last executing test programs: 1.731219096s ago: executing program 2 (id=1762): bpf$ENABLE_STATS(0x20, &(0x7f0000000000), 0x4) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x230400, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x5a6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001200)={r1, &(0x7f0000000100)="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", &(0x7f0000001100)=""/249, 0x4}, 0x20) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000001240)={'veth0_to_bond\x00', 0x400}) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001400)={&(0x7f0000001280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x9, [@union={0x0, 0x4, 0x0, 0x5, 0x0, 0x1, [{0x4, 0x3, 0xfffffffa}, {0xd, 0x1, 0x3b4}, {0xb, 0x5, 0x7fffffff}, {0xa, 0x0, 0x3}]}, @restrict={0x7, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x2e, 0x5f, 0x61, 0x2e, 0x0, 0x30, 0x0]}}, &(0x7f0000001300)=""/200, 0x69, 0xc8, 0x0, 0x0, 0x0, @void, @value}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0x1, 0x3, 0x1, 0x72, 0x2003, r1, 0x7f, '\x00', 0x0, r2, 0x1, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001500)={0x0, 0x7fff, 0x8}, 0xc) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001540)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001580)=@o_path={&(0x7f00000014c0)='./file0\x00', r4, 0x4000, r5}, 0x18) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000015c0)=@bloom_filter={0x1e, 0x8000, 0x2ff, 0x7, 0x3841, r3, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2, 0xa, @void, @value, @void, @value}, 0x50) syz_clone(0x30004080, &(0x7f0000001640)="1d5f744dd0836531abef512d96f2e0b6f221a22f53835a0e57ec2c7b5f713eba1db87dac7d3214491db4962397dce40ce4b6a71d8c1adbd9ec025ab38071aa1c91edc40f9dd8f802019d72c213da8bbbb891d8ed6f74044d0fe73412e939959f27464875db3141b65c2022a1d620489d06a359ae135e4bcd6939ca30f5ffc605d22ddef4572a577a4f4c73ddebf24d4f8be4f73ae0bd5ab37b84c1070cce8fc6a82d9ee2b5be8b3d7e0e205db0d83f82fe902c4aa6e7634143c8d386a0b8246f710c18e2f858cad04f790deb5d66dca7e472ea5154ab2aa6d45990f3ef9006324f83ebbf9b8e", 0xe6, &(0x7f0000001740), &(0x7f0000001780), &(0x7f00000017c0)="22c5a4c52b90f3057c1962afe5f44aad67db03b77a2b7014c24e56b9a5df32442e879e6c2a58775187cefdcf90b5b94436aa89a4c13a8f20ffa2d5bdfe30a2a9c76b1328eaf7eb599a3e3b8308f028487c0fd418e30b47ca0795b03cde13650eec5825b250436e196c52c5e3b107dabc7506b0568504e5404623be2e54d5913f3377f562707a9158f0d8a4f9780d9476148530f341713b28de76cdfbea4496b427779efd849071609957c051531f60f5094d810eefd5ebc226e4331e7411f0f566d4a2fcd60c47fca7efc38c03a349ea516ddc28f2b439c78d2df34be5a1f5d27da02a580b276ee43bee3d223e0c33f0436a9ce5b393ba") bpf$ENABLE_STATS(0x20, &(0x7f00000018c0), 0x4) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000001900)={'veth0_to_hsr\x00'}) openat$cgroup_subtree(r5, &(0x7f0000001940), 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001980)) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000019c0), 0x70001, 0x0) ioctl$TUNSETOFFLOAD(r7, 0x400454d0, 0x16) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x11, 0x23, &(0x7f0000001a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @call={0x85, 0x0, 0x0, 0x9e}, @ldst={0x3, 0x3, 0x0, 0xa, 0xa, 0xfffffffffffffff8, 0xfffffffffffffff0}, @ldst={0x0, 0x1, 0x1, 0x3, 0x5, 0x50}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_val={0x18, 0x5, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x9}, @alu={0x4, 0x1, 0x1, 0x1, 0x4, 0x462b47b527e426cc, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001b80)='syzkaller\x00', 0x5, 0x35, &(0x7f0000001bc0)=""/53, 0x41100, 0x2, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000001c00)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000001c40)={0x5, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c80)=[r1], &(0x7f0000001cc0)=[{0x0, 0x2, 0x3, 0x6}, {0x3, 0x4, 0x3, 0x9}, {0x3, 0x1, 0xc, 0xc}, {0x2, 0x5, 0x4, 0x6}, {0x2, 0x4, 0x5, 0x6}], 0x10, 0xff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001a00)='fscache_active\x00', r8, 0x0, 0x4}, 0x18) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000001e40), 0x41, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001e80)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001ec0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001f00)={0x5, 0x0}, 0x8) r11 = openat$cgroup_ro(r5, &(0x7f0000002140)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002200)={0x1a, 0x26, &(0x7f0000001f40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0xa71}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@map_idx={0x18, 0xa, 0x5, 0x0, 0x4}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x6}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7b}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x401}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_fd={0x18, 0x3, 0x1, 0x0, r4}, @alu={0x4, 0x1, 0x8, 0xb, 0xa, 0x2, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002080)='GPL\x00', 0x6, 0x7c, &(0x7f00000020c0)=""/124, 0x40f00, 0x71, '\x00', 0x0, @tracing=0x1c, r11, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002180)={0x5, 0x10, 0x2d, 0x7}, 0x10, r10, 0xffffffffffffffff, 0x0, &(0x7f00000021c0)=[r4, r6, r1, r4, r3, r4, r4], 0x0, 0x10, 0x4, @void, @value}, 0x94) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000002600)={&(0x7f00000022c0)="8938e9fc11dd95999bae25d5047530ca92e2dfdbbe2fe1187d16ec4bf025a5f6bc8a9a731dae967ccde6e3bcec8d5bde5d99f261bf8948e4dc8ec67872b4d8fb04038946add5e8742cc86322f6455d6ed3", &(0x7f0000002340)=""/136, &(0x7f0000002400)="7bb9c25dcb9078be45f6bd75692246ececd12cec8644705c107848284d4aff8bd528765fb226b3d81cdf0c1c4a30376277311e08ead7f05a680c8c3937701f42a993dcb6eb64317b13006500db9dc37271d9048285a66c08f8828b66175953be9d1831b19310b676be5333da6af098eab57f337909b2086d0e3f277a5ccb0a371469871957edee56b366016429b27403401db15a38747595ec7b970bf851f2a89039fc0af2b8263f2097edeb464ef99db88f7cdf0109ce6927a349d4e7961ab7e1ff4ccf957f14cef96a0f0276c9ced450e7022f2fc6bff00bbed3", &(0x7f0000002500)="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", 0x3c89, r1}, 0x38) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000026c0)={r8, 0x58, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002700)=@bloom_filter={0x1e, 0x400, 0xeb, 0xffffff5d, 0x80, r1, 0x8, '\x00', r12, 0xffffffffffffffff, 0x4, 0x5, 0x2, 0xf, @void, @value, @void, @value}, 0x50) ioctl$TUNGETVNETLE(r9, 0x800454dd, &(0x7f0000002780)) 1.640678664s ago: executing program 2 (id=1765): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10005, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x2, 0xc, &(0x7f00000013c0)=ANY=[@ANYBLOB="180200001000000000000000000000001801000020696c2500000000002020207b2af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000087000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff2e, &(0x7f0000000040)=""/210, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r3, 0x58, &(0x7f0000000340)}, 0x10) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r4}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) 1.407777346s ago: executing program 4 (id=1768): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r2, 0x0, 0xfffffffffffffffe}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000001080)={0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xffffffffffffff00, 0x2}, 0x18828, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) openat$cgroup_type(r3, &(0x7f00000001c0), 0x2, 0x0) gettid() openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r4 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000004c0)='cpu&00\t|l%G\x87\xcf\x00\xe4\xb7l\xfe\xb0\f_\xd7\x01\xc9\n\x18\x9a\x91\x02\x04A\x0e/\xd0U\xacF\xcb\"\xf3Pgch\xe2\xef\x98o\x00\x00\xc7Y\x80\xd28\xd5\x12&\xf6Y\xd0\x83\xd0\x85\xd8\xc6\xbd\x9a\xfel\"\xde\x8e\xc3\xc9\r\xd4\xb8\x97_<\xf3hV\xf7)\xb3\xf925\xcf\x97l\x85\xf3;\x1a\x0f:J\x9b\xf8\xa4\x83\x1btNT\x8a\x80\xcd\xb6\x0f\x06\xae\xc3\x94\xa3]\xd0\x1a >6\xc7\x06\x00\x00\x00\x00\x00\x00\x00x\xfcQ\xfb\f\x86\xaa\x9bjCA\xdb=g\xdf\xec\xe2~\x99V\xbck\xe7\x01\x00\x00\x00\xd9\xf9\xab\xbe\xfb\v\x954\x10\xe4\xf7\x83&\xf1J\xaa\xd4~\x10Y\xafU2\x1f_\xd5\xb7\x9d\xaa\xec\x9ceJy\xe4\x0fC\xa1e)\xedG\x1b\xa5jy\xebe\xf0\xa9\xa6\xc2Z\x85Vs8\xad\x15\xa7') openat$cgroup_ro(r3, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0xc, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x9}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x2e]}}, &(0x7f0000000080)=""/159, 0x50, 0x9f, 0x1, 0x0, 0x0, @void, @value}, 0x20) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 1.295755097s ago: executing program 1 (id=1770): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x6, 0x8, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0xd, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2800000002000000, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x0, 0x4000000}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x95, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000400), 0x8, 0x6a, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x1, 0x1, 0x7, 0x1, 0x0, 0xffffffffffffffff}]}, &(0x7f00000001c0)='GPL\x00', 0x2, 0x31, &(0x7f0000000200)=""/49, 0x41000, 0x2, '\x00', r1, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x2, 0x5, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000640), &(0x7f0000000680)=[{0x1, 0x2, 0xf, 0xd}, {0x3, 0x2, 0x4, 0x9}, {0x2, 0x3, 0x10, 0x9}, {0x0, 0x5, 0x1, 0xc}, {0x5, 0x5, 0xd, 0x7}, {0x3, 0x3, 0xb, 0xb}], 0x10, 0x2, @void, @value}, 0x94) 1.26364641s ago: executing program 1 (id=1771): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='\n\x00'/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000013c0)={0x0, 0x14, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0x1000}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYRES8=0x0, @ANYRESDEC, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/15], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000001240)=ANY=[@ANYRES32=r1, @ANYRES16], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='f2fs_write_begin\x00', r3, 0x0, 0x3}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001280), 0x7}, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffffffe}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) unlink(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00'}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200), 0x4) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) perf_event_open(&(0x7f00000010c0)={0x0, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x11, 0xa, 0xfa67, &(0x7f0000001040)) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000011c0)=r3, 0x4) close(r5) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00010000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca7f8fbc9cdfa146ec56175037958e271f60d25b7937f02c8695e5a1b2cdf41dc10d1e8bf076d83923dd29c0301000000010000003d5d58c07fa1f7e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831ab7ea0c34f17e3ad6e70af07da5ceb01b7551ef3bb6220030100dfd8e012e79578e51bc53099e90fbdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f93781965f1328d6704902cbe7bc0476619f28d99cde7a6b73340cc2160a1fe3c184b751c51160fbce841dfebd31a08b32808b80200000000009dd27080e71113610e10d8fb9c2aec61ce63a3462fd50117b89a9ab759b4eeb8cb000066d42b4e54861d0227dbfd2ed8576a3f7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0180aabc18cae2ed4b4390af9a9ceafd07ed0030000002cab154ad029a119ca3c9727ec84222fff0d7216fdb0d3a0ec4bfae563858dc06e7c337642d3e5a815212f5e16c1b30c3a2a71bc85018e5ff2c910496f0dafc9ffc2cc788bee1b47683db01a46939868d75211bbae0e7313bff5d4c391ddece00fc772dd6b4d4d0a917b239fe12280fc92c88c5b8dcdcc22ee1747790a8992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5cc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673fffffff7f23877a6b24db0e067345560942fa1c22015e53fd8a46be933ab460d8629fbef2461c96a08707671215c302fae29187d4f5c06a960fd37c10223fdae7ed04935c3c90d3add8eebc8619d73415e6adcda2130f5011e42e50adab988dd8f12baf5cc9398c88607a08009c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859adfe38f77b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc874b2f663ddeef0005b3d96c7aae73835d5a3cda9e90d76c1993e0799d4894ee7f8249dc1e3428d2129369ee1b85afa1a5b6154eb2eea0d0df414b315f65112412392191fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7ade8a5b859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b20428d6474a0a91ee90b8de802c6b538622e6bbcb80f87b415263c401e64ed69a2f75409000000000000001d695c4559b82cabac3cccadc1e1c19af4e03020abf5ff0433d660f20898d2a045d009a0ffb20a77c9af2b80c05184a66d30bbea2ca45a4d6d6d1e6e79aef42355a500587b603306a5af8d867d80a07f10d82eafb03062e95196d5e3ffea0000000000000be959096ea948cfa8e7194123e918914a71ad5a8521fb9553bc60f7d9719b55b3abb6bba3d113a680a8d46fe074c83fbe378a3889e8145b2eaceab05ef932c6e4f8ef0ed0d818a7b76d839cf3c63ebb4380b168c38fa32e49563cfee3a7f0fc18bfa32c418cef875fb49e2989177a1bcd1e30280bc586e79a5dd80701018e7d6e97b3ce267dd4e27b6ef206660090bb2164474cef378f97ca33fc03000000000000001547053453d0c9aec91a24079b21d52fb5516bf0c28ef37aa76442f6083dc99cd61afaf6be45d7b00d3639f2f10ac2d5c759c3e5468f0000000011d415b6b085fb73a2c7c3852e0e658ffeb4e863428a792bee94f6cd895424360e0464f9d7ea425f2fa6aac029d15af607ad83532ff181c985f54b39370c06e63055b4d6a36fa98a44e379d28307c9912fb097601f3f88a2ca6fd1f9320cfe7fc8e9f7f15f02e177ce23f43a154b42e26f037e8a01377cbd3f509e6e540c9ba9c2a589c95d8ad67a65e9a44c576dc24452eaa9d819e2b04bdd1c000000070000000000000000000000005333c6199c12dcd926891927a7267c47cf897853d160100b39b613faefe16bed1fc105dddd77ab929b837d4442d13d5a29179a00837918dd7854aa17eb9fbdc2bdc0e98ae2c3f23a6131e2879f04ff01000030b92dd493be66c2242f8184733b80ba28e8ffffff7f00000000bb2f89049c5f6d63d56995747639964217aacfe548bc869098aa8e07e51dbc9e2d4db3c5f79fd355222ec2a00cf7f2ccd6dd6d2dc2a815d8314221a5472f1318a9dfbec5a759579caf3262129b14e99040b5d91398e17df85c25ccae973eecc7d187168d5c9cd848d566cc17587641ed01889c927da38d83314480b15e23138c5b877a72bd4cf74a299df4fbfc8e6ea96939f15d254d9033c5a45706bda78ab60200000000000000000000000000000000000000706f78f0a2ea9667fb5b951808545a46830970c2dfae01adbda7d29bf1f7abdaf52e0de6f9d7150808ed086642e64ebf98762b34338b80e41b704c3eefaf0bb5ff070000000000000ea15ccc0d7a830b6eb33b6b61675511d693ef5e3c44bbf71cabc5f45c879e7499f8baae2a1a09cf38da73297764fbc0e723e1cc3abb12e3076982ed32c94a2ce3e6f37c47e983da4ca5c96187db5a2a2e1742bc93a65d7187126126b3a80f17dd2f7dbbe82d104ede9ba6925afc2ee6cb94f56f1363cad635abf8f983292c49c0ebf5005154c7b58a3a2a2ea86d2fd92b8661264f781e3fb02d05a28f3f17b64d0258853d45cb5ebde10cd3d82eeed2f1ed925b7cf400304932c5ed0a362b235ce37e1f17700f7d1fecf8be8a2c5d25a9c60657560d05441387ff158a018d19a286c58684a1d2f624c3eb59d509ee89cc2df52881d005b2e5c27563ba54e4153c132d0366aa660000000000000009c1aaec93ec0f925921fb2e9eb202a29bef28224dbabe723de5c584bc398a8792e493048c87f60a51a391e95921218149403558fd13c649f90b0911d57eeb298b590581eba1ce383b539ab80fd15445987b1bb4eb512545e1ab65fef3103ce10b1ee362b51c72f82edf2f502ddf52567775e34a56d1