x8}, {0x6, 0x2, 0x7fff}, {0x4, 0x2}, {0x4, 0x2, 0x1000}, {0x8, 0x3, 0x7}]}, @restrict={0xa, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x5f]}}, &(0x7f0000000b00)=""/4096, 0x7b, 0x1000, 0x0, 0x1}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x3, '\x00', r8, r9, 0x2, 0x5, 0x4}, 0x48) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x5, 0xf7, 0x5, 0x5, 0x0, 0xe, 0x14014, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x0, @perf_bp={&(0x7f00000001c0), 0x3}, 0x2000, 0x4, 0x1, 0x7, 0x978, 0x4, 0x2, 0x0, 0x2, 0x0, 0xf6b}, r7, 0x3, r6, 0x8) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 144.884459ms ago: executing program 3 (id=936): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x8, 0x7fe4, 0x1}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xe, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = syz_clone(0x56002000, &(0x7f0000000540)="233415a965af2874d9a09383c67333da7173c9d52ef29c66f7f3655aec64a7f12a60b5d466594087802bc1fd0938b9008bb58b68f930942f13dc72dfc8b17ef77054b786880a7227a446aca0e51dac646f0499ae2d4905c263e6f108054b8989fc52d31d26886dcb1b504b117370353a50778683ef2970a37680bc16dfd1e7ecd9752dddd17bf2dcee0da0a4bad3b2a0ed52d5f274ed0e2e1a0c6a2449ea25f45539789a216910f85a858750b779e88b7275ae82d7a269af97a96fc401cf53d12953d83bd039ece6152b98c2374ab807b7dbe5a9ac526c84b84c96704937968eb2953f836fcabdac2404be91241d68ca2e030840", 0xf4, &(0x7f0000000280), &(0x7f00000003c0), &(0x7f0000000640)="bd17cf29d7a5bfc658f02c467a3c71cebd20ad159e867990e9209fd079a2a8fbfa66670aeedf9811d77b8927fc2eec46fa18976f756330c41d8a8953af24ff717787fd9e196f830cbdee5a92edc5ab725350f8134013d5c16626f0c523eee87956fdc71db04dd243d18ca826138b8b720749445d80e5bac4569e0ae7e05958db283b131a8444bb41662aa44daa01ea8a594b482431b3c3a01b65c5b042f8f1ee00e5abd445788b9284a853267f38b230d4d4f7") r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000780)={r8, &(0x7f0000000740)="6acbe692a03a4f85a1b877a488f1cd1ab5a56f0b546382a845d68ee8c47021f5eb7ce743", &(0x7f0000000880)=""/199, 0x4}, 0x20) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x91, 0xff, 0x0, 0x4, 0x0, 0x10, 0x8010, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0x5}, 0x40, 0x0, 0xf, 0x2, 0xffff, 0x1, 0xfffb, 0x0, 0x0, 0x0, 0x3}, r7, 0x10, r0, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/235, 0xeb}], 0x1}, 0x40000020) sendmsg$tipc(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8084}, 0x0) 0s ago: executing program 0 (id=937): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xee, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="85000000130000005d0000000000000095000000000000000a621cf434b9eaafdc2a00e9bfde908990817b364e51afe9c8dab05b16a6437211f9f0570759f1cae63487ff68fffffffffffe8e3932e2b75a25a4cf8a9456aa8a701c318c67edb6e9330b53c0eeba8644311ba7541189070000f50c000000d8e5b1dc91c5499be2097784a94b6cc2d272ac751d8bce5db4862c1b2eab7007ceea158dbc329bab5f8450147b2b9629fdd6cdb5507d3a76dbaf6f93d161caa513f8aa41f795507856ea0015166c56ea0103220ed5a66834be086ef206a8606b04fc8462cbbe8233f381b4eefbdbdac708c1f4959cb6c008397006da8e243ec9fb19f3fab2b0f46d73a9f2d7c674cdbe4d7f76f5fbd05043e81f435fccf5063a93aa9b4c7f68670594"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x3, 0x0, 0x7, 0x1801, r2, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0xffffffff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000fc0)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000c0000000a00000000000002040000000e000000030000040f0400000000000001000000070000000d0000000400000009000000050000000200000007000000002e3061002e2e2e5f613000194060104200c14721b5bd0dc9a99ae007e89209074f689108a76279e230e5c86f"], &(0x7f0000000780)=""/110, 0x60, 0x6e, 0x1, 0x26}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000800)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x77, &(0x7f00000008c0)=[{}], 0x8, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x76, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d80)={0x6, 0x16, &(0x7f0000000b40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x9, 0x8, 0x4, 0xfffffffffffffffc}, @ringbuf_query, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @ringbuf_query, @map_idx={0x18, 0x1, 0x5, 0x0, 0xd}]}, &(0x7f0000000c00)='syzkaller\x00', 0x5, 0xd0, &(0x7f0000000c40)=""/208, 0x40f00, 0x4c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000d40)=[{0x3, 0x4, 0x4, 0x5}], 0x10, 0x9}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000f00)={0x14, 0x28, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000003000000000000000200000018110000", @ANYRES32=r6, @ANYBLOB="0100000000000080b702000014000000b703000000e1ffff8400000083000000bf090000000000005509010000000000950000000000000085000000c8000000182b0000", @ANYRES32=r6, @ANYBLOB="000000000900000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000b7080000000000007b8af8ff00000000b7080000050000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f00000002c0)='GPL\x00', 0x396, 0x4d, &(0x7f0000000380)=""/77, 0x41000, 0x40, '\x00', r7, 0x8, r8, 0x8, &(0x7f0000000480)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, r9, r10, 0x8, &(0x7f0000000e40)=[0xffffffffffffffff], &(0x7f0000000e80)=[{0x5, 0x1, 0x5, 0x3}, {0x0, 0x3, 0xa, 0x7}, {0x5, 0x1, 0xc, 0x5}, {0x4, 0x4, 0x2}, {0x1, 0x1, 0x7, 0x5}, {0x4, 0x1, 0x9, 0x8}, {0x2, 0x5, 0x9, 0xb}, {0x4, 0x2, 0x0, 0xc}], 0x10, 0x4708}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x20, 0x14, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @jmp={0x5, 0x1, 0xa, 0x3, 0x8, 0x4, 0x8}]}, &(0x7f0000000300)='GPL\x00', 0x4, 0x8c, &(0x7f0000000580)=""/140, 0x40f00, 0x5, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x4, 0x6, 0xb26c, 0x5}, 0x10, r9, r0, 0x9, &(0x7f0000000840)=[0xffffffffffffffff, r3, r4, r2], &(0x7f0000000bc0)=[{0x0, 0x2, 0x9, 0x4}, {0x0, 0x2, 0x1, 0x9}, {0x4, 0x4, 0xc}, {0x4, 0x2, 0xa, 0x6}, {0x0, 0x5, 0xd, 0x1}, {0x1, 0x5, 0x3, 0xc}, {0x1, 0x2, 0x6, 0x2}, {0x3, 0x4, 0x3, 0x1}, {0x4, 0x3, 0x0, 0x5}], 0x10, 0xaf9}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xd00, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200}, 0x28) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.96' (ED25519) to the list of known hosts. [ 22.967804][ T30] audit: type=1400 audit(1723348579.924:66): avc: denied { integrity } for pid=281 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 22.991654][ T30] audit: type=1400 audit(1723348579.954:67): avc: denied { mounton } for pid=281 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.993121][ T281] cgroup: Unknown subsys name 'net' [ 23.014233][ T30] audit: type=1400 audit(1723348579.954:68): avc: denied { mount } for pid=281 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.041218][ T30] audit: type=1400 audit(1723348579.974:69): avc: denied { unmount } for pid=281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.041423][ T281] cgroup: Unknown subsys name 'devices' [ 23.273485][ T281] cgroup: Unknown subsys name 'hugetlb' [ 23.278910][ T281] cgroup: Unknown subsys name 'rlimit' [ 23.501691][ T30] audit: type=1400 audit(1723348580.464:70): avc: denied { setattr } for pid=281 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.524704][ T30] audit: type=1400 audit(1723348580.464:71): avc: denied { mounton } for pid=281 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.549212][ T30] audit: type=1400 audit(1723348580.464:72): avc: denied { mount } for pid=281 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 23.577626][ T284] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 23.586306][ T30] audit: type=1400 audit(1723348580.544:73): avc: denied { relabelto } for pid=284 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.611683][ T30] audit: type=1400 audit(1723348580.544:74): avc: denied { write } for pid=284 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 23.686142][ T30] audit: type=1400 audit(1723348580.644:75): avc: denied { read } for pid=281 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.711854][ T281] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 24.322781][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.329728][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.337297][ T291] device bridge_slave_0 entered promiscuous mode [ 24.345044][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.351909][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.359070][ T291] device bridge_slave_1 entered promiscuous mode [ 24.451236][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.458100][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.465537][ T292] device bridge_slave_0 entered promiscuous mode [ 24.481613][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.488467][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.495893][ T292] device bridge_slave_1 entered promiscuous mode [ 24.540972][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.547829][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.555290][ T293] device bridge_slave_0 entered promiscuous mode [ 24.562131][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.568971][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.576370][ T293] device bridge_slave_1 entered promiscuous mode [ 24.645787][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.652704][ T295] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.659833][ T295] device bridge_slave_0 entered promiscuous mode [ 24.666622][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.673602][ T295] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.680909][ T295] device bridge_slave_1 entered promiscuous mode [ 24.687229][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.694237][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.701484][ T294] device bridge_slave_0 entered promiscuous mode [ 24.712257][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.719195][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.726362][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.733210][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.744851][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.751745][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.758895][ T294] device bridge_slave_1 entered promiscuous mode [ 24.907928][ T63] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.915201][ T63] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.924770][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.932029][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.975848][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.983318][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.991598][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.998514][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.005784][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.013746][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.020601][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.039232][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.047487][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.054345][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.061512][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.069479][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.076331][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.083514][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.124458][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.132227][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.139949][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.147887][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.173283][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.181134][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.188619][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.196739][ T63] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.203588][ T63] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.211315][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.219459][ T63] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.226327][ T63] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.233535][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.257948][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.266092][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.274347][ T63] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.281206][ T63] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.288553][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.296931][ T63] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.303787][ T63] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.310969][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.318717][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.326749][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.334040][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.341981][ T63] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.348802][ T63] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.356219][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.363694][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.383267][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.391183][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.398899][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.406880][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.414850][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.423556][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.431684][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.439486][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.447800][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.455155][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.472001][ T293] device veth0_vlan entered promiscuous mode [ 25.481711][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 25.490077][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.498213][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.505176][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.512464][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.520257][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.528123][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.536207][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.544339][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.551627][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.560837][ T295] device veth0_vlan entered promiscuous mode [ 25.571910][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.580130][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.594288][ T293] device veth1_macvtap entered promiscuous mode [ 25.602648][ T292] device veth0_vlan entered promiscuous mode [ 25.611501][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.619612][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.628199][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.636241][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.644210][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.651731][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.659638][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.667651][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.675350][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.683250][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.691156][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.698992][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.706375][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.713706][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.721058][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.729049][ T291] device veth0_vlan entered promiscuous mode [ 25.739064][ T292] device veth1_macvtap entered promiscuous mode [ 25.752277][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.760912][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.768806][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.776382][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.784889][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.793065][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.801136][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.813405][ T295] device veth1_macvtap entered promiscuous mode [ 25.834315][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.842484][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.850458][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.858011][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.866548][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.874750][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.882913][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.891073][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.899076][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.907236][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.915247][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.933193][ T291] device veth1_macvtap entered promiscuous mode [ 25.939991][ T294] device veth0_vlan entered promiscuous mode [ 25.947955][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.956255][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.964403][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.972752][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.980801][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.988161][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.995925][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.020575][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.027844][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.044458][ T294] device veth1_macvtap entered promiscuous mode [ 26.064837][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.080891][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.094106][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.102457][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.120637][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.128775][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.137178][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.171154][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.179407][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.197749][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.206470][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.462073][ C1] hrtimer: interrupt took 25883 ns [ 27.370799][ C0] Illegal XDP return value 16128, expect packet loss! [ 27.592215][ T413] device veth1_macvtap left promiscuous mode [ 31.726655][ T573] FAULT_INJECTION: forcing a failure. [ 31.726655][ T573] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 31.739919][ T573] CPU: 1 PID: 573 Comm: syz.0.81 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 31.749377][ T573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 31.759282][ T573] Call Trace: [ 31.762391][ T573] [ 31.765172][ T573] dump_stack_lvl+0x151/0x1b7 [ 31.769680][ T573] ? io_uring_drop_tctx_refs+0x190/0x190 [ 31.775153][ T573] dump_stack+0x15/0x17 [ 31.779143][ T573] should_fail+0x3c6/0x510 [ 31.783394][ T573] should_fail_usercopy+0x1a/0x20 [ 31.788252][ T573] _copy_from_user+0x20/0xd0 [ 31.792677][ T573] __sys_bpf+0x1e9/0x760 [ 31.796757][ T573] ? fput_many+0x160/0x1b0 [ 31.801014][ T573] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 31.806220][ T573] ? debug_smp_processor_id+0x17/0x20 [ 31.811423][ T573] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 31.817328][ T573] __x64_sys_bpf+0x7c/0x90 [ 31.821578][ T573] do_syscall_64+0x3d/0xb0 [ 31.825832][ T573] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 31.831659][ T573] RIP: 0033:0x7f319c0239f9 [ 31.835900][ T573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 31.855430][ T573] RSP: 002b:00007f319aca3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 31.863676][ T573] RAX: ffffffffffffffda RBX: 00007f319c1b1f80 RCX: 00007f319c0239f9 [ 31.871489][ T573] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 31.879297][ T573] RBP: 00007f319aca3090 R08: 0000000000000000 R09: 0000000000000000 [ 31.887107][ T573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 31.894919][ T573] R13: 0000000000000000 R14: 00007f319c1b1f80 R15: 00007ffd0adc4878 [ 31.902733][ T573] [ 32.824184][ T623] FAULT_INJECTION: forcing a failure. [ 32.824184][ T623] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 32.837334][ T623] CPU: 1 PID: 623 Comm: syz.4.99 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 32.846793][ T623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 32.856685][ T623] Call Trace: [ 32.859807][ T623] [ 32.862588][ T623] dump_stack_lvl+0x151/0x1b7 [ 32.867099][ T623] ? io_uring_drop_tctx_refs+0x190/0x190 [ 32.872574][ T623] ? kstrtouint_from_user+0x20a/0x2a0 [ 32.877786][ T623] ? kstrtol_from_user+0x310/0x310 [ 32.882736][ T623] ? avc_has_perm_noaudit+0x348/0x430 [ 32.887934][ T623] dump_stack+0x15/0x17 [ 32.891922][ T623] should_fail+0x3c6/0x510 [ 32.896178][ T623] should_fail_usercopy+0x1a/0x20 [ 32.901033][ T623] strncpy_from_user+0x24/0x2d0 [ 32.905723][ T623] bpf_prog_load+0x185/0x1b50 [ 32.910240][ T623] ? map_freeze+0x370/0x370 [ 32.914586][ T623] ? selinux_bpf+0xcb/0x100 [ 32.918915][ T623] ? security_bpf+0x82/0xb0 [ 32.923257][ T623] __sys_bpf+0x4bc/0x760 [ 32.927331][ T623] ? fput_many+0x160/0x1b0 [ 32.931585][ T623] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 32.936799][ T623] ? debug_smp_processor_id+0x17/0x20 [ 32.942000][ T623] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 32.947902][ T623] __x64_sys_bpf+0x7c/0x90 [ 32.952157][ T623] do_syscall_64+0x3d/0xb0 [ 32.956408][ T623] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 32.962136][ T623] RIP: 0033:0x7f76e07e19f9 [ 32.966392][ T623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 32.985832][ T623] RSP: 002b:00007f76df461038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 32.994075][ T623] RAX: ffffffffffffffda RBX: 00007f76e096ff80 RCX: 00007f76e07e19f9 [ 33.001886][ T623] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 33.009704][ T623] RBP: 00007f76df461090 R08: 0000000000000000 R09: 0000000000000000 [ 33.017509][ T623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 33.025324][ T623] R13: 0000000000000000 R14: 00007f76e096ff80 R15: 00007fff1caf6468 [ 33.033139][ T623] [ 33.036216][ T30] kauditd_printk_skb: 37 callbacks suppressed [ 33.036230][ T30] audit: type=1400 audit(1723348589.794:113): avc: denied { create } for pid=617 comm="syz.0.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 33.063182][ T30] audit: type=1400 audit(1723348589.994:114): avc: denied { read } for pid=82 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 33.589061][ T30] audit: type=1400 audit(1723348590.544:115): avc: denied { cpu } for pid=656 comm="syz.1.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 33.612583][ T657] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.619675][ T657] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.668144][ T30] audit: type=1400 audit(1723348590.564:116): avc: denied { write } for pid=656 comm="syz.1.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 33.852052][ T663] FAULT_INJECTION: forcing a failure. [ 33.852052][ T663] name failslab, interval 1, probability 0, space 0, times 1 [ 33.871389][ T663] CPU: 0 PID: 663 Comm: syz.2.111 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 33.881126][ T663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 33.891030][ T663] Call Trace: [ 33.894145][ T663] [ 33.896922][ T663] dump_stack_lvl+0x151/0x1b7 [ 33.901436][ T663] ? io_uring_drop_tctx_refs+0x190/0x190 [ 33.906906][ T663] dump_stack+0x15/0x17 [ 33.910903][ T663] should_fail+0x3c6/0x510 [ 33.915151][ T663] __should_failslab+0xa4/0xe0 [ 33.919749][ T663] should_failslab+0x9/0x20 [ 33.924089][ T663] slab_pre_alloc_hook+0x37/0xd0 [ 33.928865][ T663] kmem_cache_alloc_trace+0x48/0x210 [ 33.933981][ T663] ? __get_vm_area_node+0x117/0x360 [ 33.939018][ T663] __get_vm_area_node+0x117/0x360 [ 33.943884][ T663] __vmalloc_node_range+0xe2/0x8d0 [ 33.948824][ T663] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 33.954207][ T663] ? selinux_capset+0xf0/0xf0 [ 33.958716][ T663] ? kstrtouint_from_user+0x20a/0x2a0 [ 33.963949][ T663] ? kstrtol_from_user+0x310/0x310 [ 33.968876][ T663] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 33.974256][ T663] __vmalloc+0x7a/0x90 [ 33.978159][ T663] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 33.983545][ T663] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 33.988748][ T663] ? bpf_prog_alloc+0x15/0x1e0 [ 33.993347][ T663] bpf_prog_alloc+0x1f/0x1e0 [ 33.997775][ T663] bpf_prog_load+0x800/0x1b50 [ 34.002289][ T663] ? map_freeze+0x370/0x370 [ 34.006644][ T663] ? selinux_bpf+0xcb/0x100 [ 34.010967][ T663] ? security_bpf+0x82/0xb0 [ 34.015325][ T663] __sys_bpf+0x4bc/0x760 [ 34.019393][ T663] ? fput_many+0x160/0x1b0 [ 34.023836][ T663] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 34.029133][ T663] ? debug_smp_processor_id+0x17/0x20 [ 34.034334][ T663] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 34.040239][ T663] __x64_sys_bpf+0x7c/0x90 [ 34.044502][ T663] do_syscall_64+0x3d/0xb0 [ 34.048747][ T663] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 34.054473][ T663] RIP: 0033:0x7fd58c3a19f9 [ 34.058725][ T663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.078167][ T663] RSP: 002b:00007fd58b021038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 