last executing test programs: 1.765314554s ago: executing program 1 (id=3962): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00022c00db5b6861589bcfe8875a060300000023001000000000000000000000ac1414aa"], 0xfdef) 1.713392558s ago: executing program 1 (id=3965): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001b00)=ANY=[@ANYBLOB="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"/2665], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffca3}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe40, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x61, 0x60000000, 0xfe, 0x7000000}, 0x2c) 1.619753266s ago: executing program 1 (id=3969): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_request_inode\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_request_inode\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x6023}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001040)={0x11, 0x1b, &(0x7f0000000f40)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0xf}, @exit, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @jmp={0x5, 0x0, 0x8, 0x6, 0x4, 0x40, 0x4}, @alu={0x7, 0x1, 0xb, 0x0, 0x4, 0xfffffffffffffff4, 0xfffffffffffffff8}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffff8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @printk={@lx}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x4}, @exit], &(0x7f00000002c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41000, 0x56, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000a00)=[0xffffffffffffffff], &(0x7f0000000b00)=[{0x5, 0x2, 0x1, 0x1}, {0x1, 0x5, 0xa, 0x7}], 0x10, 0x7ff}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x3, 0xfffffffffffffffe, 0xa000000}], {0x95, 0x0, 0x0, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f0000000100)=""/147}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000080)=ANY=[@ANYBLOB="a60000edff"], 0x5) 926.309673ms ago: executing program 0 (id=3995): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r2) 845.82359ms ago: executing program 2 (id=3997): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='signal_generate\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000d03000000000000000000000105002000800000000000000000000003000000000200000002"], &(0x7f0000000340)=""/142, 0x4e, 0xfeaf, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xa, 0x5, 0x8, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000, 0x7fffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000001280), 0x56) sendmsg$inet(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000140)="d8", 0x1}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) sendmsg$inet(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)='u', 0x1}], 0x1, &(0x7f0000000a80)=ANY=[@ANYBLOB="78000000000000000000000007000000070fb27f000001e0000002ac1414bb8927cce0000002e0000001e0000001ffffffff00000000ac141423e00000017f000001ac14144300440cc401ac1e010100000fff94040100000bba416311049117549344142cb1e00000010000c6707f000001fffffc01000014000000000000000000000001000000f70c0000000000001c000000000000000000000008000000", @ANYRES32, @ANYBLOB="ffffffffffffffff0000000014000000000000000000000001000000090000000000000011000000000000000000000001000000b400000000000000110000000000000000000000010000007a000000000000001c"], 0x118}, 0x0) recvmsg(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000200)=""/211, 0xd3}], 0x1}, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffeffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb88f127d2495002, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x328e}, 0x0, 0xfffffdbfffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400e327a68ebacdef38b97a7300000000000061142400000000000400000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'macvtap0\x00', 0x2}) 845.34562ms ago: executing program 0 (id=3998): perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x5f) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 660.422725ms ago: executing program 0 (id=4002): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000000780)=ANY=[@ANYRES32=r0, @ANYRESHEX=r0, @ANYBLOB="d070e831ee284ed1a37da7b60ae09437ac72f1cefe4b7251a21c221af266c44d4ccf3cf99eab362cf3cf77f7bb485c6864b23e0745a270bf918265877faa1524759852221d6abd667c14f1cccf0fabbeaea184f2d2aef5ffe1382357ac68538268ce5a5d473a995dd5a84de175b47f984aad3f0b78eff4bfdc68a912d4feb00e0ed6eff9861a5a905b214fba53d1791a56bd5e9213710609bbd2b45d7dddeec5adc842537febb06e98ff819ee69e27eb789f8a781375501901b081a5e3c93024f9d023255c5edfd4818e8f12014f307d5c5f1a179d5bd250f5fa1d5e20", @ANYRES32=r0, @ANYRES16=0x0, @ANYRESHEX=r1, @ANYRESOCT=r1], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000000780)=ANY=[@ANYRES32=r0, @ANYRESHEX=r0, @ANYBLOB="d070e831ee284ed1a37da7b60ae09437ac72f1cefe4b7251a21c221af266c44d4ccf3cf99eab362cf3cf77f7bb485c6864b23e0745a270bf918265877faa1524759852221d6abd667c14f1cccf0fabbeaea184f2d2aef5ffe1382357ac68538268ce5a5d473a995dd5a84de175b47f984aad3f0b78eff4bfdc68a912d4feb00e0ed6eff9861a5a905b214fba53d1791a56bd5e9213710609bbd2b45d7dddeec5adc842537febb06e98ff819ee69e27eb789f8a781375501901b081a5e3c93024f9d023255c5edfd4818e8f12014f307d5c5f1a179d5bd250f5fa1d5e20", @ANYRES32=r0, @ANYRES16=0x0, @ANYRESHEX=r1, @ANYRESOCT=r1], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xf000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000700)={0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) mkdir(0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x4, 0x4, 0x4, 0x8}, 0x48) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x4, 0x4, 0x4, 0x8}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc697}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc697}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x5, 0x0, 0x100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000280), 0x9) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2000002, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffc}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x2, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async) socketpair(0x2, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000440)={r3, &(0x7f0000000240), 0x0}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) 595.952841ms ago: executing program 3 (id=4003): socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x47, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc$j\xfef;q1\x95\xf4\xe4\x13\x95k#Jz.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9*6q\xc3\xa5\xcf\x01t\r%\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') 591.620971ms ago: executing program 0 (id=4004): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0x5, 0x1, 0x24}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000080)=ANY=[@ANYBLOB="180881000000000000000000000000008510000006000000180000000000000000000000000000009500000000000000"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000063112400000000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x16}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x9, 0x39, &(0x7f0000001200)=ANY=[@ANYRESOCT=r0], 0x0, 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) ioctl$TUNSETOFFLOAD(r0, 0x40047451, 0x2000000a) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000002000000000000000100008400040000000000000300000000000000000000000000000500000000000000000000000902"], 0x0, 0x4a}, 0x20) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000001240)=ANY=[@ANYBLOB="2d696f20620c000094b74bc94481ce202d6e6574202b6e65745f636c73202b626c6b696f202d706572665f6576676e74202d667265657a6572202d696f2000"], 0x3f) perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xc8008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x67}, 0x0, 0x0, 0x1ff, 0x0, 0x100, 0x100}, 0x0, 0x80, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYRESDEC], &(0x7f0000000480)='syzkaller\x00', 0xfffffff9}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f00000000c0)={0x5, &(0x7f0000000000)=[{0x1d}, {}, {}, {}, {0x6}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) close(r0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x8}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r5], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r3, 0x0) 581.620512ms ago: executing program 1 (id=4005): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0xff9f, &(0x7f0000001c80)=ANY=[@ANYBLOB="61157c000000000061134c0000000000bfa000000000000007000000080000002d03010000000000870500000000000069163e0000000000bf07000000000000550607000fff0720670600003f000000160300000ee60060bf500000000000002f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3897f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45d4e3b9e41c74a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8e545dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f020000361997a75fd552bdc206438b8ef4901fd03c16dfda44e2a2235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932fb3bba54b3a6aa57f1ad2e99e0e67ab9ff16d20000009f0f53acbb40b4f8e2738270001562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f679629709e75b99f9632b6ce78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43010000007b40407d0000002100000000000020fbce0e69cc9c4e6b2816a5f31f0000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34a3c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000000000000000000020000000c1eb2d91fb79ea00000000000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c69396289549e7806e9cc54db6c7205a6b068fff496d2da7d6327f31d7c8cc5d325c5379b0363ce8bd1fff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf48903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f3b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db80300c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff139604faf0453b65586f65c7943d54b52f06c870edf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2cc17dc4a294ccba8ded5de8206c812439ab129ae818837ee1562078fc524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da20000d9ef418cf19e7a8c4c328be0ce91798a9c2dca871073f6bd61940aabc86b94f8cbde4dc70667bee722a6a2af483ad0d3415ed0f9db009acaba9eaea93f811d434e00000000000000000000d1542c882e672fea96aedf346279ec000000020000000000000000c6427829b65ee55eef70520871b2a26df69559b5a06ad06d3d0183ae3b317478fff42cc48b461c56baea65a66700000000d5559a5bfd8035e0df99b775a2a49e648dc63b496680bfa8e6979f3e2d9c31083ac3af4e5eff4e8a4e4b6d3855939fbe54014e2e367cfd3872ed8831e709538ed1e61be4778839864f88faa8f4453046eb59b6eea0d1538ccbd86cdfd389ef5bb6d49a66ed8b8915eb8e4315437c54f88eac0c74981dfe8c1239af27e714497f475ead5933f66b7f66b15663adbd804c07a4a10d5283a2fd3a0f50c9d1c0b69aa4911b409b6dda3421dbab8302ff09338f815331e3f3dbf7c119cca600b2248e530fe46f66bd8daec3ac4120ca9e23e1bbbfca76c146397b2006c7186da1065746e1641a44c8d9577617bb9f1bc769861624824565774ea1c0e5c75acb7255bc3b6ebf7beba910830877ddc82be039d33dc3742bef24c290e52af147ce4665e9d23caeceb297c3957335103f6fc2fae34f7e12864311a898ead68e5f8238103301acb7bdd9972359aaa4c3cc3021507e79df0dd0183eb1f2f2379451f556bbd4e695f481a7de7659ade66efb5b09b13c6da24dffd88a0162528ea4962ecea6fe6ad61f64606eb79f87ce8bd3834bafc0cb43f3387a7cd63a84bc7915e63b24ee4388607ba11f80b5100f4c74d0f0f34f22b765ba1fd700e0056a1c48cd53f901e006cb078fb56fc0e293b341a3f61310e85e99527ef084025f058b45d271de774905bb20"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 