be892f1e62b08950d517fa6fb1b0ef2edf1b67f8644786116b037d4a36fdd30b000063e58c856ec44cbbc2d370553f832af9480215e09aaa3843fe360b1c293a14627f2cfbe278f31d0abc0f5aaa10926dbbfe8a4b131c13a73d4e6d065c2c0fed3ab8442520ce0e0ad7d2d177377ab197ace3ef8b1c24ceb0bdee84bd6e6317633938dd19dc42de7f8f860eca6d9c74525fcd3497526df4c13e3ba5f0d75365a4542ae9440d2fede416d61800aaf7e038879c5d177b3876fda4121e00000100000000003edd3d43cc64e0d26b46907b42e08d000000000000903350932d3eef7fdada20c19807066e3c72d0d816eb9fa50be213bf6bbb7ccb9f2e8a153e6ced68f192ebed6e86af0f2cec7335fa8039fd6eb025440bc2a34d071f0a0e6774308a74748b8cd994ed368695aa2c59869c9200a1306ffa5a71ca69e89a69fc858f37c2c398515a910a35e22ab0573c10b85df4c2972a2fb8b9c080fbb41a753791df727fdeaded2930376eda31312256191c620cce34d1e3bf40a4a207ab1575b399eb8155781bfc7cb5920b49c039935a888d77041894f60fbbcafa487ee96b368e8769da90b44190e569fe8b923c32c288baaca5c5558b5a78bb43e5d9e47a1d5809bb178184b5672d08e29aecf1f572ac1e6cab7e820751e95999b7532603494d37a2bff35a9eec46dfc8a52433f605ebf151c837b4966b5f3628a406175a87e32c5e4268d3000933b580415b162e2946446b8f02554c8a1225217d69d049685dd06aa8528673a9673a723ac414af77f523ad730d00e8700c213f95c87a94f39f506b9e000000000000000000000000000000000000000000000000000090668ac41a1c2a4f7831e6c6a3e9c68ca2c449482bb70a994e71a7f24873848fbb128c820c1de19cc003dfa65a2b296caeb1253802080e08eeb724c4c7b7e052afa19b0f2cd7a13bda4b5a8f3b8fa3ca70bb756a3d529718d5c79d9bdb89e5d33793533211d76d00a45079eff797476106bf76f1fed952a7c9162b88911b5b00c3d26fd2fb4d7b29d1ce025e102d458efd5cca3f3835ce760359eaa01cb13cb28d60e8942fdc02b6824c00dac62f8a2d4c680ae284a82f09d6641921536814b444e4188d9b2e97eb3b108e7876f0f3f3863147ab694218c7cecc075d52d590dddbb57fc6fedf5ec69d7894a7b5c8109f303dab998815c80534b0bd34c49eea63997e56728a8185a8bb6988a7197b87f5548f5edfdfb3efc907fe561b33a6f7c707f7828c6adaf3b2a39929b4b65253e787d65c08aff5e4a9b2267bd8f803ea38f10a6e9c4a49bf23525e08c12d229211fe4d88cf1440f29accfa50f327ac1fb20d7f164100111bd21fca713b2475f1c997f3000000000080c426bcec79c6bc83ce4e6cbb17c01be69db342192d0a716cc24710d23321441f475ec485d642b61c6bd907071dbbe37c0b78f60fd2ad0d13ca62d9d9aafb01c3920b64cb5e023810e2de4327f90c389ce36d90ff9f3cb9d8cd2260d05a8126943a3df17157470595c68ac8df7fea6d42ecb2cdb65b4f2aef0dc4b2de949a6d4ec37f2fd693ae44944041a64fe6336aba1c66b1b95d2edbc40364a049616ae962d75eae619548aa86bd5f0bad56e7ad7de2ee5e6f3b42e3a27094b6b5face99456d9af1926b21d37faf7612d9752cf58e6424decd530b5419e117ec086174439af6ee6c7fdb2d19c9280fa9a02e8fa6a38acfff09050d912635fed175fd06f577d40000000000000000000000000000754bffd73c0888ba8834f20b3acea57b7817663e12c1a5503bc4c13af59bda21688d68698c53ce3aa767657774db09ece7ec888d3af290207d36fa433b35e17dc0f3dc728ea1c633a4ef9e7d9bf81b57492e0544800921d1b751c5fbc163"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r0}, &(0x7f00000008c0), &(0x7f0000000900)}, 0x20) 1.133674702s ago: executing program 4 (id=1775): bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0xc6d2, 0x0}, 0x8) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r0, 0x9}, 0xc) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x1c, r1}, 0x18) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) r4 = perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x9, 0xe, 0x0, 0x1, 0x0, 0x40, 0x14906, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0xff, 0x5}, 0x2280, 0x5, 0x2, 0x0, 0x0, 0xcf3, 0x8, 0x0, 0x4, 0x0, 0x401}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r5 = perf_event_open$cgroup(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x1c, 0x95, 0x10, 0x0, 0x401, 0x44220, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1000, 0x2, @perf_config_ext={0x81}, 0x10010, 0x1ff, 0x63c6, 0x2, 0x5, 0x9, 0x1ff, 0x0, 0x1, 0x0, 0x6}, r3, 0xa, r4, 0xc) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'wg0\x00', @broadcast}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x48000, 0x0) ioctl$TUNSETLINK(r6, 0x400454cd, 0x311) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r8 = getpid() r9 = gettid() (async) r10 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000480)='ns/mnt\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500), 0x4) sendmsg$unix(r7, &(0x7f0000000640)={&(0x7f0000000300)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000380)="5cac57db5610c7489788a885fa96988f51594740a8f87b8e1b8f30859030729890ae142ca236dafb0ecb807c3f56ca96a723fd7d00c1a90119bf14c21631cdaa42e7de10bf0885a7a0764b3ef523706e1a99fc4c66bc234f5f6196e572d3a94109998f3836e3b1bcd36e69a4d476001caeffd2a652f1a47cf7d37b81eacc54966f5ce1c443ffc3a734b15b46b21c3f", 0x8f}], 0x1, &(0x7f0000000540)=[@rights={{0x20, 0x1, 0x1, [r6, r6, r3, r5]}}, @rights={{0x14, 0x1, 0x1, [r2]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xffffffffffffffff}}}, @rights={{0x30, 0x1, 0x1, [r2, r1, r6, r1, r5, r3, r1, r5]}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xee01, 0xee00}}}, @rights={{0x30, 0x1, 0x1, [r10, 0xffffffffffffffff, r4, r6, r11, r12, r2, r4]}}], 0xf8, 0x20000844}, 0x48055) (async) r13 = openat$cgroup_devices(r3, &(0x7f0000000680)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r13, &(0x7f00000006c0)={'a', ' *:* ', 'wm\x00'}, 0x9) (async) write$cgroup_devices(r3, &(0x7f0000000700)={'c', ' *:* ', 'r\x00'}, 0x8) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r1, 0x58, &(0x7f0000000740)}, 0x10) (async) r14 = openat$cgroup_ro(r3, &(0x7f0000000800)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r14, &(0x7f0000000840), 0x9) (async) r15 = openat$tun(0xffffffffffffff9c, &(0x7f0000000880), 0x101000, 0x0) ioctl$TUNSETLINK(r15, 0x400454cd, 0x13) recvmsg$unix(r11, &(0x7f0000000e40)={&(0x7f00000008c0), 0x6e, &(0x7f0000000d40)=[{&(0x7f0000000940)=""/121, 0x79}, {&(0x7f00000009c0)=""/248, 0xf8}, {&(0x7f0000000ac0)=""/81, 0x51}, {&(0x7f0000000b40)=""/60, 0x3c}, {&(0x7f0000000b80)=""/165, 0xa5}, {&(0x7f0000000c40)=""/240, 0xf0}], 0x6, &(0x7f0000000dc0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f00)={r16, 0x58, &(0x7f0000000e80)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r18, 0x40082404, &(0x7f0000000f40)=0x1ff) r19 = openat$tun(0xffffffffffffff9c, &(0x7f0000000f80), 0x2e902, 0x0) ioctl$SIOCSIFHWADDR(r19, 0x8924, &(0x7f0000000fc0)) (async) perf_event_open(&(0x7f0000001040)={0x4, 0x80, 0x5, 0xd5, 0x7, 0x9, 0x0, 0x1, 0x0, 0x1e, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001000)}, 0x4000, 0x7fff, 0xffff, 0x3, 0x4, 0xfdb, 0x42f, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x10, r17, 0x2) 1.076157868s ago: executing program 4 (id=1778): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000080000000000000002000000000000000037cbd65565c44e616cc07cf81a48340dc54f321b60e75901f9c43e805768ef3309a2165dec66dfd356e4b759ec13b43987e5f89e815f9b57d4355844c0aa663e09ab1d203035292a0e2d7ea8e8b8b9ce7b41095ee0d9320ed52f3d648fbb8509ba4185af36753d00c20f7bbadff560f7201971353ec2e2b291823ad010a9eb4b2286a3976478df6c514e1e0c948c31b991b2d0af00a585a6843dd884ee5a28f57bd59524ba9d6bae21a029e68f0335d464f75f57c1c570f71184cab68b13c0eb8a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x14, 0x4, 0x4, 0x10002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x1400000000000000, 0x0, 0x48) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x500, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000004000000410000000000000001000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="034000000100000000000000000000000000000002e6c0f1de0b4501b77a724500000000000000"], 0x50) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0x2}, 0x100000, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x2) (async) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 1.070853558s ago: executing program 4 (id=1780): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000008000000000000000000007f55b9f759262b55427408a58b12ba8ccf216e3e3e6206f4b8756aa090a999e42ef31840806a921348f618e18cead4e58358f09ba41b95020f93223f022c0510124cc1b926bd5d971881b5f199"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="180000006b800000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000200b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='..\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000280)='host1x_channel_submit\x00', 0xffffffffffffffff, 0x0, 0x200000000}, 0xfffffffffffffeea) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2b, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000003c0)='mm_vmscan_lru_isolate\x00', r1}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0xf, 0x0, 0x0, 0x100200, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x600000000000000, 0x0, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000001000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/20], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="8fedcb7907081175f37538e486dd"], 0xfdef) write$cgroup_subtree(r3, &(0x7f0000000180)=ANY=[], 0x3a) 912.504813ms ago: executing program 1 (id=1782): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x0, 0x8}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000380), 0x20000000}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{r0, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f0000000340)='%+9llu \x00'}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r1, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x4, 0x0, 0x7fff, 0x0, r2, 0x1000, '\x00', r3, r1, 0x1, 0x5, 0x3, 0x7, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r6, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r7}, 0x10) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000200)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0x0, 0x0, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 814.720343ms ago: executing program 1 (id=1783): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000200)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r1}, &(0x7f0000000280), &(0x7f00000002c0)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x7, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x61, 0x10, 0x71}, [@ldst={0x6, 0x0, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x0, 0x10, &(0x7f0000000080), 0xffffffffffffffb2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) unlink(0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000407b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) close(r5) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, 0x0) socketpair(0x0, 0x0, 0x5, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00'}, 0x10) 812.746732ms ago: executing program 2 (id=1784): sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[], 0x18}, 0x0) syz_clone(0x102c0200, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000400)=ANY=[@ANYRESDEC=0x0], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000480)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fffd, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000500)=ANY=[@ANYRES16=r2, @ANYRESHEX=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x6000000) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x1c0042, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r7, &(0x7f0000000440)=ANY=[@ANYBLOB="1e0308004d8c71ef2885634a8270000387"], 0xffdd) 670.679756ms ago: executing program 3 (id=1785): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = getpid() perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x9, 0xdd, 0x1f, 0x0, 0x0, 0x2, 0x53009, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x80000000, 0x45}, 0x4, 0x3f0a, 0x2, 0x9, 0xff, 0x4, 0x8, 0x0, 0x8, 0x0, 0x9}, r2, 0xe, 0xffffffffffffffff, 0x3) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') ioctl$TUNSETIFF(r3, 0xb701, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x1, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0xf, &(0x7f0000000840)=ANY=[@ANYBLOB="058030000100000018000000070000000000000001000000186200000900000000000008080000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000085100000080000008500000030000000"], &(0x7f0000000400)='GPL\x00', 0x8, 0xb9, &(0x7f00000004c0)=""/185, 0x41000, 0x10, '\x00', r5, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x0, 0x6, 0x0, 0x9062d06}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x4, 0x8, 0x1040, 0xffffffffffffffff, 0x0, '\x00', r5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000800000000000000000001811", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x13, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="7a0a00ff00000000711065000000000095000000100000005e55e7009e471ad400844a795b22bd0e1b33fe875c3b52b6a4e68134fa72b27eb8b390f3242fa62ade943733f12b8b6aaa444370f5cc0220624be51cf4ad7a9031751c8253ba8fe5a9c3afde91c3bfa4ddd24db1f43109dadff77c0e4d129308841aa1a4282f3440cce367f486e5eda78303b753a7bcfab98300ae295c220482d5e21235b3e29a1936fff6994333039b8857a17d1f3d0a8e9951"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r7}, 0x10) close(r6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 377.697284ms ago: executing program 2 (id=1786): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) recvmsg$unix(r1, &(0x7f00000008c0)={&(0x7f00000002c0), 0x6e, &(0x7f0000000840)=[{&(0x7f0000000340)=""/248, 0xf8}, {&(0x7f0000000440)=""/2, 0x2}, {&(0x7f0000000480)=""/77, 0x4d}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/209, 0xd1}, {&(0x7f0000000680)=""/201, 0xc9}, {&(0x7f0000000780)=""/33, 0x21}, {&(0x7f00000007c0)=""/68, 0x44}], 0x8}, 0x2102) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[], 0xffbf) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) recvmsg$unix(r1, &(0x7f00000008c0)={&(0x7f00000002c0), 0x6e, &(0x7f0000000840)=[{&(0x7f0000000340)=""/248, 0xf8}, {&(0x7f0000000440)=""/2, 0x2}, {&(0x7f0000000480)=""/77, 0x4d}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/209, 0xd1}, {&(0x7f0000000680)=""/201, 0xc9}, {&(0x7f0000000780)=""/33, 0x21}, {&(0x7f00000007c0)=""/68, 0x44}], 0x8}, 0x2102) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) (async) write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[], 0xffbf) (async) 374.810094ms ago: executing program 1 (id=1787): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x1, 0x4, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{r0}, &(0x7f00000005c0), &(0x7f0000000600)='%-010d \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0000000000000000030000000000000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="040000003f807b2601809600000000000010f9f103788e0d7530e702a2b7bd89aa8ec587ced49912"], 0x48) (async, rerun: 32) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async, rerun: 64) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (rerun: 64) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async, rerun: 64) close(r5) (async, rerun: 64) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000002c0)={'pimreg1\x00'}) (async, rerun: 32) bpf$MAP_CREATE(0x0, 0x0, 0x0) (rerun: 32) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 32) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (rerun: 32) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r8}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0xf6bb, 0x8, 0x4002, r6, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x5, @void, @value, @void, @value}, 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='tlb_flush\x00'}, 0x10) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xfffffffd, 0x7fe2, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="180040ee040000d058d597736bd12d5602e310f598f6c9a7ad64d9bbd0029ebdc162b194d9d569da77030e715f50c618f962233bf3097c8889357128be19bb7153c1c8bbd3781a65941184061f7406e5d4f090d54c82b3ffaad0b368b937282de77608eb845a9159c6d2b46ef4d450c8105414007846ee7b68f76025eb1916f839a06f4695b4a91879e333a7228984b8898a1472", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async, rerun: 32) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/time\x00') (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d0000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) (async) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32], 0x18}, 0x0) sendmsg$unix(r9, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYRES32], 0x18}, 0x0) 374.142294ms ago: executing program 3 (id=1788): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r3, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0], 0x0, 0xf8, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000400), &(0x7f00000004c0), 0x8, 0x1c, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000700)={0x7d, 0x0}, 0x8) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001840)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2000000}, [@jmp={0x5, 0x0, 0xc, 0x7, 0x4, 0xfffffffffffffff4, 0x1}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000780)='syzkaller\x00', 0x5, 0x1000, &(0x7f00000007c0)=""/4096, 0x40f00, 0x4, '\x00', 0x0, 0x1b, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000017c0)=[r0, 0x1, 0x1, r1], &(0x7f0000001800)=[{0x1, 0x5, 0xf, 0xb}, {0x5, 0x4, 0x5, 0x9}, {0x3, 0x1, 0xf}, {0x2, 0x5, 0x0, 0xc}], 0x10, 0x4, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001980)={0x7, 0x17, &(0x7f0000000280)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xcbbc, 0x0, 0x0, 0x0, 0x721}, @generic={0x1, 0x8, 0x3, 0x4, 0x3}, @map_fd={0x18, 0x8, 0x1, 0x0, r3}, @map_idx={0x18, 0x7}, @generic={0x0, 0x7, 0x3, 0x200, 0xc511}, @map_val={0x18, 0xf, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x10000}}], &(0x7f0000000000)='GPL\x00', 0x10000, 0x12, &(0x7f0000000040)=""/18, 0x40f00, 0x0, '\x00', r4, @fallback=0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x2, 0xe, 0x3, 0xa}, 0x10, r5, r6, 0x2, &(0x7f0000001900)=[r1, r3, r3, r1], &(0x7f0000001940)=[{0x2, 0x2, 0xe, 0xc}, {0x1, 0x1, 0x10, 0x3}], 0x10, 0x7fff, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40010) 301.814451ms ago: executing program 1 (id=1789): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c250000000000202020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000001cc0)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc00082b00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000280)={&(0x7f0000000180), 0x6e, &(0x7f0000000900)=[{&(0x7f0000000300)=""/109, 0x6d}, {&(0x7f0000000080)}, {&(0x7f00000004c0)=""/192, 0xc0}, {&(0x7f0000000580)=""/151, 0x97}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000200)=""/52, 0x34}, {&(0x7f0000000800)=""/76, 0x4c}, {&(0x7f0000000880)=""/94, 0x5e}], 0x8}, 0x102) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x2b, 'net_prio'}, {0x2d, 'pids'}, {0x2b, 'cpuset'}, {0x2b, 'io'}, {0x2d, 'net_prio'}]}, 0x26) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x4, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x1b) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000000c0)=r3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018200000", @ANYRES32=r3, @ANYBLOB="0000000000000000690300000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r0}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 300.990851ms ago: executing program 0 (id=1790): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0xd3, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000400), 0x8) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) write$cgroup_subtree(r1, 0x0, 0xffe3) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xa, 0x13, 0x20, 0xbc, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xe, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x4d}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f00000002c0)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200092f00fe80000000000000875a650b9ff57b00000000000000000000000000ac1414aa0bf022eb"], 0xcfa4) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x3, &(0x7f00000003c0)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, r2}, @exit], &(0x7f0000000480)='syzkaller\x00', 0x1, 0xe0, &(0x7f00000004c0)=""/224, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r8, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x12, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000000000007112110000000000950000000000000080e6469b48d9d190b74579fe62bc09f8c08dc59958f9a44f38f60f340c4224a8ce48e1de3e6161b34749c0f92a2f6d48c3a340efb4ae4b52c96b360369f2883513418f443d416c7c3e00ae6ba87bb04294c9229766c3822130394408426148c4e395186788814306572101bc6239473e2f772f26b8ffc819ee055eb811c369b50173309b02170f55088a4ae71e2fc777732deb8158e27ac374dd7ad0d2d0743b36d3b2907fe6229952c747446c4f82899d410231d4176811276b34f94634a3313b362db76116b5d9d57e7b126b"], &(0x7f0000000040)='syzkaller\x00', 0xfffffffc, 0x0, 0x0, 0x40f00, 0x0, '\x00', r0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 235.312167ms ago: executing program 3 (id=1791): socketpair(0x10, 0x80000, 0xc7a, &(0x7f0000000040)) 227.420358ms ago: executing program 3 (id=1792): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYRESDEC=r3], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(r0, &(0x7f0000000600)={&(0x7f00000004c0)=@abs, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000700)=""/250, 0xfa}], 0x1, &(0x7f0000000580)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x40}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x810a1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000003, 0x5b31727f}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(r2, &(0x7f0000000400)='blkio.bfq.io_wait_time\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000000), 0x400000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000005c0)=ANY=[@ANYRESDEC=r5], &(0x7f0000000340)='GPL\x00', 0x1000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, 0x0) 193.392341ms ago: executing program 0 (id=1793): syz_clone(0x8270080, &(0x7f0000000000)="fd9d1756e37cd28241e46d6908d5d7d8df7817b33a0924ab1d475a2d9cec44f3ffa6ead08f9a431224e12e8e01b067f043166ff5dd7d4be363a7fc4220fff78a003ae26d8474f0fe3ea7ad1b841636b96f40953019b1cae4f29ba0aec35ed316bb9cef8ecea6b7257bd644042e7e06c9fbd01caf690a5bf4559fa54ced6d08c43ac828c95f3fc8c0471ddecfa70093ca4c79be052179e30d20ee381167999ba5efe29967f18e309ee2b858e33acf3017188b", 0xb2, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="405ad706528b8cb5f2bf2ce6d0650763bd76637e353e26bfd8ecae2e677106fbe9a32be1bdbf24a3326f3506176b218a3be00370837a6a4f8a1802fc795fbaa336dba35b28a568afa50584a62b5580457a746aae1547926481ef25421a2b4517b31d3046ea5496f3f100103e2a59b98bd203460fc237322b969dfd16c83724b2419db5c8fe446cc233cdefe2d0366a725afe980740377d253b8d5bb3667aceca62462f7130ddb386a44d01d727238cae228bcaa89f87dae772c352f34f586b91c90a79bb1c0a4466ee16b4c5") (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x42000, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x3) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='cgroup.controllers\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0x4, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0x400}}, @ptr={0x6, 0x0, 0x0, 0x2, 0x1}, @union={0xb, 0x3, 0x0, 0x5, 0x1, 0x5, [{0x10, 0x0, 0x939}, {0x5, 0x2, 0x10}, {0x9, 0x2, 0x7}]}, @enum64={0x4, 0xa, 0x0, 0x13, 0x0, 0x9, [{0xd, 0x4, 0x4}, {0xd, 0x0, 0x7}, {0x5, 0x5, 0x879}, {0xa, 0x4, 0x800}, {0xd, 0x9, 0x4}, {0xb, 0xe, 0x7fffffff}, {0x2, 0xfff, 0x7e1}, {0xf, 0x1, 0x6}, {0x3, 0x1, 0x7}, {0x6, 0x1ff, 0x7fffffff}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x4}]}, @typedef={0x6, 0x0, 0x0, 0x8, 0x1}, @var={0xd, 0x0, 0x0, 0xe, 0x4, 0x2}, @typedef={0xa, 0x0, 0x0, 0x8, 0x5}, @volatile={0x0, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x7bab72e1ad8eef65, 0x5f]}}, &(0x7f00000003c0)=""/40, 0x13c, 0x28, 0x1, 0xe, 0x10000, @value=r0}, 0x28) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) (async) r1 = openat$cgroup_ro(r0, &(0x7f00000004c0)='blkio.bfq.time\x00', 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r1, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0], 0x0, 0x38, &(0x7f00000005c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x40, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000800)=r3, 0x4) r5 = openat$cgroup_ro(r1, &(0x7f0000000840)='cgroup.stat\x00', 0x0, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000880)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001980)={r4, 0x20, &(0x7f0000001940)={&(0x7f00000008c0)=""/108, 0x6c, 0x0, &(0x7f0000000940)=""/4096, 0x1000}}, 0x10) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000019c0)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000001a00)={0x0, r6}, 0x8) (async) mkdirat$cgroup(r1, &(0x7f0000001a40)='syz0\x00', 0x1ff) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001a80)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', r2, r4, 0x1, 0x4, 0x546a9274, 0x0, @void, @value, @void, @value}, 0x50) (async) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001b00)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r7, &(0x7f0000001b40), 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000001b80)={'rose0\x00', 0x800}) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001bc0)=@base={0x6, 0x2, 0x0, 0x7fffffff, 0x12858, r5, 0x8, '\x00', 0x0, r0, 0x3, 0x3, 0x5, 0x0, @void, @value, @value=r0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x18, 0x15, &(0x7f0000001c40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @call={0x85, 0x0, 0x0, 0x81}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001d00)='syzkaller\x00', 0xffff8000, 0xfe, &(0x7f0000001d40)=""/254, 0x41100, 0x6a, '\x00', 0x0, @fallback=0x38, r4, 0x8, &(0x7f0000001e40)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001e80)={0x4, 0x3, 0x9, 0x3}, 0x10, r3, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, &(0x7f0000001ec0)=[{0x3, 0x2, 0xc, 0x8}, {0x4, 0x4, 0x10, 0xa}, {0x4, 0x2, 0x3, 0x7}, {0x2, 0x5, 0xb, 0x7}, {0x1, 0x4, 0x6, 0x6}, {0x0, 0x2, 0xe, 0x7}, {0x4, 0x3, 0x5}, {0x4, 0x1}], 0x10, 0x7, @void, @value}, 0x94) (async) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000002000)=r0, 0x4) write$cgroup_int(r1, &(0x7f0000002040)=0x80000000, 0x12) (async) r9 = getpid() perf_event_open(&(0x7f0000002080)={0x4, 0x80, 0x5, 0xc, 0x4, 0x0, 0x0, 0x40, 0x4008, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa388, 0x1, @perf_config_ext={0xb208, 0x8000000000000000}, 0x120, 0xfffffffffffff8e8, 0x5aae, 0x9, 0x0, 0x7, 0x0, 0x0, 0x9, 0x0, 0xb}, r9, 0x0, 0xffffffffffffffff, 0x1) (async) bpf$ENABLE_STATS(0x20, &(0x7f0000002100), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002180)={&(0x7f0000002140)='ext4_ext_remove_space\x00', r0, 0x0, 0x100000000}, 0x18) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000021c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7, '\x00', r2, 0xffffffffffffffff, 0x1, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002600)={0x6, 0xd, &(0x7f0000002240)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffff8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x800}}, @map_fd={0x18, 0x6, 0x1, 0x0, r10}], &(0x7f00000022c0)='GPL\x00', 0x1, 0xf5, &(0x7f0000002300)=""/245, 0x41100, 0x1d, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002440)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000002480)={0x0, 0x8, 0x50f9e10a, 0x4}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000002540)=[0xffffffffffffffff], &(0x7f0000002580)=[{0x1, 0x5, 0x8, 0x6}, {0x3, 0x1, 0x10, 0x4}, {0x4, 0x2, 0x8, 0xa}, {0x4, 0x3, 0x2, 0x5}, {0x3, 0x2, 0x2, 0x9}, {0x0, 0x2, 0x3, 0xc}, {0x1, 0x2, 0xc, 0x9}, {0x1, 0x3, 0x5, 0x6}], 0x10, 0x6, @void, @value}, 0x94) 192.026431ms ago: executing program 3 (id=1794): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de8500000004000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x3f, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x90) (rerun: 32) socketpair(0x2c, 0x2, 0x80004, &(0x7f00000013c0)) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00'}) (async, rerun: 32) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) (rerun: 32) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0xffff5a38, 0x4, 0x10001, 0x14, r3, 0xfe00000, '\x00', 0x0, r3, 0x5, 0x5, 0x5, 0x5, @void, @value, @void, @value}, 0x48) (async) close(r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) (async, rerun: 64) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000600), 0x4) (async) close(0xffffffffffffffff) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x2000, 0x0, 0x0, 0x85, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async, rerun: 32) bpf$MAP_CREATE(0x0, 0x0, 0x0) (rerun: 32) socketpair(0x10, 0x80000, 0xe, &(0x7f0000001380)={0x0, 0x0}) close(r4) (async) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x2, 0x4, &(0x7f00000014c0)=ANY=[@ANYBLOB="180000009100000000fa01000300006deed01f001f0085200000f2be8681000000000000db000000400000"], &(0x7f0000001400)='syzkaller\x00', 0x6, 0x0, 0x0, 0x452266c6151ef93d, 0x0, '\x00', 0x0, @fallback, r0, 0x8, &(0x7f0000001440)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000001480)={0x5, 0xa, 0x4, 0x8}, 0x10, 0x0, r2, 0x4, 0x0, &(0x7f0000001500)=[{0x0, 0x3, 0x1, 0x3}, {0x2, 0x4, 0xe, 0x1}, {0x2, 0x5}, {0x5, 0x4, 0x9, 0xb}], 0x10, 0x2, @void, @value}, 0x90) (async, rerun: 32) close(r5) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x0, 0x10, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 185.409552ms ago: executing program 4 (id=1795): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0xe, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) (async) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x18}, 0xc) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={&(0x7f0000000140)="b2f5ec5d22605282d51517138cad940d1f71fcb26ba2254e436b99575e3f2e84c24efc38b982ec2b45d5e5ba9e270adbf25040108aa47c46e55db90d8e2179efb5d706f0f1bb7d86c926931e77c63cef97cac6cb6931316342b3061c342c0de17fc8ecd3dadf039f4421cf71d5d05f7ea03c99610e20915ed94c9b4001743f5c99f9f96494f4b07808a9abbf6b965f241e5c2f75eebfefde9a667de86e37e8982bde86ce53e3b81184b6549e7653ab9c8d712958d87838cebf3c2882003c44eb45b400190ab440892432928783dc31551d7dde5a8355578f8b55afeef475c4c2cd75e00ae317ff2b", &(0x7f0000000240)=""/70, &(0x7f00000002c0)="728c5ccfe8", &(0x7f0000000300)="aa3edd5a5be150c93160ef5c42085db3fb0dfe4235bb59f8b8f9cfc5ec5d9b9e17bc3c84ca01f661309710c3981f2dc077e7b76776599d3915f9", 