last executing test programs: 5.042836257s ago: executing program 1 (id=2763): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffdc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x7, 0xfff, 0x9}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuset.effective_cpus\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x60000100, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f2, &(0x7f0000000080)) 4.699492195s ago: executing program 1 (id=2767): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000001400"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2605}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000002c7b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000065122c00000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r6}, 0x10) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x3800, 0x0, 0x0, 0x0) 1.870547213s ago: executing program 4 (id=2815): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x1, 0x6, 0x10, 0x200, 0xffffffffffffffff, 0x3, '\x00', r0, 0xffffffffffffffff, 0x2, 0x80000002, 0x0, 0x9}, 0x48) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x527cc3, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x20, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x9b5a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1a, 0x0, 0x4, 0x6, 0x150, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffd, 0x2}, 0x48) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x2251e8c7, 0x0, 0x9, 0x140, 0x1, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x4, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0xc, &(0x7f0000000b00)=ANY=[@ANYRESOCT=r3, @ANYBLOB="3f54981b67ab5f6a489c640da9086fc17aa5647e5a4beb239c69895a4e222e1e3ca7a385649110f5ecf9aaca2de4143ab4f3d85a6c15c04e53b1f71c5673db101333f21dcbed29ead0a6218da1d46142b58121633efc84527a55b3c28a2fcb3a5f235810ac8e01185513b8addff3da4b4bcb5f78fd50311f3bf71778b7a2dcefc2137358d101e1cafbaa949ebb03c3f0d5e889e577d65876299e97e0f153fa321c00f70e048964c73ce56186182b08d19d18f10ecb4aac1ef78b9a1749607d000000", @ANYBLOB="00000000b70800000000004d7b8af8ff00002300bfa200000000000007020008f8ffffaf6774a07c84ec8700b704000000000000000000002148f2ca20b05a114b8c81edfbce442dd66a603cb828f68e76649aef87b3a6dbe34cb2840000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000580)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r6}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000000000)='blkio.throttle.read_iops_device\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r5) close(r2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000001c0)='ext4_error\x00', r7}, 0x10) 1.605691085s ago: executing program 4 (id=2817): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x10) (async) close(0xffffffffffffffff) (async) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401}, 0x48) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) (async) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r3) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x3, 0xc, 0xfe, 0xa, 0x0, 0x1, 0x80009, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xe9e2, 0x2, @perf_bp={&(0x7f0000000000), 0x2}, 0x2, 0x4, 0x3, 0x1, 0xbd, 0x7, 0x6, 0x0, 0x2, 0x0, 0x3}, 0xffffffffffffffff, 0x800000000000006, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000080)='GPL\x00') r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r7, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r8}, 0x10) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r10, 0x20e, 0xe40, 0xfd000004, &(0x7f00000004c0)="b9180bb76003070c009e40f086dd1fff290000003b0020010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7472ce0ab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) syz_clone(0x40184000, 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000600)) bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0xb, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="923540628100000000000000ff7f000094000c0008f7ffff17120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018560000100000000000000000000000088c4000800300009500000000000000"], &(0x7f0000000ac0)='syzkaller\x00', 0x9d0, 0x98, &(0x7f0000000b00)=""/152, 0x41000, 0x29, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000cc0)={0x0, 0x10, 0x2, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001080)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x1ff}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000800)={{r6, 0xffffffffffffffff}, &(0x7f0000000780), &(0x7f00000007c0)=r5}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x1a, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000004f2ffff000000008900000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70300000000000085000000d31a2f490d9675e60000000028920e00000000009500000000000000"], &(0x7f0000000600)='GPL\x00', 0x2f6, 0xc0, &(0x7f0000000640)=""/192, 0x40f00, 0x11, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000840)=[r11, r1], &(0x7f0000000880)=[{0x5, 0x2, 0xd, 0xe}, {0x1, 0x2, 0x8}, {0x5, 0x4, 0x8, 0xc}, {0x0, 0x5, 0x3, 0xb}, {0x5, 0x5, 0xa, 0x2}, {0x1, 0x5, 0x1, 0x6}], 0x10, 0x5}, 0x90) 1.514188763s ago: executing program 4 (id=2818): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r2}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) write$cgroup_subtree(r0, 0x0, 0xffbf) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x56, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000001c40)="beb61ec2ca90080239f2a54e2368fa761313c3a024a98109ba1e2e7b780d03c54b7a83d56fce397842e724674507d531762055fca371ea775f418df7bee236c9b9968146efb3232ae3413b617445e98bb644a892b9337f1a9135d9f30457a8ffb21aef4a95a155fab70a40b086056b0f63331a66b3457c", 0x2}, 0x2c) 1.401532882s ago: executing program 2 (id=2819): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000000)=@framed={{0x72, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0x45}}, &(0x7f0000000480)='GPL\x00'}, 0x80) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000010a850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/249, 0xf9}], 0x1}, 0x0) close(r3) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="00000000020000008000000002bfa2000000000000070200e3f7ffffffb703000008000000b70400000000000085000000030000009600000000000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40086602, &(0x7f0000000000)=0xce) write$cgroup_int(r6, &(0x7f0000000200), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40305829, &(0x7f0000000040)) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000001f18110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x20, 0x5, 0x2, 0x7}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r9}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000050018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.392064823s ago: executing program 1 (id=2820): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) recvmsg(r1, &(0x7f0000000900)={&(0x7f0000000040)=@caif, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000300)=""/179, 0xb3}, {&(0x7f00000004c0)=""/238, 0xee}, {&(0x7f00000001c0)=""/34, 0x22}, {&(0x7f00000005c0)=""/193, 0xc1}, {&(0x7f0000000280)=""/57, 0x39}, {&(0x7f00000006c0)=""/234, 0xea}, {&(0x7f00000007c0)=""/213, 0xd5}], 0x7, &(0x7f00000008c0)=""/14, 0xe}, 0x0) 1.163393132s ago: executing program 2 (id=2821): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3e76c8c6504d4257, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000580)="b9ff0300600d698cff9e14f008004de7f9c764360000001100135433f6e31e17128c", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000050000000c000000020000000000000000000004000000000000"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x3}, 0x10}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000610000de9cbab0f1acc0634681e08c46"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) write$cgroup_int(r3, 0x0, 0x0) (async) sendmsg$unix(r3, 0x0, 0x2404c0d1) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) (async) syz_clone(0x2c000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f0000000040)}, 0x20) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="65caf946b6fb3d467a8160797607f284d297d31b18a18695bd9267e4c2495f1b8ae368bf1619292a60094ff311327bd7790a0156149cae0a1774476dee657d69879a28681054eb0aa7ec0fa4f32a17edd99b8487402be0abea8bbf82b72a336f458cfdbb559ad7ef7bb97268aad3"], 0x0, 0x800000, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x25, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2fc2800c}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x12) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r6, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="5aee41dea43e63a3f7fb7f11c72b", 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3}, 0x50) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r3, 0x58, &(0x7f00000002c0)}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xa, 0x200000bc, 0x0, &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80}, 0x90) 1.135858605s ago: executing program 4 (id=2823): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xea, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=@framed, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xee, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x2, 0x3}, @func_proto, @struct={0x0, 0x0, 0x0, 0x9, 0x0, 0x2}]}}, &(0x7f00000005c0)=""/240, 0x3e, 0xf0, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0x1}, 0x0, &(0x7f0000000040)}, 0xfffffffffffffed4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_int(r1, &(0x7f00000001c0)=0x670, 0x12) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000008000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000140000fbb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000001"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x2d) ioctl$TUNGETDEVNETNS(r5, 0x8982, 0x20000000) setsockopt$sock_attach_bpf(r2, 0x1, 0x10, &(0x7f0000000000), 0x4) sendmsg$inet(r2, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r2, &(0x7f0000002d40)={0x0, 0x0, &(0x7f0000002980)=[{&(0x7f0000000040)='P', 0xfe1b}], 0x1}, 0x0) socketpair(0x1f, 0x80000, 0x10000, &(0x7f0000000240)) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='global_dirty_state\x00', r8}, 0x10) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r9, 0x0, 0x0}, 0x10) 985.679167ms ago: executing program 0 (id=2825): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000a80)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000400000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0xd, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b5af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000300008500000014000000850000000500000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0x10001, 0x9, 0x1}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x64}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x0, 0xc}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x4, 0x5}, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='sys_enter\x00', r3}, 0x10) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x26}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) socketpair(0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=@framed={{}, [@map_idx_val, @tail_call, @printk={@ld}, @initr0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 985.156687ms ago: executing program 0 (id=2826): perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x9c, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000580), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x9c, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000580), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000c0000000000000003000000185700000c000039974023b366925f0015a4400000000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0d8000085000000060000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x81d, 0x31, &(0x7f0000000280)=""/49, 0x41100, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0xc, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000380)=[{0x5, 0x1, 0x7}], 0x10, 0x8}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x3, 0x8, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000380), &(0x7f00000003c0)='%-010d \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000d0000a03dff0000", @ANYRES64=0x0, @ANYBLOB="0000000004000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000a30000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) (async) close(r4) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@rights={{0x10}}, @cred={{0x1c}}], 0x30}, 0x40000000) (async) recvmsg$unix(r3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@rights={{0x10}}, @cred={{0x1c}}], 0x30}, 0x40000000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff15, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff15, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa3230b0"], 0xfdef) (async) write$cgroup_subtree(r9, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa3230b0"], 0xfdef) 984.803437ms ago: executing program 2 (id=2827): perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="0100001106000000691066000000000004000000000000009500000011000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x400000, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x100000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x500d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='ext4_ext_remove_space_done\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a02, 0x1700) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000005c0)={'veth0_macvtap\x00', 