last executing test programs: 948.342432ms ago: executing program 3 (id=1889): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x0, 0x8}, 0x48) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00'}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r2, &(0x7f0000000380), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x4, &(0x7f0000000640)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x6}, @jmp={0x5, 0x1, 0xa, 0x2, 0x3, 0xfffffffffffffff0, 0x1}, @call={0x85, 0x0, 0x0, 0xbe}, @alu={0x7, 0x0, 0x3, 0x0, 0x1, 0x18, 0xfffffffffffffff0}], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYRES8=r0, @ANYRES8=r0], &(0x7f0000000680)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f00000003c0)='ext4_prefetch_bitmaps\x00', r7}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x27}, 0x90) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYRES32=r4, @ANYRES8, @ANYRES8, @ANYRES8, @ANYRESHEX=r1, @ANYRES32=r8], 0x32600) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811ffff", @ANYRES32, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r11, 0x2000000, 0xe, 0xffffffffffffffd4, &(0x7f0000000200)="493c1300"/14, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r12}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 825.313052ms ago: executing program 1 (id=1891): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='ext4_fc_track_range\x00', r0}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000200), 0x0}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000003c0)={0x1, &(0x7f0000000440)=[{0x0, 0x9, 0x4, 0x10}]}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7043ff4874e0b5a3fade37b34bf82000000950000004c870000"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) close(r1) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xb, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000100)={'syzkaller0\x00', 0x7101}) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r11}, 0x10) write$cgroup_devices(r9, &(0x7f0000000200)=ANY=[@ANYBLOB="1e031800dd5c980128854d"], 0xffdd) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000cecbeab3ce27adf36c3c77af99bb5e22e1b41a9a0fea40a612313a29552b1470bc8f80ee9884bb79d11f8727b6406eb85a601b50f5d5a91cb8b1fe4ddb1a2470e78d7136e8140b061fa1f0453d1d50895d5ea46036e8a1a6a714319527816d2d3bb01dc61ace843be94359edb3fac568085d6fcace7717f1eb6c5e"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r12}, 0x10) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r2], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r13}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) 770.421307ms ago: executing program 3 (id=1894): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000003c0), 0x3}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cpuacct.usage_user\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x401c5820, &(0x7f0000000000)=0x8000) close(r2) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_da_write_pages_extent\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x403, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000380)='ext4_da_write_pages_extent\x00', r6}, 0x10) write$cgroup_int(r5, &(0x7f0000000700), 0x12) ioctl$SIOCSIFHWADDR(r5, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x7ff}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x100, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000000)={'team0\x00', 0x4901}) ioctl$TUNSETLINK(r7, 0x400454ce, 0xa002a0ffffffff) 701.964482ms ago: executing program 3 (id=1897): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fefdffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400010000000404000001000000b70500002a0000006a0a00fe00000000850000000b000000b70000005920000095000000000000006c8f5d76781dcb7729f41726a067818b990b13bfdd5db1b7ef826f015cd03018d546fa9b6827767c171a4f0720596bb3b4d821d976f5843061cc2e3afbae82d7932d4f91f718f0e56315040148e11bac31821236192321fa3b3042"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xcc0, 0xdd7, &(0x7f0000000000)="5ae02efc441a80536af0d1d905c723fa", &(0x7f0000000040)=""/24, 0x6414}, 0x28) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x7, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, @perf_config_ext={0x80}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000002000000008000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r5}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xb, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r8) ioctl$TUNSETOFFLOAD(r3, 0x40086607, 0x20001412) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x1b, 0xe, 0x5, 0x3, 0x7ad, r1, 0xfffffffd, '\x00', r2, r3, 0x5, 0x2}, 0x48) 640.006087ms ago: executing program 1 (id=1899): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12807}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f00000004c0)='syzkaller\x00'}, 0x90) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 552.015255ms ago: executing program 4 (id=1900): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x7, 0x8, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x16, '\x00', 0x0, 0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) openat$cgroup_freezer_state(r0, &(0x7f0000000840), 0x2, 0x0) r4 = openat$cgroup_freezer_state(r0, &(0x7f0000002b00), 0x2, 0x0) close(r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xfdb, 0xff, 0x3, 0x80, r1, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x0, 0x8000000000007}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r5}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000040007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400008a415fa8968e0000000085000000030000009500000000000000dea9cd92b61e73539a85bc3341fc2df7350935db033fe3efff25229a6b21eb51adfb2ab7623ae401e97d025f4f6d65dfe5d13e450769495ccb7a74cb6f3e60"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x8000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xb, &(0x7f0000000940)=ANY=[@ANYRES64=r0, @ANYRES16=r0, @ANYRESOCT=r0, @ANYRESOCT, @ANYRESDEC=r6, @ANYBLOB="a6180f93619c78d43757c6ba45b7501d96f4742440dbe15fcc396439cfd0ddb212399aa429d764cc0fb3281d7aa29ec1c75e4de5ab913b9ab0356112399ad11cdc88dcf4b769913dd18de861154cadcc121d5c1971b491c373f5d860ec9ab0b64363a468804bbb68"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffebb, 0x0, 0x0, 0x0}, 0xffffffffffffffa6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='objagg_create\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r8}, &(0x7f0000000040), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r9) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r9) 550.768334ms ago: executing program 4 (id=1901): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000000000010000702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000730000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='fib6_table_lookup\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000140)='sys_enter\x00', r5}, 0x10) unlink(&(0x7f0000000000)='./cgroup\x00') mkdir(&(0x7f0000000ac0)='./cgroup\x00', 0x0) bpf$MAP_CREATE(0x5, &(0x7f00000009c0), 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0x2}, @int={0x0, 0x0, 0x0, 0x1, 0x5}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x200000, [{0x0, 0x1}]}]}}, &(0x7f0000000000)=""/140, 0x4e, 0x8c, 0x1}, 0x20) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000093000000003b810000850000006d874d963750d39cd61b9bff6c"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000900)='mm_page_alloc\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xb, 0xff, 0x2, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={r9, &(0x7f0000000300), &(0x7f0000000340)=""/55}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='ext4_free_blocks\x00', r6}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000000500000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) 549.957464ms ago: executing program 1 (id=1902): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000900)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="8f0cb97907081175f37538e486dd"], 0xfdef) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[], 0xffbf) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 467.044911ms ago: executing program 3 (id=1904): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000900)={'syzkaller0\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0xca58c30f81b6079f}) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000110000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r4, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd55", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r2}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) close(0x4) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r8, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 383.571238ms ago: executing program 3 (id=1905): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={0x0}, 0x10) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x9, 0x0, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000001070000", @ANYRESDEC=r0, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454da, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000500)='fsi_master_aspeed_opb_read\x00', r3}, 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000900)={{r2, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f0000000540)='%pB \x00'}, 0x20) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7006, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00'}, 0x10) r5 = gettid() bpf$PROG_BIND_MAP(0x23, &(0x7f0000000580)={r1, r4}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r5, 0xffffffffffffffff, 0x0, 0x1, 0xfffffffffffffffe}, 0x42) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r6}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000002c0)="fb00008839fe8bc048c0cdafd1811dbf40b3a7da5a9c5ee2632709000000000000008acfee620ad9ca002914000000000c50aa4adf32c1209072ee1cd4", 0x3d}], 0x1}, 0x0) recvmsg(r7, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x419d) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af83b76f2d883c85f4b000000000007010000f8ffffffb7020000080000000000000000000000850000007100000095000000000000006cf4f7822e802349cd2f6337a795feaf0b227ea25cfb0bcd3f1f04c9d560c6263e79f031408a1bd702256b489ac22b9e15b4c17a23cebfa463abceeba40492ddc4b86eb727ef717c9cd22acd3b12cf9d7b022d64cc5fa48b64eae88dfab8e8cf95bdad554634cf9005e918077e23089f1a1aff38bc2e5d995795889fe803"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) close(r7) 383.165409ms ago: executing program 0 (id=1906): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8902, &(0x7f0000000900)={'wg2\x00', @random='\x00\x00\x00 \x00'}) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x0, 0xb3, 0x7f}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="b40500000000000071101f000000000066000000000000009500000000000000cd472c9289072938bc9c6ce79c31657525a15f7c566ab0a0879eac7decc602dc52dda9498c8eabecd25822e4b41d41c5c371af14a1dfb04bd306186702e92c0c24a19dab7f05d8e170b4f5515c01b2ef2842db7582cfb4f58105e41ba6034437ab4aedc300"/162], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) (async) socketpair$unix(0x1, 0x0, 0x0, 0x0) (async, rerun: 64) close(0xffffffffffffffff) (async, rerun: 64) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async, rerun: 64) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async, rerun: 64) socketpair$unix(0x1, 0x0, 0x0, 0x0) (async, rerun: 64) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000200)={'sit0\x00', @remote}) (async, rerun: 64) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 379.901709ms ago: executing program 4 (id=1907): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0xb) (async) sendmsg$tipc(r1, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$tipc(r1, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001a80), 0x48) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xb, &(0x7f00000001c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r0, @ANYRES32=r4, @ANYRES8=r3], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x13}}, 0xffffffffffffffff, 0xffeffffffffffffb, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000340)='rxrpc_rx_done\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700ff7f0000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000006c0), 0x6e, &(0x7f00000009c0)=[{&(0x7f0000000740)=""/103, 0x67}, {0xfffffffffffffffc}, {&(0x7f00000000c0)=""/54, 0x36}, {0x0}], 0x4, &(0x7f0000000a40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x20}, 0x40002101) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r5, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) (async, rerun: 32) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001440)='cgroup.procs\x00', 0x2, 0x0) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.stat\x00', 0x26e1, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0046686, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000014c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async, rerun: 32) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) (rerun: 32) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r6, 0x4) (async, rerun: 64) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 64) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'veth1_macvtap\x00', 0x2}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f0000000400)=[0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8d, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000500), 0x0, 0x0, 0xb1, 0x8, 0x0, 0x0}}, 0x10) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) (async, rerun: 64) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (rerun: 64) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) 363.9552ms ago: executing program 0 (id=1908): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) (async) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async, rerun: 64) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x0, 0x3, &(0x7f0000001400)=@framed, 0x0}, 0x90) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20000014) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r2, &(0x7f0000000bc0)="3d0c308aea321dcdd875a89d863599", 0x20000000}, 0xfffffffffffffff1) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x6, 0x4, 0x4, 0x1ff}, 0x18) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f00000003c0)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) (rerun: 64) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='sched_switch\x00', r7}, 0x10) (async) socketpair(0x0, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0}, 0x10) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_int(r8, 0x0, 0x2, 0x0) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x6, 0xc, &(0x7f0000000680)=@raw=[@jmp={0x5, 0x1, 0xd, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @btf_id, @alu={0x7, 0x0, 0x4, 0x0, 0xb, 0x8}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}], &(0x7f0000000700)='GPL\x00', 0x7, 0xc4, &(0x7f0000000740)=""/196, 0x41100, 0x8, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000840)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000880)={0x1, 0xe, 0x8, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[r5]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0x9, &(0x7f00000004c0)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xb65}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000080)='syzkaller\x00', 0x3, 0x91, &(0x7f0000000580)=""/145, 0x41100, 0x66, '\x00', 0x0, 0x31, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x8, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, r10, 0x6, &(0x7f0000000a40)=[r2], &(0x7f0000000a80)=[{0x3, 0x5, 0x3, 0x9}, {0x0, 0x5, 0xa, 0x2}, {0x2, 0x4, 0x1, 0x1}, {0x3, 0x2, 0xc}, {0x0, 0x5, 0x8, 0xd}, {0x0, 0x2, 0x10}]}, 0x90) (async) write$cgroup_subtree(r9, &(0x7f0000000040)=ANY=[@ANYBLOB='1\n', @ANYRESHEX], 0x31) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='mlxsw_sp_acl_tcam_vregion_migrate_end\x00', r3}, 0x10) (rerun: 64) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 311.689394ms ago: executing program 4 (id=1909): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbf, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0xb5, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x18, 0x12, &(0x7f0000000080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xe5e}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @jmp={0x5, 0x1, 0x0, 0x0, 0x7, 0xc, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000140)='GPL\x00', 0xff, 0xf8, &(0x7f0000000180)=""/248, 0x41000, 0x2f, '\x00', r1, 0x35, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xf, 0xa, 0x1000}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000600)=[{0x4, 0x3, 0x2, 0x7}], 0x10, 0x200}, 0x90) (async) bpf$ENABLE_STATS(0x20, &(0x7f0000000700), 0x4) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000001b80)={&(0x7f0000000780)=@id={0x1e, 0x3, 0x1, {0x4e20}}, 0x10, &(0x7f0000001ac0)=[{&(0x7f00000007c0)="d3962992fa1239cdde4a1e0d2723d75d4197aa09f26053074e4d6d0188578dd56cb618e2107e141d355d50720dc447f957293491a4ac9b", 0x37}, {&(0x7f0000000800)="693e77fe437516f403769eae16a04a1c3f7ef030a2aaa9f000012c4032c6bbaddedf9b540067ba3b9d9879f5779ac9af0c2a5154ded208baed9c453dd8557d934f7bab9351c715d51d1b893d0e67daffcdf24e3f1d598275585fa4b0735d13074c1ea37071a61d2f95c7f08a5bc22f134b56a9bb5746238aa0f072c26bad1855f9573e7354a0ba0bba58c7ff38ab2d16b50e39231576d956173939dc4427dd2b3deeb61e52", 0xa5}, {&(0x7f00000008c0)="f2492c75e3fbcad77536874adcbfc2e104a5cdc01fa1d87378d23085e7281678bfd066bcb6dd5dcdb18b9984e543bcd36356cf71ee83ea47ab8151edc37e782472330eb7928317bdfc9a4fece58b0bc13da0874313e06ae09497e30d3e62f63e4e11abee42e2ab10ff79174867e90498248f3193c831c8efefa8a6393dfa2542caaee96ad9e26fe4a37f9885667e6ed5b874f1adf7891a58406b25e2b12a5ef26f1343a11ef1c5760d2e05fdc8a9d0a0c1a285f8924afa29e6c23a76dfbf77a5a1b933c9426502327538101690a8dc7d2ec7df9ca17f1683366afc8b424eca8c2df9c581d58492dea6a8adbb6b5d79da3de571952340", 0xf6}, {&(0x7f00000009c0)="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", 0x1000}, {&(0x7f00000019c0)="d4f545cffe69979209ab7bce6308a5c54f6514f3effb299593c4120d234154c309ec2fb79991674ac2c65d4ec6822450e720e6b3c5", 0x35}, {&(0x7f0000001a00)="fa6e8ac4d8cc15ccb75814e691c06cf62b169c224e5c6ddccdab8e74a38985063170c74c10aed3539473cebb103f556dabe59c54018f741f7e0de3bf82cf3fe9f11463975f998c13ddd59e83a40289ab7578c39c18a187d9f4bb2e4ac28c168756d1068068f9d195d465bdefc4c392aedd8db11956e7e591581b284dafb295275618481579ffb2594cd2b93534d7718d09fab1a0f1f7a62428533b2cc358528141e78fe1f34287fa", 0xa8}], 0x6, &(0x7f0000001b40)="81f8964316f8768487ddff360295fcc2161f32df58ca4efe12feed0899f551b8b3343c6e3666999d70", 0x29, 0x1}, 0x20000000) (async) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001c00)={&(0x7f0000001bc0)='xen_mmu_set_pud\x00', r3}, 0x10) (async) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000001c80)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001fc0)={0xffffffffffffffff, 0xe0, &(0x7f0000001ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000001cc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x7, &(0x7f0000001d00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb8, &(0x7f0000001dc0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001e00), &(0x7f0000001e40), 0x8, 0xb0, 0x8, 0x8, &(0x7f0000001e80)}}, 0x10) (async) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000002000)=0x5) (async) openat$cgroup_type(r7, &(0x7f0000002040), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002100)={{0x1, 0xffffffffffffffff}, &(0x7f0000002080), &(0x7f00000020c0)=r3}, 0x20) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002380)=r2, 0x4) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000002440)=@base={0x1c, 0xe8, 0x5, 0x5, 0x600, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002580)={0xb, 0x26, &(0x7f0000002140)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @jmp={0x5, 0x0, 0x4, 0x5, 0x0, 0x2, 0x10}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xcacb}}, @map_val={0x18, 0xa, 0x2, 0x0, r0}], &(0x7f0000002280)='syzkaller\x00', 0x0, 0x94, &(0x7f00000022c0)=""/148, 0x41000, 0x2, '\x00', r8, 0x0, r11, 0x8, &(0x7f00000023c0)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000002400)={0x1, 0xe, 0xffffffff, 0x7f}, 0x10, r2, r3, 0x5, &(0x7f00000024c0)=[r0, r0, r0, r0, r0, r0, r0, r12], &(0x7f0000002500)=[{0x3, 0x2, 0x2, 0xc}, {0x5, 0x2, 0xd, 0x2}, {0x0, 0x4, 0xc, 0x1}, {0x4, 0x4, 0x8, 0xc}, {0x2, 0x3, 0x4, 0x9}], 0x10, 0x9b}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000026c0)={{r12, 0xffffffffffffffff}, &(0x7f0000002640), &(0x7f0000002680)='%ps \x00'}, 0x20) r14 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002700)={0x3, 0x4, 0x4, 0xa, 0x0, r12, 0x0, '\x00', r8, r11, 0x2, 0x1, 0x4}, 0x48) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000028c0)={r12, 0x58, &(0x7f0000002840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r16 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002c40)=@bpf_lsm={0x1d, 0x21, &(0x7f0000002980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_fd={0x18, 0x7, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x5d}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r12}}, @map_fd={0x18, 0x1, 0x1, 0x0, r13}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002ac0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x0, '\x00', r8, 0x1b, r11, 0x8, &(0x7f0000002b00)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000002b40)={0x4, 0x0, 0xe3fb, 0x8}, 0x10, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000002b80)=[r12, r10, r13, r13, r10, r13, r0], &(0x7f0000002bc0)=[{0x2, 0x2, 0x1, 0x9}, {0x3, 0x3, 0x2, 0x2}, {0x0, 0x5, 0x6, 0xa}, {0x5, 0x1, 0x7ff, 0x5}, {0x2, 0x2, 0x3, 0x4}, {0x4, 0x5, 0xd, 0x8}], 0x10, 0x100}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000002d40)={0xc, 0x6, &(0x7f0000002780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@alu={0x7, 0x1, 0x9, 0x1, 0x8, 0x6, 0xfffffffffffffffc}, @map_fd={0x18, 0x0, 0x1, 0x0, r14}]}, &(0x7f00000027c0)='syzkaller\x00', 0xd, 0xc, &(0x7f0000002800)=""/12, 0x41100, 0x0, '\x00', r15, 0x2, r0, 0x8, &(0x7f0000002900)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002940)={0x2, 0x3, 0xd, 0x5}, 0x10, r9, r16, 0x2, 0x0, &(0x7f0000002d00)=[{0x2, 0x2, 0x6, 0x9}, {0x4, 0x3, 0x7, 0x5}], 0x10, 0xa961}, 0x90) r17 = openat$tun(0xffffffffffffff9c, &(0x7f0000002e00), 0x101000, 0x0) ioctl$TUNSETLINK(r17, 0x400454cd, 0x7) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002ec0)={r0, 0x58, &(0x7f0000002e40)}, 0x10) sendmsg$sock(r5, &(0x7f0000004540)={&(0x7f0000002f00)=@un=@abs={0x1, 0x0, 0x4e22}, 0x80, &(0x7f0000004480)=[{&(0x7f0000002f80)="f1d3122e3d79c67f51142eb9afaa89f4b1bbee1a09defc54763a47cbd428595a52f7b7a58765aa632da2af2100eae1e3fd973a127048dadd22108854b9e18564747cc088a0b30646296569251ee0e2fc682c69a43a2dfee209c66bf688256515466da27441f1ca7ff5360fdfaf64d6484d1c91d61780", 0x76}, {&(0x7f0000003000)="c2f541a0562d84aebdfba81e49dce8c40311166f543d661e0c8715697098dba14d31ba4255b52a58ebf3e90fd1d7f14c17d33f94019bf386ca95df634e3254050c5cb560b27e77faae8e54c449794e5e361e07afffd14e26662c1690559608f7db137bb781a00e1e3da9f8cc09671d4f3b6f284eff3edb2a935bc1e7aa4c193154f87acc78e133f2e6e5796570b7f8e7457f8e1a4f34a497385ed89c849e863c8dd239864b5a095f53d7d0346ea4ca538f514c1bb66e8e4875137d1821697a34", 0xc0}, {&(0x7f00000030c0)="24aed8e14374e301a6180166bd0f4db2c28fc1bb8c73b7e3afd2e772ef63c4344d2472db6f1f86900cdd82e5e447c1b466683cb22f65d2c7888918665bd293bb37584cbc7ab7870083db9a0d1b0acde61e97c40e67e7acf5b97b", 0x5a}, {&(0x7f0000003140)="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", 0x1000}, {&(0x7f0000004140)="c0cc7ea572524f93552df1537f7e4b4ed7a041e9072736990247bfae35fdbbd14a6ad94c5f81f164e21d3c97c7030e2d0f85111af0ec55074e74520f2d3dcee14fb47e906ad1d0d07d9733922f307cf9a29a9fa9cfe761099efd7b7780bed67b8e7f39bc7f32d3095988499d83eec6d384143c8529d88367f816d4a0be56106778b37a8c2c856f74ec4a795110ba925e7d63619afbe27e4ebdb8d03e70", 0x9d}, {&(0x7f0000004200)="6250171db80eb1d1688dec4e5b5c922d0157afed4c501f6a31f2638082118d092cdf27a7f8f07bf138f430e5e5083f6ef75ab233c31ac1a5eb078b8864c424c20b6b3d0a67808c40fcae2a651d0fd6a80ddd8e4b8051b6d78ebb6bce9ef57326ed42ec5476429b80dcdc5fc01c1356d13758ed204e6884413f0aa239cd99d496e63f81b83fbbda8c283f01ecff8e919badf95cd3d196cb8c164b6c29ba18cd87c2b5abd6cb4d0ec887ccb24fcde2187bee0cfc3d7050c79de25f91da1ea6d12c241ac53917356a5bffbef932dd591e9460f30ee9c34c963462442fe4fd1c3e77b1bc1f69cb9a26509bbf3022f573bf0ca921444b80e0c3", 0xf7}, {&(0x7f0000004300)}, {&(0x7f0000004340)="0f08163f2038dcb20da550cdfd3fbe16a1deb3178e3703b2a700ee0d5f5e17edec6d629c", 0x24}, {&(0x7f0000004380)="88572ef0f3bcbe15084f1aabaaf517e5a7f1d3049286d4f46c2933436ea04f9f7b08802017bed8bac257a7f0d1450c6cf7f3bb2a4f4b1b8469fce35036fab7c40903d4335a8d29f42c9f35bd923dd150d3bf74597c730fcf2de9c0572738baf96982063551e741d732e8557ad7281d4e82988dea01e1d04718f16ce096439cf963e083d9139a138910ecff56b001e52d3510ad481e14effd984880d9476cb26e90c0e31ccad4b210586af5a9cd6604cc604dcf6ca3bf6d2f2f982b69ff3a406d6ab5b078529edbf7e80b494efdc3d7105520a174c4edce5e60c3540ec128b1ae1d51b1409a00920d7ca109ab", 0xec}], 0x9}, 0x4000) r18 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000048c0)={0x6, 0x18, &(0x7f0000004580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x57c}, [@btf_id={0x18, 0x6, 0x3, 0x0, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r12}}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0xc}, @call={0x85, 0x0, 0x0, 0x17}, @map_fd={0x18, 0x6a03cf4da0b2a16d, 0x1, 0x0, r10}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000004640)='GPL\x00', 0x7, 0x89, &(0x7f0000004680)=""/137, 0x0, 0x0, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000004740)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000004780)={0x4, 0x4, 0x5, 0x3}, 0x10, 