0x9, r0}, 0x38) 135.512687ms ago: executing program 0 (id=1796): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb01001800000000000000b80000009a00000008000000040000000300008504000000524f000002000000f5ffffff03000000050000000300000002000000020000000a00000009000000050000060400000909000000050000000b0000000000000004000000e60a00000ff42127b10000000400000008000000030000000a000000010000850600f4000900000002000000010000000000000000000008050000000b00000003000084010001000200000002000000f2ffffff04000000020000000200000000000000000000000800000000006161"], &(0x7f0000000380)=""/118, 0xd8, 0x76, 0x0, 0x4, 0x0, @void, @value}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x0, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb6c0deb5f55287d, @perf_config_ext={0x100000001}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x2) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r3, 0x0, 0x0}, 0x10) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000009c0)=0xffffffffffffffff, 0x4) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200052f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa0bf04305"], 0xcfa4) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r1}, &(0x7f00000004c0), &(0x7f0000000500)=r2}, 0x20) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r6, &(0x7f0000000200)={[{0x2d, 'net'}]}, 0x5) (async) write$cgroup_type(r6, &(0x7f0000000180), 0x40010) write$cgroup_freezer_state(r6, &(0x7f0000000000)='FROZEN\x00', 0x7) close(r4) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x9, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0xa, &(0x7f00000007c0)=@raw=[@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x5}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffc}, @alu={0x7, 0x1, 0xc, 0xa, 0xa, 0xfffffffffffffff8}, @ldst={0x3, 0x3, 0x4, 0x5, 0x2, 0x100, 0x10}], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 133.444477ms ago: executing program 3 (id=1797): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="019b00003ae31de999f92da50500000000000300838934eaa9b169f1f9578dcae42ae087998567e19a1bc383baf772aa18a923b1886673a219672553d90d837efecbb13aeae3b36dff1fdc6a8b9c553d4565657e32040896a0b40b7674216a53430c645aee5134fed81e0cd5c1e98ec20d73b8ca", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{}, 0x0, &(0x7f0000000900)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r4}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) 130.676217ms ago: executing program 4 (id=1798): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000120000000000000000000000850000006d000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000db850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000200)='percpu_alloc_percpu\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/73}, 0x20) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 129.430537ms ago: executing program 0 (id=1799): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb6bba880100000048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c27", 0x39}], 0x1}, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) r3 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000002c0)={[{0x2b, 'blkio'}]}, 0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x10) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000001c0)) (async) sendmsg$tipc(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb6bba880100000048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c27", 0x39}], 0x1}, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) recvmsg(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) (async) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) (async) write$cgroup_subtree(r3, &(0x7f00000002c0)={[{0x2b, 'blkio'}]}, 0x7) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) close(r5) (async) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) (async) 128.808047ms ago: executing program 2 (id=1800): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x13, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r2, &(0x7f0000000700)=ANY=[], 0xffdd) 97.63575ms ago: executing program 0 (id=1801): bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000b00)={0x1}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000002c0)={0x1, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r0, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f00000005c0)=[0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x9d, &(0x7f0000000640)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0x91, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000004080000000000000003000000000000000000000002000000000000000000000000000002000000000000000000000004"], 0x0, 0x56, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x3, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r3, 0x2, 0x3, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x45d, 0x8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='/proc/net/\xa9\'F\xcf\x82q\xee'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x8, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb23}, [@cb_func={0x18, 0x3, 0x4, 0x0, 0x4}, @map_fd={0x18, 0x7, 0x1, 0x0, r1}, @func={0x85, 0x0, 0x1, 0x0, 0x5}]}, &(0x7f00000003c0)='GPL\x00', 0x4, 0xc8, &(0x7f00000004c0)=""/200, 0x41000, 0x61, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000880)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000008c0)={0x2, 0xb, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000940)=[r4], &(0x7f0000000980)=[{0x4, 0x3, 0xf, 0x3}], 0x10, 0x8, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="0a00000005000000020000000700000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000008199178e123af27b8c52f1eb70ec0dfd4b1f22cc7e39b03a126e74d3a2411f112eda0a", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0b00000005000000010001000900000001000000", @ANYRES32, @ANYBLOB="0000000000000000008000"/21, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b708000000a926007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000000)='kmem_cache_free\x00', r10}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe0c, 0xffe0, &(0x7f0000000640)="b9ff03076844268cb89e14f088a847fe884700121100632f77fbac14141dac1414", 0x0, 0x71, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x9) ioctl$SIOCSIFHWADDR(r11, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b00000005000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2a, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRESDEC=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 25.529867ms ago: executing program 2 (id=1802): bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000100000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008400000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="00000000000000e0ff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r2, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb000010000000080000000400000000000001000000002d002c07005f2e205f5f3000"], &(0x7f0000000bc0)=""/142, 0x30, 0x8e, 0x0, 0x4, 0x0, @void, @value}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000940)={0x1f57a21b, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x1b, 0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000ec000000"], &(0x7f0000000280)='syzkaller\x00', 0x5, 0xd3, &(0x7f0000000780)=""/211, 0x41100, 0x4, '\x00', r3, @fallback=0x29, r4, 0x8, &(0x7f0000000600)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000006c0)={0x0, 0x4, 0x8}, 0x10, r5, r0, 0x3, &(0x7f0000000980)=[r1, r1], &(0x7f00000009c0)=[{0x2, 0x4, 0x5, 0x2}, {0x0, 0x4, 0x4, 0x7}, {0x0, 0x5, 0x5, 0xa}], 0x10, 0xbf, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xd, 0x3, &(0x7f00000006c0)=@raw=[@generic={0xff, 0x0, 0x2, 0xf623, 0xf10c}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000000700)='syzkaller\x00', 0x8, 0x0, &(0x7f0000001780), 0x41000, 0x4, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x8, &(0x7f00000017c0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000001800)={0x2, 0x9, 0x2, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000001840)=[{0x0, 0x2, 0x4, 0x8}, {0x5, 0x2, 0x7, 0xa}, {0x2, 0x2, 0x6, 0x9}, {0x2, 0x1, 0x5, 0x8}, {0x0, 0x2, 0x5, 0xc}, {0x4, 0x3, 0x4, 0x8}], 0x10, 0x543, @void, @value}, 0x94) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) close(r7) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x20001400) write$cgroup_subtree(r7, 0x0, 0x9) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001980)={0x1b, 0x0, 0x0, 0x8, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001a00)={0x1, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000001ac0)={0x1f, 0xb, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x79a}, [@exit, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x120}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7ff}]}, &(0x7f00000001c0)='GPL\x00', 0x2, 0x1000, &(0x7f0000000780)=""/4096, 0x41100, 0x44, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000680)={0x1, 0xa, 0x7, 0x7}, 0x10, r5, r6, 0x2, &(0x7f0000001a40)=[r7, 0x1, r8, 0xffffffffffffffff, r9], &(0x7f0000001a80)=[{0x2, 0x2, 0x0, 0xa}, {0x2, 0x2, 0xa, 0x2}], 0x10, 0xe, @void, @value}, 0x94) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60840, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000200), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x89a2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f0000000080)) 21.443877ms ago: executing program 32 (id=1802): bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000100000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008400000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="00000000000000e0ff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r2, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb000010000000080000000400000000000001000000002d002c07005f2e205f5f3000"], &(0x7f0000000bc0)=""/142, 0x30, 0x8e, 0x0, 0x4, 0x0, @void, @value}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000940)={0x1f57a21b, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x1b, 0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000ec000000"], &(0x7f0000000280)='syzkaller\x00', 0x5, 0xd3, &(0x7f0000000780)=""/211, 0x41100, 0x4, '\x00', r3, @fallback=0x29, r4, 0x8, &(0x7f0000000600)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000006c0)={0x0, 0x4, 0x8}, 0x10, r5, r0, 0x3, &(0x7f0000000980)=[r1, r1], &(0x7f00000009c0)=[{0x2, 0x4, 0x5, 0x2}, {0x0, 0x4, 0x4, 0x7}, {0x0, 0x5, 0x5, 0xa}], 0x10, 0xbf, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xd, 0x3, &(0x7f00000006c0)=@raw=[@generic={0xff, 0x0, 0x2, 0xf623, 0xf10c}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000000700)='syzkaller\x00', 0x8, 0x0, &(0x7f0000001780), 0x41000, 0x4, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x8, &(0x7f00000017c0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000001800)={0x2, 0x9, 0x2, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000001840)=[{0x0, 0x2, 0x4, 0x8}, {0x5, 0x2, 0x7, 0xa}, {0x2, 0x2, 0x6, 0x9}, {0x2, 0x1, 0x5, 0x8}, {0x0, 0x2, 0x5, 0xc}, {0x4, 0x3, 0x4, 0x8}], 0x10, 0x543, @void, @value}, 0x94) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) close(r7) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x20001400) write$cgroup_subtree(r7, 0x0, 0x9) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001980)={0x1b, 0x0, 0x0, 0x8, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001a00)={0x1, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000001ac0)={0x1f, 0xb, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x79a}, [@exit, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x120}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7ff}]}, &(0x7f00000001c0)='GPL\x00', 0x2, 0x1000, &(0x7f0000000780)=""/4096, 0x41100, 0x44, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000680)={0x1, 0xa, 0x7, 0x7}, 0x10, r5, r6, 0x2, &(0x7f0000001a40)=[r7, 0x1, r8, 0xffffffffffffffff, r9], &(0x7f0000001a80)=[{0x2, 0x2, 0x0, 0xa}, {0x2, 0x2, 0xa, 0x2}], 0x10, 0xe, @void, @value}, 0x94) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60840, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000200), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x89a2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f0000000080)) 620.51µs ago: executing program 0 (id=1804): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x27, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000001634f935000000000000000000eb0018100002", @ANYRES32, @ANYBLOB="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", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000008000"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r5}, 0x10) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r7}, 0x10) write$cgroup_int(r6, &(0x7f0000000200), 0x43451) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8946, &(0x7f0000000900)={'veth1_virt_wifi\x00', @random='\x00\x00\x00 \x00'}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x49, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r10, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r12}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)=@generic={&(0x7f00000003c0)='./file0\x00', r11}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x19, 0xc, &(0x7f0000000340)=ANY=[@ANYRES64, @ANYRESHEX, @ANYRES64=r5], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 0s ago: executing program 33 (id=1804): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x27, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000001634f935000000000000000000eb0018100002", @ANYRES32, @ANYBLOB="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", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000008000"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r5}, 0x10) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r7}, 0x10) write$cgroup_int(r6, &(0x7f0000000200), 0x43451) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8946, &(0x7f0000000900)={'veth1_virt_wifi\x00', @random='\x00\x00\x00 \x00'}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x49, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r10, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r12}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)=@generic={&(0x7f00000003c0)='./file0\x00', r11}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x19, 0xc, &(0x7f0000000340)=ANY=[@ANYRES64, @ANYRESHEX, @ANYRES64=r5], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) kernel console output (not intermixed with test programs): [ 7.701029][ T24] audit: type=1400 audit(1730582602.490:27): avc: denied { create } for pid=116 comm="dbus-daemon" name="messagebus.pid" scontext=system_u:system_r:system_dbusd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7.705858][ T24] audit: type=1400 audit(1730582602.490:28): avc: denied { write open } for pid=116 comm="dbus-daemon" path="/run/messagebus.pid" dev="tmpfs" ino=403 scontext=system_u:system_r:system_dbusd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7.710189][ T24] audit: type=1400 audit(1730582602.490:29): avc: denied { getattr } for pid=116 comm="dbus-daemon" path="/run/messagebus.pid" dev="tmpfs" ino=403 scontext=system_u:system_r:system_dbusd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7.814866][ T24] audit: type=1400 audit(1730582602.620:30): avc: denied { search } for pid=130 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 17.979334][ T24] kauditd_printk_skb: 30 callbacks suppressed [ 17.979348][ T24] audit: type=1400 audit(1730582612.780:61): avc: denied { transition } for pid=221 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 17.986424][ T24] audit: type=1400 audit(1730582612.780:62): avc: denied { noatsecure } for pid=221 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 17.991350][ T24] audit: type=1400 audit(1730582612.780:63): avc: denied { write } for pid=221 comm="sh" path="pipe:[12950]" dev="pipefs" ino=12950 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 17.995135][ T24] audit: type=1400 audit(1730582612.780:64): avc: denied { rlimitinh } for pid=221 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 17.999842][ T24] audit: type=1400 audit(1730582612.780:65): avc: denied { siginh } for pid=221 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.69' (ED25519) to the list of known hosts. [ 25.097593][ T24] audit: type=1400 audit(1730582619.900:66): avc: denied { mounton } for pid=275 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.098864][ T275] cgroup: Unknown subsys name 'net' [ 25.120092][ T24] audit: type=1400 audit(1730582619.900:67): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.146987][ T24] audit: type=1400 audit(1730582619.930:68): avc: denied { unmount } for pid=275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.147199][ T275] cgroup: Unknown subsys name 'devices' [ 25.285967][ T275] cgroup: Unknown subsys name 'hugetlb' [ 25.291445][ T275] cgroup: Unknown subsys name 'rlimit' [ 25.458092][ T24] audit: type=1400 audit(1730582620.260:69): avc: denied { setattr } for pid=275 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=249 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.481271][ T24] audit: type=1400 audit(1730582620.260:70): avc: denied { mounton } for pid=275 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.505830][ T24] audit: type=1400 audit(1730582620.260:71): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 25.574559][ T279] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 25.583193][ T24] audit: type=1400 audit(1730582620.380:72): avc: denied { relabelto } for pid=279 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 25.608608][ T24] audit: type=1400 audit(1730582620.380:73): avc: denied { write } for pid=279 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.655669][ T24] audit: type=1400 audit(1730582620.460:74): avc: denied { read } for pid=275 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.681080][ T24] audit: type=1400 audit(1730582620.460:75): avc: denied { open } for pid=275 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.707113][ T275] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.273786][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.280688][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.288037][ T285] device bridge_slave_0 entered promiscuous mode [ 26.297510][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.304504][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.311701][ T285] device bridge_slave_1 entered promiscuous mode [ 26.345591][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.352444][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.359845][ T287] device bridge_slave_0 entered promiscuous mode [ 26.367702][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.374585][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.381864][ T287] device bridge_slave_1 entered promiscuous mode [ 26.451335][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.458360][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.465820][ T290] device bridge_slave_0 entered promiscuous mode [ 26.475254][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.482088][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.489482][ T290] device bridge_slave_1 entered promiscuous mode [ 26.511669][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.518714][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.526082][ T286] device bridge_slave_0 entered promiscuous mode [ 26.534550][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.541387][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.548704][ T286] device bridge_slave_1 entered promiscuous mode [ 26.612418][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.619320][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.626699][ T292] device bridge_slave_0 entered promiscuous mode [ 26.655902][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.662751][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.670211][ T292] device bridge_slave_1 entered promiscuous mode [ 26.739002][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.745880][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.752979][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.759769][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.769593][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.776446][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.783532][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.790334][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.824916][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.831774][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.838949][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.845806][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.855897][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.862742][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.869878][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.876666][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.910454][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.918168][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.925393][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.932801][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.940260][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.947301][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.954569][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.961505][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.968551][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.978405][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.986507][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.993330][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.020224][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.027560][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.035222][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.043142][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.049983][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.057257][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.065744][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.072561][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.079805][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.087838][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.094677][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.115100][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.122439][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.130459][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.137309][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.144815][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.152726][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.159495][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.166752][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.195733][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.203053][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.211857][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.218713][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.227116][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.235160][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.241983][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.249195][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.257025][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.264810][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.285430][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.293358][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.301613][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.310176][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.318181][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.325573][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.332770][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 27.341112][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.349191][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.356035][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.363376][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 27.371818][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.379771][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.386611][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.393983][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 27.410421][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.418703][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.426898][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.435218][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.451837][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.459912][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.467829][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.476263][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.484603][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.492263][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.511909][ T290] device veth0_vlan entered promiscuous mode [ 27.517965][ T285] device veth0_vlan entered promiscuous mode [ 27.524582][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.531893][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.539632][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.548006][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.555945][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.563737][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.571706][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.579871][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.588015][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.595956][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.603771][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.611117][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.620702][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.628491][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.636490][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.643727][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.655622][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.663683][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.676552][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.684749][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.693104][ T286] device veth0_vlan entered promiscuous mode [ 27.707518][ T290] device veth1_macvtap entered promiscuous mode [ 27.714465][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.721968][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.730342][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.740629][ T285] device veth1_macvtap entered promiscuous mode [ 27.753062][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.760722][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.768998][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.779888][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.787690][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.803433][ T292] device veth0_vlan entered promiscuous mode [ 27.810347][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.817763][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.825215][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.833198][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.841818][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.849998][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.858422][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.866344][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.873526][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.887609][ T287] device veth0_vlan entered promiscuous mode [ 27.901581][ T290] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 27.902205][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.925533][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.935030][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.943335][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.955601][ T286] device veth1_macvtap entered promiscuous mode [ 27.977325][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.990948][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.999640][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.010211][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.018426][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.033244][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.041404][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.051463][ T292] device veth1_macvtap entered promiscuous mode [ 28.062618][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.071276][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.079660][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.091688][ T287] device veth1_macvtap entered promiscuous mode [ 28.117660][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.125499][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.133574][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.142252][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.151076][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.169907][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.184895][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.234846][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.247726][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.337367][ T331] syz.1.6[331] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.337434][ T331] syz.1.6[331] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.393876][ C0] hrtimer: interrupt took 24293 ns [ 28.880328][ T358] device wg2 entered promiscuous mode [ 29.039500][ T357] device pim6reg1 entered promiscuous mode [ 29.198086][ T369] tap0: tun_chr_ioctl cmd 1074025677 [ 29.203223][ T369] tap0: linktype set to 778 [ 29.596521][ T396] cgroup: syz.1.24 (396) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 29.639482][ T396] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 30.260605][ T438] syz.4.36[438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.260682][ T438] syz.4.36[438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.541712][ T24] kauditd_printk_skb: 40 callbacks suppressed [ 30.541725][ T24] audit: type=1400 audit(1730582625.340:116): avc: denied { setopt } for pid=450 comm="syz.3.