477.64216ms ago: executing program 3 (id=4006): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x15, &(0x7f00000004c0)={0xc, 0x18, &(0x7f0000000600)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000000000000850000001c00000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 456.325642ms ago: executing program 4 (id=4007): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0x42, 0x40}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0x16, 0x0, 0x6, 0x9, 0x80}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x5f9102, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8912, &(0x7f0000000080)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 449.735723ms ago: executing program 1 (id=4008): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r2) 379.392658ms ago: executing program 2 (id=4009): ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x1) socketpair(0x9, 0x4, 0x80000000, &(0x7f0000000040)) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x121, 0x121, 0x7, [@restrict={0xe, 0x0, 0x0, 0xb, 0x5}, @union={0x5, 0x7, 0x0, 0x5, 0x1, 0x2, [{0x5, 0x3, 0x5}, {0x6, 0x0, 0xffffffff}, {0xc, 0x3, 0x80000000}, {0x10, 0x5, 0xfffffffb}, {0xa, 0x2, 0x9c7}, {0x3, 0x1, 0x3}, {0xb, 0x0, 0x1}]}, @func={0xa, 0x0, 0x0, 0xc, 0x2}, @typedef={0x10, 0x0, 0x0, 0x8, 0x3}, @func_proto={0x0, 0x9, 0x0, 0xd, 0x0, [{0x6, 0x5}, {0x6, 0x5}, {0xf}, {0x7, 0x4}, {0x0, 0x4}, {0x10, 0x3}, {0x4, 0x3}, {0x0, 0x3}, {0xf, 0x5}]}, @datasec={0x1, 0x5, 0x0, 0xf, 0x1, [{0x5, 0x0, 0x10000}, {0x5, 0x1, 0x7}, {0x5, 0x380, 0xbd}, {0x1, 0xc, 0x1}, {0x2, 0xa0b}], 'L'}]}, {0x0, [0x0, 0x61, 0x30, 0x3f70584c065a46b6, 0x0]}}, &(0x7f0000000200)=""/167, 0x143, 0xa7, 0x0, 0xfffffffe}, 0x20) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x37, '\x00', 0x0, r0, 0x5, 0x2, 0x4}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r1, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x18, 0x10001, 0x8, 0x1f2, 0x52, 0x1, 0x9, '\x00', r3, 0xffffffffffffffff, 0x3, 0x2, 0x2}, 0x48) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='blkio.throttle.io_serviced\x00', 0x0, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r5}, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000540)=0x2) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000005c0)=@o_path={&(0x7f0000000580)='./file0\x00', 0x0, 0x18, r4}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001640)={r7, &(0x7f0000000600)="865f275ec2f4475ca3c713b595bfcb602bb46c9258a438ee466b3f36c2445ade3bb5507f93eeb86600ddef91242eb0d754f216fb21d3b2909d59789823f0f030a135bf1214388d8e3e58c74d90fed0e4ae95ed16afd2b6c9db9e08df9b355b31ee8eb0f20b9b4f3e81a6d52c7ac71545345d5492bf9e527a491916c5e7ec4f41c62b8f201bd5b8791d6aa9be7fb48d683e5be0fb2a46c12fb82e97365c0d4fd5503e4f80f1b3cead660032680de06fe368cb753821fc1f0f29dab9ca4390703a1614c6c6bb1c1a16551f672845f210b5efb40dbabf96027493a98c03b425ef36834eee75f44609995d4e054e4d42a687494d1f9718fb20400bd5310530a6ae41cf675a295a46233e13c8cdbf5744b785a39e043a3f2dd710eff078dc0f5ebe44a4347b51b3436839d660a07583ec346e13521842f5a3a803f5dab2e4ea58f77f3bed6e31538bb27329e3fc41e56e97b72283513a34d91b104ede8395d74dbea089a3199cd286cccb80a4df212f836eb0cff1fb4182349a0b3f9b968a7875d0d43d25ce9d10bffa3d1b42aa6236594c79b82dd28f71b8a50b2bcbb522624eee19dd661f99a33a3c243f463d58aa2fbdf0d3bceb8fbd56f78f83eb63e8738463d2bf399ecc83ebcf54b9a9a011bb620b0bf0f6c831922c446e42f0f323a5104e6ca0986be0ae0b2173f6c813b002a10592f7610047ba99a60e7034c6ceec10ea50dc1ef3d34b5e25a97784bc91ee8f2a4a2b4e5b7a48f2d570e47c166fda6894236b1fceb140a93d2ff34018e649b92d39cf2518cd747fbc77d2d8292fdd790dba4a0ae6865059128f2ae3f56f4015a28cbe87380fcd5ad3770b9ea6e8ff33a51d1749e1132f7c35bfd762931855a2adea54f53672400a741236bfdba1668962a96520708f303a9b9ae82e2cbab9294d24c75320ef71c350989794dbce522689eeae773fe7c8fe47e463f218462032329cafcb7dcf6b590418c24725d98d0660ab7e83aef62a0d9479355817ddb088ca972f14cb5d6bd565196ecf6e87fe0aa4d1367f16e4074aa662d8ecaf72d833788dc781939527703ad9a28dff6fbe517655d046e1f2fb88460c0ea39cd4af5bf3531c515715d06a6e4e83304f00215ec9415ef115169662082b8f4ba45b62eb1e84d878d98d47421ed0d97f43cc0b39f0b187be9a0c137e181ac6d8277771830056076aa2ff82709a1d645ce82615ef5671f419b09255f198e73fd85dfd2cb7b949bc1b842141078c24af4f3ea37713e7521fd047e9b5a9444a73d6355e8e9af876fc7d626632d83d90759b121713b0a889123584747b23367a7b94d5c13ceadeab71ffb274c0e40e96c2e688ef93dfd3bb40c9675055372584bca169545dfbb6309d7ac5302bc418d314cbe39053805d08bcfeb2db1d6513805c1831a4e04b845cff080f879dad55d22d8e0e11c0c64d56f4e71a36d063947a1fdfe5a99e7b414911bbd59f48f318caf8718c1059132eb38cba1eda00a0bf27f723420a622d69b9382723a743dbd14b1c826f4a6cb157bf1c4359889968b61499ec30456e11cbe712880655a5b98c894e8ca714875cd4dd75fb3ded5ea71a11a221eed7b5403981bf4f93f9852b627c6356483866c1db25688acdc4cb7e378064c735885ca44db777379dbc69712017239d0612d79b544281e304b2c0446868746a0a532cb53d66104b4552ce4e9b4119227cd5f4e208f6f55313e1f0f6a3e6f955ffde9240ca28b1773ba85bca495b449743cfdebfa51b500d09f56ac65f010241869cb9a1a5255bdded239e6efeab1437e784cb6a3932d33fefd886e591b9c446d42f44f363fc2271b68690d47b57c145b973afff27c0cdbfb200acdd6c4d23104f3c9823ab5dc8571789b066b92df666ab411506fea0394e0c2af2ea3ea937cbf5477ee53e1f41b0d980f8d34258a2985cef97e4669c2df37a02deecc69b2deb6156707baff02ecc110e57ccf59d42f1210f357e829873d465295c8e57f1c808b2aa248445b39d42181506e94f1100a89441c24d55d5751244b13a818be6ef4b147896d8f25cad23e286235a62ccc55c911f428326317fc1de9b446735db1a761fa98dae2bc411797554e97d1b523638f976f17992e9f8f961f1519f15bc317af6d169d636a199b3743ccea857d49d1558994d612ab85be0526847d4e87a3feaf8236fa916ab3185b3b0bc957c53a04d36680f18afa3c589c20bbdb55838f92a99166e652fc43a93f0ddc5c5b1801906a0a2bdf62b685b7a3235efc4e61546280b8c8c9a62fea948d6a9d747bc6c3746ddb60dcb3b32065be7aae48d4d62388842fa6ad92e78580393c3f5f6b6bf0cbafbba6a9e2f3baa4ca711ae17f3edc185fc833c9f38bac0967ca8052dda737438521f5b7c4361f7f7cab17ebcfee8fe31ed02528e35675e7c67e96bc70bda73975f9cd46bb56757ea10412d3d6b04eeb33446607c05e58013ba63c6a6e4993163af856a68d3944edf3d40d320fd80196cc1561b3f31092195b6ca6272b7395a388ccd6dbe19b7849e6534813611cb3fa768854e8ac83b03a03321b7e216019cbcc0ed0677a00bff4567a3a75f7b75a99f2bc8a8d940611b01321dd607119dcf3cf978d613817fd244895ba424c7b3c19fa25a44631b8746499ed1a3ed6ffb4d2dadd6f6c6cc363e99215c8f680181b20c7522a970c85da3bce2777e5fe40fa7f1fbf2fa9299fc380b033fa16143dacf5cf793de15fcf792c2d657776844ea536dc6128a3b3f7108ccc06e9343d6113f6a7fd0049a9b8411d078c385c015a0815a2084e7b92b635bd97e45d6316238c5d4edcf18845ce43468f9680d23dbaef60fc369c5e21578bae63c16f21e98ada1e40ed40ab01b71d667f444292331fe28aeae83a37114a61c6547f04cee58a6846eb023a65f1ac6da6725898ee303d628d0c7ab0874bc48fce13b7889edbd3178bc664d9c313bb185749a5020c2b1b2aea2161d423bc3385a7cf284bdebc44217c60d634e0cb41b3246815703fbf964c81a38f0bc6e1b766898b2e5a68c67afe546511c800c72febcf149ddf10bbca1cee874843a59148ee766c89f2dd798dd39410869582956d48f28e9c90552e25ce06fffb48a0a7d5872c5f8c51b5e7d8b135ef953acec3ae8bade7698b64faf0e571d208c9c3fcca2e0f87a5c50d2234d28c4558a5d16318466ee9c733b8df16ff2c08e576e47c00631db7aa87f01109d33f3920008fd9cd50f368f4243cc920ce5f3036a504d111269a1187201270c2f2f15b00112d8d97222834fb2b857c8cc3de40b858e5cc772b1eaa853c7fae8f18a5c1727280e5a3d5bb745021e6e86ef952842d0b56fc68a91c2b46d711e43cb1e6ff8325c7345e4ce104655f674241e7ba4947b2268c339b9987a028e14c7380c319f877b84aa1e169cba6ac7bd8e036ca6335793201872432395f13c6c816541fab01d5d7aba2f9019849ea63e75681933b9df7dd9a9291918838dedcd06a4fc83ca4317a591c3a110979bb28b59cab9c035f01979237881db3a0601b7d0621bcd3fcafd659d705fc270f9bc35e2ca3f23b64f1df712698f6a2e3dd57f67c0ccea546c6d6a3f53c90733f210c4ec640af9061c3c486fa4a2d0a422861aded17764c40704ecd223e3e1649e3316c88d8a4f9a98ba3d3c344ba1c825e41b908da02bb4240aea40fbdaaa52b576a3a8df004ec6dc0a3d86152398cd3720b71b27d3a3fc4c81d1e19df28507de91a21c6b79ccf39ca3701a6149150192434f1ba88d2cc73ada3d2e9ea0de2209e692ebef09d3dda8fc37cda6005214435785ef07c0d2f3cf89cfd29de6dd74b6b3ee1e2f085817f35821b315ac829d418a6a818c2e279708eb32f5dc709a708689e632cfbf347386b2331cfa5c54f53d281a3b3f100adcb5fd8c77df6acbb92c11bd599e4a9051792312f384d628629ed154121b0c488d0e7874cca29179333490b8db4830cb9ede76eac2b119c1cc4e508d4fffc2034cb20976312a8319685a71352936ee97f16147d08fb21c5e3db5705664f052dfdaf8afebc1a223e81504b3d58b834d2f83226ccaf171d75452d1b78640dcd2934ecedaa613964cb3db1104b2c4011bd70e4d9993e34a3e0af809069dd24b812acd05757de33de499c8baea0b1b598c98b25696a2afe0884831e903cf84754c20fb05b65775295e455432b1dd74842f02a3a93f4f5a63609b4be5d4f7ba3d9f018b73679e058225f3d894b6ae89fd30c2a3b971af6bae74ea9dff9b501f3e005ebcef0a5c52339617bebdfbb61ea7e6446270d615feba02ffbcf69893239a98fbadaff4de41839e5ac709dd46bc2c4fc6270ae8229de5ba15072101965dd7cbfa0fb68408ae64c1b05d7fdaaa5809c0f8f3662b2cefb306be1f6912419844032e62efc6e440ee758c57f9ea5321a414082ff7efc255510d5126eb831b96576da29bf08dab1dba780a476395a3eb4ad6d8b08b174a4bb566f1d5612ce2843b66dfdf12396bb6c72ba3a82b20ce2b5c9a1cc28742b1b12fdeadbfacd57b99bc8541bcbc40d79d8a8bdbfea88cacae85c412fd05433d6c98c22c7c75eacd0548282c4e247a20ec4ce86879dc88f1623309929d2fe481ff4f9827861be3d2571629f8fd7ef7a04e0c8d97f4839186402811de07b826d8035285aa5a1542eabdde7ad914eb3fa8b3e59777b570e4b7c22bf3b0ee06d0a8f3ee063c9c51735fd2eb54e6cf133cddfe0d7f2b9b910833651d0c3f80c1eaa0020ab8b7ee859915ea68149cadf0f3a30c597ebfea31276be0e2d555a88601ba691717d72b284efd6f2eeca116a86bbb64e6ca4185b7a35e63c6230c8012db505d367c455898f0e5a2ae4e228bb9024875cfcfcf4b4697551973d2574127e3c81ed2256859198284bf7d3c741472730353d417f3b1728261fee7eb09632987324874dedeadb52fcd88811812e0d7ab56d3b94b9d3d8128aece20203679e8b75d6a2b57e07180795a3de45dd79712acc8bee4e960e27027ff2ce4aedb4e9420a680d655bf81f75215fc8c480de3bd109c026198dadd0cf3b76eede01d82543b990b1380e35c8a679ef4612c7e2455a4d62b19e1ded05300fd5c03adf7a040c3a78c73f81c2a37e22871667bc92e8b1e3cd399217774e93bb8bdd1ad760d8306f25d0e583bb683c44a0679dd82059d64423e0771dee0086f0b2abef413abffca09a11ffcd162874d01362ec132c3051a89b51ee7d9c4334348ef62a64189b7e6f1fb7b8dee385e882f9a1da13446080c24b7935f7d62436ca329d4856b6c0434c85461263ede348e18b86c8986faf1d4a5edc17e264143591a175e5ac89ef822f70c3aaa21fe6a64ace93400ff49b3546e2595ceff0c914ea4b7d800205ed9c35df79d92a80db8ebc1bbb2256b988f6bbd300cb253680ea4019bc09e451226fb7c34c48d154fc7daf80097192f42fc7428e6f47cfabfe47ccad2fef4c9ad08d7a426c34167fab326581386fbaa7597e111b41a0aeca0bbbe2250834483825564218f58437c8cb7d3f89737aac2624d2cb9d7f5860eac9b3b8676f92acc89d645573145430d30546741f67ea5c326e8dcc816204a97626bbab31e436d41f4ada51d946ed6d55e5e482eb103ff54327d5af24a7a3b782060c96911707349ba47c2753bce6a8aa6b041dcd115759c13d7c099af1fa2abf58293f1dfdb780a98d54131db6906d7be3129fbc86581e682a04097c6db09f66896c07d1fbc8c41262c7b72414bfe27198e160e21f34d1492d2dd17320f91431b8f19eaa8a6bb89941fc1b4320f", &(0x7f0000001600)=""/9}, 