0xf101}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xa) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f00000000c0), 0x12) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x2, 0xc}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000300000000000000000018110000bce5d8860dee0e961c5318ca83664f74dad4ccf82f77008b5d3721d438385a54266471aeedb648fead20ce6acc7b39f69b71e3c5007c8a5488ad9ed027a10f946ab8f946a6ca7a4ee56f6213baa312e13e904186d3", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000005a00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000007d00000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1d, 0x80000, 0x2, &(0x7f0000000200)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000940)='ext4_es_find_extent_range_exit\x00', r8}, 0x10) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xe, 0x4, &(0x7f0000001200)=ANY=[@ANYBLOB="180000000000000000000000000000007110360000000000950000070000000071a6a8cf894e189cd05deac28da285b787dded5975a88b0f35c83fd850f9af41bfa8b766aa339fef845bb5ed6f3ed4956d892ea0e292c241b07839a62cfac526b32ed2e08a9a8db638"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x30, 0xff, 0x0, 0xfffff010}, {0x6}]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x6, 0xffff, 0x4, 0x2, r4, 0x8, '\x00', 0x0, r4, 0x0, 0x2, 0x4, 0x6}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000080)={r9, &(0x7f00000000c0), 0x20000000}, 0x20) 968.576768ms ago: executing program 3 (id=2828): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)) write$cgroup_devices(r2, &(0x7f0000000b00)=ANY=[@ANYBLOB="1e0306003c5c980128876340860800703c1ffe80000000000000ffffa1dce408db9d13", @ANYBLOB="292f4a1081a74a421dbaeb711010ca87"], 0xffdd) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1804000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000002000000181100000223787e9112691cd0e3668963fe2881ad7dd2a9e2e68acf78efcc22ea34607e5d2302c2eefca19769eb4ad1baee9b717ecb37ee1adcb63528901d94bdf98f50626361e13e963580a89d8e0f90b1ac38c2ebb8a597f9a46cb4eb0d23affab993a8b0f55c899e0236ba6aff19c540d8f3e0dded73e88e0a2d126e88a5262a2bc7e998a1c05f32cb03c6dd7002b0804c99ef847362d74e6db7a99aead07725241d798edfc77149d771cc4cad5b018a1fb938", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r6}, &(0x7f0000000180), &(0x7f00000001c0)='%pB \x00'}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r7}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r6}, &(0x7f0000000340), &(0x7f0000000380)=r4}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000740)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r6, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x3, 0x114, &(0x7f00000004c0)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0xffffffff, 0x0, 0x0, 0x41000, 0x0, '\x00', r8, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x10, 0x6}, 0x90) 921.826633ms ago: executing program 0 (id=2829): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000001000000000000180100002020702568ce1958170ee8d0b13000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072000000950000000000000019cb9917eed567afac92ffe9608c30da6bad4ed78f2a7be6302bdcc7f59d04bdfb370cbc63fe62ce4e99c97293f86098475cf152a7e7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='percpu_free_percpu\x00', r0}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) (async) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000fe010000020000f8ffffffb703000008000000b7040000000000008500"/72], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200), 0x3, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000000000000000001811", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x81, 0x7}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sys_enter\x00'}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r8, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080), 0x0, 0xca, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0xe0, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r13 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="9feb0100180000000000000010000000100000000a000000040000000000000e010000000100000000305f30615f00302e00e9f26f4276334e51414603a1e1061c472bdd0f2f32f27690529aeebf23c4f20022585c048b9bc2f254026d074b04e5da81a91c948b775f4ed45a29939b28f28fc501dd8ba9c7dd4ba9e365a98ac42e0ab38a9b2cd1192249c6f8140e1b0585b373a3d9902e11f3797e5b6baf741e0d44e6de9231e9a57c3fe200"], &(0x7f0000000540)=""/115, 0x32, 0x73, 0x0, 0x7fff}, 0x20) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000740)=ANY=[@ANYRES8=r5, @ANYRESDEC=r11, @ANYRESHEX=r5, @ANYBLOB="6359c23e23efb46bf1c3eeb5", @ANYRES64=r13], &(0x7f0000000240)='GPL\x00', 0xd, 0xffffffffffffff71, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, r12, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r14}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0xc, 0xe, &(0x7f0000002600)=ANY=[@ANYRES32=r0], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, r13}, 0x90) r16 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x3, 0x8}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) (async) r17 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000008c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095", @ANYRES32=r2, @ANYRES16=r10, @ANYRES32=r9, @ANYRES32=r4, @ANYBLOB="c93fa6a6878960f930ee006b707f3cf1db7cfa76a555baca971d2a2b244745a8971aa23f5c8be2613aad010001003f678e91c7cec4"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r16, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r18 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000840)=ANY=[@ANYRES8=0x0, @ANYRESDEC=r6, @ANYRES32=r3, @ANYRESOCT=r6, @ANYRESOCT=r15, @ANYRES32=r12, @ANYRES8=r18, @ANYRESOCT=r17], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2}, 0x90) 842.709269ms ago: executing program 4 (id=2830): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000840), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) openat$cgroup_freezer_state(r1, &(0x7f0000002b00), 0x2, 0x0) close(r0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r4}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0xe, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x0, 0x0, 0x1, 0x1, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0185879, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) 840.005189ms ago: executing program 0 (id=2831): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffff7f850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x10, 0x32}, [@ldst={0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x3b) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000000000000701000003ffffffb702000008000000b703000000000083"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='ext4_ext_show_extent\x00', r4}, 0x10) r6 = openat$cgroup_devices(r0, &(0x7f0000000380)='devices.deny\x00', 0x2, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000002c0)=[{&(0x7f00000004c0)="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", 0xfb}, {&(0x7f00000005c0)="4a372aa0069792b61f3ced12e048c048c7b40cef164f894037ac18794062f5ef0da815b5ed6ff87fe19b7c56f229fe823d90c1b0eebc86e2e0854dcced44ef34967a94ec5c7e553b22555b34bad489486aa2964296b8606d5841bc", 0x5b}, {&(0x7f0000000640)="b8751f7d005e49d219760b2c52e45a8be03bdda935ce35ae1862bf555d7ebd10fa48d4b34fcaf15f8527a934d18dce8498040f21ae01b425c03acf87b84958bac29a7f1c5799a55c40d72134e6dc401166fd61905a2c2fa91e8694bfe0681f985afef584dc21a84a961e3b00c5b4b5cf3d63fc40ed498fcee6625e7b1109dc2c6aa1ee42be3929c3af5f705f28182cda92aa03fff49475e0cde339a3f14a5feee5ae64102a1698caed676c5cc67f010cb17f81ba6491ac199ef60bee86b059f7d41b2dc6e03b0a57a024d37d6996", 0xce}], 0x3, &(0x7f0000000740)=[@rights={{0x28, 0x1, 0x1, [r5, r6, 0xffffffffffffffff, r3, r1, r2]}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [r5]}}], 0x50, 0x40040}, 0x24000084) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0xf, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x1c, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffff09a400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800fcffffe2ffff19ea00000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xf) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='qdisc_create\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r8}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f0000000080)) 839.088789ms ago: executing program 4 (id=2832): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18010000000020000000000000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000050000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) close(r2) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r6, 0x0, 0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000cc0), 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x16, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000001000000000000000000000071121200000000009500001a000000004992dca8c88034bc955dc788323fc24347b59e8b2a0a0456e31b8d1cbcd7f0df406d7849f295ff4e5b251367c62cb69b4efa767fbbbb9baa5034f23d16dc09b9636e73bda842f7ea466262e8faa0bbfd289f20090fca7d16f18b34d4f285b8995948efdc4bd274179071f26a9992a2340313ad3238c254308c18a6d7c86e86248d399c55aef442b330a7e423b76525918a3c9c7f5814cb26b7d5da9d85913484b88203654db4e0e1b0570d880754533fb6144bec43daf7a5fb3398e97fbb48a88f367fbe132dd7914de9559876720b0b0693500d126cf8fabe626c729cad2384479bd230c15b061a15d7fe41497f5b11bf868f040d693fecb929d4eef4ea91f42633424723fdf81a4b4f80ba75344a38ff8b7c32c04419c9b0202fb7352f39111aa056ee73d357552797866e467f099204282871bc8b1a96a165fa05ad4e8b5cd4daf7bb6751bc4a"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='kvm_ioapic_delayed_eoi_inj\x00', r7}, 0x10) 838.790789ms ago: executing program 2 (id=2833): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0xffffffff, 0x3f328bd6, 0x9, 0x1010, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x2, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9d, 0x9d, 0x5, [@restrict={0x1, 0x0, 0x0, 0xb, 0x1}, @fwd={0x7}, @union={0xd, 0x4, 0x0, 0x5, 0x0, 0x4, [{0xc, 0x3, 0x5}, {0x4, 0x0, 0x9}, {0xa, 0x2, 0x2}, {0x10, 0x1, 0x7}]}, @datasec={0x7, 0x4, 0x0, 0xf, 0x1, [{0x5, 0xe, 0xbb7}, {0x4, 0x0, 0x9}, {0x4, 0x8, 0x401}, {0x5, 0x0, 0x52}], "94"}, @typedef={0x1}]}, {0x0, [0x2e, 0x30, 0x61]}}, &(0x7f0000000200)=""/38, 0xbd, 0x26, 0x0, 0x2}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x5, 0x6, 0x1, 0x1ff, 0x440, r0, 0x40, '\x00', r2, r3, 0x2, 0x5, 0x5}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000300)={r4, 0xffffffffffffffff}, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540)={0x401, 0x0}, 0x8) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x14, 0xf, &(0x7f0000000340)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0xca9}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}], &(0x7f00000003c0)='syzkaller\x00', 0x6, 0xdb, &(0x7f0000000400)=""/219, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, r6, r7, 0x5, &(0x7f00000005c0)=[r4], &(0x7f0000000600)=[{0x3, 0x1, 0x1, 0x1}, {0x5, 0x4, 0x2, 0x4}, {0x4, 0x3, 0x9, 0xa}, {0x2, 0x4, 0xc, 0xd}, {0x0, 0x1, 0xf}], 0x10, 0x5}, 0x90) unlink(&(0x7f0000000740)='./file0\x00') (async) socketpair(0x27, 0x4, 0x9, &(0x7f0000000780)) (async) ioctl$TUNGETSNDBUF(r7, 0x800454d3, &(0x7f00000007c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000840)={0x0, r7}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b00)={r7, 0x58, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000bc0)={r1, 0xb, 0x8}, 0xc) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x18, 0x15, &(0x7f0000000880)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000940)='syzkaller\x00', 0x1, 0xf4, &(0x7f0000000980)=""/244, 0x40f00, 0x12, '\x00', r9, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000b80)={0x3, 0xf, 0x6, 0x6}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000c00)=[r5, r5, r0, r10, r7, r4, r4, r4], &(0x7f0000000c40)=[{0x2, 0x4, 0x9, 0xc}, {0x3, 0x4, 0xa, 0x2}, {0x2, 0x3, 0xc, 0x7}, {0x0, 0x3, 0x5, 0x1}, {0x2, 0x1, 0x4, 0x4}, {0x5, 0x4, 0x3, 0x7}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001140)={r11, 0x0, 0xf5, 0x99, &(0x7f0000000d80)="d9e193abf599950fb1b0ae9e5e16638d4d499c9afbc58bb11b3de0c78f63ec8070f23d0feb5a3ba601d10b2b1c47e5ce85e35d61970ee0737cad7e15cb12a53f9f2f7193b6439143ae862d2af66b3ec9d254301fd3e5612f0874a6f32053c68f88ee545cf711c1deedee81ef0c1173d3c90a93b03a732ab65306df7c95f20aec4c654d7d3fedfbaa4b6741ae8b21c09b8b238792bfcad347a0b5bb6b901299250bb5e5f511cc5dd61f4943a493bfdc6520f28b0b575f34f6748e0418dc5cc0a38cd75c4e19037fb16b0b0d6cb8ef5a0f7b402e975d8807c79b933015285e1c24fad7438956a04a09c7aa6342951fbe468fdb22160a", &(0x7f0000000e80)=""/153, 0x9, 0x0, 0xc7, 0xff, &(0x7f0000000f40)="e3c62036b67bf376884461d6890ae5d541c06bad95a8b88fb01ed591a49085b6c2e9a8c5624c3c4c4826caabd277a40f91bde42641be0eefd8b90ed847fc8f9eee6e6f8d92be92d7ef481e15985dfb625486c71a7beb16e08944a82492cb0e0954ac281c7bec89f02c5c7ebb10dbf5e851ab4f3f1be91c2221a7716a9e2ea32a8d4650430f32f379b0c43c094efd0a04dbe6291cd637e75b405f6f1d8b111ab3a7ca5d06aa715d51daa7dafa7c1597b4b9a04d0fab7442ee0e09a90ac8174e001b43a979766a14", &(0x7f0000001040)="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", 0x0, 0x0, 0x8ff}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000011c0)) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001200)='./cgroup/syz1\x00', 0x200002, 0x0) r13 = openat$cgroup_ro(r12, &(0x7f0000001240)='blkio.bfq.sectors\x00', 0x0, 0x0) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001280)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x597, '\x00', r2, r3, 