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.632265][ T452] cgroup: fork rejected by pids controller in /syz4 [ 30.840546][ T563] syz.3.44[563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.840593][ T563] syz.3.44[563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.854726][ T564] syz.3.44[564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.917978][ T564] syz.3.44[564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.937406][ T24] audit: type=1400 audit(1730582625.740:117): avc: denied { write } for pid=567 comm="syz.0.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 31.097520][ T575] syz.1.46[575] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.097594][ T575] syz.1.46[575] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.542295][ T584] device pim6reg1 entered promiscuous mode [ 31.775639][ T596] device veth1_macvtap left promiscuous mode [ 31.787379][ T596] device macsec0 entered promiscuous mode [ 31.828242][ T603] device veth0_vlan left promiscuous mode [ 31.890193][ T603] device veth0_vlan entered promiscuous mode [ 32.054899][ T24] audit: type=1400 audit(1730582626.860:118): avc: denied { relabelfrom } for pid=612 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 32.084876][ T594] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.091725][ T594] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.093942][ T24] audit: type=1400 audit(1730582626.860:119): avc: denied { relabelto } for pid=612 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 32.118317][ T594] device bridge_slave_0 entered promiscuous mode [ 32.125568][ T594] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.132450][ T594] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.140060][ T594] device bridge_slave_1 entered promiscuous mode [ 32.200102][ T594] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.206976][ T594] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.214113][ T594] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.220943][ T594] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.303727][ T24] audit: type=1400 audit(1730582627.100:120): avc: denied { create } for pid=625 comm="syz.3.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 32.345000][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 32.365283][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.390751][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.409140][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 32.421247][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.428140][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.440572][ T641] device pim6reg1 entered promiscuous mode [ 32.464841][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 32.472803][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.479663][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.521568][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 32.549794][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 32.572886][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 32.586175][ T321] device bridge_slave_1 left promiscuous mode [ 32.592437][ T321] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.600607][ T321] device bridge_slave_0 left promiscuous mode [ 32.606962][ T321] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.615532][ T321] device veth1_macvtap left promiscuous mode [ 32.621544][ T321] device veth0_vlan left promiscuous mode [ 32.752326][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.774621][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 32.781968][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.803260][ T594] device veth0_vlan entered promiscuous mode [ 32.838054][ T594] device veth1_macvtap entered promiscuous mode [ 32.853616][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 32.887863][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.896319][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 32.916874][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.934265][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.971738][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.997730][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.486494][ T728] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.493554][ T728] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.966500][ T734] device syzkaller0 entered promiscuous mode [ 35.249502][ T759] device veth0_vlan left promiscuous mode [ 35.284278][ T759] device veth0_vlan entered promiscuous mode [ 35.380838][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.398928][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 35.414319][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.647106][ T781] device pim6reg1 entered promiscuous mode [ 35.766815][ T24] audit: type=1400 audit(1730582630.570:121): avc: denied { create } for pid=782 comm="syz.0.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 35.985540][ T791] device wg2 entered promiscuous mode [ 36.491662][ T810] device sit0 entered promiscuous mode [ 36.632959][ T24] audit: type=1400 audit(1730582631.430:122): avc: denied { create } for pid=815 comm="syz.0.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 37.989633][ T24] audit: type=1400 audit(1730582632.790:123): avc: denied { create } for pid=848 comm="syz.3.119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 38.111342][ T24] audit: type=1400 audit(1730582632.840:124): avc: denied { create } for pid=851 comm="syz.4.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 38.134515][ T841] device syzkaller0 entered promiscuous mode [ 38.259021][ T24] audit: type=1400 audit(1730582632.840:125): avc: denied { write } for pid=851 comm="syz.4.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 38.345341][ T24] audit: type=1400 audit(1730582632.840:126): avc: denied { read } for pid=851 comm="syz.4.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 38.413936][ T24] audit: type=1400 audit(1730582633.030:127): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 38.478785][ T872] device syzkaller0 entered promiscuous mode [ 38.484753][ T24] audit: type=1400 audit(1730582633.110:128): avc: denied { setopt } for pid=863 comm="syz.3.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 38.700591][ T887] device pim6reg1 entered promiscuous mode [ 38.854226][ T885] bpf_get_probe_write_proto: 2 callbacks suppressed [ 38.854255][ T885] syz.3.129[885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.871844][ T885] syz.3.129[885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.123337][ T24] audit: type=1400 audit(1730582633.920:129): avc: denied { create } for pid=896 comm="syz.1.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 39.875247][ T935] syz.4.141[935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.875302][ T935] syz.4.141[935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.994285][ T24] audit: type=1400 audit(1730582634.800:130): avc: denied { create } for pid=941 comm="syz.0.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 40.371178][ T955] device pim6reg1 entered promiscuous mode [ 41.304304][ T975] device wg2 left promiscuous mode [ 41.918067][ T24] kauditd_printk_skb: 1 callbacks suppressed [ 41.918081][ T24] audit: type=1400 audit(1730582636.720:132): avc: denied { create } for pid=1014 comm="syz.4.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 42.183934][ T1023] device sit0 entered promiscuous mode [ 42.368018][ T1015] bridge0: port 3(veth0) entered blocking state [ 42.374205][ T1015] bridge0: port 3(veth0) entered disabled state [ 42.505801][ T1015] device veth0 entered promiscuous mode [ 42.526309][ T24] audit: type=1400 audit(1730582637.320:133): avc: denied { create } for pid=1020 comm="syz.0.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 43.610441][ T1059] device syzkaller0 entered promiscuous mode [ 43.989652][ T1074] device veth0_vlan left promiscuous mode [ 44.079200][ T1074] device veth0_vlan entered promiscuous mode [ 44.640670][ T24] audit: type=1400 audit(1730582639.440:134): avc: denied { create } for pid=1103 comm="syz.0.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 45.578608][ T1120] device syzkaller0 entered promiscuous mode [ 45.600042][ T1130] device sit0 left promiscuous mode [ 45.690173][ T1132] device sit0 entered promiscuous mode [ 45.751143][ T1136] device syzkaller0 entered promiscuous mode [ 46.635833][ T1192] device sit0 left promiscuous mode [ 46.641146][ T24] audit: type=1400 audit(1730582641.440:135): avc: denied { ioctl } for pid=1193 comm="syz.4.212" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 46.917519][ T24] audit: type=1400 audit(1730582641.720:136): avc: denied { tracepoint } for pid=1203 comm="syz.2.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 48.005546][ T1238] bridge0: port 3(veth0) entered blocking state [ 48.024021][ T1238] bridge0: port 3(veth0) entered disabled state [ 48.094176][ T1238] device veth0 entered promiscuous mode [ 49.144317][ T1304] device veth0_vlan left promiscuous mode [ 49.218015][ T1304] device veth0_vlan entered promiscuous mode [ 49.318475][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.330883][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.354880][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.394769][ T1314] device wg2 entered promiscuous mode [ 49.703630][ T24] audit: type=1400 audit(1730582644.500:137): avc: denied { write } for pid=1327 comm="syz.1.252" name="cgroup.subtree_control" dev="cgroup2" ino=129 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 49.761278][ T24] audit: type=1400 audit(1730582644.540:138): avc: denied { open } for pid=1327 comm="syz.1.252" path="" dev="cgroup2" ino=129 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 50.005748][ T1347] device pim6reg1 entered promiscuous mode [ 50.466749][ T24] audit: type=1400 audit(1730582645.270:139): avc: denied { create } for pid=1365 comm="syz.0.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 50.936921][ T1380] device veth1_macvtap left promiscuous mode [ 50.984947][ T1380] device macsec0 entered promiscuous mode [ 52.009837][ T1460] device pim6reg1 entered promiscuous mode [ 52.503376][ T1470] device syzkaller0 entered promiscuous mode [ 52.844990][ T1489] device syzkaller0 entered promiscuous mode [ 53.215409][ T1494] device veth0_vlan left promiscuous mode [ 53.221494][ T1494] device veth0_vlan entered promiscuous mode [ 53.229670][ T1492] device veth0_vlan left promiscuous mode [ 53.236229][ T1492] device veth0_vlan entered promiscuous mode [ 53.795740][ T1523] device sit0 entered promiscuous mode [ 56.591705][ T1613] device pim6reg1 entered promiscuous mode [ 56.930526][ T1631] device pim6reg1 entered promiscuous mode [ 57.553122][ T1661] device pim6reg1 entered promiscuous mode [ 57.651888][ T1667] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.658923][ T1667] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.693572][ T1663] device pim6reg1 entered promiscuous mode [ 57.707849][ T1667] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.714756][ T1667] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.721861][ T1667] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.728718][ T1667] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.788262][ T1667] device bridge0 entered promiscuous mode [ 61.523663][ T1772] device veth0_vlan left promiscuous mode [ 61.578203][ T1772] device veth0_vlan entered promiscuous mode [ 62.786617][ T1842] device syzkaller0 entered promiscuous mode [ 63.034699][ T24] audit: type=1400 audit(1730582657.840:140): avc: denied { read } for pid=1898 comm="syz.2.407" name="cgroup.subtree_control" dev="cgroup2" ino=243 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 63.091537][ T1907] device veth0_vlan left promiscuous mode [ 63.097704][ T1907] device veth0_vlan entered promiscuous mode [ 63.105004][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 63.114850][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 63.129312][ T1908] syz.2.407 uses obsolete (PF_INET,SOCK_PACKET) [ 63.148597][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 63.534030][ T2008] device pim6reg1 entered promiscuous mode [ 63.821549][ T2023] device pim6reg1 entered promiscuous mode [ 64.015721][ T2030] device syzkaller0 entered promiscuous mode [ 64.096835][ T2043] syz.2.435[2043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.096899][ T2043] syz.2.435[2043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.238126][ T24] audit: type=1400 audit(1730582659.040:141): avc: denied { create } for pid=2050 comm="syz.1.438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 65.932486][ T24] audit: type=1400 audit(1730582660.730:142): avc: denied { create } for pid=2116 comm="syz.0.460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 66.156252][ T2131] device pim6reg1 entered promiscuous mode [ 66.282769][ T2159] syz.0.474[2159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.282824][ T2159] syz.0.474[2159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.299525][ T24] audit: type=1400 audit(1730582661.100:143): avc: denied { create } for pid=2160 comm="syz.2.