0x20) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000001680)={'pim6reg0\x00', 0x4000}) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000017c0)={@ifindex=r3, 0x6, 0x0, 0x8, &(0x7f00000016c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000001700)=[0x0, 0x0], &(0x7f0000001740)=[0x0, 0x0, 0x0], &(0x7f0000001780)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001800)={@cgroup=r5, r5, 0x27, 0x4, 0x0, @prog_fd=r6, r9}, 0x20) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001840)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0xd924, '\x00', 0x0, r6, 0x2, 0x5, 0x1}, 0x48) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=@base={0x14, 0x3, 0x3, 0x1, 0xa, r4, 0x1, '\x00', r8, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001940)=@bloom_filter={0x1e, 0x0, 0x800, 0x0, 0x9, r11, 0x2, '\x00', r8, r0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001a80)={&(0x7f00000019c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x53, 0x53, 0xa, [@enum={0xa, 0x1, 0x0, 0x6, 0x4, [{0x4, 0x3}]}, @datasec={0x3, 0x4, 0x0, 0xf, 0x3, [{0x2, 0x8, 0x1}, {0x3, 0x1ff, 0xf97}, {0x5, 0x6, 0x2}, {0x8, 0x4, 0x5ee}], "820343"}]}, {0x0, [0x5f, 0x61, 0x0, 0xf6bcef26d3063b2d, 0x61, 0x61, 0x0, 0x2e]}}, &(0x7f0000001a40), 0x76, 0x0, 0x0, 0xe70}, 0x20) write$cgroup_devices(r6, &(0x7f0000001ac0)={'c', ' *:* ', 'wm\x00'}, 0x9) socketpair(0xb, 0x3, 0x7, &(0x7f0000001b00)) close(r4) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)=@generic={&(0x7f0000001b40)='./file0\x00', 0x0, 0x18}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001cc0)={r12, &(0x7f0000001bc0)="e30743b6e9d7c45ed2c0f4ad8b14c1ecc2199b5e867f58f966d976b577204fcdfc62cb0a45a78cdbd2fa5f0d918fa793be90846a1a0a0237ced005d08d3c0468497e278f5ae258d5503f7adac726ac8b8d821c47e24d5cd2e1d10248167d41865e21e397b7a1041cbbf272d5792691d7377b413cc09f86694b76c66753c4405bddaafa9de8ce6ad41b0ff0bf9c5561858e3a9ae0e106bf7813980419103d1b29af14d32e88a94971573b40592e8b966b9b13f8b15c7f6c40c7ce4ded3dc6be86f1cba6"}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001d80)={{r6, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)='%pi6 \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001dc0)={r13}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pI4 \x00'}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001ec0)={0x1b, 0x0, 0x0, 0x8000, 0x0, r14, 0x0, '\x00', r8, r5, 0x5, 0x3, 0x2}, 0x48) r15 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r2, 0x5, 0x8}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002000)={{r15}, &(0x7f0000001f80), &(0x7f0000001fc0)=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000002080)={0x2, 0x80, 0x3, 0x40, 0x20, 0x7, 0x0, 0x85b3, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000002040), 0x1}, 0x0, 0x6, 0x401, 0x2, 0x1f, 0x5, 0xffff, 0x0, 0x1, 0x0, 0xfffffffffffeffff}, r6, 0xd, r6, 0x0) 379.199689ms ago: executing program 3 (id=4010): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x0, 0x46, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x68, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x304, 0x1, 0x0, '\x00', r0}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xb, &(0x7f00000009c0)=@framed={{}, [@printk={@lu, {0x3, 0x3, 0x3, 0xa, 0x0}, {0x5}, {0x7, 0x0, 0x5}, {}, {}, {0x85, 0x0, 0x0, 0x52}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 355.521071ms ago: executing program 4 (id=4011): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x0, 0x46, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x68, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x304, 0x1, 0x0, '\x00', r0}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xb, &(0x7f00000009c0)=@framed={{}, [@printk={@lu, {0x3, 0x3, 0x3, 0xa, 0x0}, {0x5}, {0x7, 0x0, 0x5}, {}, {}, {0x85, 0x0, 0x0, 0x52}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 351.289741ms ago: executing program 2 (id=4012): perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x5f) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 270.517967ms ago: executing program 3 (id=4013): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0x42, 0x40}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0x16, 0x0, 0x6, 0x9, 0x80}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x5f9102, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8912, &(0x7f0000000080)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 240.08828ms ago: executing program 2 (id=4014): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00080400db5b6861589bcfe8875a06030000002300e0ff000000000000000000ac1414aa"], 0xfdef) 194.705954ms ago: executing program 0 (id=4015): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x94}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000002000000000000000200000408000000000000000300000000000000000000000200000000000000000000000000000200000000000000000000000404"], 0x0, 0x56}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000017c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r1, 0x0, 0x1}, 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000017c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r1, 0x0, 0x1}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200000000e900850000008600000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200000000e900850000008600000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd4242"], 0xfdef) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd4242"], 0xfdef) close(r4) (async) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f0000000040)}, 0x20) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000071ee6ccc230009000000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0xc}, 0x96) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) close(r0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x0, 0x7fffffff}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="e001"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="e001"], 0x0}, 0x90) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0x8204) (async) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0x8204) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0), 0x9) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x1}, 0x48) 193.841664ms ago: executing program 4 (id=4016): openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x43, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb0100180000f2ff000000340000003400000009000000000000000000000b00000000000000000200000d0000000000000000030000000d000000030000000e00000000000009030000000030002e5f5f2e3e0051"], &(0x7f0000000b80)=""/4090, 0x55, 0xffa, 0x1}, 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8, 0x10140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79070098750575ffff86dd6317ce62070000000000000000431ccaf57b3dc85909c8c7b25ae379"], 0xfe1b) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x891d, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf\xc8>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8911, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf\xc8>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 140.117158ms ago: executing program 2 (id=4017): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000100061134c0000000000bf2000000000000007000000180000003d030100000000009500f000000000007126000000000000bf67000000000000360602000fff07006706000020000000170200000ee60000bf250000000000002d350000000000006507000002080000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad03000000000000720400000000000014000000000000009500000000000000db13d5d8b741f2cdaabc8383c8f56b8c2b84a800ea6553f304000000815dcf00c3eebc52267b042d19"], &(0x7f0000000100)='GPL\x00'}, 0x48) 139.803658ms ago: executing program 3 (id=4019): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r2) 122.64268ms ago: executing program 2 (id=4020): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='signal_generate\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000d03000000000000000000000105002000800000000000000000000003000000000200000002"], &(0x7f0000000340)=""/142, 0x4e, 0xfeaf, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xa, 0x5, 0x8, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000, 0x7fffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000001280), 0x56) sendmsg$inet(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000140)="d8", 0x1}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) sendmsg$inet(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)='u', 0x1}], 0x1, &(0x7f0000000a80)=ANY=[@ANYBLOB="78000000000000000000000007000000070fb27f000001e0000002ac1414bb8927cce0000002e0000001e0000001ffffffff00000000ac141423e00000017f000001ac14144300440cc401ac1e010100000fff94040100000bba416311049117549344142cb1e00000010000c6707f000001fffffc01000014000000000000000000000001000000f70c0000000000001c000000000000000000000008000000", @ANYRES32, @ANYBLOB="ffffffffffffffff0000000014000000000000000000000001000000090000000000000011000000000000000000000001000000b400000000000000110000000000000000000000010000007a000000000000001c"], 0x118}, 0x0) recvmsg(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000200)=""/211, 0xd3}], 0x1}, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffeffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb88f127d2495002, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x328e}, 0x0, 0xfffffdbfffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400e327a68ebacdef38b97a7300000000000061142400000000000400000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'macvtap0\x00', 0x2}) 104.775791ms ago: executing program 4 (id=4021): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0x42, 0x40}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0x16, 0x0, 0x6, 0x9, 