0x2, 0x3, 0x4}, 0x48) (async) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000001300), 0x800, 0x0) ioctl$TUNSETIFF(r14, 0x400454ca, &(0x7f0000001340)={'gre0\x00', 0x8000}) (async) ioctl$TUNGETFILTER(r13, 0x801054db, &(0x7f0000001380)=""/96) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001400)={0xd8000000}, 0x8) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000014c0)={{r0}, &(0x7f0000001440), &(0x7f0000001480)='%+9llu \x00'}, 0x20) (async) openat$cgroup_ro(r13, &(0x7f0000001500)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001540)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001580)={r8, 0xfffffffc, 0x18}, 0xc) (async) write$cgroup_devices(r13, &(0x7f00000015c0)={'c', ' *:* ', 'r\x00'}, 0x8) 769.385985ms ago: executing program 3 (id=2834): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x0, 0x8, 0x8}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r1}, &(0x7f0000000080), &(0x7f0000000280)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7968dd986c45630002008daa"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f0000000b00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x2}]}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}]}}, &(0x7f0000000b80)=""/230, 0x3a, 0xe6, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r6, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x21, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000500), 0x8, 0xb0, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0x20, &(0x7f0000000800)={&(0x7f0000000700)=""/114, 0x72, 0x0, &(0x7f0000000780)=""/78, 0x4e}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x13, 0x11, &(0x7f00000001c0)=ANY=[@ANYBLOB="ac69f8fffcffffff18110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000000000000850000008600000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7020000e223e838d07e3a27eb77e900850000008600000018000000030000000000000001010000a40095000100ff000000186b00000e000b00"/82], &(0x7f0000000280)='syzkaller\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x20, '\x00', r8, 0x12, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x1, 0x5, 0xfffffffa, 0xff}, 0x10, r9, r6, 0x0, &(0x7f0000000880)=[r0]}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0xfffffff8, 0x0, 0x1, 0xffffe5a8, '\x00', r8, 0xffffffffffffffff, 0x3, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000dd0a00000000000063010900000000009500000000004000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7}, 0x48) 750.958527ms ago: executing program 3 (id=2835): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='signal_generate\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x12, 0x0, 0x0, 0xfffffd25, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400), 0x8, 0x10, &(0x7f0000000500)={0x0, 0x0, 0x5, 0x201}, 0x10}, 0x90) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x19, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000feffffffffffffff00000095faffffff00000018bf50ddaa"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000016000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 670.826584ms ago: executing program 2 (id=2836): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0x1, 0xffffffffffffffff}, 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000100)="7941e6a0f67d010ba93f3c6c2821a3db942de1821b9dba68e160c64048ace76600fc90c0f12147fe76dcd2c1f03e59ed73da"}, 0x20) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB], 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200b43, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) close(r1) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) (async) close(0xffffffffffffffff) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8922, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff9500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) 505.400937ms ago: executing program 3 (id=2837): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0x3f, &(0x7f00000003c0)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000004b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='mm_page_free_batched\x00', r5}, 0x10) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x10, &(0x7f0000000040), 0x4) sendmsg$inet(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="9e", 0x1}], 0x1}, 0x0) recvmsg$unix(r6, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002d00), 0x45}, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40286608, &(0x7f0000000540)) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000680)=ANY=[@ANYRES32=r0, @ANYRES32=r2, @ANYRES32], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x0, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="18008000000000f6ffffff00000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r9}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 504.716397ms ago: executing program 2 (id=2838): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000088fe508a8500000004000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = perf_event_open(&(0x7f0000000300)={0x4, 0x80, 0x5, 0x4, 0x2, 0x64, 0x0, 0xffff, 0x1000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7117, 0x0, @perf_bp={&(0x7f0000000080), 0x7}, 0x823, 0x1, 0xd43c, 0x7, 0x3, 0x7, 0x8, 0x0, 0x4, 0x0, 0xe0}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r2}, 0x10) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 499.697288ms ago: executing program 1 (id=2839): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000500)={0x3, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000118110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(0xffffffffffffffff) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r1, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='freezer.state\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x10, &(0x7f0000000680), 0x0, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x16, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r5, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) write$cgroup_pid(r6, &(0x7f0000000000), 0xfdef) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x8, 0x7, 0x2, 0x0, 0x1, 0x11b5, '\x00', 0x0, r1, 0x3, 0x0, 0x5, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1b, 0x3, &(0x7f0000000080)=@raw=[@map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd}, @generic={0x7, 0x8, 0xb, 0x1, 0x2}], &(0x7f0000000200)='GPL\x00', 0x3, 0x9a, &(0x7f0000000280)=""/154, 0x41000, 0x40, '\x00', 0x0, 0x11, r4, 0x8, &(0x7f0000000380)={0x3, 0x4}, 0x8, 0x10, 0x0, 0x0, r5, r3, 0x0, &(0x7f00000004c0)=[r1, r1, r1, r1, r6, r7, r1, r1], 0x0, 0x10, 0x6}, 0x90) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) 352.70472ms ago: executing program 3 (id=2840): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000b00)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa4000000000000070400060000000000000000080000001823000014aed6139469b0d07f72fc733beb155b9155b6090e2d1043e6a4082681d4eb03436d725900"/138, @ANYRES32=r0, @ANYBLOB="0000000000000000b70400000800000085000000950000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000bc0)={0x1, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x2}, 0x0, 0xcd0a, 0x40, 0x0, 0x0, 0x0, 0x15e, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x5, 0x9fd, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000180), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r2, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], 0x0, 0xb0, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000003c0), &(0x7f00000004c0), 0x8, 0x6c, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000c0000000c00000000a000000030000000000000100000000250048040000000000000003000000000400000000000000ffff0000010000000000000204000000070000000000000e0100000001000000000000000400000d00000000000000000000000000000000010000000f0000000200000003000000030000000f00000000000002000000000000000000000003000000000400000001000000ff010000000000675d00000d000000000b0000000100000006000000020000000700000000000000000000000500000000302e61615f2e002e00"], &(0x7f0000000880)=""/230, 0xe2, 0xe6, 0x0, 0x1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x9e0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="ffff000000000080b7080000000000007b8a0035ce5cab000000000007020000f8ffffd1d303000008000000b70400000000000085000100c30000009400000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000980)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x33, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300), 0x0, 0xac, 0x0, 0x0, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0xcf, 0x8, 0x8, &(0x7f0000000280)}}, 0x9) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x8, &(0x7f0000000a40)=ANY=[@ANYBLOB="180000000002000000000000ff00000018120000", @ANYRES32=r4, @ANYBLOB="000000000000850cb7030000000000008500000000000095000000000000000000000000000000000b98038655bb07beddca3311e1446d6e73d1bff25c153195962c814b7a07fc34b48d04d69c47719bae096a905b65f13d0b7b832c2d24f0440f007fe49a89249be63b3754"], &(0x7f00000001c0)='GPL\x00', 0x5, 0x30, &(0x7f0000000200)=""/48, 0x41100, 0x16, '\x00', r5, 0x25, r4, 0x8, &(0x7f0000000600)={0x7, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000640)=[r4, r3, r4], &(0x7f0000000680)=[{0x1, 0x3, 0x2, 0x1}, {0x5, 0x2, 0x2, 0x5}, {0x5, 0x0, 0x0, 0x7}, {0x0, 0x5, 0xd, 0x1}, {0x5, 0x2, 0xd, 0x3}, {0x5, 0x2, 0x6}, {0x0, 0x1, 0xe, 0xb}, {0x0, 0x4, 0x10}, {0x3, 0x1, 0x3, 0x7}], 0x10, 0x6}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r9) 198.442313ms ago: executing program 1 (id=2841): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440), 0x1e3701, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00'}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x99, 0x1, 0x0, 0x9, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffff, 0x101}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000300)=ANY=[], &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x13, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='block_plug\x00', r2}, 0x10) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x200200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_config_ext, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0xf, &(0x7f0000000380)=@ringbuf, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x7fe4, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r6, &(0x7f0000000380), 0x20000000}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000001c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000009c0)='kfree\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x7, 0x1c, &(0x7f0000000580)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bca900000000000045090200000300006e00000000000000b7020000000000007b9af0ff00000000c509000000000000c3aaf0ff00000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffffb702000008000000180200007a365e14c560a42c274a76620b249312bfa35394dd7b86b0a7cb56e90418bdb2ea002692d915ed082a8016f5cfab7e4d86509850e32c277d1e29c6a7886201bb20f8af5213579052011f444a34832815b2b9cf20fe593fe185b827575ba21e216c1b82bd0c5e9bb7377bd5f0", @ANYRES32=r4, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x2800000002000000, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x0, 0x4000000, 0x700}, 0x28) 147.687727ms ago: executing program 3 (id=2842): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x435, 0x0, r0, 0xfd3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x5}, 0x48) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 129.970749ms ago: executing program 0 (id=2844): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x2f}) socketpair(0x2c, 0xa, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a2, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xf, 0x5, 0x10001, 0x5, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000f40)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRESOCT=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffff9503000008000000b70400000000000085000000349c23cd9c3101000000953cb20a7c8f717c711431b187e88db7a1de80592909b28db23162693845ab291468f94c26e10567f5a03bf4cc51c1fb023881c166a93363d2047fef57c98d0292ab0424bb143d002f402e1319b4eabc3d4977cf18b1efef018a6beafbe9e859"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r2, &(0x7f0000000840), 0x2, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000002b00), 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x2a}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) close(r3) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x9, 0x0}, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0xfffffffffffffef6, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) r7 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1801000000081000000000000000000085"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000e40)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='ext4_ext_convert_to_initialized_enter\x00', r8}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_int(r9, &(0x7f0000000200), 0x42400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb9e962116da8cc5b82a05dd42"], 0xfdef) close(r11) 9.296019ms ago: executing program 1 (id=2845): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x0, 0x5}, 0x48) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x7, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES64=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000080), 0x0}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a0ef010095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401}, 0x48) socketpair(0x0, 