0x0, 0x0, 0xa, &(0x7f00000047c0)=[r0], &(0x7f0000004800)=[{0x5, 0x3, 0xd, 0x1}, {0x4, 0x1, 0xb}, {0x2, 0x1, 0x6, 0x8}, {0x3, 0x5, 0x5, 0x9}, {0x2, 0x5}, {0x4, 0x4, 0x7, 0x7}, {0x4, 0x2, 0x10, 0x1}, {0x3, 0x4, 0x8}, {0x0, 0x5, 0x4}, {0x5, 0x3, 0x9, 0x4}], 0x10, 0x6}, 0x90) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000004980)=r18, 0x4) bpf$ENABLE_STATS(0x20, &(0x7f00000049c0), 0x4) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000004c00)={r13, &(0x7f0000004a00)="b30bac083d3074d4e4c15286b0ce2bf6e2e201b968533c341ca8f79b94ca43792f0c9b13d66f77aaeb450382b8a0aea5c3b3440db27a9d23064892293485a79611f85f2047b4954b14453ae78965518d53d56fb5345339d59dfe62c7a59be76f02706a986dafd9220106067fb7e32f219b1dd50e2980f8593a243fd49ea9f6967b19691f291e60402fb3b5c478d8f70ba322d4a2500b0850c5a5bc5794944dfbe1ded12527ad5d53cc4c4c876409b7fdd23eaef1646e2b92ab141fe6b75b77fdc18e2573d0ac6c7a4ef916dd600e35", &(0x7f0000004b00)=""/205}, 0x20) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000004c40)='./cgroup.net/syz0\x00', 0x1ff) 310.875434ms ago: executing program 2 (id=1910): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000071120700000000009500004000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8971, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='mm_page_alloc\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8013, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r2}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='ext4_es_remove_extent\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000004c0)='fscache_volume\x00', r8}, 0xffffffffffffffa7) unlink(0x0) 310.350564ms ago: executing program 0 (id=1911): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x0, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x5, 0x400, 0x9}, 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x3378090f) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x40002022) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000f10000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1f, 0x5, 0x10001, 0x9, 0x2409, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffd}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x47) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) 309.546954ms ago: executing program 4 (id=1912): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000004c0)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="8f0ccba80d0870b8acc3d91dd5b5ba8972c65e22b19ff388bfca06154d4254ec30434ee41dbd4747a301dcf607e8621f9a6be7dde1082282d258294845a3136dc503123fb816eb5fa715d387c3b937f2a6253a694876b27ae79ed342f316fa10889fe019f04e7fc558c9e9215e7b5a9eec1aac396fcdffffffffffffff7f8ca7afa141f49e39737228164bb20087aa"], 0xfdef) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[], 0xffbf) 259.243928ms ago: executing program 2 (id=1913): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x9, &(0x7f0000000300)=@raw=[@map_val={0x18, 0x9, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x28b}, @exit, @cb_func={0x18, 0xb, 0x4, 0x0, 0x5}, @ldst={0x2, 0x3, 0x4, 0x4, 0x0, 0x1, 0xffffffffffffffff}, @map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xf3}, @jmp={0x5, 0x0, 0x4, 0x4, 0xb, 0xe, 0xfffffffffffffff0}], &(0x7f0000000380)='syzkaller\x00', 0x7, 0x4d, &(0x7f00000004c0)=""/77, 0x41100, 0x65, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x5, 0x4, 0xa, 0xfffffff9}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000580)=[r1, r0, r1], &(0x7f00000005c0)=[{0x5, 0x4, 0xa, 0xb}, {0x0, 0x1, 0xe}, {0x5, 0x1, 0x4, 0x8}], 0x10, 0x40}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000080)='rxrpc_tx_data\x00', r2}, 0x5) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b70300000000002085000000720000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r6}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r5, &(0x7f00000003c0)="add23214cb861e300b4555e44d24463a2e8790182586a620c5930f2bbf31d2b49cc42629195f0e04ea5105f6a7513858f1076241d737d763", &(0x7f00000004c0)=""/77}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) mkdir(&(0x7f0000000380)='./cgroup\x00', 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x0, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x1}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='ext4_unlink_enter\x00', r7}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 246.828299ms ago: executing program 0 (id=1914): bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000100000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000e0ffffff170000001800000002000300000000000000000d0200000000000000009e7909010100000000"], &(0x7f0000000d40)=""/4096, 0x32, 0x1000, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_da_write_pages_extent\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000080), &(0x7f00000002c0)='%pI4 \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f0000000040)='ext4_da_write_pages_extent\x00'}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000280)={'lo\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_request_inode\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='vnet_rx_one\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x6023}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001040)={0x11, 0x1b, &(0x7f0000000f40)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0xf}, @exit, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @jmp={0x5, 0x0, 0x8, 0x6, 0x4, 0x40, 0x4}, @alu={0x7, 0x1, 0xb, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffff8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @printk={@lx}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x4}, @exit], &(0x7f00000002c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000a00)=[0xffffffffffffffff], &(0x7f0000000b00)=[{0x5, 0x2, 0x1, 0x1}, {0x1, 0x5, 0xa, 0x7}], 0x10, 0x7ff}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x3, 0xfffffffffffffffe, 0xa000000}], {0x95, 0x0, 0x0, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f0000000100)=""/147}, 0x90) 149.275587ms ago: executing program 2 (id=1915): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x800, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={&(0x7f0000000080)="51ab377db2dc065eb792de1218c58b565d106168", &(0x7f0000000180)=""/60, &(0x7f00000001c0)="56851cd1c0de2e163240286065ab9e1c501f1ea94bd609a2d90cd7d530f9f55d0dd8f54df6dce031503f1b291c2d1782778a43a1513857401c576f0516957066412572642e72e2ae75c20e299282e19180a5e153fa37f5c5dd2eb9d60f411d8d819fee17e9558f6c679e880d1f5643f86247dc9561d643c4571eb1", &(0x7f0000000280)="75a0b464d49228", 0x2, r0}, 0x38) syz_clone(0x4d100000, 0x0, 0x0, 0x0, 0x0, 0x0) 148.573447ms ago: executing program 0 (id=1916): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x0, 0x2, 0xb, 0xf53, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75}, 0x38) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) r2 = openat$cgroup_freezer_state(r1, &(0x7f0000000140), 0x2, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_freezer_state(r2, &(0x7f0000000400)='FROZEN\x00', 0x7) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000005c0), 0x6, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x25, &(0x7f0000000c00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1c7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@alu={0x4, 0x0, 0xd, 0xb, 0x8, 0x30, 0x10}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x1b}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @alu={0x4, 0x0, 0xb, 0x0, 0xb, 0xffffffffffffffe2, 0xfffffffffffffff0}, @exit, @alu={0x7, 0x0, 0x2, 0xd9af1e03557f6b94, 0x0, 0x100, 0xfffffffffffffff0}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x36c}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r6}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) write$cgroup_freezer_state(r2, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r4, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000500)=[0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0], 0x0, 0xf4, &(0x7f0000000700)=[{}, {}], 0x10, 0x10, &(0x7f0000000740), &(0x7f0000000880), 0x8, 0x90, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x2, 0x18, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000081000000000000000200000018110000", @ANYRES32=r0, @ANYBLOB="0000000003002200b702000014000000b703ca804a15d4579a254438cb4fbe1cbc479181f981d5e1874a0000000000008500000083000000bf09000000000000550901000000", @ANYRES32=r0, @ANYBLOB="0000000000000000852000000100000018670000100000000000000002000000088807000c00000085100000f9ffffff18580000090000000000000000000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x1, 0x8a, &(0x7f00000007c0)=""/138, 0x40f00, 0x11, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x3, 0x6, 0x1, 0x9}, 0x10, r8, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[0x1], 0x0, 0x10, 0xffffffa8}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0x0, 0x16, 0xb3, 0x7f}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 147.038457ms ago: executing program 2 (id=1917): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000100), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x6b, 0x11, 0x36}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit={0x95, 0x0, 0x33}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb8000000}, 0x70) 145.804358ms ago: executing program 2 (id=1918): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000002c0)={'team_slave_1\x00', 0x20}) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000002280)={'team_slave_0\x00', @random="bf0fd66e1ee3"}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="1e040600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r8}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'vxcan1\x00', 0x20}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)={0x1b, 0x0, 0x0, 0x8, 0x0, r4, 0xfffff000, '\x00', 0x0, r5, 0x4, 0x4, 0x4}, 0x48) ioctl$TUNSETQUEUE(r9, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 100.925422ms ago: executing program 3 (id=1919): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000), 0xe) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r1}, &(0x7f0000000000), &(0x7f0000000040)=r1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x8, 0xffff0000, 0x1, 0x2c, r1, 0x27, '\x00', 0x0, r1, 0x2, 0x3, 0x0, 0xe}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x7}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001200)={{r3}, &(0x7f0000001180), &(0x7f00000011c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r2}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 99.851872ms ago: executing program 1 (id=1920): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x8f, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b62063", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYRES64=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x19, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="8f0ccb7907081175f37538e486dd"], 0xfdef) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[], 0xffbf) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x10001, 0x0, 0x0, 0x200, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x2d}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) 63.191824ms ago: executing program 0 (id=1921): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000088fe508a8500000004000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082b00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x16, 0x3, 0x8, 0x8, 0x502, r2, 0x6, '\x00', 0x0, r4, 0x0, 0x5, 0x2}, 0x48) bpf$ENABLE_STATS(0x20, &(0x7f0000000080), 0x4) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000088fe508a8500000004000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082b00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x16, 0x3, 0x8, 0x8, 0x502, r2, 0x6, '\x00', 0x0, r4, 0x0, 0x5, 0x2}, 0x48) (async) bpf$ENABLE_STATS(0x20, &(0x7f0000000080), 0x4) (async) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 61.784645ms ago: executing program 1 (id=1922): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, &(0x7f0000001380)=[0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xdc, &(0x7f0000001400)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x48, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', r0, 0xffffffffffffffff, 0x1, 0xfffffffd}, 0xffffffffffffff7e) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x3, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000280), 0x75, r2}, 0x38) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000711212000000000095000000000000000f80b0303defef28ba94ff8c71822bf00afd021201e8b20bad09087c4c35c3b3370517bf9ebbbefb68d456c0d5809b94d6a145556e497ee8df60df8740078fb7e290baa6e384550c34466fb0a9484afbf6ac9b992e567b7fe835fe85975b6f52154035a9d890bc4f4f9ddf31c2b3e58f18afcebfadda5de996b7fd79ca33e92b8f512d9a6196a6915202a7c0ef1b9f00f443eaf34e05bc77ad44bd9052e8a3b79ee1e2edad1873b0bbb43d62ee65b0240bee375c10d4360e9151d3bca8ada04a59202f43697bfd5f7f7d8a9bb13a14d6ef9d91"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0xe) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', r5}, 