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 66.347687][ T2163] syz.0.474[2163] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.347753][ T2163] syz.0.474[2163] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.573258][ T2176] device pim6reg1 entered promiscuous mode [ 67.234052][ T2204] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 67.251247][ T2204] device syzkaller0 entered promiscuous mode [ 68.247458][ T2284] device veth0_vlan left promiscuous mode [ 68.290690][ T2284] device veth0_vlan entered promiscuous mode [ 68.473060][ T2294] device sit0 entered promiscuous mode [ 69.334453][ T2326] device syzkaller0 entered promiscuous mode [ 69.539075][ T2348] device syzkaller0 entered promiscuous mode [ 70.046176][ T2384] : renamed from pim6reg1 [ 71.142087][ T2441] device wg2 left promiscuous mode [ 71.155923][ T2441] device wg2 entered promiscuous mode [ 71.797443][ T2455] device syzkaller0 entered promiscuous mode [ 75.538547][ T2587] device veth1_macvtap left promiscuous mode [ 75.583056][ T2588] device veth1_macvtap entered promiscuous mode [ 75.592991][ T2588] device macsec0 entered promiscuous mode [ 75.718234][ T2602] syz.0.596[2602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.718283][ T2602] syz.0.596[2602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.787554][ T95] udevd[95]: worker [1094] terminated by signal 33 (Unknown signal 33) [ 75.850573][ T95] udevd[95]: worker [1094] failed while handling '/devices/virtual/block/loop4' [ 75.956952][ T95] udevd[95]: worker [311] terminated by signal 33 (Unknown signal 33) [ 75.982308][ T95] udevd[95]: worker [311] failed while handling '/devices/virtual/block/loop2' [ 76.028177][ T95] udevd[95]: worker [2619] terminated by signal 33 (Unknown signal 33) [ 76.072133][ T95] udevd[95]: worker [2619] failed while handling '/devices/virtual/block/loop0' [ 76.501053][ T2638] device sit0 left promiscuous mode [ 76.565132][ T2645] device lo entered promiscuous mode [ 76.570855][ T2651] device sit0 entered promiscuous mode [ 78.125389][ T2737] ------------[ cut here ]------------ [ 78.130682][ T2737] trace type BPF program uses run-time allocation [ 78.204057][ T2737] WARNING: CPU: 1 PID: 2737 at kernel/bpf/verifier.c:10493 check_map_prog_compatibility+0x65b/0x7c0 [ 78.305794][ T2737] Modules linked in: [ 78.410428][ T2737] CPU: 1 PID: 2737 Comm: syz.1.631 Not tainted 5.10.226-syzkaller #0 [ 78.484402][ T2737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 78.686856][ T2737] RIP: 0010:check_map_prog_compatibility+0x65b/0x7c0 [ 78.714862][ T2757] syz.4.638[2757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.714926][ T2757] syz.4.638[2757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.754011][ T2737] Code: c8 e9 84 fe ff ff e8 34 f4 ee ff 31 db e9 85 fe ff ff e8 28 f4 ee ff c6 05 ce 16 65 05 01 48 c7 c7 e0 73 45 85 e8 15 7a c2 ff <0f> 0b e9 42 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 17 fa ff [ 78.799660][ T2757] syz.4.638[2757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.799713][ T2757] syz.4.638[2757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.934125][ T2737] RSP: 0018:ffffc90000da6f90 EFLAGS: 00010246 [ 79.018601][ T2737] RAX: 07827e9e6e6c4600 RBX: ffff88810f9e1000 RCX: ffff888106dea780 [ 79.084029][ T2737] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 79.104825][ T2737] RBP: ffffc90000da6fd0 R08: ffffffff81522098 R09: ffffed103ee2a5f8 [ 79.112724][ T2737] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 79.159116][ T2737] R13: 1ffff92000021c04 R14: ffff888116678000 R15: ffffc9000010e020 [ 79.176661][ T2737] FS: 00007f477ba0f6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 79.229387][ T2737] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 79.266610][ T2737] CR2: fffffffffffffffa CR3: 0000000119460000 CR4: 00000000003506a0 [ 79.305346][ T2737] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 79.333199][ T2737] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 79.394166][ T2737] Call Trace: [ 79.397459][ T2737] ? show_regs+0x58/0x60 [ 79.401506][ T2737] ? __warn+0x160/0x2f0 [ 79.463899][ T2737] ? check_map_prog_compatibility+0x65b/0x7c0 [ 79.471103][ T2737] ? report_bug+0x3d9/0x5b0 [ 79.489526][ T2737] ? check_map_prog_compatibility+0x65b/0x7c0 [ 79.502198][ T2737] ? handle_bug+0x41/0x70 [ 79.511086][ T2737] ? exc_invalid_op+0x1b/0x50 [ 79.515886][ T2737] ? asm_exc_invalid_op+0x12/0x20 [ 79.522872][ T2737] ? wake_up_klogd+0xb8/0xf0 [ 79.544640][ T2737] ? check_map_prog_compatibility+0x65b/0x7c0 [ 79.550553][ T2737] ? __fdget+0x1bc/0x240 [ 79.554811][ T2737] resolve_pseudo_ldimm64+0x586/0x1020 [ 79.563966][ T2737] ? bpf_check+0xf2b0/0xf2b0 [ 79.568383][ T2737] ? kvmalloc_node+0x82/0x130 [ 79.572889][ T2737] bpf_check+0xaf21/0xf2b0 [ 79.595749][ T2737] ? stack_depot_save+0xe/0x10 [ 79.600342][ T2737] ? __se_sys_bpf+0x9856/0x11cb0 [ 79.623608][ T2737] ? sched_clock+0x3a/0x40 [ 79.643908][ T2737] ? bpf_prog_a9d1eab64edc2dc9+0x2b0/0xb6c [ 79.649571][ T2737] ? bpf_get_btf_vmlinux+0x60/0x60 [ 79.654666][ T2737] ? __kernel_text_address+0x9b/0x110 [ 79.659854][ T2737] ? unwind_get_return_address+0x4d/0x90 [ 79.665788][ T2737] ? arch_stack_walk+0xf3/0x140 [ 79.670454][ T2737] ? stack_trace_save+0x113/0x1c0 [ 79.675568][ T2737] ? stack_trace_snprint+0xf0/0xf0 [ 79.682402][ T2803] syz.2.649[2803] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.688928][ T2737] ? stack_trace_snprint+0xf0/0xf0 [ 79.692017][ T2803] syz.2.649[2803] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.720950][ T2737] ? selinux_bpf_prog_alloc+0x51/0x140 [ 79.763559][ T2737] ? selinux_bpf_prog_alloc+0x51/0x140 [ 79.774004][ T2737] ? ____kasan_kmalloc+0xed/0x110 [ 79.786509][ T2737] ? ____kasan_kmalloc+0xdb/0x110 [ 79.797909][ T2737] ? __kasan_kmalloc+0x9/0x10 [ 79.810684][ T2737] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 79.846368][ T2737] ? selinux_bpf_prog_alloc+0x51/0x140 [ 79.885539][ T2737] ? security_bpf_prog_alloc+0x62/0x90 [ 79.939327][ T2737] ? __se_sys_bpf+0x9f8c/0x11cb0 [ 79.953932][ T2737] ? __x64_sys_bpf+0x7b/0x90 [ 79.979552][ T2737] ? do_syscall_64+0x34/0x70 [ 79.999732][ T2737] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 80.016932][ T2824] tap0: tun_chr_ioctl cmd 1074025675 [ 80.022031][ T2824] tap0: persist enabled [ 80.024932][ T2737] ? __kasan_kmalloc+0x9/0x10 [ 80.030725][ T2737] __se_sys_bpf+0x107a2/0x11cb0 [ 80.035466][ T2737] ? futex_wait+0x6a0/0x7c0 [ 80.039896][ T2737] ? __x64_sys_bpf+0x90/0x90 [ 80.043592][ T2824] tap0: tun_chr_ioctl cmd 1074025675 [ 80.044365][ T2737] ? do_futex+0x17b0/0x17b0 [ 80.053886][ T2737] ? no_context+0x107/0xd20 [ 80.058337][ T2737] ? do_futex+0x139a/0x17b0 [ 80.062653][ T2737] ? __kasan_check_write+0x14/0x20 [ 80.064969][ T2824] tap0: persist enabled [ 80.067697][ T2737] ? put_vma+0x8f/0xb0 [ 80.075758][ T2737] ? __bad_area_nosemaphore+0xc4/0x430 [ 80.081032][ T2737] ? futex_exit_release+0x1e0/0x1e0 [ 80.086241][ T2737] ? bad_area+0x69/0x80 [ 80.090231][ T2737] ? htab_map_hash+0x320/0x7e0 [ 80.095400][ T2737] ? ktime_get_mono_fast_ns+0x19d/0x1c0 [ 80.100882][ T2737] ? bpf_ktime_get_ns+0xe/0x10 [ 80.105723][ T2737] ? bpf_trace_run2+0xf4/0x280 [ 80.110323][ T2737] ? __bpf_trace_sys_enter+0x62/0x70 [ 80.115749][ T2737] __x64_sys_bpf+0x7b/0x90 [ 80.120005][ T2737] do_syscall_64+0x34/0x70 [ 80.124494][ T2737] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 80.130271][ T2737] RIP: 0033:0x7f477cd96719 [ 80.140512][ T2737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 80.177422][ T2737] RSP: 002b:00007f477ba0f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 80.193387][ T2737] RAX: ffffffffffffffda RBX: 00007f477cf4df80 RCX: 00007f477cd96719 [ 80.208945][ T2737] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 80.224467][ T2737] RBP: 00007f477ce0932e R08: 0000000000000000 R09: 0000000000000000 [ 80.242047][ T2737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 80.261416][ T2737] R13: 0000000000000000 R14: 00007f477cf4df80 R15: 00007fff7e559268 [ 80.277945][ T2737] ---[ end trace e88406bbe25195df ]--- [ 80.418971][ T2844] device veth1_macvtap left promiscuous mode [ 81.202850][ T2879] device pim6reg1 entered promiscuous mode [ 81.304788][ T2885] device sit0 entered promiscuous mode [ 81.824934][ T2933] device syzkaller0 entered promiscuous mode [ 82.105828][ T2944] syz.2.687[2944] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.105886][ T2944] syz.2.687[2944] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.231132][ T2952] device pim6reg1 entered promiscuous mode [ 82.730017][ T24] audit: type=1400 audit(1730582677.530:144): avc: denied { create } for pid=2967 comm="syz.3.695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 82.788249][ T2972] device pim6reg1 entered promiscuous mode [ 83.020053][ T2983] device syzkaller0 entered promiscuous mode [ 83.124879][ T2999] device syzkaller0 entered promiscuous mode [ 83.220229][ T2999] syz.4.705[2999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.248603][ T3005] syz.0.707 (3005) used obsolete PPPIOCDETACH ioctl [ 83.401906][ T3010] device pim6reg1 entered promiscuous mode [ 83.512130][ T3020] device pim6reg1 entered promiscuous mode [ 83.559289][ T3028] device pim6reg1 entered promiscuous mode [ 83.694534][ T3039] syz.4.719[3039] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.694600][ T3039] syz.4.719[3039] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.920622][ T24] audit: type=1400 audit(1730582678.720:145): avc: denied { ioctl } for pid=3065 comm="syz.4.728" path="socket:[24604]" dev="sockfs" ino=24604 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 83.986096][ T3072] syz.1.731[3072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.986149][ T3072] syz.1.731[3072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.002286][ T3072] syz.1.731[3072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.014401][ T3072] syz.1.731[3072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.157222][ T3070] device veth0 left promiscuous mode [ 84.180966][ T3070] bridge0: port 3(veth0) entered disabled state [ 84.243764][ T3070] device bridge_slave_1 left promiscuous mode [ 84.259709][ T3070] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.304575][ T3070] device bridge_slave_0 left promiscuous mode [ 84.314353][ T3070] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.829873][ T3136] device pim6reg1 entered promiscuous mode [ 86.076989][ T3145] syz.3.753[3145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.313544][ T3163] device syzkaller0 entered promiscuous mode [ 87.062910][ T3185] device syzkaller0 entered promiscuous mode [ 87.376210][ T3218] device syzkaller0 entered promiscuous mode [ 87.428591][ T3224] device pim6reg1 entered promiscuous mode [ 88.313291][ T3239] device veth0_vlan left promiscuous mode [ 88.344592][ T3239] device veth0_vlan entered promiscuous mode [ 88.422475][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 88.434814][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 88.442270][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 89.069690][ T3253] device sit0 left promiscuous mode [ 89.151345][ T3253] device sit0 entered promiscuous mode [ 89.438266][ T3271] device pim6reg1 entered promiscuous mode [ 90.398092][ T3298] device syzkaller0 entered promiscuous mode [ 90.509117][ T3297] device syzkaller0 entered promiscuous mode [ 91.792840][ T24] audit: type=1400 audit(1730582686.590:146): avc: denied { create } for pid=3363 comm="syz.3.814" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 91.871780][ T24] audit: type=1400 audit(1730582686.670:147): avc: denied { remove_name } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 91.935734][ T24] audit: type=1400 audit(1730582686.670:148): avc: denied { rename } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 92.071337][ T3371] device sit0 left promiscuous mode [ 92.102628][ T3373] device sit0 entered promiscuous mode [ 92.624813][ T24] audit: type=1400 audit(1730582687.420:149): avc: denied { create } for pid=3381 comm="syz.4.819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 92.770292][ T3392] : renamed from vlan0 [ 95.054853][ T3479] device veth0_vlan left promiscuous mode [ 95.060713][ T3479] device veth0_vlan entered promiscuous mode [ 95.096106][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 95.108545][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 95.204820][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 95.385198][ T3505] bpf_get_probe_write_proto: 41 callbacks suppressed [ 95.385210][ T3505] syz.3.851[3505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.409589][ T3505] syz.3.851[3505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.848352][ T3519] device veth0_vlan left promiscuous mode [ 95.945241][ T3519] device veth0_vlan entered promiscuous mode [ 96.039568][ T3520] device syzkaller0 entered promiscuous mode [ 96.467785][ T3533] device veth0_vlan left promiscuous mode [ 96.499582][ T3533] device veth0_vlan entered promiscuous mode [ 96.648246][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 96.659209][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 96.672244][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 96.885928][ T3554] device macsec0 left promiscuous mode [ 97.203014][ T3558] device veth0_vlan left promiscuous mode [ 97.291738][ T3558] device veth0_vlan entered promiscuous mode [ 97.407992][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.416368][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.430156][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.902028][ T3575] device syzkaller0 entered promiscuous mode [ 98.103065][ T3604] device wg2 left promiscuous mode [ 98.136929][ T3604] device wg2 entered promiscuous mode [ 98.171951][ T3611] device pim6reg1 entered promiscuous mode [ 98.367000][ T3621] device pim6reg1 entered promiscuous mode [ 98.711934][ T3635] device vxcan1 entered promiscuous mode [ 98.955811][ T3635] device syzkaller0 entered promiscuous mode [ 99.535706][ T3674] device syzkaller0 entered promiscuous mode [ 99.555162][ T3674] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 100.023288][ T3702] syz.4.903[3702] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.023337][ T3702] syz.4.903[3702] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.518412][ T3714] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.541877][ T3714] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.784784][ T3731] device syzkaller0 entered promiscuous mode [ 100.791579][ T3716] device bridge_slave_1 left promiscuous mode [ 100.804010][ T3716] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.824354][ T3716] device bridge_slave_0 left promiscuous mode [ 100.830336][ T3716] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.044767][ T3742] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.053331][ T3742] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.067146][ T3742] device bridge0 left promiscuous mode [ 102.705446][ T3813] device veth0_vlan left promiscuous mode [ 102.753001][ T3813] device veth0_vlan entered promiscuous mode [ 103.211844][ T3841] device syzkaller0 entered promiscuous mode [ 103.404003][ T3852] device veth0_vlan left promiscuous mode [ 103.488021][ T3852] device veth0_vlan entered promiscuous mode [ 103.697254][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.719912][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 103.735474][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 