0x1, 0x7, &(0x7f0000000040)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) r7 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x949, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r7, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000980)={{r9}, &(0x7f00000008c0), &(0x7f0000000940)='%ps \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100036c00fe08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 0s ago: executing program 0 (id=2846): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYRES64, @ANYRES16=r0, @ANYBLOB="3793de5b49031bd41737829a7cc248d1b3cac02355484080899090b9d33e39077602c98c85d1797a5ef9bc4bb3ca976c5701f4f0cb0e86392b9a8434b97aed8918919912e4056a15020eb45d7b61566c63055ece1853bff3ba5dacd0eb843d7279d9ef8e096a1ec16594259988e3dafeafac17989fd04db49ec259371ea9", @ANYRES16=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffec8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) socketpair(0x1d, 0x803, 0x1, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x10, &(0x7f0000000ac0)=ANY=[@ANYRES16=r4, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000"], &(0x7f0000000200)='GPL\x00', 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x9c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) close(r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$SIOCSIFHWADDR(r7, 0x8b26, &(0x7f0000000080)={'wlan1\x00', @random="000000f900"}) (async) ioctl$SIOCSIFHWADDR(r7, 0x8b26, &(0x7f0000000080)={'wlan1\x00', @random="000000f900"}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x8, &(0x7f0000000380)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @call={0x85, 0x0, 0x0, 0x7d}]}, &(0x7f0000001240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000040)='mm_lru_insertion\x00', r8}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x2009) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0xc00d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0xc00d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000002000000000000000000008300000000000000000000000100000000000000000000427263219f4344c3cbb5b2efcd695b218e20bab2c56cf9acc2a233a231415f62567939cd02c08aedfc481a94d4b9d15fa7d3c504907326398b1d52a15048372b18dd3c5facdd7ab1e874516de9a28f5cc9b3ee6d6c"], &(0x7f00000001c0)=""/163, 0x36, 0xa3, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000940)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r10, 0x1, 0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) kernel console output (not intermixed with test programs): [ 3.307759][ T24] audit: type=1400 audit(1720378490.520:9): avc: denied { append open } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3.310981][ T24] audit: type=1400 audit(1720378490.520:10): avc: denied { getattr } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3.601139][ T92] udevd[92]: starting version 3.2.11 [ 3.647352][ T93] udevd[93]: starting eudev-3.2.11 [ 12.269310][ T24] kauditd_printk_skb: 50 callbacks suppressed [ 12.269321][ T24] audit: type=1400 audit(1720378499.490:61): avc: denied { transition } for pid=217 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.273331][ T24] audit: type=1400 audit(1720378499.490:62): avc: denied { noatsecure } for pid=217 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.276271][ T24] audit: type=1400 audit(1720378499.490:63): avc: denied { write } for pid=217 comm="sh" path="pipe:[13623]" dev="pipefs" ino=13623 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 12.279746][ T24] audit: type=1400 audit(1720378499.490:64): avc: denied { rlimitinh } for pid=217 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.282416][ T24] audit: type=1400 audit(1720378499.490:65): avc: denied { siginh } for pid=217 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.76' (ED25519) to the list of known hosts. [ 19.178675][ T24] audit: type=1400 audit(1720378506.400:66): avc: denied { mounton } for pid=271 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.179793][ T271] cgroup: Unknown subsys name 'net' [ 19.181892][ T24] audit: type=1400 audit(1720378506.400:67): avc: denied { mount } for pid=271 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.185603][ T24] audit: type=1400 audit(1720378506.400:68): avc: denied { unmount } for pid=271 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.185765][ T271] cgroup: Unknown subsys name 'devices' [ 19.338813][ T271] cgroup: Unknown subsys name 'hugetlb' [ 19.344196][ T271] cgroup: Unknown subsys name 'rlimit' [ 19.477306][ T24] audit: type=1400 audit(1720378506.700:69): avc: denied { setattr } for pid=271 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.500231][ T24] audit: type=1400 audit(1720378506.700:70): avc: denied { mounton } for pid=271 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 19.517324][ T273] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 19.524887][ T24] audit: type=1400 audit(1720378506.700:71): avc: denied { mount } for pid=271 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 19.556039][ T24] audit: type=1400 audit(1720378506.750:72): avc: denied { relabelto } for pid=273 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.581346][ T24] audit: type=1400 audit(1720378506.750:73): avc: denied { write } for pid=273 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.581387][ T271] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 19.606706][ T24] audit: type=1400 audit(1720378506.780:74): avc: denied { read } for pid=271 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.606723][ T24] audit: type=1400 audit(1720378506.780:75): avc: denied { open } for pid=271 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.072705][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.079626][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.086711][ T279] device bridge_slave_0 entered promiscuous mode [ 20.106738][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.113584][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.120761][ T279] device bridge_slave_1 entered promiscuous mode [ 20.159140][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.165973][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.173243][ T281] device bridge_slave_0 entered promiscuous mode [ 20.186493][ T280] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.193444][ T280] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.200686][ T280] device bridge_slave_0 entered promiscuous mode [ 20.207084][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.213962][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.221070][ T281] device bridge_slave_1 entered promiscuous mode [ 20.243415][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.250282][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.257533][ T282] device bridge_slave_0 entered promiscuous mode [ 20.263945][ T280] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.270986][ T280] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.278126][ T280] device bridge_slave_1 entered promiscuous mode [ 20.298973][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.305800][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.313032][ T282] device bridge_slave_1 entered promiscuous mode [ 20.385056][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.391985][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.399145][ T283] device bridge_slave_0 entered promiscuous mode [ 20.411630][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.418474][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.425629][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.432445][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.442790][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.449701][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.456818][ T283] device bridge_slave_1 entered promiscuous mode [ 20.513922][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.520766][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.527872][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.534647][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.556055][ T53] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.563235][ T53] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.570265][ T53] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.577482][ T53] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.585421][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.592938][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.627774][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.636085][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.644583][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.651408][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.659665][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.667559][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.674311][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.681710][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.689622][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.696450][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.703630][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.711557][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.718387][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.725492][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.733186][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.747477][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.755413][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.775064][ T281] device veth0_vlan entered promiscuous mode [ 20.787649][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.795065][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.804110][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.812061][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.819438][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.826583][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.835162][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.842009][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.849295][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.867436][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.874723][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.889542][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.897855][ T53] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.904668][ T53] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.918633][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.926666][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.933563][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.941007][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.949331][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.956147][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.963403][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.971407][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.978329][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.985677][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.993097][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.007729][ T279] device veth0_vlan entered promiscuous mode [ 21.013844][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.021794][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.029103][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.036448][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.044418][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.052491][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.062134][ T281] device veth1_macvtap entered promiscuous mode [ 21.071601][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.079527][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.087573][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.094411][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.113084][ T279] device veth1_macvtap entered promiscuous mode [ 21.121485][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.129529][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.137686][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.145455][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.153379][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.161809][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.169654][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.177468][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.185112][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.193153][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.201141][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.208561][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.216512][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.232972][ T280] device veth0_vlan entered promiscuous mode [ 21.239043][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.247762][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.255865][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.263911][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.282276][ T282] device veth0_vlan entered promiscuous mode [ 