34.086419][ T663] RAX: ffffffffffffffda RBX: 00007fd58c52ff80 RCX: 00007fd58c3a19f9 [ 34.094219][ T663] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 34.102037][ T663] RBP: 00007fd58b021090 R08: 0000000000000000 R09: 0000000000000000 [ 34.109854][ T663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 34.117658][ T663] R13: 0000000000000000 R14: 00007fd58c52ff80 R15: 00007ffdd6706778 [ 34.125478][ T663] [ 34.173747][ T663] syz.2.111: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 34.247994][ T663] CPU: 0 PID: 663 Comm: syz.2.111 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 34.257560][ T663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 34.267892][ T663] Call Trace: [ 34.271008][ T663] [ 34.273788][ T663] dump_stack_lvl+0x151/0x1b7 [ 34.278299][ T663] ? io_uring_drop_tctx_refs+0x190/0x190 [ 34.283770][ T663] ? pr_cont_kernfs_name+0xf0/0x100 [ 34.288802][ T663] dump_stack+0x15/0x17 [ 34.292792][ T663] warn_alloc+0x21a/0x390 [ 34.296964][ T663] ? zone_watermark_ok_safe+0x270/0x270 [ 34.302348][ T663] ? kmem_cache_alloc_trace+0x115/0x210 [ 34.307723][ T663] ? __get_vm_area_node+0x117/0x360 [ 34.312759][ T663] ? __get_vm_area_node+0x347/0x360 [ 34.317798][ T663] __vmalloc_node_range+0x2c1/0x8d0 [ 34.322831][ T663] ? selinux_capset+0xf0/0xf0 [ 34.327337][ T663] ? kstrtouint_from_user+0x20a/0x2a0 [ 34.332548][ T663] ? kstrtol_from_user+0x310/0x310 [ 34.337495][ T663] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 34.342876][ T663] __vmalloc+0x7a/0x90 [ 34.346777][ T663] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 34.352158][ T663] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 34.357364][ T663] ? bpf_prog_alloc+0x15/0x1e0 [ 34.361966][ T663] bpf_prog_alloc+0x1f/0x1e0 [ 34.366393][ T663] bpf_prog_load+0x800/0x1b50 [ 34.371084][ T663] ? map_freeze+0x370/0x370 [ 34.375605][ T663] ? selinux_bpf+0xcb/0x100 [ 34.379936][ T663] ? security_bpf+0x82/0xb0 [ 34.384709][ T663] __sys_bpf+0x4bc/0x760 [ 34.388784][ T663] ? fput_many+0x160/0x1b0 [ 34.393125][ T663] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 34.398338][ T663] ? debug_smp_processor_id+0x17/0x20 [ 34.403538][ T663] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 34.409441][ T663] __x64_sys_bpf+0x7c/0x90 [ 34.413695][ T663] do_syscall_64+0x3d/0xb0 [ 34.418005][ T663] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 34.423680][ T663] RIP: 0033:0x7fd58c3a19f9 [ 34.428104][ T663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.447544][ T663] RSP: 002b:00007fd58b021038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 34.455785][ T663] RAX: ffffffffffffffda RBX: 00007fd58c52ff80 RCX: 00007fd58c3a19f9 [ 34.463595][ T663] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 34.471405][ T663] RBP: 00007fd58b021090 R08: 0000000000000000 R09: 0000000000000000 [ 34.479219][ T663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 34.487031][ T663] R13: 0000000000000000 R14: 00007fd58c52ff80 R15: 00007ffdd6706778 [ 34.494846][ T663] [ 34.500813][ T663] Mem-Info: [ 34.503945][ T663] active_anon:64 inactive_anon:8276 isolated_anon:0 [ 34.503945][ T663] active_file:3369 inactive_file:3172 isolated_file:0 [ 34.503945][ T663] unevictable:0 dirty:1307 writeback:0 [ 34.503945][ T663] slab_reclaimable:7064 slab_unreclaimable:71161 [ 34.503945][ T663] mapped:21221 shmem:162 pagetables:523 bounce:0 [ 34.503945][ T663] kernel_misc_reclaimable:0 [ 34.503945][ T663] free:1577798 free_pcp:18456 free_cma:0 [ 34.545101][ T663] Node 0 active_anon:256kB inactive_anon:33104kB active_file:13476kB inactive_file:12688kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:84884kB dirty:5228kB writeback:0kB shmem:648kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4668kB pagetables:2092kB all_unreclaimable? no [ 34.576629][ T663] DMA32 free:2974676kB min:62568kB low:78208kB high:93848kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2978980kB mlocked:0kB bounce:0kB free_pcp:4304kB local_pcp:1884kB free_cma:0kB [ 34.604634][ T663] lowmem_reserve[]: 0 3941 3941 [ 34.609385][ T663] Normal free:3336516kB min:84884kB low:106104kB high:127324kB reserved_highatomic:0KB active_anon:256kB inactive_anon:33104kB active_file:13476kB inactive_file:12688kB unevictable:0kB writepending:5228kB present:5242880kB managed:4035584kB mlocked:0kB bounce:0kB free_pcp:69888kB local_pcp:25348kB free_cma:0kB [ 34.638533][ T663] lowmem_reserve[]: 0 0 0 [ 34.642731][ T663] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 723*4096kB (M) = 2974676kB [ 34.658981][ T663] Normal: 1*4kB (E) 0*8kB 2*16kB (UM) 3*32kB (UME) 1*64kB (U) 1*128kB (M) 0*256kB 2*512kB (ME) 3*1024kB (UME) 3*2048kB (UME) 812*4096kB (M) = 3336516kB [ 34.696175][ T663] 6678 total pagecache pages [ 34.701059][ T663] 0 pages in swap cache [ 34.705101][ T663] Swap cache stats: add 0, delete 0, find 0/0 [ 34.741982][ T663] Free swap = 124996kB [ 34.749504][ T663] Total swap = 124996kB [ 34.753835][ T663] 2097051 pages RAM [ 34.761434][ T663] 0 pages HighMem/MovableOnly [ 34.766005][ T663] 343410 pages reserved [ 34.769928][ T663] 0 pages cma reserved [ 34.867081][ T30] audit: type=1400 audit(1723348591.824:117): avc: denied { ioctl } for pid=695 comm="syz.0.121" path="socket:[15732]" dev="sockfs" ino=15732 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 36.636258][ T723] cgroup: fork rejected by pids controller in /syz4 [ 37.959823][ T30] audit: type=1400 audit(1723348594.914:118): avc: denied { write } for pid=863 comm="syz.0.167" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 40.920010][ T919] device veth1_macvtap left promiscuous mode [ 42.306999][ T30] audit: type=1400 audit(1723348599.264:119): avc: denied { relabelfrom } for pid=988 comm="syz.0.206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 42.394594][ T30] audit: type=1400 audit(1723348599.264:120): avc: denied { relabelto } for pid=988 comm="syz.0.206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 42.769228][ T30] audit: type=1400 audit(1723348599.724:121): avc: denied { create } for pid=1007 comm="syz.1.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 42.994467][ T30] audit: type=1400 audit(1723348599.954:122): avc: denied { create } for pid=1020 comm="syz.4.218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 49.326674][ T30] audit: type=1400 audit(1723348606.284:123): avc: denied { create } for pid=1196 comm="syz.1.272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 49.441264][ T1211] syz.3.280[1211] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.441345][ T1211] syz.3.280[1211] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.904882][ T30] audit: type=1400 audit(1723348607.864:124): avc: denied { create } for pid=1240 comm="syz.1.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 51.333770][ T1256] device syzkaller0 entered promiscuous mode [ 53.405330][ T1362] syz.0.318[1362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.405400][ T1362] syz.0.318[1362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.465445][ T1364] syz.0.318[1364] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.477591][ T1364] syz.0.318[1364] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.498866][ T1362] syz.0.318[1362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.510646][ T1362] syz.0.318[1362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.522383][ T1362] syz.0.318[1362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.533742][ T1362] syz.0.318[1362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.619874][ T1370] device veth1_macvtap left promiscuous mode [ 54.312860][ T1417] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.319938][ T1417] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.680876][ T1439] device wg2 entered promiscuous mode [ 55.658991][ T1476] bond_slave_1: mtu less than device minimum [ 55.665952][ T30] audit: type=1400 audit(1723348612.624:125): avc: denied { create } for pid=1484 comm="syz.3.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 56.722914][ T1518] bridge0: port 3(veth0_to_batadv) entered blocking state [ 56.733755][ T1518] bridge0: port 3(veth0_to_batadv) entered disabled state [ 56.850968][ T1518] device veth0_to_batadv entered promiscuous mode [ 56.864258][ T1518] bridge0: port 3(veth0_to_batadv) entered blocking state [ 56.871764][ T1518] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 57.071696][ T30] audit: type=1400 audit(1723348614.034:126): avc: denied { setopt } for pid=1535 comm="syz.0.372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 58.417079][ T1589] Â: renamed from pim6reg1 [ 58.932956][ T30] audit: type=1400 audit(1723348615.894:127): avc: denied { create } for pid=1639 comm="syz.4.405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 59.824943][ T30] audit: type=1400 audit(1723348616.784:128): avc: denied { create } for pid=1666 comm="syz.4.416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 60.659610][ T1724] device syzkaller0 entered promiscuous mode [ 64.147512][ T1864] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.154634][ T1864] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.206844][ T1864] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.213751][ T1864] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.261133][ T1864] device bridge0 entered promiscuous mode [ 67.043862][ T1898] device sit0 entered promiscuous mode [ 70.092538][ T1971] device sit0 left promiscuous mode [ 70.146360][ T1971] device sit0 entered promiscuous mode [ 70.972502][ T30] audit: type=1400 audit(1723348627.934:129): avc: denied { create } for pid=1995 comm="syz.1.513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 72.304092][ T2026] device veth1_macvtap left promiscuous mode [ 72.858903][ T2084] device syzkaller0 entered promiscuous mode [ 72.982260][ T2093] device syzkaller0 entered promiscuous mode [ 74.027673][ T2100] device syzkaller0 entered promiscuous mode [ 75.040482][ T30] audit: type=1400 audit(1723348631.994:130): avc: denied { create } for pid=2161 comm="syz.4.559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 75.142937][ T2160] device syzkaller0 entered promiscuous mode [ 75.286509][ T2163] device sit0 entered promiscuous mode [ 75.346291][ T30] audit: type=1400 audit(1723348632.304:131): avc: denied { create } for pid=2167 comm="syz.2.560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 75.721920][ T30] audit: type=1400 audit(1723348632.684:132): avc: denied { write } for pid=2172 comm="syz.2.563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 75.983394][ T30] audit: type=1400 audit(1723348632.934:133): avc: denied { read } for pid=2192 comm="syz.3.569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 77.024345][ T30] audit: type=1400 audit(1723348633.984:134): avc: denied { setopt } for pid=2240 comm="syz.2.583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 77.459101][ T2257] device macsec0 entered promiscuous mode [ 80.040458][ C0] sched: RT throttling activated [ 80.251233][ T2296] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.258243][ T2296] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.211762][ T2371] device pim6reg1 entered promiscuous mode [ 83.653717][ T2428] device pim6reg1 entered promiscuous mode [ 85.148271][ T30] audit: type=1400 audit(1723348642.104:135): avc: denied { ioctl } for pid=2494 comm="syz.4.655" path="socket:[20086]" dev="sockfs" ino=20086 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 85.283408][ T30] audit: type=1400 audit(1723348642.214:136): avc: denied { create } for pid=2490 comm="syz.0.656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 88.712483][ T2638] device sit0 left promiscuous mode [ 88.764839][ T30] audit: type=1400 audit(1723348645.724:137): avc: denied { create } for pid=2640 comm="syz.0.695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 88.852064][ T30] audit: type=1400 audit(1723348645.804:138): avc: denied { create } for pid=2650 comm="syz.0.698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 89.252859][ T2669] device pim6reg1 entered promiscuous mode [ 90.051235][ T2694] device pim6reg1 entered promiscuous mode [ 90.118748][ T295] syz-executor (295) used greatest stack depth: 20880 bytes left [ 90.311974][ T2710] device sit0 left promiscuous mode [ 90.882862][ T2721] bridge0: port 3(veth0_to_batadv) entered blocking state [ 90.890096][ T2721] bridge0: port 3(veth0_to_batadv) entered disabled state [ 90.915575][ T2721] device veth0_to_batadv entered promiscuous mode [ 90.938347][ T2724] device veth0_to_batadv left promiscuous mode [ 90.944669][ T2724] bridge0: port 3(veth0_to_batadv) entered disabled state [ 91.064125][ T2711] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.072332][ T2711] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.098879][ T2711] device bridge_slave_0 entered promiscuous mode [ 91.276928][ T2711] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.284057][ T2711] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.296043][ T2711] device bridge_slave_1 entered promiscuous mode [ 91.467364][ T2733] device pim6reg1 entered promiscuous mode [ 91.871833][ T2744] device syzkaller0 entered promiscuous mode [ 91.943798][ T2711] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.950714][ T2711] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.957810][ T2711] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.964708][ T2711] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.994878][ T1170] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.003832][ T1170] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.013132][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.021543][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.104924][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 92.116782][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 92.131674][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.138647][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.181837][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 92.190162][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.205830][ T1170] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.212763][ T1170] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.220837][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 92.228974][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 92.237571][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 92.246021][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 92.254478][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 92.262781][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 92.280754][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 92.288886][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 92.297849][ T2711] device veth0_vlan entered promiscuous mode [ 92.306581][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 92.314203][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 92.345878][ T2711] device veth1_macvtap entered promiscuous mode [ 92.359145][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 92.368315][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 92.376899][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 92.406106][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 92.414892][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 92.436688][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 92.445350][ T30] audit: type=1400 audit(1723348649.404:139): avc: denied { mounton } for pid=2711 comm="syz-executor" path="/root/syzkaller.7PlnAk/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 92.480149][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 92.500238][ T30] audit: type=1400 audit(1723348649.434:140): avc: denied { mount } for pid=2711 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 92.522962][ T30] audit: type=1400 audit(1723348649.434:141): avc: denied { mounton } for pid=2711 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 92.581142][ T2711] syz-executor (2711) used greatest stack depth: 19232 bytes left [ 92.705650][ T2776] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.714420][ T2776] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.722262][ T2776] device bridge_slave_0 entered promiscuous mode [ 92.729405][ T2776] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.736744][ T2776] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.744688][ T2776] device bridge_slave_1 entered promiscuous mode [ 92.752367][ T324] device bridge_slave_1 left promiscuous mode [ 92.758447][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.766826][ T324] device bridge_slave_0 left promiscuous mode [ 92.772925][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.781662][ T324] device veth0_vlan left promiscuous mode [ 92.971106][ T2776] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.978024][ T2776] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.985150][ T2776] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.992011][ T2776] bridge0: port 1(bridge_slave_0) entered forwarding state [ 93.058229][ T1356] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.072491][ T1356] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.420527][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 93.431889][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 93.443181][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 93.457971][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 93.497752][ T1373] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.504806][ T1373] bridge0: port 1(bridge_slave_0) entered forwarding state [ 93.563745][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 93.572179][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 93.580326][ T1373] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.587215][ T1373] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.594944][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 93.603025][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 93.611389][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 93.619786][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 93.628066][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 93.636542][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 93.648243][ T2776] device veth0_vlan entered promiscuous mode [ 93.832226][ T2801] device veth0_vlan left promiscuous mode [ 93.839717][ T2801] device veth0_vlan entered promiscuous mode [ 93.850384][ T1367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 93.868272][ T1367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 93.901434][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 93.909055][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 93.973087][ T2776] device veth1_macvtap entered promiscuous mode [ 93.979685][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 93.988588][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 93.997623][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 94.088527][ T30] audit: type=1400 audit(1723348651.044:142): avc: denied { create } for pid=2828 comm="syz.1.750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 94.130613][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 94.138740][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 94.147171][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 94.155628][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 94.191048][ T2829] device syzkaller0 entered promiscuous mode [ 94.200403][ T314] syzkaller0: tun_net_xmit 48 [ 94.212997][ T2829] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 94.241413][ T2829] device pim6reg1 entered promiscuous mode [ 94.631422][ T2842] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.638425][ T2842] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.645977][ T2842] device bridge_slave_0 entered promiscuous mode [ 94.653982][ T2842] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.661135][ T2842] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.677430][ T2842] device bridge_slave_1 entered promiscuous mode [ 94.761003][ T2842] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.767881][ T2842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.775059][ T2842] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.782009][ T2842] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.874907][ T1367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 94.888839][ T1367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 94.907097][ T1367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 94.923071][ T2868] cgroup: fork rejected by pids controller in /syz0 [ 94.951740][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 94.974942][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 95.005321][ T2842] device veth0_vlan entered promiscuous mode [ 95.027088][ T2842] device veth1_macvtap entered promiscuous mode [ 95.049131][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 95.057605][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 95.066126][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 95.074288][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 95.081711][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 95.094658][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 95.102991][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 95.417049][ T324] device bridge_slave_1 left promiscuous mode [ 95.424186][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.442585][ T324] device bridge_slave_0 left promiscuous mode [ 95.450393][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.466186][ T324] device veth1_macvtap left promiscuous mode [ 95.472434][ T324] device veth0_vlan left promiscuous mode [ 95.675786][ T2988] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.682944][ T2988] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.690236][ T2988] device bridge_slave_0 entered promiscuous mode [ 95.698444][ T2988] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.705313][ T2988] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.712618][ T2988] device bridge_slave_1 entered promiscuous mode [ 95.765193][ T2988] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.772156][ T2988] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.779247][ T2988] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.786045][ T2988] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.811612][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 95.818982][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 95.827502][ T1356] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.837406][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.864053][ T1170] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.870968][ T1170] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.894467][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 95.902542][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 95.928738][ T2996] device syzkaller0 entered promiscuous mode [ 95.971374][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 95.995498][ T2988] device veth0_vlan entered promiscuous mode [ 96.002719][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 96.015285][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 96.023289][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 96.069692][ T2998] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.076692][ T2998] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.084207][ T2998] device bridge_slave_0 entered promiscuous mode [ 96.093619][ T2998] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.101934][ T2998] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.109398][ T2998] device bridge_slave_1 entered promiscuous mode [ 96.124711][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 96.142476][ T2988] device veth1_macvtap entered promiscuous mode [ 96.189876][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 96.216367][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 96.389748][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 96.397620][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 96.437951][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 96.446800][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 96.455243][ T1356] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.462143][ T1356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 96.469657][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 96.477941][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 96.486326][ T1356] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.493238][ T1356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.521420][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 96.533011][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 96.541837][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 96.549728][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 96.558546][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 96.767315][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 96.775598][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 96.798987][ T2998] device veth0_vlan entered promiscuous mode [ 96.813058][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 96.822447][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 96.831373][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 