103.763616][ T3863] device macsec0 left promiscuous mode [ 103.820629][ T3863] device veth1_macvtap entered promiscuous mode [ 103.848555][ T3863] device macsec0 entered promiscuous mode [ 103.907524][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 103.929551][ T3869] device veth1_macvtap left promiscuous mode [ 104.087501][ T3870] device veth1_macvtap entered promiscuous mode [ 104.113800][ T3870] device macsec0 entered promiscuous mode [ 104.131265][ T3874] device macsec0 left promiscuous mode [ 104.170096][ T3874] device veth1_macvtap entered promiscuous mode [ 104.198397][ T3874] device macsec0 entered promiscuous mode [ 104.296482][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 104.765308][ T24] audit: type=1400 audit(1730582699.570:150): avc: denied { create } for pid=3904 comm="syz.0.960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 104.931502][ T3917] device pim6reg1 entered promiscuous mode [ 105.123126][ T3923] device veth1_macvtap left promiscuous mode [ 105.190427][ T3923] device macsec0 left promiscuous mode [ 105.256029][ T3926] device veth1_macvtap entered promiscuous mode [ 105.268688][ T3926] device macsec0 entered promiscuous mode [ 105.281992][ T3925] device pim6reg1 entered promiscuous mode [ 106.690079][ T3966] device syzkaller0 entered promiscuous mode [ 107.658887][ T24] audit: type=1400 audit(1730582702.460:151): avc: denied { create } for pid=4003 comm="syz.1.992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 108.157854][ T4039] device pim6reg1 entered promiscuous mode [ 109.210102][ T24] audit: type=1400 audit(1730582704.000:152): avc: denied { create } for pid=4081 comm="syz.4.1014" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 110.251964][ T4130] syz.0.1028[4130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.252020][ T4130] syz.0.1028[4130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.452825][ T4130] syz.0.1028[4130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.592734][ T4130] syz.0.1028[4130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.645463][ T4146] syz.4.1031[4146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.721662][ T4146] syz.4.1031[4146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.742722][ T4147] device pim6reg1 entered promiscuous mode [ 110.984290][ T4153] device pim6reg1 entered promiscuous mode [ 111.647434][ T4159] device syzkaller0 entered promiscuous mode [ 112.407303][ T4209] device veth0_vlan left promiscuous mode [ 112.615441][ T4209] device veth0_vlan entered promiscuous mode [ 112.784023][ T4213] device bridge_slave_0 entered promiscuous mode [ 112.790681][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.846377][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 112.879356][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 115.569827][ T4323] device syzkaller0 entered promiscuous mode [ 116.966524][ T4390] syz.2.1102[4390] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.966597][ T4390] syz.2.1102[4390] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.110538][ T24] audit: type=1400 audit(1730582711.910:153): avc: denied { create } for pid=4397 comm="syz.4.1105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 117.195622][ T24] audit: type=1400 audit(1730582712.000:154): avc: denied { create } for pid=4403 comm="syz.2.1107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 117.431827][ T4420] device veth0_vlan left promiscuous mode [ 117.468012][ T4420] device veth0_vlan entered promiscuous mode [ 117.595088][ T4424] device pim6reg1 entered promiscuous mode [ 119.184514][ T4475] device veth0_vlan left promiscuous mode [ 119.195973][ T4475] device veth0_vlan entered promiscuous mode [ 119.215361][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 119.229034][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 119.246866][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 120.404525][ T4547] device pim6reg1 entered promiscuous mode [ 120.990820][ T4596] device pim6reg1 entered promiscuous mode [ 121.731780][ T24] audit: type=1400 audit(1730582716.530:155): avc: denied { append } for pid=4629 comm="syz.0.1172" name="ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 123.058320][ T4700] device syzkaller0 entered promiscuous mode [ 125.077210][ T4779] Y4`Ҙ: renamed from lo [ 125.418212][ T4802] device pim6reg1 entered promiscuous mode [ 125.491525][ T4816] device pim6reg1 entered promiscuous mode [ 125.602880][ T24] audit: type=1400 audit(1730582720.400:156): avc: denied { create } for pid=4823 comm="syz.2.1229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 125.752893][ T4839] device syzkaller0 entered promiscuous mode [ 125.807772][ T24] audit: type=1400 audit(1730582720.610:157): avc: denied { setattr } for pid=4850 comm="syz.1.1236" path="/net/tun" dev="devtmpfs" ino=147 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 125.943214][ T4857] syz.1.1238[4857] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.943277][ T4857] syz.1.1238[4857] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.071733][ T4857] syz.1.1238[4857] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.096535][ T4857] syz.1.1238[4857] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.303372][ T4873] device syzkaller0 entered promiscuous mode [ 130.425102][ T24] audit: type=1400 audit(1730582725.230:158): avc: denied { create } for pid=4879 comm="syz.1.1244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 131.069093][ T4948] device veth0_vlan left promiscuous mode [ 131.092728][ T4948] device veth0_vlan entered promiscuous mode [ 131.375280][ T4970] device wg2 entered promiscuous mode [ 131.463041][ T24] audit: type=1400 audit(1730582726.260:159): avc: denied { create } for pid=4990 comm="syz.4.1271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 136.296346][ T5203] device veth1_macvtap left promiscuous mode [ 136.302160][ T5203] device macsec0 left promiscuous mode [ 136.498202][ T5211] device veth1_macvtap entered promiscuous mode [ 136.507760][ T5211] device macsec0 entered promiscuous mode [ 136.720656][ T5228] device sit0 left promiscuous mode [ 136.793356][ T5228] device sit0 entered promiscuous mode [ 138.729108][ T5327] device veth0_to_bond entered promiscuous mode [ 138.759100][ T5327] device veth1_macvtap entered promiscuous mode [ 138.803773][ T5327] device macsec0 entered promiscuous mode [ 138.816017][ T5330] : renamed from vlan1 [ 138.870963][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 138.987546][ T5344] syz.3.1365[5344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.989481][ T5344] syz.3.1365[5344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.673630][ T5380] device pim6reg1 entered promiscuous mode [ 139.777661][ T24] audit: type=1400 audit(1730582734.580:160): avc: denied { create } for pid=5385 comm="syz.0.1375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 139.891086][ T24] audit: type=1400 audit(1730582734.690:161): avc: denied { create } for pid=5394 comm="syz.1.1378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 140.052553][ T5412] device lo entered promiscuous mode [ 140.391155][ T5439] device pim6reg1 entered promiscuous mode [ 140.439130][ T24] audit: type=1400 audit(1730582735.240:162): avc: denied { append } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 140.489867][ T24] audit: type=1400 audit(1730582735.240:163): avc: denied { open } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 140.565844][ T24] audit: type=1400 audit(1730582735.240:164): avc: denied { getattr } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 140.615552][ T5443] device pim6reg1 entered promiscuous mode [ 140.783497][ T5468] device sit0 left promiscuous mode [ 141.164858][ T5475] : renamed from pim6reg1 [ 142.988110][ T5585] : renamed from vlan0 [ 143.037541][ T5590] bridge0: port 4() entered blocking state [ 143.052752][ T5590] bridge0: port 4() entered disabled state [ 143.075941][ T5590] device entered promiscuous mode [ 143.089333][ T5589] device pim6reg1 entered promiscuous mode [ 144.287461][ T5655] device syzkaller0 entered promiscuous mode [ 144.532076][ T5666] syz.3.1460[5666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.540786][ T5666] syz.3.1460[5666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.284706][ T5690] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 145.313875][ T5690] device syzkaller0 entered promiscuous mode [ 145.553934][ T5693] : renamed from vlan0 [ 145.927086][ T5721] device veth0_vlan left promiscuous mode [ 145.960998][ T5721] device veth0_vlan entered promiscuous mode [ 146.036080][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 146.054462][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 146.074227][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 146.087600][ T5726] device wg2 left promiscuous mode [ 146.566370][ T5764] syz.1.1491[5764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.566404][ T5764] syz.1.1491[5764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.581208][ T5764] device pim6reg1 entered promiscuous mode [ 146.978180][ T5809] device veth0_vlan left promiscuous mode [ 146.998879][ T5809] device veth0_vlan entered promiscuous mode [ 147.202083][ T5871] device pim6reg1 entered promiscuous mode [ 147.331674][ T5869] bridge0: port 3(veth0) entered blocking state [ 147.337963][ T5869] bridge0: port 3(veth0) entered disabled state [ 147.379269][ T5869] device veth0 entered promiscuous mode [ 147.395582][ T5869] bridge0: port 3(veth0) entered blocking state [ 147.401760][ T5869] bridge0: port 3(veth0) entered forwarding state [ 147.945183][ T5896] syz.2.1529[5896] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.945250][ T5896] syz.2.1529[5896] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.436453][ T5946] device veth0_vlan left promiscuous mode [ 149.481185][ T5946] device veth0_vlan entered promiscuous mode [ 149.512593][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 149.528470][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 149.547047][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 149.669415][ T24] audit: type=1400 audit(1730582744.470:165): avc: denied { create } for pid=5966 comm="syz.2.1551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 150.311311][ T24] audit: type=1400 audit(1730582745.100:166): avc: denied { create } for pid=5984 comm="syz.2.1556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 151.242476][ T6046] device syzkaller0 entered promiscuous mode [ 151.633365][ T6073] tap0: tun_chr_ioctl cmd 1074812117 [ 153.948165][ T6156] bridge0: port 3(veth0) entered disabled state [ 153.954342][ T6156] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.961433][ T6156] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.603458][ T6193] device syzkaller0 entered promiscuous mode [ 155.146671][ T6228] device pim6reg1 entered promiscuous mode [ 155.401120][ T24] audit: type=1400 audit(1730582750.200:167): avc: denied { create } for pid=6259 comm="syz.0.1636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 155.538998][ T6260] device syzkaller0 entered promiscuous mode [ 156.235815][ T6288] device pim6reg1 entered promiscuous mode [ 157.867110][ T6343] : renamed from vlan1 [ 157.951221][ T6346] device sit0 left promiscuous mode [ 157.984463][ T6356] device sit0 entered promiscuous mode [ 158.426355][ T6362] device sit0 left promiscuous mode [ 160.320361][ T6442] device syzkaller0 entered promiscuous mode [ 161.873514][ T6524] device wg2 left promiscuous mode [ 162.059704][ T6524] device wg2 entered promiscuous mode [ 162.174603][ T6546] device veth1_macvtap left promiscuous mode [ 162.200075][ T6546] device veth1_macvtap entered promiscuous mode [ 162.242017][ T95] udevd[95]: worker [4880] terminated by signal 33 (Unknown signal 33) [ 162.307594][ T95] udevd[95]: worker [4880] failed while handling '/devices/virtual/block/loop3' [ 162.395514][ T24] audit: type=1400 audit(1730582757.200:168): avc: denied { create } for pid=6529 comm="syz.1.1713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 163.474821][ T24] audit: type=1400 audit(1730582758.270:169): avc: denied { create } for pid=6605 comm="syz.4.1736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 163.599103][ T6604] device veth0 left promiscuous mode [ 163.609335][ T6604] bridge0: port 3(veth0) entered disabled state [ 163.648975][ T6604] device bridge_slave_1 left promiscuous mode [ 163.659792][ T6604] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.688319][ T6604] device bridge_slave_0 left promiscuous mode [ 163.699422][ T6604] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.773499][ T6620] syz.1.1740[6620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.773567][ T6620] syz.1.1740[6620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.823851][ T6664] device veth1_macvtap left promiscuous mode [ 164.914197][ T6664] device macsec0 left promiscuous mode [ 165.463849][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 166.027210][ T6770] device syzkaller0 entered promiscuous mode [ 166.468747][ T6778] device syzkaller0 entered promiscuous mode [ 166.647711][ T6793] syz.3.1788[6793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.647784][ T6793] syz.3.1788[6793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.687650][ T6793] syz.3.1788[6793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.724249][ T6793] syz.3.1788[6793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.737786][ T6795] device syzkaller0 entered promiscuous mode SYZFAIL: repeatedly failed to execute the program proc=5 req=1803 state=1 status=7 (errno 32: Broken pipe) [ 167.745732][ T666] device bridge_slave_1 left promiscuous mode [ 167.751671][ T666] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.758959][ T666] device bridge_slave_0 left promiscuous mode [ 167.764954][ T666] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.772721][ T666] device veth1_macvtap left promiscuous mode [ 167.778733][ T666] device veth1_macvtap left promiscuous mode [ 167.784581][ T666] device veth0_vlan left promiscuous mode [ 169.596430][ T666] device left promiscuous mode [ 169.601671][ T666] bridge0: port 4() entered disabled state [ 169.608240][ T666] device veth0 left promiscuous mode [ 169.613375][ T666] bridge0: port 3(veth0) entered disabled state [ 169.619776][ T666] device bridge_slave_1 left promiscuous mode [ 169.625759][ T666] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.632836][ T666] device bridge_slave_0 left promiscuous mode [ 169.638899][ T666] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.646967][ T666] device veth1_macvtap left promiscuous mode [ 169.652780][ T666] device veth0_vlan left promiscuous mode [ 169.658637][ T666] device veth1_macvtap left promiscuous mode