0x18) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xf, 0x1b, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000018010000786c6c2500000000102020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000007000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r8, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x5c, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r9}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x90) (async) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000004c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffff8}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r10}, 0x10) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 60.140415ms ago: executing program 2 (id=1923): r0 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x80, 0x6, 0x0, 0x0, 0x87, 0x0, 0x81, 0x10220, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0x240, 0x9, 0x5, 0xd1fa1ff88b46da42, 0x6, 0x8, 0x914, 0x0, 0xfe00, 0x0, 0x800}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x102843}, 0x0, 0x4, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000050000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000004c0)={{r2}, &(0x7f00000003c0), &(0x7f0000000400)='%pi6 \x00'}, 0x20) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r1}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) close(r3) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000680)={&(0x7f0000000040), 0x0, &(0x7f0000000240)="6f5b9d5016b214f69e1a1a15e866d95512c7521b", 0x0, 0x6}, 0x38) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xb, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x22}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r7, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r8}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1c9826cd, 0x0, 0x0, 0xfffffffffffffe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000980)=0x3c) 59.868105ms ago: executing program 1 (id=1924): unlink(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x89f0, &(0x7f0000002280)={'ip6tnl0\x00', @link_local}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r5) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000880)=ANY=[@ANYBLOB="05000000000000007111a300000000008510000002000000850000003400000095000000000000009500a50500000000e711c67fd6e792313b4072f25b14cfe846310b6a0ab5e45ff8c47c37342206535c2df8f794abf0237126ee71861bd8"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) 0s ago: executing program 4 (id=1925): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x1, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000200), &(0x7f0000000080), 0xce, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='qdisc_create\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000fc0)={&(0x7f0000003780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd8, 0xd8, 0x6, [@union={0x6, 0x1, 0x0, 0x5, 0x1, 0xff, [{0xe, 0x2, 0xffffffff}]}, @struct={0x2, 0x3, 0x0, 0x4, 0x1, 0xbe, [{0xc, 0x0, 0x1}, {0xfffffffe, 0x0, 0x1c}, {0xb, 0x1, 0x7}]}, @struct={0x10, 0xa, 0x0, 0x4, 0x0, 0x4, [{0x7, 0x3, 0x1}, {0x5, 0x1, 0x1}, {0xa, 0x4, 0x4}, {0x10, 0x2, 0x4e4d0fa1}, {0xc, 0x4, 0x4}, {0xe, 0x2, 0x8000}, {0xb, 0x2, 0xa1a6}, {0x1, 0x2, 0x1}, {0x6}, {0xd, 0x2, 0x5}]}, @typedef={0x4}]}, {0x0, [0x61, 0x0, 0x2e, 0x5f]}}, &(0x7f0000001080)=""/103, 0xf6, 0x67, 0x0, 0x1}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001240)={0x400, 0x0}, 0x8) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r9, @ANYRESOCT=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0x5, 0x34, &(0x7f0000003880)=ANY=[@ANYBLOB="1800000005000000000000000100000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000186900000c0000000000000004000000b7080000000000007b8af8ff00000000b7080000001000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000037781800fcffffff950000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000010000008500000006000000186100000b000000000000000900000018110000", @ANYRES32=r4, @ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x7c09d91b, 0x1000, &(0x7f0000002780)=""/4096, 0x40f00, 0x18, '\x00', 0x0, 0x28, r6, 0x8, &(0x7f0000001100)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000001200)={0x5, 0x0, 0x10000, 0x22}, 0x10, r7, r5, 0x3, &(0x7f0000001280), &(0x7f0000001340)=[{0x4, 0x3, 0x6, 0xf}, {0x4, 0x4, 0xc, 0x4}, {0x3, 0x4, 0xc, 0x7}], 0x10, 0xffffffff}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000001180)=ANY=[@ANYBLOB="00000000ab828371478cfcbd8bf92e75932af0f0000000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009542000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)) kernel console output (not intermixed with test programs): [ 3.143218][ T24] audit: type=1400 audit(1720293992.569:9): avc: denied { append open } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3.146192][ T24] audit: type=1400 audit(1720293992.569:10): avc: denied { getattr } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3.383385][ T92] udevd[92]: starting version 3.2.11 [ 3.438677][ T93] udevd[93]: starting eudev-3.2.11 [ 12.247282][ T24] kauditd_printk_skb: 50 callbacks suppressed [ 12.247292][ T24] audit: type=1400 audit(1720294001.689:61): avc: denied { transition } for pid=218 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.251048][ T24] audit: type=1400 audit(1720294001.689:62): avc: denied { noatsecure } for pid=218 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.253544][ T24] audit: type=1400 audit(1720294001.689:63): avc: denied { write } for pid=218 comm="sh" path="pipe:[12987]" dev="pipefs" ino=12987 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 12.256681][ T24] audit: type=1400 audit(1720294001.689:64): avc: denied { rlimitinh } for pid=218 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.259106][ T24] audit: type=1400 audit(1720294001.689:65): avc: denied { siginh } for pid=218 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.123' (ED25519) to the list of known hosts. [ 18.887409][ T24] audit: type=1400 audit(1720294008.329:66): avc: denied { mounton } for pid=272 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 18.888372][ T272] cgroup: Unknown subsys name 'net' [ 18.890388][ T24] audit: type=1400 audit(1720294008.329:67): avc: denied { mount } for pid=272 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.893937][ T24] audit: type=1400 audit(1720294008.329:68): avc: denied { unmount } for pid=272 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.894070][ T272] cgroup: Unknown subsys name 'devices' [ 19.138066][ T272] cgroup: Unknown subsys name 'hugetlb' [ 19.143467][ T272] cgroup: Unknown subsys name 'rlimit' [ 19.334321][ T24] audit: type=1400 audit(1720294008.769:69): avc: denied { setattr } for pid=272 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.357285][ T24] audit: type=1400 audit(1720294008.769:70): avc: denied { mounton } for pid=272 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 19.379370][ T274] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 19.381767][ T24] audit: type=1400 audit(1720294008.769:71): avc: denied { mount } for pid=272 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 19.413282][ T24] audit: type=1400 audit(1720294008.859:72): avc: denied { relabelto } for pid=274 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.438773][ T24] audit: type=1400 audit(1720294008.859:73): avc: denied { write } for pid=274 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.467175][ T24] audit: type=1400 audit(1720294008.909:74): avc: denied { read } for pid=272 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.492497][ T24] audit: type=1400 audit(1720294008.909:75): avc: denied { open } for pid=272 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.492627][ T272] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 19.922230][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.929101][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.936289][ T281] device bridge_slave_0 entered promiscuous mode [ 19.947983][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.954814][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.962135][ T282] device bridge_slave_0 entered promiscuous mode [ 19.968756][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.975667][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.982952][ T282] device bridge_slave_1 entered promiscuous mode [ 19.989331][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.996148][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.003401][ T281] device bridge_slave_1 entered promiscuous mode [ 20.072859][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.079897][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.087154][ T284] device bridge_slave_0 entered promiscuous mode [ 20.093679][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.100557][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.107609][ T284] device bridge_slave_1 entered promiscuous mode [ 20.113999][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.121050][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.128165][ T283] device bridge_slave_0 entered promiscuous mode [ 20.136501][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.143338][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.150563][ T283] device bridge_slave_1 entered promiscuous mode [ 20.158920][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.165743][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.172973][ T285] device bridge_slave_0 entered promiscuous mode [ 20.181328][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.188233][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.195356][ T285] device bridge_slave_1 entered promiscuous mode [ 20.281725][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.288581][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.295659][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.302484][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.356430][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.364780][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.374486][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.381766][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.404677][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.418739][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.432777][ T281] device veth0_vlan entered promiscuous mode [ 20.448104][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.456264][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.464097][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.471517][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.479339][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.497181][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.504304][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.511487][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.519437][ T54] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.526250][ T54] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.533965][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.541863][ T54] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.548614][ T54] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.555744][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.563494][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.571314][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.580517][ T281] device veth1_macvtap entered promiscuous mode [ 20.596586][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.604341][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.612651][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.620846][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.628147][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.644231][ T282] device veth0_vlan entered promiscuous mode [ 20.650525][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.658845][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.679747][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.687008][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.694997][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.701856][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.709801][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.717858][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.724671][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.731891][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.747184][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.755078][ T15] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.761853][ T15] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.769550][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.777601][ T15] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.784500][ T15] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.791768][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.799477][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.807588][ T281] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 20.811227][ T282] device veth1_macvtap entered promiscuous mode [ 20.839448][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.847868][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.855926][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.876880][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.884885][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.893144][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.915247][ T285] device veth0_vlan entered promiscuous mode [ 20.923613][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.931928][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.939456][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.947227][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.962852][ T284] device veth0_vlan entered promiscuous mode [ 20.981334][ T285] device veth1_macvtap entered promiscuous mode [ 20.992146][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.002145][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.010636][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.018486][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.026224][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.033699][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.041140][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 21.049544][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.057849][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.064705][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.072118][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.080504][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.088710][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.095545][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.104149][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.112244][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.120375][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.133174][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.142454][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.149822][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.183396][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.192065][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.200397][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.208420][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.216242][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.226789][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.235176][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.243497][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.268828][ T333] device syzkaller0 entered promiscuous mode [ 21.280732][ T284] device veth1_macvtap entered promiscuous mode [ 21.295891][ T283] device veth0_vlan entered promiscuous mode [ 21.312124][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.320482][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.328755][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.336109][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.344293][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.352429][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.360233][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.383889][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.394372][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.402798][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.415029][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.423429][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.431532][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.443980][ T283] device veth1_macvtap entered promiscuous mode [ 21.464538][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.480173][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.491407][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.514320][ T341] device syzkaller0 entered promiscuous mode [ 21.526782][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.535676][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.552611][ T352] device pim6reg1 entered promiscuous mode [ 21.560581][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.568761][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.636318][ C0] hrtimer: interrupt took 27291 ns [ 21.818799][ T366] ʮ}p: renamed from pim6reg1 [ 23.093168][ T427] cgroup: syz.4.35 (427) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 23.196170][ T427] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 23.304928][ T459] device veth1_macvtap left promiscuous mode [ 23.375148][ T472] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.382197][ T472] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.667908][ T532] device syzkaller0 entered promiscuous mode [ 23.695012][ T535] device syzkaller0 entered promiscuous mode [ 23.799983][ T551] syz.0.70[551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 23.800051][ T551] syz.0.70[551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.074594][ T590] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.092496][ T590] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.356065][ T24] kauditd_printk_skb: 46 callbacks suppressed [ 24.356074][ T24] audit: type=1400 audit(1720294013.789:122): avc: denied { create } for pid=607 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 24.724063][ T621] device syzkaller0 entered promiscuous mode [ 24.814410][ T631] device syzkaller0 entered promiscuous mode [ 25.067648][ T657] device syzkaller0 entered promiscuous mode [ 26.043688][ T24] audit: type=1400 audit(1720294015.479:123): avc: denied { create } for pid=703 comm="syz.0.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 26.602871][ T716] device pim6reg1 entered promiscuous mode [ 26.960222][ T757] syz.0.123[757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.960269][ T757] syz.0.123[757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.136898][ T24] audit: type=1400 audit(1720294016.569:124): avc: denied { create } for pid=773 comm="syz.0.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.183066][ T778] device wg2 entered promiscuous mode [ 27.890499][ T24] audit: type=1400 audit(1720294017.329:125): avc: denied { write } for pid=807 comm="syz.1.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.026398][ T24] audit: type=1400 audit(1720294017.439:126): avc: denied { read } for pid=75 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 28.356934][ T24] audit: type=1400 audit(1720294017.799:127): avc: denied { read } for pid=819 comm="syz.0.141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.746753][ T24] audit: type=1400 audit(1720294018.189:128): avc: denied { setopt } for pid=851 comm="syz.2.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.773203][ T858] device pim6reg1 entered promiscuous mode [ 29.068138][ T863] device pim6reg1 entered promiscuous mode [ 29.128425][ T879] device syzkaller0 entered promiscuous mode [ 29.135745][ T876] device wg2 entered promiscuous mode [ 29.143536][ T876] tap0: tun_chr_ioctl cmd 1074025677 [ 29.149182][ T876] tap0: linktype set to 704 [ 29.185015][ T884] device syzkaller0 entered promiscuous mode [ 29.212580][ T891] syz.1.160[891] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.212633][ T891] syz.1.160[891] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.227153][ T891] syz.1.160[891] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.239694][ T891] syz.1.160[891] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.323678][ T893] device syzkaller0 entered promiscuous mode [ 30.616405][ T24] audit: type=1400 audit(1720294020.049:129): avc: denied { create } for pid=931 comm="syz.1.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 30.728016][ T940] geneve1: tun_chr_ioctl cmd 1074025672 [ 30.761824][ T940] geneve1: ignored: set checksum enabled [ 31.391303][ T972] device veth1_macvtap left promiscuous mode [ 31.638896][ T981] : renamed from vlan0 [ 31.999419][ T1003] device wg2 left promiscuous mode [ 32.006174][ T1003] device wg2 entered promiscuous mode [ 32.014435][ T1003] syz.3.196[1003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.014590][ T1003] syz.3.196[1003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.049157][ T1003] syz.3.196[1003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.062169][ T1003] syz.3.196[1003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.153366][ T1014] device wg2 entered promiscuous mode [ 32.627804][ T1032] device veth0_vlan left promiscuous mode [ 32.640470][ T1032] device veth0_vlan entered promiscuous mode [ 32.740140][ T1039] syz.4.207[1039] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.740196][ T1039] syz.4.207[1039] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.821485][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.877644][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 32.885118][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.945274][ T1050] device syzkaller0 entered promiscuous mode [ 33.008337][ T1064] device syzkaller0 entered promiscuous mode [ 33.014844][ T1059] : renamed from vlan0 [ 33.424812][ T1093] device syzkaller0 entered promiscuous mode [ 33.757544][ T1104] ------------[ cut here ]------------ [ 33.781179][ T1104] trace type BPF program uses run-time allocation [ 33.787844][ T1104] WARNING: CPU: 0 PID: 1104 at kernel/bpf/verifier.c:10480 check_map_prog_compatibility+0x65b/0x7c0 [ 33.802720][ T1104] Modules linked in: [ 33.888203][ T1104] CPU: 0 PID: 1104 Comm: syz.1.226 Not tainted 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 33.923676][ T1104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 33.966874][ T1104] RIP: 0010:check_map_prog_compatibility+0x65b/0x7c0 [ 33.978941][ T1104] Code: c8 e9 84 fe ff ff e8 44 f5 ee ff 31 db e9 85 fe ff ff e8 38 f5 ee ff c6 05 8e ef 64 05 01 48 c7 c7 e0 71 45 85 e8 55 7f c2 ff <0f> 0b e9 42 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 17 fa ff [ 34.149435][ T1104] RSP: 0018:ffffc90000f46f90 EFLAGS: 00010246 [ 34.155339][ T1104] RAX: a2e528995b3d5e00 RBX: ffff888115178800 RCX: 0000000000040000 [ 34.168096][ T1104] RDX: ffffc9000133c000 RSI: 00000000000007e9 RDI: 00000000000007ea [ 34.187666][ T1104] RBP: ffffc90000f46fd0 R08: ffffffff81521de8 R09: ffffed103ee0a5f8 [ 34.209995][ T1104] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 34.220434][ T1104] R13: 1ffff92000015a04 R14: ffff888112490000 R15: ffffc900000ad020 [ 34.228298][ T1104] FS: 00007f9710d296c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 34.237241][ T1104] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 34.243815][ T1104] CR2: 000000110c2a2f43 CR3: 000000010eb26000 CR4: 00000000003506b0 [ 34.251833][ T1104] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 34.259884][ T1104] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 34.268477][ T1104] Call Trace: [ 34.271728][ T1104] ? show_regs+0x58/0x60 [ 34.275794][ T1104] ? __warn+0x160/0x2f0 [ 34.279819][ T1104] ? check_map_prog_compatibility+0x65b/0x7c0 [ 34.285915][ T1104] ? report_bug+0x3d9/0x5b0 [ 34.294002][ T1104] ? check_map_prog_compatibility+0x65b/0x7c0 [ 34.300142][ T1104] ? handle_bug+0x41/0x70 [ 34.304354][ T1104] ? exc_invalid_op+0x1b/0x50 [ 34.309050][ T1104] ? asm_exc_invalid_op+0x12/0x20 [ 34.313957][ T1104] ? wake_up_klogd+0xb8/0xf0 [ 34.318530][ T1104] ? check_map_prog_compatibility+0x65b/0x7c0 [ 34.324556][ T1104] ? __fdget+0x1bc/0x240 [ 34.329921][ T1104] resolve_pseudo_ldimm64+0x586/0x1020 [ 34.335290][ T1104] ? bpf_check+0xf2b0/0xf2b0 [ 34.340160][ T1104] ? kvmalloc_node+0x82/0x130 [ 34.344680][ T1104] bpf_check+0xaf21/0xf2b0 [ 34.349165][ T1104] ? stack_depot_save+0xe/0x10 [ 34.353737][ T1104] ? __se_sys_bpf+0x9856/0x11cb0 [ 34.375385][ T1128] device syzkaller0 entered promiscuous mode [ 34.381286][ T1104] ? sched_clock+0x3a/0x40 [ 34.385452][ T1104] ? 