96.838791][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 96.861089][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 96.869050][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 96.880106][ T2998] device veth1_macvtap entered promiscuous mode [ 96.890192][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 96.897795][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 96.906251][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 96.925886][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 96.944678][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 97.101736][ T324] device bridge_slave_1 left promiscuous mode [ 97.107722][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.115282][ T324] device bridge_slave_0 left promiscuous mode [ 97.121366][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.129070][ T324] device bridge_slave_1 left promiscuous mode [ 97.135530][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.143100][ T324] device bridge_slave_0 left promiscuous mode [ 97.149042][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.156873][ T324] device bridge_slave_1 left promiscuous mode [ 97.162835][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.170205][ T324] device bridge_slave_0 left promiscuous mode [ 97.177736][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.186291][ T324] device veth1_macvtap left promiscuous mode [ 97.192148][ T324] device veth0_vlan left promiscuous mode [ 97.197922][ T324] device veth1_macvtap left promiscuous mode [ 97.203957][ T324] device veth0_vlan left promiscuous mode [ 97.209866][ T324] device veth1_macvtap left promiscuous mode [ 97.215740][ T324] device veth0_vlan left promiscuous mode [ 98.016528][ T3052] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.090847][ T3052] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.169377][ T3052] device bridge_slave_0 entered promiscuous mode [ 98.195544][ T3052] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.215076][ T3052] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.223009][ T3052] device bridge_slave_1 entered promiscuous mode [ 98.772824][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 98.788942][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 98.881014][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 98.903497][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 98.948575][ T314] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.955507][ T314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.023571][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 99.065666][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 99.106046][ T314] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.112957][ T314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.124902][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 99.133717][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 99.142530][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 99.243596][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 99.256837][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 99.267089][ T3052] device veth0_vlan entered promiscuous mode [ 99.298800][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 99.310782][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 99.318223][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 99.378556][ T3052] device veth1_macvtap entered promiscuous mode [ 99.397225][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 99.416580][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 99.424909][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 99.448141][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 99.457149][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 99.876924][ T324] device bridge_slave_1 left promiscuous mode [ 99.884111][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.911372][ T324] device bridge_slave_0 left promiscuous mode [ 99.935551][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.967496][ T324] device veth1_macvtap left promiscuous mode [ 99.992840][ T324] device veth0_vlan left promiscuous mode [ 100.315944][ T30] audit: type=1400 audit(1723348657.274:143): avc: denied { create } for pid=3136 comm="syz.1.806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 101.021397][ T3152] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.028290][ T3152] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.039246][ T3152] device bridge_slave_0 entered promiscuous mode [ 101.046691][ T3152] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.053719][ T3152] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.063326][ T3152] device bridge_slave_1 entered promiscuous mode [ 101.373559][ T324] device bridge_slave_1 left promiscuous mode [ 101.395155][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.416967][ T324] device bridge_slave_0 left promiscuous mode [ 101.428579][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.442604][ T324] device veth1_macvtap left promiscuous mode [ 101.453689][ T324] device veth0_vlan left promiscuous mode [ 101.973251][ T3152] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.980166][ T3152] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.987281][ T3152] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.994143][ T3152] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.008490][ T1356] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.021453][ T1356] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.175508][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 102.192048][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.247901][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 102.266570][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 102.339511][ T1170] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.346442][ T1170] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.380940][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 102.389457][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 102.436336][ T1170] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.443267][ T1170] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.516208][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 102.539640][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 102.630953][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 102.639209][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 102.758217][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 102.772255][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 102.786043][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 102.799221][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 102.808453][ T3152] device veth0_vlan entered promiscuous mode [ 102.817119][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 102.825214][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 102.839195][ T3152] device veth1_macvtap entered promiscuous mode [ 102.847728][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 102.856235][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 102.864658][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 102.886264][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 102.894926][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 102.903517][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 102.912861][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 103.904319][ T3257] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 103.910514][ T30] audit: type=1400 audit(1723348660.864:144): avc: denied { tracepoint } for pid=3252 comm="syz.2.840" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 104.063652][ T324] device bridge_slave_1 left promiscuous mode [ 104.079788][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.112084][ T324] device bridge_slave_0 left promiscuous mode [ 104.127705][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.191305][ T324] device veth1_macvtap left promiscuous mode [ 104.197191][ T324] device veth0_vlan left promiscuous mode [ 105.185223][ T3263] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.200641][ T3263] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.208035][ T3263] device bridge_slave_0 entered promiscuous mode [ 105.333779][ T3263] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.344737][ T3263] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.352474][ T3263] device bridge_slave_1 entered promiscuous mode [ 105.673552][ T30] audit: type=1400 audit(1723348662.634:145): avc: denied { create } for pid=3326 comm="syz.2.860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 105.702631][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 105.714454][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 105.742439][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 105.759894][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.779292][ T1372] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.786208][ T1372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.804051][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 105.821030][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.829104][ T1372] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.835985][ T1372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.037537][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 107.055923][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 108.104658][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 108.157426][ T3263] device veth0_vlan entered promiscuous mode [ 108.200976][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 108.209264][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 108.233469][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 108.246582][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 108.318119][ T3263] device veth1_macvtap entered promiscuous mode [ 108.353218][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 108.381985][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 108.389301][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 108.398025][ T30] audit: type=1400 audit(1723348665.354:146): avc: denied { remove_name } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 108.420899][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 108.428700][ T30] audit: type=1400 audit(1723348665.354:147): avc: denied { rename } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 108.453513][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 108.532461][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 108.543925][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 108.559907][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 108.568389][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 109.807515][ T30] audit: type=1400 audit(1723348666.764:148): avc: denied { create } for pid=3381 comm="syz.0.874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 110.018844][ T3392] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.081670][ T3392] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.140087][ T3392] device bridge_slave_0 entered promiscuous mode [ 110.201156][ T3392] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.259280][ T3392] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.287022][ T3392] device bridge_slave_1 entered promiscuous mode [ 110.343815][ T324] device bridge_slave_1 left promiscuous mode [ 110.354444][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.417923][ T324] device bridge_slave_0 left promiscuous mode [ 110.468818][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.511361][ T324] device veth1_macvtap left promiscuous mode [ 110.517401][ T324] device veth0_vlan left promiscuous mode [ 111.263192][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.271035][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.314738][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 111.359203][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.398001][ T375] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.405184][ T375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.559569][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 111.615856][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 111.672520][ T375] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.679444][ T375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.735712][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 111.757521][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 111.772240][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 111.780253][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 111.788567][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 