21.289710][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.296954][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.304425][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.312744][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.320935][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.328946][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.336952][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.345373][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.353571][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.361413][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.369268][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.377342][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.392628][ T283] device veth0_vlan entered promiscuous mode [ 21.399448][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.406694][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.414647][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.422952][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.431153][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.438880][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.462384][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.469976][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.477211][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.485086][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.494111][ T281] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 21.504455][ T280] device veth1_macvtap entered promiscuous mode [ 21.515977][ T283] device veth1_macvtap entered promiscuous mode [ 21.526479][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.534290][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.547458][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.555421][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.570553][ T282] device veth1_macvtap entered promiscuous mode [ 21.587835][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.595815][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.604478][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.612832][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.621891][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.629843][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.637837][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.645217][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.653219][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.661410][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.669589][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.703683][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.712890][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.722128][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.730182][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.036611][ C0] hrtimer: interrupt took 25670 ns [ 22.252631][ T408] cgroup: syz.1.23 (408) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 22.337851][ T407] : renamed from veth0_vlan [ 22.624481][ T408] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 22.994804][ T440] bridge0: port 3(ip6gretap0) entered blocking state [ 23.008260][ T440] bridge0: port 3(ip6gretap0) entered disabled state [ 23.038179][ T440] device ip6gretap0 entered promiscuous mode [ 23.044757][ T440] bridge0: port 3(ip6gretap0) entered blocking state [ 23.051377][ T440] bridge0: port 3(ip6gretap0) entered forwarding state [ 23.079230][ T448] syz.0.35[448] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 23.079296][ T448] syz.0.35[448] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 23.085023][ T442] device syzkaller0 entered promiscuous mode [ 23.523280][ T478] device sit0 entered promiscuous mode [ 24.318914][ T24] kauditd_printk_skb: 43 callbacks suppressed [ 24.318925][ T24] audit: type=1400 audit(1720378511.540:119): avc: denied { create } for pid=503 comm="syz.3.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 24.481647][ T24] audit: type=1400 audit(1720378511.650:120): avc: denied { create } for pid=503 comm="syz.3.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 24.764481][ T511] device pim6reg1 entered promiscuous mode [ 25.048002][ T553] macvlan0: tun_chr_ioctl cmd 1074025681 [ 25.119945][ T563] device pim6reg1 entered promiscuous mode [ 25.203032][ T583] device syzkaller0 entered promiscuous mode [ 25.264980][ T586] device pim6reg1 entered promiscuous mode [ 25.282992][ T593] device pim6reg1 entered promiscuous mode [ 25.437171][ T24] audit: type=1400 audit(1720378512.640:121): avc: denied { write } for pid=604 comm="syz.0.82" name="ppp" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 26.450283][ T24] audit: type=1400 audit(1720378513.660:122): avc: denied { relabelfrom } for pid=671 comm="syz.4.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 26.486215][ T24] audit: type=1400 audit(1720378513.660:123): avc: denied { relabelto } for pid=671 comm="syz.4.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 26.812490][ T781] device syzkaller0 entered promiscuous mode [ 26.890686][ T24] audit: type=1400 audit(1720378514.110:124): avc: denied { setopt } for pid=799 comm="syz.4.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.001743][ T813] device syzkaller0 entered promiscuous mode [ 27.367020][ T24] audit: type=1400 audit(1720378514.580:125): avc: denied { create } for pid=858 comm="syz.3.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 27.630960][ T865] device pim6reg1 entered promiscuous mode [ 28.779980][ T946] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 28.789013][ T946] device syzkaller0 entered promiscuous mode [ 28.853336][ T944] device pim6reg1 entered promiscuous mode [ 28.882263][ T957] device veth1_macvtap left promiscuous mode [ 29.028142][ T966] device pim6reg1 entered promiscuous mode [ 30.105131][ T1072] device pim6reg1 entered promiscuous mode [ 30.207540][ T1077] device syzkaller0 entered promiscuous mode [ 30.265914][ T1086] device syzkaller0 entered promiscuous mode [ 30.384921][ T24] audit: type=1400 audit(1720378517.600:126): avc: denied { create } for pid=1093 comm="syz.0.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 30.424175][ T24] audit: type=1400 audit(1720378517.600:127): avc: denied { create } for pid=1093 comm="syz.0.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 30.425274][ T1105] device pim6reg1 entered promiscuous mode [ 30.535209][ T1120] bridge0: port 3(ip6gretap0) entered disabled state [ 30.541779][ T1120] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.548732][ T1120] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.559641][ T1120] bridge0: port 3(ip6gretap0) entered blocking state [ 30.566147][ T1120] bridge0: port 3(ip6gretap0) entered forwarding state [ 30.572924][ T1120] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.579677][ T1120] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.586774][ T1120] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.593566][ T1120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.600840][ T1120] device bridge0 entered promiscuous mode [ 30.737868][ T24] audit: type=1400 audit(1720378517.960:128): avc: denied { create } for pid=1132 comm="syz.0.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 30.800774][ T1150] device syzkaller0 entered promiscuous mode [ 30.807775][ T24] audit: type=1400 audit(1720378518.030:129): avc: denied { read } for pid=75 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 30.843077][ T1150] device sit0 left promiscuous mode [ 31.000050][ T24] audit: type=1400 audit(1720378518.220:130): avc: denied { create } for pid=1153 comm="syz.2.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.044166][ T24] audit: type=1400 audit(1720378518.220:131): avc: denied { write } for pid=1153 comm="syz.2.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.065674][ T24] audit: type=1400 audit(1720378518.220:132): avc: denied { read } for pid=1153 comm="syz.2.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.177393][ T1180] device wg2 entered promiscuous mode [ 31.219234][ T1189] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 31.237226][ T1189] pim6reg0: linktype set to 802 [ 31.399155][ T24] audit: type=1400 audit(1720378518.620:133): avc: denied { tracepoint } for pid=1208 comm="syz.2.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 31.921771][ T1231] IPv6: : Disabled Multicast RS [ 32.056837][ T24] audit: type=1400 audit(1720378519.270:134): avc: denied { create } for pid=1238 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 32.059302][ T1239] device pim6reg1 entered promiscuous mode [ 32.197351][ T24] audit: type=1400 audit(1720378519.410:135): avc: denied { create } for pid=1243 comm="syz.0.257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 32.293480][ T1262] device syzkaller0 entered promiscuous mode [ 32.361917][ T1267] device pim6reg1 entered promiscuous mode [ 32.394761][ T1277] device syzkaller0 entered promiscuous mode [ 32.646253][ T1301] ------------[ cut here ]------------ [ 32.658231][ T1301] trace type BPF program uses run-time allocation [ 32.671781][ T1301] WARNING: CPU: 1 PID: 1301 at kernel/bpf/verifier.c:10480 check_map_prog_compatibility+0x65b/0x7c0 [ 32.687614][ T1301] Modules linked in: [ 32.692053][ T1301] CPU: 1 PID: 1301 Comm: syz.1.274 Not tainted 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 32.702435][ T1301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 32.718845][ T1301] RIP: 0010:check_map_prog_compatibility+0x65b/0x7c0 [ 32.728761][ T1301] Code: c8 e9 84 fe ff ff e8 44 f5 ee ff 31 db e9 85 fe ff ff e8 38 f5 ee ff c6 05 8e ef 64 05 01 48 c7 c7 e0 71 45 85 e8 55 7f c2 ff <0f> 0b e9 42 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 17 fa ff [ 32.754064][ T1301] RSP: 0018:ffffc90000dd6f90 EFLAGS: 00010246 [ 32.760445][ T1301] RAX: 795aaec835d42800 RBX: ffff8881194c5000 RCX: 0000000000040000 [ 32.769438][ T1301] RDX: ffffc9000131c000 RSI: 00000000000009a3 RDI: 00000000000009a4 [ 32.777629][ T1301] RBP: ffffc90000dd6fd0 R08: ffffffff81521de8 R09: ffffed103ee2a5f8 [ 32.785564][ T1301] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 32.793739][ T1301] R13: 1ffff92000015604 R14: ffff88810c170000 R15: ffffc900000ab020 [ 32.803504][ T1301] FS: 00007ff09f6086c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 32.812641][ T1301] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 32.819784][ T1301] CR2: 0000000000000000 CR3: 0000000115ca7000 CR4: 00000000003506a0 [ 32.828045][ T1301] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 32.835960][ T1301] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 32.846465][ T1301] Call Trace: [ 32.849900][ T1301] ? show_regs+0x58/0x60 [ 32.854085][ T1301] ? __warn+0x160/0x2f0 [ 32.858440][ T1301] ? check_map_prog_compatibility+0x65b/0x7c0 [ 32.864493][ T1301] ? report_bug+0x3d9/0x5b0 [ 32.870029][ T1301] ? check_map_prog_compatibility+0x65b/0x7c0 [ 32.876036][ T1301] ? handle_bug+0x41/0x70 [ 32.880512][ T1301] ? exc_invalid_op+0x1b/0x50 [ 32.885113][ T1301] ? asm_exc_invalid_op+0x12/0x20 [ 32.892183][ T1301] ? wake_up_klogd+0xb8/0xf0 [ 32.896840][ T1301] ? check_map_prog_compatibility+0x65b/0x7c0 [ 32.903108][ T1301] ? __fdget+0x1bc/0x240 [ 32.907743][ T1301] resolve_pseudo_ldimm64+0x586/0x1020 [ 32.913125][ T1301] ? bpf_check+0xf2b0/0xf2b0 [ 32.917793][ T1301] ? kvmalloc_node+0x82/0x130 [ 32.922683][ T1301] bpf_check+0xaf21/0xf2b0 [ 32.927022][ T1301] ? stack_depot_save+0xe/0x10 [ 32.933714][ T1301] ? __se_sys_bpf+0x9856/0x11cb0 [ 32.938787][ T1301] ? sched_clock+0x3a/0x40 [ 32.943119][ T1301] ? 