0x80}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x5f9102, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8912, &(0x7f0000000080)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 39.980176ms ago: executing program 3 (id=4022): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8927, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000ae685c0b163ef93d95c7e307963117b5a705fd4a74bc49e24a9ae8c22842f85899c62ca3a6ff691f1df44c614a5fd33f6f8a4eb689d0910000000096d3635567c2d514698af29411dd54da063469b0e756f0555a15f5c39cbc6fc096f52406aff201b1057a8fc25a4e33b1a296875642eb3a7b732cda1ba46a2a42c4c333abc80e00fb000000004e4c4263efd12b257fdf9d292ba48e3aa93faeb7a3973a6dd9cf527332eb4a5dda77ad0e925d0a9c004dcb78410a3100c44cb61c92d40e31577a4e64c1155008241709504b573381f79b890a2aedbe60114760df9a5feb47115ac44625090590c275a5f2cf4f8789450b8303e8fdb7449565e01a331f061e143b26ab8905449942ca2c339ffbe92f821d84b2dd89069e6b66174903a7e94fa7a055b52b1dc2f4d76ec4d98432d6cf396b9d61858bcd5ff958da1ff886e43ffbcb2d972f43031769718daaa6105a5188ed990122303d201404e179144da06ed1e7ddff0fac2edd58ea986b3b375a57d8e37a2952902d357386884e3e548196f1f1a3e59edcd7b9ced9b2782c41724b738a8d47236983a2db1146b7a925a02ebf7739f63057c4ae701c74622be55bd113a415f7b36818647ce0d39e3aeb2002d51ff70c1e464c5f5e26aa1af3e7299d23be"], &(0x7f0000000040)='syzkaller\x00'}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000002c0)='bdi_dirty_ratelimit\x00', r0}, 0x10) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r2, r1, 0x0, 0x1, 0xfffffffffffffffe}, 0x42) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x5ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) 39.731636ms ago: executing program 0 (id=4023): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x0, 0x46, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x68, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x304, 0x1, 0x0, '\x00', r0}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xb, &(0x7f00000009c0)=@framed={{}, [@printk={@lu, {0x3, 0x3, 0x3, 0xa, 0x0}, {0x5}, {0x7, 0x0, 0x5}, {}, {}, {0x85, 0x0, 0x0, 0x52}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 39.305897ms ago: executing program 4 (id=4024): perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x5f) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 22.945268ms ago: executing program 4 (id=4025): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x0, 0x46, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x68, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x304, 0x1, 0x0, '\x00', r0}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xb, &(0x7f00000009c0)=@framed={{}, [@printk={@lu, {0x3, 0x3, 0x3, 0xa, 0x0}, {0x5}, {0x7, 0x0, 0x5}, {}, {}, {0x85, 0x0, 0x0, 0x52}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 0s ago: executing program 1 (id=4018): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x80108907, &(0x7f0000000080)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.74' (ED25519) to the list of known hosts. [ 25.987527][ T23] audit: type=1400 audit(1719946312.420:66): avc: denied { mounton } for pid=345 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.989514][ T345] cgroup1: Unknown subsys name 'net' [ 26.010149][ T23] audit: type=1400 audit(1719946312.420:67): avc: denied { mount } for pid=345 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.037781][ T345] cgroup1: Unknown subsys name 'net_prio' [ 26.043556][ T345] cgroup1: Unknown subsys name 'devices' [ 26.050073][ T23] audit: type=1400 audit(1719946312.480:68): avc: denied { unmount } for pid=345 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.190298][ T345] cgroup1: Unknown subsys name 'hugetlb' [ 26.195936][ T345] cgroup1: Unknown subsys name 'rlimit' [ 26.392225][ T23] audit: type=1400 audit(1719946312.820:69): avc: denied { setattr } for pid=345 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=1860 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.415363][ T23] audit: type=1400 audit(1719946312.820:70): avc: denied { mounton } for pid=345 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.423943][ T347] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.440098][ T23] audit: type=1400 audit(1719946312.820:71): avc: denied { mount } for pid=345 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 26.471249][ T23] audit: type=1400 audit(1719946312.880:72): avc: denied { relabelto } for pid=347 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.496399][ T23] audit: type=1400 audit(1719946312.880:73): avc: denied { write } for pid=347 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.524618][ T23] audit: type=1400 audit(1719946312.950:74): avc: denied { read } for pid=345 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.549919][ T23] audit: type=1400 audit(1719946312.950:75): avc: denied { open } for pid=345 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.576008][ T345] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.752316][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.759289][ T354] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.766692][ T354] device bridge_slave_0 entered promiscuous mode [ 26.775076][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.781938][ T354] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.789543][ T354] device bridge_slave_1 entered promiscuous mode [ 26.950599][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.957447][ T354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.964572][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.971428][ T354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.992300][ T356] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.999296][ T356] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.006571][ T356] device bridge_slave_0 entered promiscuous mode [ 27.016173][ T356] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.023043][ T356] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.030400][ T356] device bridge_slave_1 entered promiscuous mode [ 27.112691][ T358] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.119569][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.126887][ T358] device bridge_slave_0 entered promiscuous mode [ 27.133872][ T358] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.140745][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.148394][ T358] device bridge_slave_1 entered promiscuous mode [ 27.169096][ T355] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.175931][ T355] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.183396][ T355] device bridge_slave_0 entered promiscuous mode [ 27.202237][ T355] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.209106][ T355] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.216376][ T355] device bridge_slave_1 entered promiscuous mode [ 27.234748][ T357] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.241615][ T357] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.249028][ T357] device bridge_slave_0 entered promiscuous mode [ 27.271170][ T357] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.278327][ T357] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.285624][ T357] device bridge_slave_1 entered promiscuous mode [ 27.367637][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.374833][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.382601][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.390036][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.420434][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.428846][ T107] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.435663][ T107] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.470257][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.478771][ T18] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.485588][ T18] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.541620][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.556912][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.599617][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.607718][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.615666][ T365] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.622505][ T365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.629999][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 27.655436][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.664227][ T18] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.671076][ T18] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.719657][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.751733][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.760591][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.768714][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.776703][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.783542][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.790722][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.799052][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.807648][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.815305][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.823181][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 27.831573][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.839953][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.846773][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.854118][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.861422][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.868746][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.876006][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.883468][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 27.910304][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.918514][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.926481][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 27.935222][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.943466][ T365] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.950310][ T365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.957957][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 27.966056][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.974131][ T365] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.980959][ T365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.988466][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.996655][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.004883][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.012573][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.020547][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.028717][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.036803][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 28.047203][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.055153][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.063424][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.071907][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.080004][ T376] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.086825][ T376] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.105758][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 28.113431][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.122066][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.131043][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.139471][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.170767][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.180417][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.189727][ T18] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.196563][ T18] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.204935][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.213510][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.222264][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.230250][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.243742][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.252062][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.290433][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.299032][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.307182][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.315310][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.324400][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.332644][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.385147][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.393805][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.402050][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.410173][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.463076][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.471117][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.482757][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.491325][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.500282][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.508415][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.526865][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.546733][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.555633][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.573655][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.582812][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.608602][ T399] cgroup: syz.4.10 (399) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 28.639524][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.647529][ T399] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 28.657889][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.679073][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.689486][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.702841][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.711522][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.720122][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.727068][ C1] hrtimer: interrupt took 25748 ns [ 28.728645][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.761095][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.826845][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.858154][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.868385][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.898796][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.061156][ T430] [ 29.064507][ T430] ********************************************************** [ 29.072336][ T430] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 29.082915][ T430] ** ** [ 29.091960][ T430] ** trace_printk() being used. Allocating extra memory. ** [ 29.099654][ T430] ** ** [ 29.106883][ T430] ** This means that this is a DEBUG kernel and it is ** [ 29.146214][ T430] ** unsafe for production use. ** [ 29.172660][ T430] ** ** [ 29.195645][ T430] ** If you see this message and you are not debugging ** [ 29.221226][ T430] ** the kernel, report this immediately to your vendor! ** [ 29.246161][ T430] ** ** [ 29.293992][ T430] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 29.316780][ T430] ********************************************************** [ 31.220919][ T530] device syzkaller0 entered promiscuous mode [ 31.270086][ T23] kauditd_printk_skb: 38 callbacks suppressed [ 31.270096][ T23] audit: type=1400 audit(1719946317.700:114): avc: denied { write } for pid=537 comm="syz.0.58" name="ppp" dev="devtmpfs" ino=9264 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 31.723043][ T23] audit: type=1400 audit(1719946318.150:115): avc: denied { read } for pid=560 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.790282][ T23] audit: type=1400 audit(1719946318.220:116): avc: denied { create } for pid=560 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 32.974517][ T615] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.984006][ T615] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.661749][ T745] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.823243][ T23] audit: type=1400 audit(1719946321.250:117): avc: denied { relabelfrom } for pid=755 comm="syz.1.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 34.883177][ T23] audit: type=1400 audit(1719946321.270:118): avc: denied { relabelto } for pid=755 comm="syz.1.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 34.992475][ T23] audit: type=1400 audit(1719946321.340:119): avc: denied { create } for pid=761 comm="syz.0.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 35.132625][ T774] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.156590][ T771] syz.4.145 (771) used greatest stack depth: 20952 bytes left [ 35.164965][ T774] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.171847][ T774] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.458273][ T782] device syzkaller0 entered promiscuous mode [ 36.263880][ T844] device wg2 entered promiscuous mode [ 36.875908][ T919] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.884989][ T919] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.013851][ T925] device syzkaller0 entered promiscuous mode [ 37.481463][ T23] audit: type=1400 audit(1719946323.910:120): avc: denied { create } for pid=958 comm="syz.3.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 38.707862][ T23] audit: type=1400 audit(1719946325.140:121): avc: denied { ioctl } for pid=1051 comm="syz.1.247" path="socket:[16012]" dev="sockfs" ino=16012 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 38.842776][ T1055] device syzkaller0 entered promiscuous mode [ 39.317178][ T23] audit: type=1400 audit(1719946325.720:122): avc: denied { create } for pid=1138 comm="syz.1.264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 39.467328][ T23] audit: type=1400 audit(1719946325.810:123): avc: denied { create } for pid=1135 comm="syz.0.262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 42.952475][ T1187] device syzkaller0 entered promiscuous mode [ 44.491389][ T1302] device syzkaller0 entered promiscuous mode [ 44.549149][ T1294] device syzkaller0 entered promiscuous mode [ 44.712978][ T23] audit: type=1400 audit(1719946331.140:124): avc: denied { create } for pid=1309 comm="syz.0.321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 45.818815][ T23] audit: type=1400 audit(1719946332.250:125): avc: denied { create } for pid=1391 comm="syz.1.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 45.863979][ T1401] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.873509][ T1401] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.390633][ T23] audit: type=1400 audit(1719946332.790:126): avc: denied { write } for pid=1437 comm="syz.4.368" name="cgroup.subtree_control" dev="cgroup2" ino=179 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 46.531933][ T23] audit: type=1400 audit(1719946332.870:127): avc: denied { open } for pid=1437 comm="syz.4.368" path="" dev="cgroup2" ino=179 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 47.032482][ T23] audit: type=1400 audit(1719946333.460:128): avc: denied { create } for pid=1502 comm="syz.3.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 47.333257][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.345522][ T1112] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.352425][ T1112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.150841][ T23] audit: type=1400 audit(1719946334.580:129): avc: denied { create } for pid=1563 comm="syz.3.414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 48.646854][ T1579] device syzkaller0 entered promiscuous mode [ 49.253314][ T1637] Â: renamed from pim6reg1 [ 49.767747][ T1673] device syzkaller0 entered promiscuous mode [ 52.147353][ T1826] device wg2 entered promiscuous mode [ 52.580660][ T1858] device syzkaller0 entered promiscuous mode [ 52.848825][ T23] audit: type=1400 audit(1719946339.270:130): avc: denied { append } for pid=1880 comm="syz.4.539" name="ppp" dev="devtmpfs" ino=9264 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 53.301273][ T1917] device pim6reg1 entered promiscuous mode [ 53.885235][ T1942] device syzkaller0 entered promiscuous mode [ 54.746908][ T1984] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.753855][ T1984] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.762726][ T1984] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.769806][ T1984] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.782592][ T1984] device bridge0 entered promiscuous mode [ 55.763051][ T1110] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.822496][ T2049] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.834196][ T2049] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.633580][ T2097] syz.4.617[2097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.633652][ T2097] syz.4.617[2097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.685947][ T2097] syz.4.617[2097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.711616][ T2097] syz.4.617[2097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.785612][ T2097] device syzkaller0 entered promiscuous mode [ 57.925068][ T2135] device syzkaller0 entered promiscuous mode [ 57.967528][ T2147] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.432592][ T2179] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.483773][ T2179] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.490660][ T2179] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.432074][ T23] audit: type=1400 audit(1719946346.860:131): avc: denied { ioctl } for pid=2255 comm="syz.0.678" path="uts:[4026532382]" dev="nsfs" ino=4026532382 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 61.038001][ T2260] device bridge_slave_1 left promiscuous mode [ 61.076982][ T2260] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.189387][ T2260] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.197155][ T23] audit: type=1400 audit(1719946348.610:132): avc: denied { create } for pid=2323 comm="syz.3.702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 62.342814][ T2327] Â: renamed from pim6reg1 [ 66.359300][ T2527] device syzkaller0 entered promiscuous mode [ 66.367502][ T24] cfg80211: failed to load regulatory.db [ 67.926102][ T2620] device syzkaller0 entered promiscuous mode [ 67.950364][ T2618] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 68.244995][ T23] audit: type=1400 audit(1719946354.670:133): avc: denied { create } for pid=2636 comm="syz.3.820" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 68.683953][ T2643] device syzkaller0 entered promiscuous mode [ 68.802719][ T23] audit: type=1400 audit(1719946355.230:134): avc: denied { create } for pid=2657 comm="syz.0.826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 69.333170][ T2706] device syzkaller0 entered promiscuous mode [ 71.125682][ T2771] device sit0 entered promiscuous mode [ 71.361690][ T2781] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.372366][ T2781] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.380164][ T2781] device bridge_slave_0 entered promiscuous mode [ 71.413148][ T2781] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.450820][ T2781] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.478285][ T2781] device bridge_slave_1 entered promiscuous mode [ 72.005771][ T2781] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.012644][ T2781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.019799][ T2781] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.026628][ T2781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.060997][ T1084] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.074743][ T23] audit: type=1400 audit(1719946358.500:135): avc: denied { create } for pid=2839 comm="syz.0.890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 72.094781][ T1084] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.167701][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.175117][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.193525][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.205330][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.222468][ T379] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.229351][ T379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.245517][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.255556][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.263879][ T379] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.270738][ T379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.302301][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 72.311323][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 72.321551][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 72.329991][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.423989][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 72.435048][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 72.455385][ T23] audit: type=1400 audit(1719946358.880:136): avc: denied { create } for pid=2868 comm="syz.2.901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 72.507297][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 72.525314][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.567314][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 72.580716][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 72.620899][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 72.631006][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 72.665731][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 72.674280][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 72.777897][ T7] device bridge_slave_1 left promiscuous mode [ 72.783905][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.906953][ T7] device bridge_slave_0 left promiscuous mode [ 72.912976][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.670355][ T2968] device bridge_slave_0 left promiscuous mode [ 74.722876][ T2968] device bridge_slave_0 entered promiscuous mode [ 74.740449][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 78.578073][ T3205] device syzkaller0 entered promiscuous mode [ 78.947944][ T23] audit: type=1400 audit(1719946365.380:137): avc: denied { create } for pid=3257 comm="syz.1.1050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 79.804193][ T3315] device syzkaller0 entered promiscuous mode [ 83.741518][ T3470] device syzkaller0 entered promiscuous mode [ 83.843552][ T3469] : renamed from bond_slave_0 [ 85.423067][ T3521] device syzkaller0 entered promiscuous mode [ 85.429882][ T3523] : renamed from bond_slave_0 [ 85.873167][ T3558] device sit0 entered promiscuous mode [ 86.366510][ T3570] device syzkaller0 entered promiscuous mode [ 86.539683][ T23] audit: type=1400 audit(1719946372.970:138): avc: denied { create } for pid=3587 comm="syz.1.1181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 87.270358][ T23] audit: type=1400 audit(1719946373.700:139): avc: denied { create } for pid=3631 comm="syz.4.1200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 87.829097][ T3622] device syzkaller0 entered promiscuous mode [ 87.835823][ T3627] : renamed from bond_slave_0 [ 88.090386][ T3656] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.573757][ T3690] syz.4.1224[3690] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.573818][ T3690] syz.4.1224[3690] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.588582][ T3690] syz.4.1224[3690] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.599850][ T3690] syz.4.1224[3690] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.654692][ T3695] device syzkaller0 entered promiscuous mode [ 88.907209][ T3705] device pim6reg1 entered promiscuous mode [ 90.075899][ T23] audit: type=1400 audit(1719946376.500:140): avc: denied { create } for pid=3757 comm="syz.4.1254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 90.675713][ T3810] syz.0.1272[3810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.677410][ T3810] syz.0.1272[3810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.255860][ T23] audit: type=1400 audit(1719946377.680:141): avc: denied { create } for pid=3843 comm="syz.4.1286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 92.717734][ T23] audit: type=1400 audit(1719946379.150:142): avc: denied { create } for pid=3898 comm="syz.0.1308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 93.397537][ T23] audit: type=1400 audit(1719946379.820:143): avc: denied { create } for pid=3935 comm="syz.4.1323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 94.388936][ T23] audit: type=1400 audit(1719946380.800:144): avc: denied { create } for pid=3985 comm="syz.4.1340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 97.205784][ T4117] device syzkaller0 entered promiscuous mode [ 98.776910][ T4228] device syzkaller0 entered promiscuous mode [ 100.467386][ T4301] device bridge0 entered promiscuous mode [ 103.430707][ T4452] device syzkaller0 entered promiscuous mode [ 103.619240][ T4467] sock: sock_set_timeout: `syz.0.1525' (pid 4467) tries to set negative timeout [ 103.910609][ T4484] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.137543][ T4498] device syzkaller0 entered promiscuous mode [ 104.176478][ T23] audit: type=1400 audit(1719946390.600:145): avc: denied { create } for pid=4497 comm="syz.1.1537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 104.657430][ T4523] bridge0: port 3(veth0_to_batadv) entered blocking state [ 104.703381][ T4523] bridge0: port 3(veth0_to_batadv) entered disabled state [ 104.758358][ T4523] device veth0_to_batadv entered promiscuous mode [ 104.787566][ T4523] device veth0_to_batadv left promiscuous mode [ 104.827355][ T4523] bridge0: port 3(veth0_to_batadv) entered disabled state [ 105.191692][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.203090][ T376] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.209979][ T376] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.594190][ T4586] device bridge_slave_0 left promiscuous mode [ 105.641950][ T4586] device bridge_slave_0 entered promiscuous mode [ 106.021242][ T1083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.034274][ T1083] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.041165][ T1083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.544886][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.560250][ T1112] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.567157][ T1112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.694988][ T4791] device syzkaller0 entered promiscuous mode [ 109.702855][ T23] audit: type=1400 audit(1719946396.130:146): avc: denied { ioctl } for pid=4855 comm="syz.3.1678" path="" dev="cgroup2" ino=322 ioctlcmd=0x54cd scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 112.008182][ T354] syz-executor (354) used greatest stack depth: 18840 bytes left [ 112.181669][ T4985] device syzkaller0 entered promiscuous mode [ 112.227995][ T4974] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.234877][ T4974] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.242798][ T4974] device bridge_slave_0 entered promiscuous mode [ 112.279322][ T4974] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.286264][ T4974] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.294126][ T4974] device bridge_slave_1 entered promiscuous mode [ 112.524553][ T4983] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.533872][ T4983] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.546965][ T4983] device bridge_slave_0 entered promiscuous mode [ 112.569923][ T4983] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.582246][ T4983] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.596408][ T4983] device bridge_slave_1 entered promiscuous mode [ 112.719160][ T7] device bridge_slave_1 left promiscuous mode [ 112.735329][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.761263][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.899359][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 112.913182][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 112.934466][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 112.947498][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 112.965763][ T1084] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.972731][ T1084] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.987503][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 113.003847][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.021304][ T1084] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.028191][ T1084] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.045990][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 113.075570][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 113.086460][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 113.142076][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 113.190417][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 113.234534][ T1083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 113.264672][ T1083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 113.301205][ T1083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 113.340928][ T23] audit: type=1400 audit(1719946399.760:147): avc: denied { mounton } for pid=4974 comm="syz-executor" path="/root/syzkaller.3aLdT7/syz-tmp/newroot/dev" dev="tmpfs" ino=42783 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 113.385719][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 113.403572][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 113.447326][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 113.455614][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.478825][ T23] audit: type=1400 audit(1719946399.770:148): avc: denied { mounton } for pid=4974 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=11368 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 113.503762][ T1111] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.510825][ T1111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.535952][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 113.553918][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.573139][ T1111] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.580121][ T1111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.609523][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 113.649054][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 113.660808][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 113.677627][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 113.706778][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 113.759688][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 113.802775][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 113.852267][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 113.878757][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 113.944669][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 113.960033][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 114.033171][ T1083] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 114.065276][ T1083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 114.089216][ T1083] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 114.113512][ T1083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 114.641673][ T7] device bridge_slave_1 left promiscuous mode [ 114.651654][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.680214][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.688992][ T5077] syz.4.1766[5077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.689049][ T5077] syz.4.1766[5077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.609548][ T5132] syzkaller0: activation failed [ 115.628966][ T5132] device syzkaller0 entered promiscuous mode [ 116.833290][ T5170] device pim6reg1 entered promiscuous mode [ 117.937606][ T5220] device veth1_to_team entered promiscuous mode [ 119.032385][ T5271] device syzkaller0 entered promiscuous mode [ 119.613275][ T5295] device syzkaller0 entered promiscuous mode [ 120.866893][ T5374] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.334799][ T5406] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.342081][ T5406] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.349871][ T5406] device bridge_slave_0 entered promiscuous mode [ 121.357837][ T5406] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.364716][ T5406] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.387912][ T5406] device bridge_slave_1 entered promiscuous mode [ 121.495155][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 121.600865][ T5406] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.607761][ T5406] bridge0: port 2(bridge_slave_1) entered forwarding state [ 121.614888][ T5406] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.621755][ T5406] bridge0: port 1(bridge_slave_0) entered forwarding state [ 121.676892][ T1083] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.689083][ T1083] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.937459][ T23] audit: type=1400 audit(1719946408.370:149): avc: denied { create } for pid=5457 comm="syz.0.1917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 121.963373][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 121.973162][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 121.998578][ T1083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 122.006860][ T1083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.033150][ T1083] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.040030][ T1083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 122.047719][ T1083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 122.056039][ T1083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 122.064477][ T1083] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.071336][ T1083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 122.079543][ T2120] device bridge_slave_1 left promiscuous mode [ 122.085931][ T2120] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.094739][ T2120] device bridge_slave_0 left promiscuous mode [ 122.100806][ T2120] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.239728][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 122.247879][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 122.261452][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 122.270793][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 122.294092][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 122.303289][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 122.326746][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 122.334852][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 122.371312][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 122.381894][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 122.408751][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 122.425905][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 122.442166][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 122.450760][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 126.296870][ T5738] bridge0: port 3(veth0_to_batadv) entered blocking state [ 126.304654][ T5738] bridge0: port 3(veth0_to_batadv) entered disabled state [ 126.364112][ T5738] device veth0_to_batadv entered promiscuous mode [ 126.380842][ T5738] bridge0: port 3(veth0_to_batadv) entered blocking state [ 126.388231][ T5738] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 126.405751][ T5743] device veth0_to_batadv left promiscuous mode [ 126.417222][ T5743] bridge0: port 3(veth0_to_batadv) entered disabled state [ 127.056481][ T5771] bridge0: port 3(veth0_to_batadv) entered blocking state [ 127.065020][ T5771] bridge0: port 3(veth0_to_batadv) entered disabled state [ 127.107755][ T5771] device veth0_to_batadv entered promiscuous mode [ 127.126219][ T5771] bridge0: port 3(veth0_to_batadv) entered blocking state [ 127.133447][ T5771] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 127.151734][ T5777] device veth0_to_batadv left promiscuous mode [ 127.161954][ T5777] bridge0: port 3(veth0_to_batadv) entered disabled state [ 128.093651][ T5816] bridge0: port 3(veth0_to_batadv) entered blocking state [ 128.104370][ T5816] bridge0: port 3(veth0_to_batadv) entered disabled state [ 128.135730][ T5816] device veth0_to_batadv entered promiscuous mode [ 128.165414][ T5823] device veth0_to_batadv left promiscuous mode [ 128.171983][ T5823] bridge0: port 3(veth0_to_batadv) entered disabled state [ 130.526726][ T5914] bridge0: port 3(veth0_to_batadv) entered blocking state [ 130.534100][ T5914] bridge0: port 3(veth0_to_batadv) entered disabled state [ 130.599181][ T5914] device veth0_to_batadv entered promiscuous mode [ 130.615736][ T5914] bridge0: port 3(veth0_to_batadv) entered blocking state [ 130.623149][ T5914] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 130.640789][ T5915] device veth0_to_batadv left promiscuous mode [ 130.646865][ T5915] bridge0: port 3(veth0_to_batadv) entered disabled state [ 131.429362][ T23] audit: type=1400 audit(1719946417.860:150): avc: denied { create } for pid=5945 comm="syz.1.2108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 131.772152][ T5966] device syzkaller0 entered promiscuous mode [ 131.783047][ T23] audit: type=1400 audit(1719946418.210:151): avc: denied { append } for pid=144 comm="syslogd" name="messages" dev="tmpfs" ino=1989 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 131.811521][ T23] audit: type=1400 audit(1719946418.210:152): avc: denied { open } for pid=144 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=1989 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 131.836254][ T23] audit: type=1400 audit(1719946418.210:153): avc: denied { getattr } for pid=144 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=1989 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 131.937089][ T23] audit: type=1400 audit(1719946418.350:154): avc: denied { create } for pid=5976 comm="syz.2.2121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 136.674166][ T6180] device syzkaller0 