111.848391][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 111.882986][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 111.925842][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 111.934087][ T1170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 111.947043][ T3392] device veth0_vlan entered promiscuous mode [ 111.996719][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 112.004557][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.047940][ T3392] device veth1_macvtap entered promiscuous mode [ 112.056354][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 112.087373][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 112.110246][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 112.127418][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 112.135535][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 112.143915][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 112.152455][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 112.218952][ T30] audit: type=1400 audit(1723348669.174:149): avc: denied { create } for pid=3483 comm="syz.0.902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 113.302812][ T30] audit: type=1400 audit(1723348670.254:150): avc: denied { create } for pid=3500 comm="syz.2.910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 113.633560][ T3511] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.646855][ T3511] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.654730][ T3511] device bridge_slave_0 entered promiscuous mode [ 113.680473][ T3511] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.690032][ T3511] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.699790][ T3511] device bridge_slave_1 entered promiscuous mode [ 113.797208][ T30] audit: type=1400 audit(1723348670.754:151): avc: denied { create } for pid=3525 comm="syz.0.917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 113.870610][ T3526] device wg2 entered promiscuous mode [ 113.890972][ T3511] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.897931][ T3511] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.905089][ T3511] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.911954][ T3511] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.972990][ T324] device bridge_slave_1 left promiscuous mode [ 113.979375][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.986991][ T324] device bridge_slave_0 left promiscuous mode [ 113.994955][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.017033][ T324] device veth1_macvtap left promiscuous mode [ 114.028416][ T324] device veth0_vlan left promiscuous mode [ 114.636496][ T1363] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.654205][ T1363] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.057335][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 115.075515][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 115.083792][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 115.092462][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 115.100816][ T829] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.107713][ T829] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.115340][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 115.123691][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 115.132231][ T829] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.139123][ T829] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.188645][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 115.197166][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 115.205601][ T3529] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.212657][ T3529] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.220136][ T3529] device bridge_slave_0 entered promiscuous mode [ 115.237668][ T1363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 115.246064][ T1363] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 115.256586][ T3529] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.307605][ T3529] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.365806][ T3529] device bridge_slave_1 entered promiscuous mode [ 115.404296][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 115.433811][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 115.571781][ T3511] device veth0_vlan entered promiscuous mode [ 115.581524][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 115.589405][ T829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 115.776555][ T3589] bond_slave_1: mtu greater than device maximum [ 115.906217][ T3511] device veth1_macvtap entered promiscuous mode [ 115.968684][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 115.982959][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 116.111096][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 116.125601][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 116.143005][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 116.240567][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 116.248820][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 116.265295][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 116.274132][ T1356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 119.769213][ C1] ------------[ cut here ]------------ [ 119.774492][ C1] WARNING: CPU: 1 PID: 3604 at kernel/softirq.c:358 __local_bh_enable_ip+0x6c/0x80 [ 119.783603][ C1] Modules linked in: [ 119.787336][ C1] CPU: 1 PID: 3604 Comm: syz.0.937 Not tainted 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 119.797203][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 119.807094][ C1] RIP: 0010:__local_bh_enable_ip+0x6c/0x80 [ 119.812736][ C1] Code: 66 8b 05 c7 87 c0 7e 66 85 c0 75 22 bf 01 00 00 00 e8 38 44 09 00 65 8b 05 39 85 bf 7e 85 c0 74 02 5d c3 e8 3a 99 bd ff 5d c3 <0f> 0b eb a2 e8 0b 00 00 00 eb d7 66 0f 1f 84 00 00 00 00 00 55 48 [ 119.832177][ C1] RSP: 0018:ffffc900001d0ae0 EFLAGS: 00010006 [ 119.838077][ C1] RAX: 0000000000010204 RBX: ffff8881232a46d8 RCX: dffffc0000000000 [ 119.845886][ C1] RDX: 0000000000010204 RSI: 0000000000000201 RDI: ffffffff83ff1472 [ 119.853900][ C1] RBP: ffffc900001d0ae0 R08: dffffc0000000000 R09: 0000000000000003 [ 119.861713][ C1] R10: fffff5200003a150 R11: dffffc0000000001 R12: 0000000000000000 [ 119.869522][ C1] R13: dffffc0000000000 R14: 00000000fffffffe R15: ffff8881232a46c0 [ 119.877333][ C1] FS: 0000555555ebf500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 119.886099][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 119.892523][ C1] CR2: 0000000100000000 CR3: 0000000137c1d000 CR4: 00000000003506a0 [ 119.900357][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 119.908145][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 119.915958][ C1] Call Trace: [ 119.919083][ C1] [ 119.921776][ C1] ? show_regs+0x58/0x60 [ 119.925867][ C1] ? __warn+0x160/0x2f0 [ 119.929852][ C1] ? __local_bh_enable_ip+0x6c/0x80 [ 119.934881][ C1] ? report_bug+0x3d9/0x5b0 [ 119.939220][ C1] ? __local_bh_enable_ip+0x6c/0x80 [ 119.944251][ C1] ? handle_bug+0x41/0x70 [ 119.948422][ C1] ? exc_invalid_op+0x1b/0x50 [ 119.952928][ C1] ? asm_exc_invalid_op+0x1b/0x20 [ 119.957792][ C1] ? sock_hash_delete_elem+0x2a2/0x2f0 [ 119.963171][ C1] ? __local_bh_enable_ip+0x6c/0x80 [ 119.968205][ C1] _raw_spin_unlock_bh+0x51/0x60 [ 119.972997][ C1] sock_hash_delete_elem+0x2a2/0x2f0 [ 119.978101][ C1] bpf_prog_586ab708469db861+0x41/0xd70 [ 119.983481][ C1] bpf_trace_run3+0x194/0x250 [ 119.987993][ C1] ? __kasan_check_write+0x14/0x20 [ 119.992942][ C1] ? bpf_trace_run2+0x210/0x210 [ 119.997629][ C1] __bpf_trace_timer_start+0x2b/0x40 [ 120.002748][ C1] enqueue_timer+0x351/0x4c0 [ 120.007175][ C1] add_timer_on+0x3f3/0x560 [ 120.011513][ C1] ? add_timer+0x80/0x80 [ 120.015593][ C1] ? __handle_irq_event_percpu+0x6c5/0x730 [ 120.021237][ C1] add_interrupt_randomness+0x40d/0x480 [ 120.026617][ C1] handle_irq_event+0x124/0x2b0 [ 120.031301][ C1] ? handle_irq_event_percpu+0x1a0/0x1a0 [ 120.036770][ C1] ? apic_ack_edge+0x10e/0x1b0 [ 120.041370][ C1] handle_edge_irq+0x2ea/0xda0 [ 120.045974][ C1] __common_interrupt+0x97/0x1b0 [ 120.050743][ C1] common_interrupt+0xaf/0xd0 [ 120.055258][ C1] [ 120.058034][ C1] [ 120.060813][ C1] asm_common_interrupt+0x27/0x40 [ 120.065672][ C1] RIP: 0010:smp_call_function_many_cond+0x843/0x9b0 [ 120.072093][ C1] Code: 45 8b 7d 00 44 89 fe 83 e6 01 31 ff e8 76 a8 0a 00 41 83 e7 01 49 bf 00 00 00 00 00 fc ff df 75 07 e8 b1 a4 0a 00 eb 38 f3 90 <42> 0f b6 04 3b 84 c0 75 11 41 f7 45 00 01 00 00 00 74 1e e8 95 a4 [ 120.091545][ C1] RSP: 0018:ffffc90000ba7740 EFLAGS: 00000293 [ 120.097554][ C1] RAX: ffffffff81659ddb RBX: 1ffff1103ee07af1 RCX: ffff8881349f3b40 [ 120.105364][ C1] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 120.113178][ C1] RBP: ffffc90000ba7858 R08: ffffffff81659daa R09: ffffed103ee271d3 [ 120.120989][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 120.128799][ C1] R13: ffff8881f703d788 R14: ffff8881f7138e80 R15: dffffc0000000000 [ 120.136613][ C1] ? smp_call_function_many_cond+0x82a/0x9b0 [ 120.142424][ C1] ? smp_call_function_many_cond+0x85b/0x9b0 [ 120.148243][ C1] ? text_poke_sync+0x30/0x30 [ 120.152753][ C1] ? smp_call_function_many+0x40/0x40 [ 120.157962][ C1] ? insn_decode+0x308/0x490 [ 120.162388][ C1] ? text_poke_sync+0x30/0x30 [ 120.166902][ C1] on_each_cpu_cond_mask+0x40/0x80 [ 120.171848][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 120.177674][ C1] text_poke_bp_batch+0x1c4/0x5d0 [ 120.182525][ C1] ? text_poke_loc_init+0x540/0x540 [ 120.187558][ C1] ? ____kasan_kmalloc+0xed/0x110 [ 120.192417][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 120.198233][ C1] text_poke_bp+0xc8/0x140 [ 120.202502][ C1] ? text_poke_queue+0x1a0/0x1a0 [ 120.207345][ C1] ? mutex_lock+0xb6/0x1e0 [ 120.211685][ C1] ? wait_for_completion_killable_timeout+0x10/0x10 [ 120.218106][ C1] ? mutex_lock+0xb6/0x1e0 [ 120.222360][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 120.228176][ C1] __static_call_transform+0x1b5/0x2c0 [ 120.233468][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 120.239283][ C1] ? probe_sched_wakeup+0x80/0x80 [ 120.244147][ C1] arch_static_call_transform+0x7f/0x1c0 [ 120.249617][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 120.255427][ C1] __static_call_update+0xd2/0x5c0 [ 120.260374][ C1] ? probe_sched_wakeup+0x80/0x80 [ 120.265235][ C1] ? __static_call_return0+0x10/0x10 [ 120.270355][ C1] ? __kasan_kmalloc+0x9/0x10 [ 120.274956][ C1] ? tracepoint_probe_unregister+0x458/0x900 [ 120.280772][ C1] ? memcpy+0x56/0x70 [ 120.284590][ C1] ? probe_sched_wakeup+0x80/0x80 [ 120.289458][ C1] tracepoint_probe_unregister+0x7fb/0x900 [ 120.295091][ C1] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 120.301254][ C1] bpf_probe_unregister+0x61/0x70 [ 120.306129][ C1] bpf_raw_tp_link_release+0x63/0x90 [ 120.311242][ C1] bpf_link_free+0x129/0x3f0 [ 120.315665][ C1] ? rcu_gp_kthread_wake+0x90/0x90 [ 120.320608][ C1] ? bpf_link_put_deferred+0x20/0x20 [ 120.325730][ C1] ? kmem_cache_free+0x2c3/0x2e0 [ 120.330506][ C1] bpf_link_release+0x170/0x180 [ 120.335190][ C1] ? bpf_prog_get_stats+0x2f0/0x2f0 [ 120.340222][ C1] __fput+0x3fe/0x910 [ 120.344044][ C1] ____fput+0x15/0x20 [ 120.347860][ C1] task_work_run+0x129/0x190 [ 120.352288][ C1] exit_to_user_mode_loop+0xc4/0xe0 [ 120.357322][ C1] exit_to_user_mode_prepare+0x5a/0xa0 [ 120.362617][ C1] syscall_exit_to_user_mode+0x26/0x160 [ 120.367999][ C1] do_syscall_64+0x49/0xb0 [ 120.372250][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 120.377891][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 120.383618][ C1] RIP: 0033:0x7f79a65c69f9 [ 120.388230][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 120.407669][ C1] RSP: 002b:00007fffaa17bb78 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 120.415914][ C1] RAX: 0000000000000000 RBX: 000000000001c641 RCX: 00007f79a65c69f9 [ 120.423731][ C1] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 120.431537][ C1] RBP: 00007fffaa17bc50 R08: 0000000000000001 R09: 00007fffaa17be5f [ 120.439358][ C1] R10: 00007f79a644f000 R11: 0000000000000246 R12: 0000000000000032 [ 120.447244][ C1] R13: 00007fffaa17bc70 R14: 00007fffaa17bc90 R15: ffffffffffffffff [ 120.455065][ C1] [ 120.457919][ C1] ---[ end trace 1fc894d2286cec92 ]--- [ 216.350399][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 216.357209][ C1] rcu: 0-...!: (0 ticks this GP) idle=c6d/1/0x4000000000000000 softirq=17017/17025 fqs=1 last_accelerate: b7ec/df02 dyntick_enabled: 1 [ 216.371265][ C1] (detected by 1, t=10002 jiffies, g=16925, q=264) [ 216.377696][ C1] Sending NMI from CPU 1 to CPUs 0: [ 216.382792][ C0] NMI backtrace for cpu 0 [ 216.382815][ C0] CPU: 0 PID: 829 Comm: kworker/0:6 Tainted: G W 