0xffffffffa0030104 [ 34.389783][ T1104] ? bpf_get_btf_vmlinux+0x60/0x60 [ 34.396517][ T1104] ? __kernel_text_address+0x9b/0x110 [ 34.401721][ T1104] ? unwind_get_return_address+0x4d/0x90 [ 34.415867][ T1104] ? arch_stack_walk+0xf3/0x140 [ 34.429358][ T1104] ? stack_trace_save+0x113/0x1c0 [ 34.437360][ T1104] ? stack_trace_snprint+0xf0/0xf0 [ 34.446529][ T1104] ? stack_trace_snprint+0xf0/0xf0 [ 34.451462][ T1104] ? selinux_bpf_prog_alloc+0x51/0x140 [ 34.475690][ T1104] ? selinux_bpf_prog_alloc+0x51/0x140 [ 34.524782][ T1104] ? ____kasan_kmalloc+0xed/0x110 [ 34.561770][ T1104] ? ____kasan_kmalloc+0xdb/0x110 [ 34.574668][ T1104] ? __kasan_kmalloc+0x9/0x10 [ 34.584039][ T1104] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 34.596508][ T1104] ? selinux_bpf_prog_alloc+0x51/0x140 [ 34.601810][ T1104] ? security_bpf_prog_alloc+0x62/0x90 [ 34.607498][ T1104] ? __se_sys_bpf+0x9f8c/0x11cb0 [ 34.618966][ T1104] ? __x64_sys_bpf+0x7b/0x90 [ 34.633747][ T1104] ? do_syscall_64+0x34/0x70 [ 34.638439][ T1104] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 34.645340][ T1104] ? __kasan_kmalloc+0x9/0x10 [ 34.650209][ T1104] __se_sys_bpf+0x107a2/0x11cb0 [ 34.655286][ T1104] ? futex_wait+0x6a0/0x7c0 [ 34.660819][ T1104] ? __x64_sys_bpf+0x90/0x90 [ 34.665293][ T1104] ? do_futex+0x17b0/0x17b0 [ 34.675967][ T1104] ? do_futex+0x139a/0x17b0 [ 34.685842][ T1104] ? __rtnl_unlock+0x77/0x80 [ 34.694841][ T1104] ? netdev_run_todo+0xd5a/0xdc0 [ 34.702072][ T1104] ? netdev_refcnt_read+0x1e0/0x1e0 [ 34.707268][ T1104] ? futex_exit_release+0x1e0/0x1e0 [ 34.712365][ T1104] ? check_stack_object+0xf4/0x130 [ 34.718073][ T1104] ? __kasan_check_read+0x11/0x20 [ 34.723001][ T1104] ? rtnl_unlock+0xe/0x10 [ 34.727423][ T1104] ? __tun_chr_ioctl+0xae9/0x2260 [ 34.732297][ T1104] ? __se_sys_futex+0x355/0x470 [ 34.737217][ T1104] ? __fget_files+0x31e/0x380 [ 34.741746][ T1104] ? fpu__clear_all+0x20/0x20 [ 34.746250][ T1104] ? __kasan_check_read+0x11/0x20 [ 34.751208][ T1104] __x64_sys_bpf+0x7b/0x90 [ 34.755492][ T1104] do_syscall_64+0x34/0x70 [ 34.760031][ T1104] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 34.765838][ T1104] RIP: 0033:0x7f9711aa7bd9 [ 34.781127][ T1104] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.807603][ T1104] RSP: 002b:00007f9710d29048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 34.825788][ T1104] RAX: ffffffffffffffda RBX: 00007f9711c35f60 RCX: 00007f9711aa7bd9 [ 34.949533][ T1104] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 34.964881][ T1104] RBP: 00007f9711b16aa1 R08: 0000000000000000 R09: 0000000000000000 [ 35.082146][ T1104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 35.163239][ T1104] R13: 000000000000000b R14: 00007f9711c35f60 R15: 00007ffd00c91e08 [ 35.180522][ T1104] ---[ end trace 76d7b288ca051524 ]--- [ 35.566938][ T1175] device syzkaller0 entered promiscuous mode [ 36.864684][ T1224] 0: renamed from pim6reg1 [ 37.054385][ T1237] device pim6reg1 entered promiscuous mode [ 37.510740][ T1264] syz.1.272[1264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.510779][ T1264] syz.1.272[1264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.651181][ T24] audit: type=1400 audit(1720294027.079:130): avc: denied { create } for pid=1278 comm="syz.0.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 37.801295][ T1281] tun0: tun_chr_ioctl cmd 1074025692 [ 37.847890][ T24] audit: type=1400 audit(1720294027.289:131): avc: denied { create } for pid=1294 comm="syz.0.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 37.954281][ T1311] device pim6reg1 entered promiscuous mode [ 39.900348][ T24] audit: type=1400 audit(1720294029.339:132): avc: denied { create } for pid=1338 comm="syz.0.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 40.396806][ T24] audit: type=1400 audit(1720294029.839:133): avc: denied { create } for pid=1357 comm="syz.0.299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 40.624261][ T1366] device macsec0 entered promiscuous mode [ 40.632923][ T1363] device veth1_macvtap left promiscuous mode [ 40.638739][ T1363] device macsec0 left promiscuous mode [ 41.365998][ T24] audit: type=1400 audit(1720294030.799:134): avc: denied { tracepoint } for pid=1449 comm="syz.3.323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 42.482786][ T24] audit: type=1400 audit(1720294031.919:135): avc: denied { create } for pid=1509 comm="syz.0.342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 42.735082][ T1525] device pim6reg1 entered promiscuous mode [ 42.757899][ T1527] device pim6reg1 entered promiscuous mode [ 42.970819][ T24] audit: type=1400 audit(1720294032.409:136): avc: denied { create } for pid=1604 comm="syz.2.363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 43.406943][ T1655] device veth0_vlan left promiscuous mode [ 43.412803][ T1655] device veth0_vlan entered promiscuous mode [ 43.616919][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 43.629418][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 43.643057][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 44.054308][ T1712] device syzkaller0 entered promiscuous mode [ 44.568101][ T24] audit: type=1400 audit(1720294034.009:137): avc: denied { ioctl } for pid=1741 comm="syz.1.404" path="socket:[18843]" dev="sockfs" ino=18843 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 44.607113][ T1742] device syzkaller0 entered promiscuous mode [ 44.656341][ T1748] device syzkaller0 entered promiscuous mode [ 45.711038][ T24] audit: type=1400 audit(1720294035.149:138): avc: denied { create } for pid=1803 comm="syz.1.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 45.780312][ T1763] device syzkaller0 entered promiscuous mode [ 45.799811][ T24] audit: type=1400 audit(1720294035.239:139): avc: denied { append } for pid=1805 comm="syz.4.420" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 45.824139][ T1797] device macsec0 entered promiscuous mode [ 45.858531][ T1827] device syzkaller0 entered promiscuous mode [ 45.944259][ T1847] bridge_slave_0: mtu greater than device maximum [ 46.081846][ T1864] device syzkaller0 entered promiscuous mode [ 46.137624][ T1866] device veth0_vlan left promiscuous mode [ 46.144144][ T1866] device veth0_vlan entered promiscuous mode [ 47.088487][ T1891] syz.4.446 (1891) used obsolete PPPIOCDETACH ioctl [ 47.152909][ T1905] device syzkaller0 entered promiscuous mode [ 47.448776][ T1922] device syzkaller0 entered promiscuous mode [ 47.591408][ T1938] tap0: tun_chr_ioctl cmd 1074025677 [ 47.596539][ T1938] tap0: linktype set to 805 [ 48.293810][ T24] audit: type=1400 audit(1720294037.729:140): avc: denied { create } for pid=1979 comm="syz.0.474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 48.605326][ T1975] device syzkaller0 entered promiscuous mode [ 48.858304][ T24] audit: type=1400 audit(1720294038.299:141): avc: denied { create } for pid=2013 comm="syz.1.485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 50.009729][ T2106] device pim6reg1 entered promiscuous mode [ 51.146298][ T24] audit: type=1400 audit(1720294040.579:142): avc: denied { create } for pid=2180 comm="syz.2.529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 52.696237][ T2224] device syzkaller0 entered promiscuous mode [ 52.856891][ T2226] device syzkaller0 entered promiscuous mode [ 52.922853][ T2235] device pim6reg1 entered promiscuous mode [ 53.232686][ T2293] syz.2.561 uses obsolete (PF_INET,SOCK_PACKET) [ 53.393476][ T2315] syz.4.567[2315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.393522][ T2315] syz.4.567[2315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.540911][ T2346] device syzkaller0 entered promiscuous mode [ 54.073602][ T2387] device syzkaller0 entered promiscuous mode [ 54.842471][ T2402] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.849759][ T2402] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.857710][ T2402] device bridge_slave_0 entered promiscuous mode [ 54.864764][ T2402] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.872051][ T2402] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.927903][ T2402] device bridge_slave_1 entered promiscuous mode [ 55.023942][ T24] audit: type=1400 audit(1720294044.459:143): avc: denied { create } for pid=2448 comm="syz.0.597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 55.084935][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.096207][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.185426][ T2331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.193582][ T2331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.201660][ T2331] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.208513][ T2331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.215656][ T2331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.223774][ T2331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.231707][ T2331] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.238543][ T2331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.245673][ T2331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.253371][ T2331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.261274][ T2331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.286216][ T2331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 55.297301][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 55.305009][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 55.312324][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 55.320641][ T2402] device veth0_vlan entered promiscuous mode [ 55.333140][ T2402] device veth1_macvtap entered promiscuous mode [ 55.347451][ T288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 55.363509][ T2331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 55.376179][ T2331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 55.393455][ T24] audit: type=1400 audit(1720294044.829:144): avc: denied { mounton } for pid=2402 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=357 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 55.865518][ T2522] device syzkaller0 entered promiscuous mode [ 55.977574][ T2539] device syzkaller0 entered promiscuous mode [ 56.091164][ T2550] syz.0.625[2550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.091215][ T2550] syz.0.625[2550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.184887][ T2560] syz.0.630[2560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.239082][ T2565] syz.0.630[2565] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.242700][ T2561] syz.0.630[2561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.265856][ T2560] syz.0.630[2560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.278994][ T2565] syz.0.630[2565] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.282098][ T2561] syz.0.630[2561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.682344][ T2579] device syzkaller0 entered promiscuous mode [ 56.770016][ T2589] device pim6reg1 entered promiscuous mode [ 57.589348][ T2645] device pim6reg1 entered promiscuous mode [ 57.768977][ T24] audit: type=1400 audit(1720294047.209:145): avc: denied { create } for pid=2669 comm="syz.3.662" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 57.827548][ T2672] device syzkaller0 entered promiscuous mode [ 57.924434][ T2684] device veth1_macvtap left promiscuous mode [ 57.939894][ T2684] device macsec0 entered promiscuous mode [ 57.946949][ T2685] device veth1_macvtap entered promiscuous mode [ 59.221675][ T2856] device syzkaller0 entered promiscuous mode [ 59.332497][ T2878] syz.1.710[2878] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.332549][ T2878] syz.1.710[2878] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.627053][ T2920] device sit0 entered promiscuous mode [ 59.788576][ T2929] device syzkaller0 entered promiscuous mode [ 59.798435][ T2935] device sit0 entered promiscuous mode [ 59.944811][ T2948] device vxcan1 entered promiscuous mode [ 59.954531][ T2951] device pim6reg1 entered promiscuous mode [ 61.085614][ T3060] device syzkaller0 entered promiscuous mode [ 61.130926][ T24] audit: type=1400 audit(1720294050.569:146): avc: denied { create } for pid=3069 comm="syz.1.769" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 61.629198][ T3144] device dummy0 entered promiscuous mode [ 61.872759][ T3155] device syzkaller0 entered promiscuous mode [ 62.951818][ T3215] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.959198][ T3215] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.967304][ T3215] device bridge_slave_0 entered promiscuous mode [ 62.989375][ T3215] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.012492][ T3215] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.041804][ T3215] device bridge_slave_1 entered promiscuous mode [ 63.075790][ T3243] syz.0.816[3243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.075841][ T3243] syz.0.816[3243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.248568][ T3215] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.266539][ T3215] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.273619][ T3215] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.280434][ T3215] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.738515][ T24] audit: type=1400 audit(1720294053.179:147): avc: denied { create } for pid=3255 comm="syz.0.819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 