entered promiscuous mode [ 138.362072][ T6278] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.722755][ T6295] device pim6reg1 entered promiscuous mode [ 139.602466][ T6354] device pim6reg1 entered promiscuous mode [ 139.752137][ T6370] : renamed from ipvlan1 [ 139.807099][ T23] audit: type=1400 audit(1719946426.230:155): avc: denied { create } for pid=6381 comm="syz.1.2276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 140.194056][ T6405] device pim6reg1 entered promiscuous mode [ 141.084393][ T6470] device pim6reg1 entered promiscuous mode [ 143.404949][ T6636] device syzkaller0 entered promiscuous mode [ 144.566421][ T6732] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.583880][ T6732] device bridge0 left promiscuous mode [ 144.630677][ T6732] device bridge_slave_1 left promiscuous mode [ 144.639010][ T6732] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.647903][ T6732] device bridge_slave_0 left promiscuous mode [ 144.663341][ T6732] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.236499][ T6777] device bridge_slave_1 left promiscuous mode [ 145.245846][ T6777] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.274756][ T6777] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.577084][ T6862] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.584242][ T6862] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.613802][ T6866] device pim6reg1 entered promiscuous mode [ 146.635091][ T6862] device bridge_slave_1 left promiscuous mode [ 146.641138][ T6862] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.648635][ T6862] device bridge_slave_0 left promiscuous mode [ 146.654688][ T6862] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.298248][ T6910] device pim6reg1 entered promiscuous mode [ 148.028806][ T6950] device pim6reg1 entered promiscuous mode [ 148.909488][ T6982] device pim6reg1 entered promiscuous mode [ 151.137425][ T7013] device syzkaller0 entered promiscuous mode [ 151.264867][ T7035] device pim6reg1 entered promiscuous mode [ 151.755726][ T23] audit: type=1400 audit(1719946438.180:156): avc: denied { create } for pid=7067 comm="syz.3.2547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 152.274646][ T7108] device syzkaller0 entered promiscuous mode [ 152.624882][ T7146] device syzkaller0 entered promiscuous mode [ 152.660696][ T7138] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 153.483220][ T23] audit: type=1400 audit(1719946439.910:157): avc: denied { create } for pid=7201 comm="syz.1.2598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 158.682313][ T7523] device bridge_slave_0 left promiscuous mode [ 158.696652][ T7523] device bridge_slave_0 entered promiscuous mode [ 158.730291][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.905961][ T7856] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.913087][ T7856] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.920981][ T7856] device bridge_slave_0 entered promiscuous mode [ 163.950429][ T7856] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.975752][ T7856] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.999390][ T7856] device bridge_slave_1 entered promiscuous mode [ 164.334323][ T7856] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.341320][ T7856] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.348465][ T7856] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.355302][ T7856] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.428676][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.436959][ T376] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.445263][ T376] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.477487][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.487903][ T379] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.494764][ T379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.508692][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.528954][ T379] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.535879][ T379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.745541][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.753373][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.882212][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 164.890681][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 164.902737][ T6441] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 164.917597][ T6441] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 164.934253][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 164.942931][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 164.981706][ T6441] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 164.992390][ T6441] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 165.001570][ T6441] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 165.029183][ T6441] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 165.547567][ T7973] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.554663][ T7973] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.338960][ T8268] device syzkaller0 entered promiscuous mode [ 172.219755][ T8398] device syzkaller0 entered promiscuous mode [ 174.136460][ T8508] device syzkaller0 entered promiscuous mode [ 174.218903][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 174.825337][ T8557] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.838315][ T8557] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.870846][ T8557] device bridge_slave_0 entered promiscuous mode [ 174.919690][ T8557] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.944339][ T8557] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.975819][ T8557] device bridge_slave_1 entered promiscuous mode [ 175.658611][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.666344][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 175.817098][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.825356][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.833734][ T1112] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.840580][ T1112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.848134][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.856389][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.865219][ T1112] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.872083][ T1112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.904861][ T1109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 175.912855][ T1109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 175.921860][ T1109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 175.965116][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 175.973811][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.023639][ T1109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.071293][ T6441] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 177.321212][ T1109] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 177.336102][ T1109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 177.354954][ T1109] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 177.363972][ T1109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 177.508453][ T179] device bridge_slave_1 left promiscuous mode [ 177.519408][ T179] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.534527][ T179] device bridge_slave_0 left promiscuous mode [ 177.554640][ T179] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.402686][ T8692] device bridge_slave_0 left promiscuous mode [ 178.422880][ T8704] device bridge_slave_0 entered promiscuous mode [ 178.464053][ T1084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 181.385378][ T23] audit: type=1400 audit(1719946467.810:158): avc: denied { remove_name } for pid=144 comm="syslogd" name="messages" dev="tmpfs" ino=1989 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 181.414102][ T23] audit: type=1400 audit(1719946467.810:159): avc: denied { rename } for pid=144 comm="syslogd" name="messages" dev="tmpfs" ino=1989 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 181.437860][ T23] audit: type=1400 audit(1719946467.810:160): avc: denied { create } for pid=144 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 181.875636][ T8964] device syzkaller0 entered promiscuous mode [ 186.373531][ T9233] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.311282][ T23] audit: type=1400 audit(1719946475.740:161): avc: denied { create } for pid=9388 comm="syz.0.3404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 192.550963][ T9524] device syzkaller0 entered promiscuous mode [ 192.606023][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 194.126211][ T9613] device syzkaller0 entered promiscuous mode [ 194.725132][ T9650] device syzkaller0 left promiscuous mode [ 196.035640][ T9720] device bridge_slave_0 entered promiscuous mode [ 196.135245][ T6441] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.233604][ T9783] device bridge_slave_0 left promiscuous mode [ 197.303861][ T9788] device bridge_slave_0 entered promiscuous mode [ 197.432933][ T9798] device syzkaller0 entered promiscuous mode [ 198.274831][ T9837] device syzkaller0 entered promiscuous mode [ 198.348827][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 200.266344][ T9952] device syzkaller0 entered promiscuous mode [ 200.497388][ T23] audit: type=1400 audit(1719946486.880:162): avc: denied { create } for pid=9961 comm="syz.0.3627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 201.990867][T10013] device syzkaller0 entered promiscuous mode [ 202.371240][ T23] audit: type=1400 audit(1719946488.800:163): avc: denied { read } for pid=10051 comm="syz.4.3652" name="cgroup.subtree_control" dev="cgroup2" ino=179 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 202.475763][T10064] ÿÿÿÿÿÿ: renamed from pim6reg1 [ 212.106315][T10666] device sit0 entered promiscuous mode [ 212.831971][T10715] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.026406][ T1050] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.054557][ T1050] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.061464][ T1050] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.313503][T10773] device wg2 entered promiscuous mode [ 214.825338][ T23] audit: type=1400 audit(1719946501.250:164): avc: denied { create } for pid=10895 comm="syz.3.3960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 215.454753][T10961] veth0: mtu less than device minimum [ 216.014391][T10996] device syzkaller0 left promiscuous mode [ 216.457528][T11029] device wg2 entered promiscuous mode