0xffffffffa0028018 [ 32.947354][ T1301] ? bpf_get_btf_vmlinux+0x60/0x60 [ 32.952389][ T1301] ? __kernel_text_address+0x9b/0x110 [ 32.957859][ T1301] ? unwind_get_return_address+0x4d/0x90 [ 32.963443][ T1301] ? arch_stack_walk+0xf3/0x140 [ 32.970405][ T1301] ? stack_trace_save+0x113/0x1c0 [ 32.975370][ T1301] ? stack_trace_snprint+0xf0/0xf0 [ 32.980535][ T1301] ? stack_trace_snprint+0xf0/0xf0 [ 32.985572][ T1301] ? selinux_bpf_prog_alloc+0x51/0x140 [ 32.991086][ T1301] ? selinux_bpf_prog_alloc+0x51/0x140 [ 32.996462][ T1301] ? ____kasan_kmalloc+0xed/0x110 [ 33.001570][ T1301] ? ____kasan_kmalloc+0xdb/0x110 [ 33.006508][ T1301] ? __kasan_kmalloc+0x9/0x10 [ 33.011233][ T1301] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 33.016715][ T1301] ? selinux_bpf_prog_alloc+0x51/0x140 [ 33.022602][ T1301] ? security_bpf_prog_alloc+0x62/0x90 [ 33.029957][ T1301] ? __se_sys_bpf+0x9f8c/0x11cb0 [ 33.035017][ T1301] ? __x64_sys_bpf+0x7b/0x90 [ 33.039724][ T1301] ? do_syscall_64+0x34/0x70 [ 33.044229][ T1301] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 33.051019][ T1301] ? __kasan_kmalloc+0x9/0x10 [ 33.055629][ T1301] __se_sys_bpf+0x107a2/0x11cb0 [ 33.060547][ T1301] ? __kasan_check_write+0x14/0x20 [ 33.065591][ T1301] ? __x64_sys_bpf+0x90/0x90 [ 33.072377][ T1301] ? futex_wake+0x630/0x790 [ 33.076833][ T1301] ? nlmsg_notify+0x161/0x1c0 [ 33.081620][ T1301] ? do_futex+0x13c5/0x17b0 [ 33.086034][ T1301] ? __rtnl_unlock+0x77/0x80 [ 33.090785][ T1301] ? netdev_run_todo+0xd5a/0xdc0 [ 33.095617][ T1301] ? ioctl_has_perm+0x3f0/0x560 [ 33.100582][ T1301] ? netdev_refcnt_read+0x1e0/0x1e0 [ 33.105697][ T1301] ? futex_exit_release+0x1e0/0x1e0 [ 33.112626][ T1301] ? check_stack_object+0xf4/0x130 [ 33.117835][ T1301] ? __kasan_check_write+0x14/0x20 [ 33.122893][ T1301] ? rtnl_unlock+0xe/0x10 [ 33.127354][ T1301] ? __tun_chr_ioctl+0x1aad/0x2260 [ 33.132350][ T1301] ? __se_sys_futex+0x355/0x470 [ 33.137065][ T1301] ? __fget_files+0x31e/0x380 [ 33.142142][ T1301] ? fpu__clear_all+0x20/0x20 [ 33.146728][ T1301] ? __kasan_check_read+0x11/0x20 [ 33.152015][ T1301] __x64_sys_bpf+0x7b/0x90 [ 33.156345][ T1301] do_syscall_64+0x34/0x70 [ 33.160883][ T1301] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 33.168320][ T1301] RIP: 0033:0x7ff0a0386bd9 [ 33.172630][ T1301] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 33.192471][ T1301] RSP: 002b:00007ff09f608048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 33.208153][ T1301] RAX: ffffffffffffffda RBX: 00007ff0a0514f60 RCX: 00007ff0a0386bd9 [ 33.226989][ T1301] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 33.244118][ T1301] RBP: 00007ff0a03f5aa1 R08: 0000000000000000 R09: 0000000000000000 [ 33.270189][ T1301] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 33.290074][ T1301] R13: 000000000000000b R14: 00007ff0a0514f60 R15: 00007ffd01c7e6d8 [ 33.314910][ T1301] ---[ end trace 797f3bc450e99160 ]--- [ 33.943907][ T1373] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.950928][ T1373] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.079727][ T1377] device syzkaller0 entered promiscuous mode [ 34.138008][ T1388] tap0: tun_chr_ioctl cmd 1074025675 [ 34.146442][ T1388] tap0: persist disabled [ 34.289666][ T1405] device sit0 entered promiscuous mode [ 34.422128][ T1438] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.429101][ T1438] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.438732][ T1438] device veth0 entered promiscuous mode [ 34.445255][ T1438] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.452137][ T1438] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.459217][ T1438] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.465978][ T1438] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.473711][ T1438] device bridge0 entered promiscuous mode [ 34.607007][ T1464] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.613934][ T1464] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.621073][ T1464] device bridge0 left promiscuous mode [ 34.691357][ T1475] device pim6reg1 entered promiscuous mode [ 34.716747][ T1485] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.270713][ T1522] device sit0 entered promiscuous mode [ 35.399539][ T1526] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.827712][ T1568] : renamed from vlan0 [ 36.109178][ T1599] device syzkaller0 entered promiscuous mode [ 36.438690][ T1654] device pim6reg1 entered promiscuous mode [ 36.715972][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.742790][ T404] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.749684][ T404] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.912624][ T24] kauditd_printk_skb: 4 callbacks suppressed [ 36.912636][ T24] audit: type=1400 audit(1720378524.130:140): avc: denied { create } for pid=1683 comm="syz.2.385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 37.044977][ T1692] syz.2.388[1692] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.045012][ T1692] syz.2.388[1692] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.191461][ T1710] device pim6reg1 entered promiscuous mode [ 37.472391][ T24] audit: type=1400 audit(1720378524.690:141): avc: denied { create } for pid=1752 comm="syz.3.410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 37.530973][ T1757] bridge0: port 4(veth0_to_batadv) entered blocking state [ 37.560473][ T1757] bridge0: port 4(veth0_to_batadv) entered disabled state [ 37.589769][ T1757] device veth0_to_batadv entered promiscuous mode [ 37.600385][ T1757] bridge0: port 4(veth0_to_batadv) entered blocking state [ 37.607364][ T1757] bridge0: port 4(veth0_to_batadv) entered forwarding state [ 37.690389][ T1767] device veth0_to_batadv left promiscuous mode [ 37.696894][ T1767] bridge0: port 4(veth0_to_batadv) entered disabled state [ 38.259483][ T1824] device vxcan1 entered promiscuous mode [ 38.386135][ T1832] syz.2.436[1832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.386169][ T1832] syz.2.436[1832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.387333][ T1833] syz.2.436[1833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.408811][ T1833] syz.2.436[1833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.422251][ T1832] device pim6reg1 entered promiscuous mode [ 38.820908][ T1898] device syzkaller0 entered promiscuous mode [ 38.916095][ T1930] device syzkaller0 entered promiscuous mode [ 38.951673][ T24] audit: type=1400 audit(1720378526.170:142): avc: denied { create } for pid=1936 comm="syz.1.465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 38.952731][ T1935] device syzkaller0 entered promiscuous mode [ 39.158870][ T24] audit: type=1400 audit(1720378526.380:143): avc: denied { create } for pid=1967 comm="syz.2.474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 39.257580][ T1988] device pim6reg1 entered promiscuous mode [ 40.040394][ T2017] device pim6reg1 entered promiscuous mode [ 41.174723][ T2092] device syzkaller0 entered promiscuous mode [ 41.968730][ T2140] syz.4.520[2140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.968778][ T2140] syz.4.520[2140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.022187][ T2141] tap0: tun_chr_ioctl cmd 1074025673 [ 42.622414][ T2181] device sit0 entered promiscuous mode [ 43.239182][ T2214] bridge0: port 3(veth1_macvtap) entered blocking state [ 43.269110][ T2214] bridge0: port 3(veth1_macvtap) entered disabled state [ 43.605582][ T2223] device veth1_macvtap left promiscuous mode [ 43.738675][ T2228] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.745670][ T2228] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.287713][ T2272] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.296572][ T2272] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.429855][ T2272] device bridge_slave_0 entered promiscuous mode [ 45.496593][ T2272] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.524399][ T2272] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.531815][ T2272] device bridge_slave_1 entered promiscuous mode [ 45.685831][ T24] audit: type=1400 audit(1720378532.900:144): avc: denied { create } for pid=2272 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 45.723280][ T24] audit: type=1400 audit(1720378532.930:145): avc: denied { write } for pid=2272 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 45.746607][ T747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 45.755720][ T747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.803466][ T24] audit: type=1400 audit(1720378532.930:146): avc: denied { read } for pid=2272 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 45.826019][ T747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 45.835019][ T747] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.843214][ T747] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.850174][ T747] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.862834][ T747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 45.871146][ T747] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.879288][ T747] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.886216][ T747] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.917414][ T1009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 45.925102][ T2308] device macsec0 entered promiscuous mode [ 46.002891][ T698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.023764][ T2323] device syzkaller0 entered promiscuous mode [ 46.045832][ T689] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.149300][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.161916][ T2272] device veth0_vlan entered promiscuous mode [ 46.183497][ T1009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.192315][ T1009] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.206313][ T1009] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.222295][ T2272] device veth1_macvtap entered promiscuous mode [ 46.267592][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.392620][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.499663][ T404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 46.594948][ T24] audit: type=1400 audit(1720378533.810:147): avc: denied { mounton } for pid=2272 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=357 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 46.892304][ T2374] device syzkaller0 entered promiscuous mode [ 47.116408][ T24] audit: type=1400 audit(1720378534.330:148): avc: denied { create } for pid=2385 comm="syz.2.587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 47.336835][ T2418] device pim6reg1 entered promiscuous mode [ 47.809118][ T2442] device syzkaller0 entered promiscuous mode [ 47.854891][ T391] device bridge_slave_1 left promiscuous mode [ 47.861211][ T391] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.888158][ T391] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.064913][ T2467] syz.0.614[2467] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.064965][ T2467] syz.0.614[2467] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.083018][ T2468] syz.0.614[2468] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.131688][ T2467] syz.0.614[2467] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.184803][ T2487] syz.0.614[2487] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.699732][ T2538] syz.4.633[2538] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.716576][ T2538] syz.4.633[2538] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.872949][ T2577] device syzkaller0 entered promiscuous mode [ 48.939166][ T2582] device pim6reg1 entered promiscuous mode [ 49.165385][ T2604] device syzkaller0 entered promiscuous mode [ 49.969854][ T2714] : renamed from vlan0 [ 50.117535][ T24] audit: type=1400 audit(1720378537.340:149): avc: denied { create } for pid=2751 comm="syz.1.689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 50.160172][ T2758] device wg2 entered promiscuous mode [ 50.419516][ T2778] syz.1.698 (2778) used obsolete PPPIOCDETACH ioctl [ 51.077080][ T2845] device syzkaller0 entered promiscuous mode [ 51.174498][ T2845] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 51.560514][ T2912] syz.3.736[2912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.560567][ T2912] syz.3.736[2912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.573702][ T2887] device pim6reg1 entered promiscuous mode [ 52.304535][ T391] bridge0: port 3(ip6gretap0) entered disabled state [ 52.331813][ T391] device ip6gretap0 left promiscuous mode [ 52.437493][ T391] bridge0: port 3(ip6gretap0) entered disabled state [ 52.598680][ T24] audit: type=1400 audit(1720378539.820:150): avc: denied { create } for pid=2969 comm="syz.2.757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 52.634598][ T2945] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.741280][ T2945] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.748929][ T2945] device bridge_slave_0 entered promiscuous mode [ 52.755780][ T2945] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.771144][ T2945] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.778770][ T2945] device bridge_slave_1 entered promiscuous mode [ 53.098917][ T3001] device sit0 left promiscuous mode [ 53.243865][ T3002] device sit0 entered promiscuous mode [ 53.485966][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.495622][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.522473][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.542846][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.556460][ T319] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.563347][ T319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.583775][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.599723][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.616423][ T319] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.623302][ T319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.673301][ T1009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.684771][ T3019] syz.0.772[3019] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.684819][ T3019] syz.0.772[3019] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.698184][ T1009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 53.729343][ T1009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.745911][ T1009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 53.783612][ T1009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.829378][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 53.840019][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 53.871350][ T2945] device veth0_vlan entered promiscuous mode [ 53.910793][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 53.927053][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 53.998411][ T2945] device veth1_macvtap entered promiscuous mode [ 54.013571][ T1009] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 54.023310][ T1009] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 54.050399][ T1009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 54.068278][ T1009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 54.085859][ T1009] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 54.107330][ T3029] device veth0_vlan left promiscuous mode [ 54.118885][ T3029] device veth0_vlan entered promiscuous mode [ 54.143954][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 54.156839][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 