63.768849][ T845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.864317][ T845] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.884554][ T845] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.954176][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.969967][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.985072][ T303] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.991961][ T303] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.004300][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.012793][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.029618][ T303] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.036509][ T303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.049807][ T3269] device pim6reg1 entered promiscuous mode [ 64.066176][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 64.074561][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 64.082347][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 64.090857][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 64.107204][ T3215] device veth0_vlan entered promiscuous mode [ 64.113342][ T288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 64.121715][ T288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 64.129919][ T288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 64.137786][ T288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 64.152187][ T288] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 64.164597][ T288] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 64.182051][ T3215] device veth1_macvtap entered promiscuous mode [ 64.192562][ T845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 64.204232][ T845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 64.216869][ T845] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 64.236226][ T288] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 64.246895][ T288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 64.255316][ T288] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 64.264166][ T288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 64.283680][ T3297] syz.1.833[3297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.283731][ T3297] syz.1.833[3297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.443585][ T3313] device syzkaller0 entered promiscuous mode [ 64.497735][ T3323] syz.4.841[3323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.497792][ T3323] syz.4.841[3323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.547588][ T110] device bridge_slave_1 left promiscuous mode [ 64.616621][ T110] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.689663][ T110] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.105343][ T3337] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.119425][ T3337] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.126766][ T3337] device bridge_slave_0 entered promiscuous mode [ 65.133855][ T3337] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.142462][ T3337] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.149713][ T3337] device bridge_slave_1 entered promiscuous mode [ 65.198078][ T3357] device syzkaller0 entered promiscuous mode [ 65.218376][ T3371] syz.4.854[3371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.218421][ T3371] syz.4.854[3371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.236620][ T3378] device pim6reg1 entered promiscuous mode [ 65.309217][ T3337] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.316099][ T3337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.323178][ T3337] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.329967][ T3337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.372538][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.394693][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.424021][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.470045][ T3399] device syzkaller0 entered promiscuous mode [ 65.483791][ T3399] syz.0.863[3399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.483833][ T3399] syz.0.863[3399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.502435][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.523612][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.530485][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.539573][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.551997][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.558865][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.583108][ T3406] tun0: tun_chr_ioctl cmd 1074025673 [ 65.589210][ T3407] tun0: tun_chr_ioctl cmd 2148553947 [ 65.600462][ T836] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 65.608532][ T836] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 65.707326][ T3406] device syzkaller0 entered promiscuous mode [ 65.752963][ T599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 65.779938][ T3337] device veth0_vlan entered promiscuous mode [ 65.797982][ T846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 65.805960][ T3436] syz.4.873[3436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.806007][ T3436] syz.4.873[3436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.820822][ T846] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 65.839946][ T846] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 65.858744][ T3437] syz.4.873[3437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.858750][ T3436] syz.4.873[3436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.878393][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 65.899514][ T3337] device veth1_macvtap entered promiscuous mode [ 65.918944][ T2331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 65.948656][ T3442] device syzkaller0 entered promiscuous mode [ 65.981086][ T2331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 66.780611][ T3480] device syzkaller0 entered promiscuous mode [ 67.208538][ T3542] bridge0: port 3(veth0_to_batadv) entered blocking state [ 67.219549][ T3542] bridge0: port 3(veth0_to_batadv) entered disabled state [ 67.227950][ T3542] device veth0_to_batadv entered promiscuous mode [ 67.234287][ T3542] bridge0: port 3(veth0_to_batadv) entered blocking state [ 67.241180][ T3542] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 67.262335][ T3544] device syzkaller0 entered promiscuous mode [ 68.952704][ T24] audit: type=1400 audit(1720294058.389:148): avc: denied { create } for pid=3634 comm="syz.4.931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 69.082317][ T3649] device pim6reg1 entered promiscuous mode [ 70.043303][ T3697] bridge0: port 3(veth0_to_batadv) entered blocking state [ 70.088338][ T3697] bridge0: port 3(veth0_to_batadv) entered disabled state [ 70.195164][ T3697] device veth0_to_batadv entered promiscuous mode [ 70.266675][ T3697] bridge0: port 3(veth0_to_batadv) entered blocking state [ 70.273617][ T3697] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 70.474016][ T3697] device syzkaller0 entered promiscuous mode [ 71.262638][ T3775] bpf_get_probe_write_proto: 4 callbacks suppressed [ 71.262647][ T3775] syz.0.968[3775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.269480][ T3775] syz.0.968[3775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.283257][ T3778] device syzkaller0 entered promiscuous mode [ 71.301358][ T3775] syz.0.968[3775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.301408][ T3775] syz.0.968[3775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.375731][ T24] audit: type=1400 audit(1720294060.809:149): avc: denied { create } for pid=3781 comm="syz.2.970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 72.397434][ T3864] : renamed from pim6reg1 [ 72.518558][ T24] audit: type=1400 audit(1720294061.959:150): avc: denied { create } for pid=3880 comm="syz.2.1001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 72.954689][ T3927] device pim6reg1 entered promiscuous mode [ 73.605478][ T3980] device syzkaller0 entered promiscuous mode [ 73.724058][ T3980] : renamed from vlan0 [ 74.107633][ T4020] syz.1.1044[4020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.107700][ T4020] syz.1.1044[4020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.163811][ T4022] syz.1.1044[4022] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.519271][ T4094] syz.1.1062[4094] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.533292][ T4094] syz.1.1062[4094] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.589182][ T4115] device veth1_macvtap left promiscuous mode [ 74.644588][ T4115] device veth1_macvtap entered promiscuous mode [ 74.651944][ T4115] device macsec0 entered promiscuous mode [ 74.716049][ T4133] device pim6reg1 entered promiscuous mode [ 74.875014][ T4149] device veth0_vlan left promiscuous mode [ 74.889644][ T4149] device veth0_vlan entered promiscuous mode [ 75.022791][ T784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 75.036262][ T784] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 75.059460][ T784] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 75.072549][ T4150] device pim6reg1 entered promiscuous mode [ 75.661556][ T4165] device veth0_vlan left promiscuous mode [ 75.692681][ T4165] device veth0_vlan entered promiscuous mode [ 75.940645][ T4197] 5: renamed from ipvlan1 [ 76.378496][ T24] audit: type=1400 audit(1720294065.819:151): avc: denied { create } for pid=4263 comm="syz.2.1114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 76.403499][ T4262] device veth1_macvtap left promiscuous mode [ 76.430646][ T4262] device macsec0 left promiscuous mode [ 76.461589][ T4266] device pim6reg1 entered promiscuous mode [ 76.574247][ T4262] device pim6reg1 entered promiscuous mode [ 76.649274][ T4287] device lo entered promiscuous mode [ 77.522868][ T4329] syz.3.1135[4329] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.522920][ T4329] syz.3.1135[4329] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.675684][ T4336] syz.3.1135[4336] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.711612][ T4336] syz.3.1135[4336] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.366078][ T4373] device syzkaller0 entered promiscuous mode [ 78.404944][ T4371] device syzkaller0 entered promiscuous mode [ 78.880952][ T4379] device syzkaller0 entered promiscuous mode [ 78.901603][ T4389] device syzkaller0 entered promiscuous mode [ 80.285359][ T4490] syz.4.1177[4490] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.285411][ T4490] syz.4.1177[4490] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.461570][ T4503] device syzkaller0 entered promiscuous mode [ 80.594826][ T4522] device syzkaller0 entered promiscuous mode [ 80.663235][ T4532] device syzkaller0 entered promiscuous mode [ 80.982560][ T4556] device pim6reg1 entered promiscuous mode [ 81.070265][ T4579] device pim6reg1 entered promiscuous mode [ 81.134308][ T24] audit: type=1400 audit(1720294070.569:152): avc: denied { create } for pid=4581 comm="syz.0.1210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 81.187811][ T4586] device pim6reg1 entered promiscuous mode [ 81.415675][ T4595] macvlan0: tun_chr_ioctl cmd 1074025681 [ 82.019175][ T4678] syz.4.1237[4678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.019219][ T4678] syz.4.1237[4678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.059068][ T4678] syz.4.1237[4678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.100739][ T4678] syz.4.1237[4678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.568093][ T4761] device erspan0 entered promiscuous mode [ 83.884816][ T4788] device syzkaller0 entered promiscuous mode [ 83.891426][ T4796] syz.3.1269[4796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.891476][ T4796] syz.3.1269[4796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.892852][ T4798] syz.3.1269[4798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.914606][ T4798] syz.3.1269[4798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.926832][ T4797] syz.3.1269[4797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.938253][ T4797] syz.3.1269[4797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.267738][ T4823] device pim6reg1 entered promiscuous mode [ 85.063964][ T4861] tun0: tun_chr_ioctl cmd 21731 [ 85.235311][ T4863] syz.4.1288[4863] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.235365][ T4863] syz.4.1288[4863] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.401940][ T4869] device sit0 entered promiscuous mode [ 86.321538][ T4891] device syzkaller0 entered promiscuous mode [ 86.328256][ T4898] device macsec0 entered promiscuous mode [ 86.857050][ T4941] bridge0: port 3(veth1_macvtap) entered blocking state [ 86.863834][ T4941] bridge0: port 3(veth1_macvtap) entered disabled state [ 87.165837][ T4988] device veth0_vlan left promiscuous mode [ 87.173449][ T4988] device