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 216.382835][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 216.382856][ C0] Workqueue: rcu_gp process_srcu [ 216.382894][ C0] RIP: 0010:kvm_wait+0x117/0x180 [ 216.382915][ C0] Code: 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 53 41 0f b6 45 00 44 38 f0 0f 85 63 ff ff ff 66 90 0f 00 2d 5a 02 13 04 f4 54 ff ff ff fa 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b [ 216.382929][ C0] RSP: 0000:ffffc90000007600 EFLAGS: 00000046 [ 216.382943][ C0] RAX: 0000000000000003 RBX: 1ffff92000000ec4 RCX: ffffffff8155068f [ 216.382956][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff8881f7027900 [ 216.382969][ C0] RBP: ffffc900000076b0 R08: dffffc0000000000 R09: ffffed103ee04f21 [ 216.382982][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 216.382995][ C0] R13: ffff8881f7027900 R14: 0000000000000003 R15: 1ffff92000000ec8 [ 216.383007][ C0] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 216.383022][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 216.383035][ C0] CR2: 0000000100000000 CR3: 0000000137c1d000 CR4: 00000000003506b0 [ 216.383054][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 216.383064][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 216.383075][ C0] Call Trace: [ 216.383082][ C0] [ 216.383091][ C0] ? show_regs+0x58/0x60 [ 216.383128][ C0] ? nmi_cpu_backtrace+0x29f/0x300 [ 216.383150][ C0] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 216.383172][ C0] ? kvm_wait+0x117/0x180 [ 216.383188][ C0] ? kvm_wait+0x117/0x180 [ 216.383203][ C0] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 216.383223][ C0] ? nmi_handle+0xa8/0x280 [ 216.383241][ C0] ? kvm_wait+0x117/0x180 [ 216.383257][ C0] ? default_do_nmi+0x69/0x160 [ 216.383273][ C0] ? exc_nmi+0xaf/0x120 [ 216.383288][ C0] ? end_repeat_nmi+0x16/0x31 [ 216.383305][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 216.383327][ C0] ? kvm_wait+0x117/0x180 [ 216.383343][ C0] ? kvm_wait+0x117/0x180 [ 216.383359][ C0] ? kvm_wait+0x117/0x180 [ 216.383375][ C0] [ 216.383380][ C0] [ 216.383386][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 216.383404][ C0] ? pv_hash+0x86/0x150 [ 216.383421][ C0] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 216.383445][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 216.383465][ C0] ? ret_from_fork+0x1f/0x30 [ 216.383484][ C0] _raw_spin_lock_irqsave+0x1a0/0x210 [ 216.383504][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 216.383521][ C0] ? stack_trace_save+0x113/0x1c0 [ 216.383540][ C0] ? __stack_depot_save+0x34/0x470 [ 216.383556][ C0] ? kmem_cache_free+0x116/0x2e0 [ 216.383577][ C0] lock_timer_base+0x12f/0x270 [ 216.383594][ C0] __mod_timer+0x1c9/0xcf0 [ 216.383612][ C0] ? do_softirq+0xf6/0x150 [ 216.383630][ C0] ? __local_bh_enable_ip+0x75/0x80 [ 216.383647][ C0] ? _raw_spin_unlock_bh+0x51/0x60 [ 216.383665][ C0] ? sock_hash_delete_elem+0x2a2/0x2f0 [ 216.383685][ C0] ? bpf_prog_586ab708469db861+0x41/0xd70 [ 216.383705][ C0] ? enqueue_timer+0x351/0x4c0 [ 216.383720][ C0] ? __mod_timer+0x8d3/0xcf0 [ 216.383738][ C0] ? timer_reduce+0x22/0x30 [ 216.383752][ C0] ? process_one_work+0x6bb/0xc10 [ 216.383767][ C0] ? worker_thread+0xad5/0x12a0 [ 216.383783][ C0] ? mod_timer_pending+0x30/0x30 [ 216.383802][ C0] ? htab_map_hash+0x3c2/0x7e0 [ 216.383825][ C0] add_timer+0x68/0x80 [ 216.383840][ C0] __queue_delayed_work+0x16d/0x1f0 [ 216.383860][ C0] queue_delayed_work_on+0x10f/0x180 [ 216.383881][ C0] ? delayed_work_timer_fn+0x80/0x80 [ 216.383901][ C0] ? _raw_spin_unlock+0x4d/0x70 [ 216.383919][ C0] ? srcu_gp_start+0x136/0x1c0 [ 216.383936][ C0] srcu_gp_start_if_needed+0x5e3/0x950 [ 216.383958][ C0] ? rcu_free_old_probes+0x30/0x30 [ 216.383975][ C0] call_srcu+0x46/0x50 [ 216.383990][ C0] ? android_rvh_probe_register+0x430/0x430 [ 216.384008][ C0] rcu_free_old_probes+0x23/0x30 [ 216.384024][ C0] rcu_do_batch+0x57a/0xc10 [ 216.384047][ C0] ? local_bh_enable+0x20/0x20 [ 216.384065][ C0] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 216.384085][ C0] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 216.384106][ C0] ? rcu_report_qs_rnp+0x381/0x390 [ 216.384131][ C0] rcu_core+0x517/0x1020 [ 216.384152][ C0] ? rcu_cpu_kthread_park+0x90/0x90 [ 216.384170][ C0] ? sched_clock_cpu+0x18/0x3b0 [ 216.384190][ C0] ? irqtime_account_irq+0x79/0x3c0 [ 216.384208][ C0] rcu_core_si+0x9/0x10 [ 216.384224][ C0] __do_softirq+0x26d/0x5bf [ 216.384243][ C0] do_softirq+0xf6/0x150 [ 216.384260][ C0] [ 216.384265][ C0] [ 216.384270][ C0] ? __local_bh_enable_ip+0x80/0x80 [ 216.384288][ C0] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 216.384305][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 216.384325][ C0] __local_bh_enable_ip+0x75/0x80 [ 216.384343][ C0] _raw_spin_unlock_bh+0x51/0x60 [ 216.384361][ C0] sock_hash_delete_elem+0x2a2/0x2f0 [ 216.384382][ C0] bpf_prog_586ab708469db861+0x41/0xd70 [ 216.384395][ C0] bpf_trace_run3+0x194/0x250 [ 216.384413][ C0] ? __kasan_check_write+0x14/0x20 [ 216.384432][ C0] ? bpf_trace_run2+0x210/0x210 [ 216.384451][ C0] ? debug_smp_processor_id+0x17/0x20 [ 216.384467][ C0] ? get_nohz_timer_target+0x79/0x750 [ 216.384485][ C0] ? update_load_avg+0x43a/0x1150 [ 216.384504][ C0] __bpf_trace_timer_start+0x2b/0x40 [ 216.384524][ C0] enqueue_timer+0x351/0x4c0 [ 216.384541][ C0] __mod_timer+0x8d3/0xcf0 [ 216.384561][ C0] ? __switch_to+0x62a/0x1190 [ 216.384576][ C0] ? bpf_ringbuf_output+0x19a/0x1f0 [ 216.384594][ C0] ? mod_timer_pending+0x30/0x30 [ 216.384613][ C0] ? __kasan_check_write+0x14/0x20 [ 216.384630][ C0] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 216.384648][ C0] ? _raw_spin_lock_irqsave+0x210/0x210 [ 216.384667][ C0] ? try_check_zero+0x230/0x370 [ 216.384685][ C0] timer_reduce+0x22/0x30 [ 216.384699][ C0] process_srcu+0x867/0xc50 [ 216.384721][ C0] process_one_work+0x6bb/0xc10 [ 216.384741][ C0] worker_thread+0xad5/0x12a0 [ 216.384757][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 216.384780][ C0] kthread+0x421/0x510 [ 216.384796][ C0] ? worker_clr_flags+0x180/0x180 [ 216.384811][ C0] ? kthread_blkcg+0xd0/0xd0 [ 216.384829][ C0] ret_from_fork+0x1f/0x30 [ 216.384849][ C0] [ 216.385742][ C1] rcu: rcu_preempt kthread starved for 10000 jiffies! g16925 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 217.003249][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 217.013054][ C1] rcu: RCU grace-period kthread stack dump: [ 217.018783][ C1] task:rcu_preempt state:R running task stack:28328 pid: 14 ppid: 2 flags:0x00004000 [ 217.029372][ C1] Call Trace: [ 217.032496][ C1] [ 217.035280][ C1] __schedule+0xccc/0x1590 [ 217.039542][ C1] ? __sched_text_start+0x8/0x8 [ 217.044210][ C1] ? del_timer_sync+0x1bc/0x230 [ 217.048900][ C1] ? __kasan_check_write+0x14/0x20 [ 217.053850][ C1] schedule+0x11f/0x1e0 [ 217.057839][ C1] schedule_timeout+0x18c/0x370 [ 217.062525][ C1] ? __kasan_check_write+0x14/0x20 [ 217.067474][ C1] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 217.072765][ C1] ? console_conditional_schedule+0x30/0x30 [ 217.078495][ C1] ? update_process_times+0x200/0x200 [ 217.083702][ C1] ? prepare_to_swait_event+0x308/0x320 [ 217.089085][ C1] rcu_gp_fqs_loop+0x2af/0xf80 [ 217.093685][ C1] ? dump_blkd_tasks+0x7e0/0x7e0 [ 217.098456][ C1] ? rcu_gp_init+0xc30/0xc30 [ 217.102884][ C1] ? _raw_spin_unlock_irq+0x4e/0x70 [ 217.107915][ C1] ? rcu_gp_init+0x9cf/0xc30 [ 217.112343][ C1] rcu_gp_kthread+0xa4/0x350 [ 217.116768][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 217.121456][ C1] ? wake_nocb_gp+0x1e0/0x1e0 [ 217.125974][ C1] ? __kasan_check_read+0x11/0x20 [ 217.130827][ C1] ? __kthread_parkme+0xb2/0x200 [ 217.135603][ C1] kthread+0x421/0x510 [ 217.139507][ C1] ? wake_nocb_gp+0x1e0/0x1e0 [ 217.144020][ C1] ? kthread_blkcg+0xd0/0xd0 [ 217.148447][ C1] ret_from_fork+0x1f/0x30 [ 217.152704][ C1] [ 217.155564][ C1] rcu: Stack dump where RCU GP kthread last ran: [ 217.161727][ C1] NMI backtrace for cpu 1 [ 217.165904][ C1] CPU: 1 PID: 3604 Comm: syz.0.937 Tainted: G W 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 217.176915][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 217.186811][ C1] Call Trace: [ 217.189936][ C1] [ 217.192633][ C1] dump_stack_lvl+0x151/0x1b7 [ 217.197166][ C1] ? io_uring_drop_tctx_refs+0x190/0x190 [ 217.202607][ C1] dump_stack+0x15/0x17 [ 217.206616][ C1] nmi_cpu_backtrace+0x2f7/0x300 [ 217.211383][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 217.217364][ C1] ? panic+0x751/0x751 [ 217.221278][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 217.227167][ C1] nmi_trigger_cpumask_backtrace+0x15d/0x270 [ 217.232982][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 217.238885][ C1] arch_trigger_cpumask_backtrace+0x10/0x20 [ 217.244613][ C1] rcu_check_gp_kthread_starvation+0x1e3/0x250 [ 217.250604][ C1] print_other_cpu_stall+0x112d/0x1340 [ 217.255898][ C1] ? print_cpu_stall+0x5f0/0x5f0 [ 217.260676][ C1] rcu_sched_clock_irq+0xaec/0x12f0 [ 217.265705][ C1] ? rcu_boost_kthread_setaffinity+0x340/0x340 [ 217.271708][ C1] ? hrtimer_run_queues+0x15f/0x440 [ 217.276725][ C1] update_process_times+0x198/0x200 [ 217.281758][ C1] tick_sched_timer+0x188/0x240 [ 217.286444][ C1] ? tick_setup_sched_timer+0x480/0x480 [ 217.291827][ C1] __hrtimer_run_queues+0x41a/0xad0 [ 217.296864][ C1] ? hrtimer_interrupt+0xaa0/0xaa0 [ 217.301811][ C1] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 217.307710][ C1] hrtimer_interrupt+0x40c/0xaa0 [ 217.312490][ C1] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 217.318211][ C1] sysvec_apic_timer_interrupt+0x95/0xc0 [ 217.323769][ C1] [ 217.326544][ C1] [ 217.329321][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 217.335222][ C1] RIP: 0010:smp_call_function_many_cond+0x843/0x9b0 [ 217.341734][ C1] Code: 45 8b 7d 00 44 89 fe 83 e6 01 31 ff e8 76 a8 0a 00 41 83 e7 01 49 bf 00 00 00 00 00 fc ff df 75 07 e8 b1 a4 0a 00 eb 38 f3 90 <42> 0f b6 04 3b 84 c0 75 11 41 f7 45 00 01 00 00 00 74 1e e8 95 a4 [ 217.361283][ C1] RSP: 0018:ffffc90000ba7740 EFLAGS: 00000293 [ 217.367268][ C1] RAX: ffffffff81659ddb RBX: 1ffff1103ee07af1 RCX: ffff8881349f3b40 [ 217.375090][ C1] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 217.382891][ C1] RBP: ffffc90000ba7858 R08: ffffffff81659daa R09: ffffed103ee271d3 [ 217.390703][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 217.398513][ C1] R13: ffff8881f703d788 R14: ffff8881f7138e80 R15: dffffc0000000000 [ 217.406414][ C1] ? smp_call_function_many_cond+0x82a/0x9b0 [ 217.412226][ C1] ? smp_call_function_many_cond+0x85b/0x9b0 [ 217.418074][ C1] ? text_poke_sync+0x30/0x30 [ 217.422557][ C1] ? smp_call_function_many+0x40/0x40 [ 217.427763][ C1] ? insn_decode+0x308/0x490 [ 217.432189][ C1] ? text_poke_sync+0x30/0x30 [ 217.436705][ C1] on_each_cpu_cond_mask+0x40/0x80 [ 217.441675][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 217.447478][ C1] text_poke_bp_batch+0x1c4/0x5d0 [ 217.452326][ C1] ? text_poke_loc_init+0x540/0x540 [ 217.457360][ C1] ? ____kasan_kmalloc+0xed/0x110 [ 217.462229][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 217.468037][ C1] text_poke_bp+0xc8/0x140 [ 217.472291][ C1] ? text_poke_queue+0x1a0/0x1a0 [ 217.477059][ C1] ? mutex_lock+0xb6/0x1e0 [ 217.481314][ C1] ? wait_for_completion_killable_timeout+0x10/0x10 [ 217.487742][ C1] ? mutex_lock+0xb6/0x1e0 [ 217.491991][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 217.497804][ C1] __static_call_transform+0x1b5/0x2c0 [ 217.503097][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 217.508913][ C1] ? probe_sched_wakeup+0x80/0x80 [ 217.513773][ C1] arch_static_call_transform+0x7f/0x1c0 [ 217.519242][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 217.525056][ C1] __static_call_update+0xd2/0x5c0 [ 217.530003][ C1] ? probe_sched_wakeup+0x80/0x80 [ 217.534866][ C1] ? __static_call_return0+0x10/0x10 [ 217.539986][ C1] ? __kasan_kmalloc+0x9/0x10 [ 217.544506][ C1] ? tracepoint_probe_unregister+0x458/0x900 [ 217.550321][ C1] ? memcpy+0x56/0x70 [ 217.554132][ C1] ? probe_sched_wakeup+0x80/0x80 [ 217.558992][ C1] tracepoint_probe_unregister+0x7fb/0x900 [ 217.564634][ C1] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 217.570797][ C1] bpf_probe_unregister+0x61/0x70 [ 217.575671][ C1] bpf_raw_tp_link_release+0x63/0x90 [ 217.580776][ C1] bpf_link_free+0x129/0x3f0 [ 217.585202][ C1] ? rcu_gp_kthread_wake+0x90/0x90 [ 217.590148][ C1] ? bpf_link_put_deferred+0x20/0x20 [ 217.595271][ C1] ? kmem_cache_free+0x2c3/0x2e0 [ 217.600045][ C1] bpf_link_release+0x170/0x180 [ 217.604738][ C1] ? bpf_prog_get_stats+0x2f0/0x2f0 [ 217.609850][ C1] __fput+0x3fe/0x910 [ 217.613672][ C1] ____fput+0x15/0x20 [ 217.617490][ C1] task_work_run+0x129/0x190 [ 217.621916][ C1] exit_to_user_mode_loop+0xc4/0xe0 [ 217.626949][ C1] exit_to_user_mode_prepare+0x5a/0xa0 [ 217.632265][ C1] syscall_exit_to_user_mode+0x26/0x160 [ 217.637664][ C1] do_syscall_64+0x49/0xb0 [ 217.641877][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 217.647518][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 217.653245][ C1] RIP: 0033:0x7f79a65c69f9 [ 217.657516][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 217.676942][ C1] RSP: 002b:00007fffaa17bb78 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 217.685186][ C1] RAX: 0000000000000000 RBX: 000000000001c641 RCX: 00007f79a65c69f9 [ 217.692995][ C1] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 217.700809][ C1] RBP: 00007fffaa17bc50 R08: 0000000000000001 R09: 00007fffaa17be5f [ 217.708621][ C1] R10: 00007f79a644f000 R11: 0000000000000246 R12: 0000000000000032 [ 217.716458][ C1] R13: 00007fffaa17bc70 R14: 00007fffaa17bc90 R15: ffffffffffffffff [ 217.724334][ C1] [ 353.089924][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 225s! [syz.0.937:3604] [ 353.097912][ C1] Modules linked in: [ 353.101647][ C1] CPU: 1 PID: 3604 Comm: syz.0.937 Tainted: G W 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 353.112668][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 353.122562][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x30/0x60 [ 353.128552][ C1] Code: 45 08 65 48 8b 0d 00 2b 92 7e 65 8b 15 01 2b 92 7e f7 c2 00 01 ff 00 74 11 f7 c2 00 01 00 00 74 35 83 b9 5c 0b 00 00 00 74 2c <8b> 91 38 0b 00 00 83 fa 02 75 21 48 8b 91 40 0b 00 00 48 8b 32 48 [ 353.148597][ C1] RSP: 0018:ffffc90000ba7730 EFLAGS: 00000246 [ 353.154499][ C1] RAX: ffffffff81659ddb RBX: 1ffff1103ee07af1 RCX: ffff8881349f3b40 [ 353.162421][ C1] RDX: 0000000000000001 RSI: 0000000000000001 RDI: 0000000000000000 [ 353.170331][ C1] RBP: ffffc90000ba7730 R08: ffffffff81659daa R09: ffffed103ee271d3 [ 353.178139][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 353.185951][ C1] R13: ffff8881f703d788 R14: ffff8881f7138e80 R15: dffffc0000000000 [ 353.193764][ C1] FS: 0000555555ebf500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 353.202530][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 353.208950][ C1] CR2: 0000000100000000 CR3: 0000000137c1d000 CR4: 00000000003506a0 [ 353.216765][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 353.224574][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 353.232389][ C1] Call Trace: [ 353.235517][ C1] [ 353.238206][ C1] ? show_regs+0x58/0x60 [ 353.242280][ C1] ? watchdog_timer_fn+0x4b1/0x5f0 [ 353.247225][ C1] ? proc_watchdog_cpumask+0xd0/0xd0 [ 353.252347][ C1] ? __hrtimer_run_queues+0x41a/0xad0 [ 353.257558][ C1] ? hrtimer_interrupt+0xaa0/0xaa0 [ 353.262500][ C1] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 353.268431][ C1] ? hrtimer_interrupt+0x40c/0xaa0 [ 353.273356][ C1] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 353.279255][ C1] ? sysvec_apic_timer_interrupt+0x95/0xc0 [ 353.284895][ C1] [ 353.287668][ C1] [ 353.290449][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 353.296438][ C1] ? smp_call_function_many_cond+0x82a/0x9b0 [ 353.302251][ C1] ? smp_call_function_many_cond+0x85b/0x9b0 [ 353.308084][ C1] ? __sanitizer_cov_trace_pc+0x30/0x60 [ 353.313451][ C1] smp_call_function_many_cond+0x85b/0x9b0 [ 353.319105][ C1] ? text_poke_sync+0x30/0x30 [ 353.323702][ C1] ? smp_call_function_many+0x40/0x40 [ 353.328912][ C1] ? insn_decode+0x308/0x490 [ 353.333455][ C1] ? text_poke_sync+0x30/0x30 [ 353.337966][ C1] on_each_cpu_cond_mask+0x40/0x80 [ 353.342917][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 353.348730][ C1] text_poke_bp_batch+0x1c4/0x5d0 [ 353.353590][ C1] ? text_poke_loc_init+0x540/0x540 [ 353.359231][ C1] ? ____kasan_kmalloc+0xed/0x110 [ 353.364091][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 353.369912][ C1] text_poke_bp+0xc8/0x140 [ 353.374160][ C1] ? text_poke_queue+0x1a0/0x1a0 [ 353.378932][ C1] ? mutex_lock+0xb6/0x1e0 [ 353.383185][ C1] ? wait_for_completion_killable_timeout+0x10/0x10 [ 353.389606][ C1] ? mutex_lock+0xb6/0x1e0 [ 353.393862][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 353.399674][ C1] __static_call_transform+0x1b5/0x2c0 [ 353.404968][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 353.410785][ C1] ? probe_sched_wakeup+0x80/0x80 [ 353.415645][ C1] arch_static_call_transform+0x7f/0x1c0 [ 353.421112][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 353.426927][ C1] __static_call_update+0xd2/0x5c0 [ 353.431873][ C1] ? probe_sched_wakeup+0x80/0x80 [ 353.436738][ C1] ? __static_call_return0+0x10/0x10 [ 353.441863][ C1] ? __kasan_kmalloc+0x9/0x10 [ 353.446369][ C1] ? tracepoint_probe_unregister+0x458/0x900 [ 353.452187][ C1] ? memcpy+0x56/0x70 [ 353.456010][ C1] ? probe_sched_wakeup+0x80/0x80 [ 353.460949][ C1] tracepoint_probe_unregister+0x7fb/0x900 [ 353.466590][ C1] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 353.472756][ C1] bpf_probe_unregister+0x61/0x70 [ 353.477615][ C1] bpf_raw_tp_link_release+0x63/0x90 [ 353.482994][ C1] bpf_link_free+0x129/0x3f0 [ 353.487419][ C1] ? rcu_gp_kthread_wake+0x90/0x90 [ 353.492371][ C1] ? bpf_link_put_deferred+0x20/0x20 [ 353.497488][ C1] ? kmem_cache_free+0x2c3/0x2e0 [ 353.502265][ C1] bpf_link_release+0x170/0x180 [ 353.506950][ C1] ? bpf_prog_get_stats+0x2f0/0x2f0 [ 353.511996][ C1] __fput+0x3fe/0x910 [ 353.515807][ C1] ____fput+0x15/0x20 [ 353.519620][ C1] task_work_run+0x129/0x190 [ 353.524052][ C1] exit_to_user_mode_loop+0xc4/0xe0 [ 353.529082][ C1] exit_to_user_mode_prepare+0x5a/0xa0 [ 353.534376][ C1] syscall_exit_to_user_mode+0x26/0x160 [ 353.539757][ C1] do_syscall_64+0x49/0xb0 [ 353.544008][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 353.549648][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 353.555377][ C1] RIP: 0033:0x7f79a65c69f9 [ 353.559640][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 353.579364][ C1] RSP: 002b:00007fffaa17bb78 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 353.587608][ C1] RAX: 0000000000000000 RBX: 000000000001c641 RCX: 00007f79a65c69f9 [ 353.595421][ C1] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 353.603231][ C1] RBP: 00007fffaa17bc50 R08: 0000000000000001 R09: 00007fffaa17be5f [ 353.611043][ C1] R10: 00007f79a644f000 R11: 0000000000000246 R12: 0000000000000032 [ 353.618852][ C1] R13: 00007fffaa17bc70 R14: 00007fffaa17bc90 R15: ffffffffffffffff [ 353.626673][ C1] [ 353.629531][ C1] Sending NMI from CPU 1 to CPUs 0: [ 353.634628][ C0] NMI backtrace for cpu 0 [ 353.634639][ C0] CPU: 0 PID: 829 Comm: kworker/0:6 Tainted: G W 5.15.152-syzkaller-00143-g70e1a731d986 #0 [ 353.634659][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 353.634673][ C0] Workqueue: rcu_gp process_srcu [ 353.634694][ C0] RIP: 0010:kvm_wait+0x117/0x180 [ 353.634715][ C0] Code: 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 53 41 0f b6 45 00 44 38 f0 0f 85 63 ff ff ff 66 90 0f 00 2d 5a 02 13 04 f4 54 ff ff ff fa 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b [ 353.634729][ C0] RSP: 0000:ffffc90000007600 EFLAGS: 00000046 [ 353.634744][ C0] RAX: 0000000000000003 RBX: 1ffff92000000ec4 RCX: ffffffff8155068f [ 353.634757][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff8881f7027900 [ 353.634770][ C0] RBP: ffffc900000076b0 R08: dffffc0000000000 R09: ffffed103ee04f21 [ 353.634784][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 353.634797][ C0] R13: ffff8881f7027900 R14: 0000000000000003 R15: 1ffff92000000ec8 [ 353.634810][ C0] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 353.634826][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 353.634838][ C0] CR2: 0000000100000000 CR3: 0000000137c1d000 CR4: 00000000003506b0 [ 353.634855][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 353.634865][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 353.634877][ C0] Call Trace: [ 353.634884][ C0] [ 353.634891][ C0] ? show_regs+0x58/0x60 [ 353.634919][ C0] ? nmi_cpu_backtrace+0x29f/0x300 [ 353.634941][ C0] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 353.634964][ C0] ? kvm_wait+0x117/0x180 [ 353.634980][ C0] ? kvm_wait+0x117/0x180 [ 353.634996][ C0] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 353.635016][ C0] ? nmi_handle+0xa8/0x280 [ 353.635035][ C0] ? kvm_wait+0x117/0x180 [ 353.635050][ C0] ? kvm_wait+0x117/0x180 [ 353.635066][ C0] ? default_do_nmi+0x69/0x160 [ 353.635082][ C0] ? exc_nmi+0xaf/0x120 [ 353.635097][ C0] ? end_repeat_nmi+0x16/0x31 [ 353.635115][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 353.635156][ C0] ? kvm_wait+0x117/0x180 [ 353.635173][ C0] ? kvm_wait+0x117/0x180 [ 353.635189][ C0] ? kvm_wait+0x117/0x180 [ 353.635205][ C0] [ 353.635211][ C0] [ 353.635217][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 353.635235][ C0] ? pv_hash+0x86/0x150 [ 353.635254][ C0] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 353.635277][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 353.635299][ C0] ? ret_from_fork+0x1f/0x30 [ 353.635317][ C0] _raw_spin_lock_irqsave+0x1a0/0x210 [ 353.635338][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 353.635356][ C0] ? stack_trace_save+0x113/0x1c0 [ 353.635375][ C0] ? __stack_depot_save+0x34/0x470 [ 353.635391][ C0] ? kmem_cache_free+0x116/0x2e0 [ 353.635412][ C0] lock_timer_base+0x12f/0x270 [ 353.635429][ C0] __mod_timer+0x1c9/0xcf0 [ 353.635447][ C0] ? do_softirq+0xf6/0x150 [ 353.635465][ C0] ? __local_bh_enable_ip+0x75/0x80 [ 353.635484][ C0] ? _raw_spin_unlock_bh+0x51/0x60 [ 353.635502][ C0] ? sock_hash_delete_elem+0x2a2/0x2f0 [ 353.635523][ C0] ? bpf_prog_586ab708469db861+0x41/0xd70 [ 353.635538][ C0] ? enqueue_timer+0x351/0x4c0 [ 353.635554][ C0] ? __mod_timer+0x8d3/0xcf0 [ 353.635572][ C0] ? timer_reduce+0x22/0x30 [ 353.635586][ C0] ? process_one_work+0x6bb/0xc10 [ 353.635601][ C0] ? worker_thread+0xad5/0x12a0 [ 353.635618][ C0] ? mod_timer_pending+0x30/0x30 [ 353.635637][ C0] ? htab_map_hash+0x3c2/0x7e0 [ 353.635661][ C0] add_timer+0x68/0x80 [ 353.635676][ C0] __queue_delayed_work+0x16d/0x1f0 [ 353.635696][ C0] queue_delayed_work_on+0x10f/0x180 [ 353.635716][ C0] ? delayed_work_timer_fn+0x80/0x80 [ 353.635736][ C0] ? _raw_spin_unlock+0x4d/0x70 [ 353.635754][ C0] ? srcu_gp_start+0x136/0x1c0 [ 353.635772][ C0] srcu_gp_start_if_needed+0x5e3/0x950 [ 353.635794][ C0] ? rcu_free_old_probes+0x30/0x30 [ 353.635811][ C0] call_srcu+0x46/0x50 [ 353.635826][ C0] ? android_rvh_probe_register+0x430/0x430 [ 353.635844][ C0] rcu_free_old_probes+0x23/0x30 [ 353.635861][ C0] rcu_do_batch+0x57a/0xc10 [ 353.635939][ C0] ? local_bh_enable+0x20/0x20 [ 353.635969][ C0] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 353.635990][ C0] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 353.636011][ C0] ? rcu_report_qs_rnp+0x381/0x390 [ 353.636031][ C0] rcu_core+0x517/0x1020 [ 353.636054][ C0] ? rcu_cpu_kthread_park+0x90/0x90 [ 353.636082][ C0] ? sched_clock_cpu+0x18/0x3b0 [ 353.636102][ C0] ? irqtime_account_irq+0x79/0x3c0 [ 353.636121][ C0] rcu_core_si+0x9/0x10 [ 353.636138][ C0] __do_softirq+0x26d/0x5bf [ 353.636157][ C0] do_softirq+0xf6/0x150 [ 353.636176][ C0] [ 353.636181][ C0] [ 353.636186][ C0] ? __local_bh_enable_ip+0x80/0x80 [ 353.636204][ C0] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 353.636222][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 353.636243][ C0] __local_bh_enable_ip+0x75/0x80 [ 353.636260][ C0] _raw_spin_unlock_bh+0x51/0x60 [ 353.636279][ C0] sock_hash_delete_elem+0x2a2/0x2f0 [ 353.636301][ C0] bpf_prog_586ab708469db861+0x41/0xd70 [ 353.636317][ C0] bpf_trace_run3+0x194/0x250 [ 353.636336][ C0] ? __kasan_check_write+0x14/0x20 [ 353.636355][ C0] ? bpf_trace_run2+0x210/0x210 [ 353.636374][ C0] ? debug_smp_processor_id+0x17/0x20 [ 353.636391][ C0] ? get_nohz_timer_target+0x79/0x750 [ 353.636411][ C0] ? update_load_avg+0x43a/0x1150 [ 353.636431][ C0] __bpf_trace_timer_start+0x2b/0x40 [ 353.636452][ C0] enqueue_timer+0x351/0x4c0 [ 353.636470][ C0] __mod_timer+0x8d3/0xcf0 [ 353.636491][ C0] ? __switch_to+0x62a/0x1190 [ 353.636507][ C0] ? bpf_ringbuf_output+0x19a/0x1f0 [ 353.636525][ C0] ? mod_timer_pending+0x30/0x30 [ 353.636545][ C0] ? __kasan_check_write+0x14/0x20 [ 353.636563][ C0] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 353.636581][ C0] ? _raw_spin_lock_irqsave+0x210/0x210 [ 353.636600][ C0] ? try_check_zero+0x230/0x370 [ 353.636618][ C0] timer_reduce+0x22/0x30 [ 353.636633][ C0] process_srcu+0x867/0xc50 [ 353.636656][ C0] process_one_work+0x6bb/0xc10 [ 353.636676][ C0] worker_thread+0xad5/0x12a0 [ 353.636692][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 353.636715][ C0] kthread+0x421/0x510 [ 353.636732][ C0] ? worker_clr_flags+0x180/0x180 [ 353.636748][ C0] ? kthread_blkcg+0xd0/0xd0 [ 353.636766][ C0] ret_from_fork+0x1f/0x30 [ 353.636787][ C0]