veth0_vlan entered promiscuous mode [ 87.182102][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 87.190094][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 87.197546][ T2360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 87.262575][ T4992] device pim6reg1 entered promiscuous mode [ 87.401731][ T5005] device pim6reg1 entered promiscuous mode [ 87.515158][ T5014] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.522168][ T5014] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.575785][ T5032] device vxcan1 entered promiscuous mode [ 87.631736][ T5059] bridge0: port 3(gretap0) entered blocking state [ 87.639361][ T5059] bridge0: port 3(gretap0) entered disabled state [ 87.651096][ T5059] device gretap0 entered promiscuous mode [ 88.223217][ T5095] device syzkaller0 entered promiscuous mode [ 88.507546][ T5105] ip6_tunnel: non-ECT from fe08:000e:4000:0200:875a:6596:9ff5:7b00 with DS=0x31 [ 89.867617][ T5200] device veth1_macvtap left promiscuous mode [ 89.958207][ T5201] device veth1_macvtap entered promiscuous mode [ 90.002537][ T5201] device macsec0 entered promiscuous mode [ 90.860798][ T5262] macvlan0: tun_chr_ioctl cmd 1074025673 [ 90.870235][ T5268] bridge0: port 3(veth0_to_batadv) entered blocking state [ 90.896436][ T5268] bridge0: port 3(veth0_to_batadv) entered disabled state [ 90.917312][ T5268] device veth0_to_batadv entered promiscuous mode [ 90.937901][ T5268] bridge0: port 3(veth0_to_batadv) entered blocking state [ 90.944873][ T5268] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 91.169588][ T5289] syz.4.1413[5289] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.169642][ T5289] syz.4.1413[5289] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.539549][ T5317] bridge0: port 3(veth0_to_batadv) entered disabled state [ 91.557819][ T5317] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.564732][ T5317] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.726583][ T5311] device sit0 left promiscuous mode [ 92.124433][ T5317] bridge0: port 3(veth0_to_batadv) entered blocking state [ 92.131432][ T5317] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 92.138606][ T5317] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.145344][ T5317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.152459][ T5317] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.159254][ T5317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.166615][ T5317] device bridge0 entered promiscuous mode [ 92.347827][ T5340] syz.4.1430[5340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.347895][ T5340] syz.4.1430[5340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.726428][ T2331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 92.866985][ T5388] device pim6reg1 entered promiscuous mode [ 92.917457][ T5398] device veth1_macvtap left promiscuous mode [ 92.923388][ T5398] device macsec0 left promiscuous mode [ 92.931312][ T5398] device veth1_macvtap entered promiscuous mode [ 92.937473][ T5398] device macsec0 entered promiscuous mode [ 93.922024][ T5489] device pim6reg1 entered promiscuous mode [ 93.929737][ T5479] device veth0_vlan left promiscuous mode [ 94.008612][ T5479] device veth0_vlan entered promiscuous mode [ 94.027543][ T5505] syz.2.1469[5505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.027609][ T5505] syz.2.1469[5505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.714759][ T5548] device pim6reg1 entered promiscuous mode [ 95.284663][ T5604] device pim6reg1 entered promiscuous mode [ 95.818710][ T5658] device pim6reg1 entered promiscuous mode [ 96.136889][ T5696] device pim6reg1 entered promiscuous mode [ 96.158450][ T5700] tap0: tun_chr_ioctl cmd 1074025673 [ 96.204818][ T5703] device pim6reg1 entered promiscuous mode [ 96.869117][ T24] audit: type=1400 audit(1720294086.309:153): avc: denied { create } for pid=5749 comm="syz.2.1539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 96.893160][ T5757] syz.4.1541[5757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.893210][ T5757] syz.4.1541[5757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.057137][ T5788] device syzkaller0 entered promiscuous mode [ 97.173749][ T5801] syz.0.1554[5801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.173803][ T5801] syz.0.1554[5801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.486245][ T5821] syz.3.1561[5821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.498334][ T5821] syz.3.1561[5821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.527439][ T5822] syz.3.1561[5822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.541416][ T5822] syz.3.1561[5822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.794821][ T5844] syz.3.1566[5844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.896708][ T5844] syz.3.1566[5844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.967389][ T5841] device veth0_vlan left promiscuous mode [ 97.997273][ T5841] device veth0_vlan entered promiscuous mode [ 98.007163][ T786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 98.017283][ T786] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 98.028869][ T786] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 98.136291][ T5880] device syzkaller0 entered promiscuous mode [ 98.209106][ T5889] device vxcan1 entered promiscuous mode [ 99.382398][ T5993] device syzkaller0 entered promiscuous mode [ 101.540774][ T6061] device syzkaller0 entered promiscuous mode [ 101.559041][ T6070] device pim6reg1 entered promiscuous mode [ 101.978956][ T6095] device pim6reg1 entered promiscuous mode [ 101.992440][ T6112] device pim6reg1 entered promiscuous mode [ 102.023530][ T24] audit: type=1400 audit(1720294091.459:154): avc: denied { create } for pid=6119 comm="syz.2.1644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 102.076883][ T6126] bpf_get_probe_write_proto: 4 callbacks suppressed [ 102.076891][ T6126] syz.0.1646[6126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.086630][ T6125] syz.0.1646[6125] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.092163][ T6127] syz.0.1646[6127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.131071][ T6126] syz.0.1646[6126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.082609][ T24] audit: type=1400 audit(1720294092.519:155): avc: denied { append } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 103.282032][ T24] audit: type=1400 audit(1720294092.519:156): avc: denied { open } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 103.304580][ T24] audit: type=1400 audit(1720294092.519:157): avc: denied { getattr } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 103.847272][ T6240] device syzkaller0 entered promiscuous mode [ 104.064924][ T6273] device syzkaller0 entered promiscuous mode [ 106.197829][ T6391] device syzkaller0 entered promiscuous mode [ 106.391793][ T6415] : renamed from pim6reg1 [ 106.470412][ T6430] syz.0.1721[6430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.470457][ T6430] syz.0.1721[6430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.516970][ T6407] device veth0_vlan left promiscuous mode [ 106.571000][ T6407] device veth0_vlan entered promiscuous mode [ 106.588462][ T2345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 106.597301][ T2345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 106.604670][ T2345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 106.664526][ T6457] device syzkaller0 entered promiscuous mode [ 106.680553][ T6477] device wg2 left promiscuous mode [ 106.781749][ T6507] device wg2 entered promiscuous mode [ 107.104434][ T6503] bridge0: port 3(veth0_to_batadv) entered blocking state [ 107.171341][ T6503] bridge0: port 3(veth0_to_batadv) entered disabled state [ 107.311873][ T6503] device veth0_to_batadv entered promiscuous mode [ 107.459775][ T6503] bridge0: port 3(veth0_to_batadv) entered blocking state [ 107.466758][ T6503] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 107.639398][ T6560] device pim6reg1 entered promiscuous mode [ 107.851945][ T6615] bridge0: port 3(veth0_to_batadv) entered disabled state [ 107.859205][ T6615] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.868762][ T6615] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.878626][ T6615] device bridge0 left promiscuous mode [ 108.079748][ T6671] syz.2.1783[6671] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.079799][ T6671] syz.2.1783[6671] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.095031][ T6671] syz.2.1783[6671] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.106798][ T6671] syz.2.1783[6671] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.205585][ T6671] syz.2.1783[6671] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.228819][ T6671] syz.2.1783[6671] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.260653][ T6722] device veth0_vlan left promiscuous mode [ 108.277984][ T6722] device veth0_vlan entered promiscuous mode [ 108.708271][ T24] audit: type=1400 audit(1720294098.149:158): avc: denied { create } for pid=6803 comm="syz.1.1817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 108.759057][ T6817] device pim6reg1 entered promiscuous mode [ 108.767297][ T24] audit: type=1400 audit(1720294098.209:159): avc: denied { remove_name } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 108.789560][ T24] audit: type=1400 audit(1720294098.209:160): avc: denied { rename } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 108.811450][ T24] audit: type=1400 audit(1720294098.209:161): avc: denied { create } for pid=75 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 108.992833][ T6832] syz.3.1825[6832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.992884][ T6832] syz.3.1825[6832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.005595][ T6832] syz.3.1825[6832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.024699][ T6832] syz.3.1825[6832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.417734][ T6923] device syzkaller0 entered promiscuous mode [ 110.164858][ T6992] device syzkaller0 entered promiscuous mode [ 110.540950][ T7017] Y4`Ҙ: renamed from lo [ 110.677362][ T7043] device sit0 left promiscuous mode [ 111.051652][ T7052] device sit0 entered promiscuous mode [ 111.288181][ T7064] device vxcan1 entered promiscuous mode [ 111.358356][ T7067] device syzkaller0 entered promiscuous mode [ 111.635649][ T7094] device syzkaller0 entered promiscuous mode [ 111.725177][ T7096] device syzkaller0 entered promiscuous mode [ 111.882043][ T7132] device pim6reg1 entered promiscuous mode [ 111.930111][ T7132] device syzkaller0 entered promiscuous mode [ 112.023197][ T3337] cgroup: fork rejected by pids controller in /syz2 SYZFAIL: proc resp pipe read failed n=-1 (errno 11: Resource temporarily unavailable) [ 113.227080][ T2219] device veth0_to_batadv left promiscuous mode [ 113.233106][ T2219] bridge0: port 3(veth0_to_batadv) entered disabled state [ 113.240537][ T2219] device bridge_slave_1 left promiscuous mode [ 113.246567][ T2219] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.253666][ T2219] device bridge_slave_0 left promiscuous mode [ 113.259684][ T2219] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.267223][ T2219] device veth0_to_batadv left promiscuous mode [ 113.273195][ T2219] bridge0: port 3(veth0_to_batadv) entered disabled state [ 113.280547][ T2219] device bridge_slave_1 left promiscuous mode [ 113.286504][ T2219] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.293489][ T2219] device bridge_slave_0 left promiscuous mode [ 113.299487][ T2219] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.307105][ T2219] device veth0_vlan left promiscuous mode [ 113.312768][ T2219] device veth1_macvtap left promiscuous mode [ 113.318611][ T2219] device veth0_vlan left promiscuous mode [ 115.197089][ T2219] device veth0_to_batadv left promiscuous mode [ 115.203086][ T2219] bridge0: port 3(veth0_to_batadv) entered disabled state [ 115.210894][ T2219] device bridge_slave_1 left promiscuous mode [ 115.216845][ T2219] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.223895][ T2219] device bridge_slave_0 left promiscuous mode [ 115.229907][ T2219] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.237321][ T2219] device veth0_to_batadv left promiscuous mode [ 115.243302][ T2219] bridge0: port 3(veth0_to_batadv) entered disabled state [ 115.250598][ T2219] device bridge_slave_1 left promiscuous mode [ 115.256530][ T2219] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.263573][ T2219] device bridge_slave_0 left promiscuous mode [ 115.269626][ T2219] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.277243][ T2219] device veth1_macvtap left promiscuous mode [ 115.283035][ T2219] device veth0_vlan left promiscuous mode [ 115.288816][ T2219] device veth0_vlan left promiscuous mode