54.184790][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 54.211248][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 54.229407][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 54.246866][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 54.263351][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 54.454403][ T391] device bridge_slave_1 left promiscuous mode [ 54.464983][ T391] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.498653][ T391] device bridge_slave_0 left promiscuous mode [ 54.536876][ T391] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.577254][ T391] device veth1_macvtap left promiscuous mode [ 55.421710][ T3161] device syzkaller0 entered promiscuous mode [ 55.455392][ T3150] ʮ}p: renamed from pim6reg1 [ 56.122893][ T3230] device pim6reg1 entered promiscuous mode [ 56.373304][ T3268] vlan1: mtu greater than device maximum [ 56.413153][ T3268] device syzkaller0 entered promiscuous mode [ 56.682595][ T3310] device syzkaller0 entered promiscuous mode [ 56.888732][ T24] audit: type=1400 audit(1720378544.110:151): avc: denied { ioctl } for pid=3328 comm="syz.1.869" path="pid:[4026532280]" dev="nsfs" ino=4026532280 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 57.165255][ T3346] syz.4.873[3346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.165306][ T3346] syz.4.873[3346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.233283][ T3345] syz.4.873[3345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.273793][ T3345] syz.4.873[3345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.008935][ T24] audit: type=1400 audit(1720378545.230:152): avc: denied { create } for pid=3408 comm="syz.2.892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 58.113553][ T3424] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.120527][ T3424] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.130889][ T3434] device wg2 left promiscuous mode [ 58.138157][ T3436] device bridge_slave_1 left promiscuous mode [ 58.144092][ T3436] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.151426][ T3436] device bridge_slave_0 left promiscuous mode [ 58.157551][ T3436] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.236009][ T3434] device wg2 entered promiscuous mode [ 58.365474][ T3463] device syzkaller0 entered promiscuous mode [ 58.654866][ T3485] device pim6reg1 entered promiscuous mode [ 59.146500][ T3493] : renamed from vlan0 [ 59.872743][ T3518] device sit0 left promiscuous mode [ 60.008346][ T3517] device sit0 entered promiscuous mode [ 61.000505][ T3589] device syzkaller0 entered promiscuous mode [ 61.056771][ T3593] device pim6reg1 entered promiscuous mode [ 61.470246][ T3659] syz.0.956[3659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.470293][ T3659] syz.0.956[3659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.523234][ T3664] device sit0 entered promiscuous mode [ 61.917644][ T3686] device veth1_macvtap left promiscuous mode [ 61.930469][ T3686] device macsec0 entered promiscuous mode [ 62.010999][ T3687] device veth1_macvtap entered promiscuous mode [ 62.187678][ T3713] bridge0: port 3(vlan1) entered blocking state [ 62.196574][ T3713] bridge0: port 3(vlan1) entered disabled state [ 62.203546][ T3713] device vlan1 entered promiscuous mode [ 62.307265][ T3735] device veth1_macvtap left promiscuous mode [ 62.403336][ T3736] device veth1_macvtap entered promiscuous mode [ 62.428536][ T24] audit: type=1400 audit(1720378549.650:153): avc: denied { create } for pid=3751 comm="syz.0.983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 62.498885][ T3759] device pim6reg1 entered promiscuous mode [ 62.609577][ T3768] geneve1: tun_chr_ioctl cmd 1074025698 [ 62.661115][ T3762] ʮ}p: renamed from pim6reg1 [ 63.020342][ T3796] device pim6reg1 entered promiscuous mode [ 63.085223][ T3807] device syzkaller0 entered promiscuous mode [ 63.208737][ T3823] device pim6reg1 entered promiscuous mode [ 63.248373][ T3823] syz.3.1006[3823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.248420][ T3823] syz.3.1006[3823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.278962][ T3823] syz.3.1006[3823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.296702][ T3823] syz.3.1006[3823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.432898][ T3843] : renamed from bridge0 [ 63.537870][ T3845] syz.4.1014[3845] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.537914][ T3845] syz.4.1014[3845] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.628172][ T3861] device syzkaller0 entered promiscuous mode [ 64.031322][ T24] audit: type=1400 audit(1720378551.250:154): avc: denied { create } for pid=3903 comm="syz.4.1027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 64.559250][ T3938] device pim6reg1 entered promiscuous mode [ 64.772740][ T3974] syz.4.1048[3974] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.772785][ T3974] syz.4.1048[3974] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.409276][ T4031] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 65.784108][ T4040] device pim6reg1 entered promiscuous mode [ 66.014153][ T4072] device pim6reg1 entered promiscuous mode [ 67.367306][ T24] audit: type=1400 audit(1720378554.590:155): avc: denied { create } for pid=4246 comm="syz.1.1120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 67.694795][ T4304] device veth0_vlan left promiscuous mode [ 67.704280][ T24] audit: type=1400 audit(1720378554.920:156): avc: denied { create } for pid=4301 comm="syz.4.1136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 67.752826][ T4304] device veth0_vlan entered promiscuous mode [ 67.955322][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.963576][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 67.971067][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 68.003869][ T4310] device pim6reg1 entered promiscuous mode [ 69.149016][ T4460] device pim6reg1 entered promiscuous mode [ 69.382456][ T4480] bpf_get_probe_write_proto: 2 callbacks suppressed [ 69.382465][ T4480] syz.1.1190[4480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.427258][ T4480] syz.1.1190[4480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.563408][ T4483] syz.1.1190[4483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.585990][ T4483] syz.1.1190[4483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.847230][ T4501] device syzkaller0 entered promiscuous mode [ 70.511733][ T4547] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.518914][ T4547] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.563897][ T4550] syz.0.1209[4550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.563952][ T4550] syz.0.1209[4550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.659388][ T24] audit: type=1400 audit(1720378557.880:157): avc: denied { create } for pid=4551 comm="syz.2.1210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 71.849344][ T4596] syz.2.1224[4596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.849399][ T4596] syz.2.1224[4596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.643437][ T4611] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.674987][ T4611] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.687832][ T4611] device bridge_slave_0 entered promiscuous mode [ 72.825560][ T4611] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.983122][ T4611] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.067278][ T4611] device bridge_slave_1 entered promiscuous mode [ 73.200214][ T4611] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.207093][ T4611] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.214170][ T4611] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.220974][ T4611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.406311][ T1009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.414303][ T1009] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.421656][ T1009] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.441175][ T1009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.449580][ T1009] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.456426][ T1009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.468403][ T1009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 73.476389][ T1009] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.483243][ T1009] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.542395][ T2846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 73.555748][ T2846] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 73.569315][ T2846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 73.584336][ T2846] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 73.707980][ T2846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 73.782205][ T2846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 73.832633][ T4611] device veth0_vlan entered promiscuous mode [ 73.917483][ T2846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 73.967717][ T2846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 73.981242][ T4611] device veth1_macvtap entered promiscuous mode [ 73.992223][ T2846] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 74.000150][ T2846] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 74.007583][ T2846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 74.015576][ T2846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 74.090080][ T2846] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 74.143414][ T747] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 74.151487][ T747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 74.159846][ T747] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 74.168264][ T747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 74.638976][ T9] device bridge_slave_1 left promiscuous mode [ 74.650933][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.670851][ T9] device bridge_slave_0 left promiscuous mode [ 74.677061][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.686094][ T9] device veth1_macvtap left promiscuous mode [ 74.692344][ T9] device veth0_vlan left promiscuous mode [ 74.786870][ T4704] device pim6reg1 entered promiscuous mode [ 74.899954][ T4723] device sit0 left promiscuous mode [ 74.910762][ T4723] device sit0 entered promiscuous mode [ 75.216983][ T4769] device syzkaller0 entered promiscuous mode [ 75.824531][ T4824] device veth1_macvtap left promiscuous mode [ 75.831099][ T4824] device macsec0 entered promiscuous mode [ 75.860803][ T4824] device veth1_macvtap entered promiscuous mode [ 75.946972][ T4830] device vxcan1 entered promiscuous mode [ 76.056595][ T4872] device pim6reg1 entered promiscuous mode [ 76.086860][ T24] audit: type=1400 audit(1720378563.300:158): avc: denied { create } for pid=4874 comm="syz.4.1302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 76.201789][ T4900] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.208674][ T4900] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.215752][ T4900] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.222544][ T4900] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.230712][ T4900] device bridge0 entered promiscuous mode [ 76.468295][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 76.805826][ T4977] device pim6reg1 entered promiscuous mode [ 77.167511][ T4991] device pim6reg1 entered promiscuous mode [ 77.291795][ T4988] device syzkaller0 entered promiscuous mode [ 77.408806][ T4999] syz.3.1343[4999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.408851][ T4999] syz.3.1343[4999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.605113][ T24] audit: type=1400 audit(1720378564.820:159): avc: denied { append } for pid=5017 comm="syz.4.1349" name="ppp" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 77.739885][ T5028] device syzkaller0 entered promiscuous mode [ 77.769235][ T5038] syz.1.1355[5038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.769287][ T5038] syz.1.1355[5038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.850828][ T5038] syz.1.1355[5038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.863225][ T5038] syz.1.1355[5038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.907942][ T5056] geneve1: tun_chr_ioctl cmd 1074025673 [ 77.930813][ T5054] geneve1: tun_chr_ioctl cmd 1074025681 [ 78.083102][ T5089] device syzkaller0 entered promiscuous mode [ 78.255833][ T24] audit: type=1400 audit(1720378565.470:160): avc: denied { create } for pid=5109 comm="syz.1.1378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 78.307725][ T5113] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.314639][ T5113] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.423151][ T5113] device bridge0 left promiscuous mode [ 78.489208][ T5113] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.496059][ T5113] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.503198][ T5113] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.509966][ T5113] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.519958][ T5113] device bridge0 entered promiscuous mode [ 78.601341][ T5129] syz.0.1382[5129] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.601402][ T5129] syz.0.1382[5129] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.628504][ T5129] syz.0.1382[5129] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.658494][ T5129] syz.0.1382[5129] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.486850][ T24] audit: type=1400 audit(1720378566.700:161): avc: denied { append } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 79.644469][ T24] audit: type=1400 audit(1720378566.700:162): avc: denied { open } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 79.757790][ T24] audit: type=1400 audit(1720378566.700:163): avc: denied { getattr } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 80.273628][ T24] audit: type=1400 audit(1720378567.490:164): avc: denied { create } for pid=5307 comm="syz.2.1425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 80.277930][ T5303] device pim6reg1 entered promiscuous mode [ 80.351770][ T5308] O3c: renamed from bridge_slave_0 [ 80.677932][ T5322] device pim6reg1 entered promiscuous mode [ 81.331672][ T5361] tap0: tun_chr_ioctl cmd 1074025675 [ 81.336787][ T5361] tap0: persist disabled [ 82.256581][ T5448] tap0: tun_chr_ioctl cmd 1074025675 [ 82.274669][ T5448] tap0: persist enabled [ 82.359237][ T5454] tap0: tun_chr_ioctl cmd 1074025675 [ 82.417139][ T5454] tap0: persist disabled [ 82.701623][ T5463] device syzkaller0 entered promiscuous mode [ 83.701817][ T5482] device syzkaller0 entered promiscuous mode [ 84.245380][ T5601] device syzkaller0 entered promiscuous mode [ 84.422945][ T5611] device syzkaller0 entered promiscuous mode [ 84.468475][ T5618] bridge0: port 3(veth0_to_batadv) entered blocking state [ 84.495659][ T5618] bridge0: port 3(veth0_to_batadv) entered disabled state [ 84.516293][ T5618] device veth0_to_batadv entered promiscuous mode [ 84.533248][ T5618] bridge0: port 3(veth0_to_batadv) entered blocking state [ 84.540202][ T5618] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 84.624465][ T5623] device veth0_vlan left promiscuous mode [ 84.660190][ T5623] device veth0_vlan entered promiscuous mode [ 84.757405][ T5384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 84.765822][ T5384] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 84.785485][ T5384] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 85.934547][ T5722] device pim6reg1 entered promiscuous mode [ 85.959448][ T5724] device syzkaller0 entered promiscuous mode [ 86.136896][ T5748] device syzkaller0 entered promiscuous mode [ 86.148140][ T5743] device pim6reg1 entered promiscuous mode [ 86.303566][ T5780] device syzkaller0 entered promiscuous mode [ 86.565914][ T5806] device syzkaller0 entered promiscuous mode [ 86.763258][ T5832] device syzkaller0 entered promiscuous mode [ 86.844418][ T5848] syz.0.1577[5848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.844476][ T5848] syz.0.1577[5848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.856749][ T5846] device pim6reg1 entered promiscuous mode [ 87.252612][ T5865] device syzkaller0 entered promiscuous mode [ 87.349799][ T5870] syz.1.1584 uses obsolete (PF_INET,SOCK_PACKET) [ 87.490211][ T5872] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.532313][ T5872] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.539200][ T5872] bridge0: port 2(bridge_slave_1) entered forwarding state [ 87.606101][ T5872] device bridge0 entered promiscuous mode [ 87.676046][ T5888] device syzkaller0 entered promiscuous mode [ 88.318736][ T5959] device syzkaller0 entered promiscuous mode [ 88.328905][ T5963] device pim6reg1 entered promiscuous mode [ 88.764073][ T6000] device syzkaller0 entered promiscuous mode [ 88.871860][ T6023] device syzkaller0 entered promiscuous mode [ 89.109635][ T6060] device pim6reg1 entered promiscuous mode [ 89.210519][ T24] audit: type=1400 audit(1720378576.430:165): avc: denied { create } for pid=6084 comm="syz.3.1653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 89.229784][ T24] audit: type=1400 audit(1720378576.430:166): avc: denied { create } for pid=6084 comm="syz.3.1653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 89.256227][ T6083] device pim6reg1 entered promiscuous mode [ 89.648851][ T6122] syz.3.1663[6122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.648891][ T6122] syz.3.1663[6122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.798224][ T6135] device syzkaller0 entered promiscuous mode [ 89.946791][ T6166] device syzkaller0 entered promiscuous mode [ 89.995225][ T6174] device syzkaller0 entered promiscuous mode [ 90.596145][ T6208] device wg2 left promiscuous mode [ 90.623456][ T6208] device wg2 entered promiscuous mode [ 92.707560][ T6429] device pim6reg1 entered promiscuous mode [ 92.988446][ T6460] device syzkaller0 entered promiscuous mode [ 94.145406][ T6552] device syzkaller0 entered promiscuous mode [ 94.166144][ T6556] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.173897][ T6556] device bridge0 left promiscuous mode [ 94.184463][ T6557] syz.0.1769[6557] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.184497][ T6557] syz.0.1769[6557] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.271680][ T6574] device pim6reg1 entered promiscuous mode [ 94.457253][ T6592] syz.3.1783[6592] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.457295][ T6592] syz.3.1783[6592] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.998372][ T6627] : renamed from veth0_vlan [ 95.376307][ T6682] syz.1.1807[6682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.376350][ T6682] syz.1.1807[6682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.161304][ T6745] device pim6reg1 entered promiscuous mode [ 97.894918][ T6839] device wg2 entered promiscuous mode [ 98.450238][ T6857] bridge0: port 3(veth0_to_batadv) entered blocking state [ 98.457740][ T6857] bridge0: port 3(veth0_to_batadv) entered disabled state [ 98.465928][ T6857] device veth0_to_batadv entered promiscuous mode [ 98.480642][ T6857] bridge0: port 3(veth0_to_batadv) entered blocking state [ 98.487620][ T6857] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 98.528234][ T6857] device veth0_to_batadv left promiscuous mode [ 98.534544][ T6857] bridge0: port 3(veth0_to_batadv) entered disabled state [ 99.969185][ T24] audit: type=1400 audit(1720378587.190:167): avc: denied { remove_name } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 100.079965][ T24] audit: type=1400 audit(1720378587.190:168): avc: denied { rename } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 100.180919][ T24] audit: type=1400 audit(1720378587.190:169): avc: denied { create } for pid=75 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 100.385802][ T7041] device syzkaller0 entered promiscuous mode [ 100.467745][ T7040] device syzkaller0 entered promiscuous mode [ 102.622602][ T7081] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.635967][ T7081] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.661476][ T7081] device bridge_slave_0 entered promiscuous mode [ 102.740771][ T7081] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.769433][ T7081] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.776748][ T7081] device bridge_slave_1 entered promiscuous mode [ 103.162986][ T7081] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.169878][ T7081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.176944][ T7081] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.183745][ T7081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.344318][ T6321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 103.367709][ T6321] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.378889][ T6321] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.468710][ T689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 103.476865][ T689] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 103.587391][ T689] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.594263][ T689] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.711306][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 103.729639][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 103.848228][ T740] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.855095][ T740] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.997339][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 104.083548][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 104.146792][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 104.209218][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 104.247435][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 104.264575][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 104.275894][ T7081] device veth0_vlan entered promiscuous mode [ 104.352045][ T693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 104.360866][ T693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 104.382452][ T7081] device veth1_macvtap entered promiscuous mode [ 104.417728][ T7188] device veth1_macvtap left promiscuous mode [ 104.442482][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 104.457363][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 104.468375][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 104.477502][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 104.485426][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 104.507435][ T7188] device veth1_macvtap entered promiscuous mode [ 104.513500][ T7188] device macsec0 entered promiscuous mode [ 104.611213][ T693] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 104.629155][ T693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 104.727436][ T693] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 104.735505][ T693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 104.895061][ T9] device bridge_slave_1 left promiscuous mode [ 104.921038][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.010619][ T9] device bridge_slave_0 left promiscuous mode [ 105.077330][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.146231][ T9] device veth1_macvtap left promiscuous mode [ 105.921480][ T7237] device syzkaller0 entered promiscuous mode [ 108.408081][ T7366] device pim6reg1 entered promiscuous mode [ 108.416996][ T7374] syz.4.1989[7374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.417035][ T7374] syz.4.1989[7374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.909115][ T7454] device syzkaller0 entered promiscuous mode [ 111.149901][ T7478] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.156829][ T7478] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.164189][ T7478] device bridge_slave_0 entered promiscuous mode [ 111.170866][ T7478] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.181217][ T7478] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.189363][ T7478] device bridge_slave_1 entered promiscuous mode [ 111.285658][ T7478] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.292849][ T7478] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.299935][ T7478] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.306713][ T7478] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.571591][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.657557][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.665809][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 111.885602][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 111.998302][ T7497] Y4`Ҙ: renamed from lo [ 112.056839][ T6327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 112.180327][ T6327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 112.277482][ T6327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 112.365634][ T6327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 112.379769][ T7478] device veth0_vlan entered promiscuous mode [ 112.411608][ T6324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 112.447034][ T6324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.650072][ T7510] syz.3.2021[7510] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.668820][ T7509] device syzkaller0 entered promiscuous mode [ 112.687900][ T7478] device veth1_macvtap entered promiscuous mode [ 112.717547][ T6327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 112.735784][ T6327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.796099][ T6327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 112.804087][ T6327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 112.812107][ T6327] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 112.964004][ T6324] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 113.007123][ T6324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 113.141245][ T6326] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 113.156673][ T6326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 113.361131][ T7528] device sit0 left promiscuous mode [ 113.393081][ T7531] device sit0 entered promiscuous mode [ 113.834890][ T7530] bridge0: port 3(veth0_to_batadv) entered disabled state [ 113.841900][ T7530] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.849299][ T7530] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.998960][ T7530] device bridge0 left promiscuous mode [ 114.044059][ T7549] device syzkaller0 entered promiscuous mode [ 114.206667][ T7579] device veth1_macvtap left promiscuous mode [ 114.221707][ T7579] device pim6reg1 entered promiscuous mode [ 114.273688][ T7576] syz.1.2040[7576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.273957][ T7576] syz.1.2040[7576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.397299][ T7654] device syzkaller0 entered promiscuous mode [ 115.487464][ T7660] device syzkaller0 entered promiscuous mode [ 115.517290][ T7659] macvlan0: tun_chr_ioctl cmd 1074025681 [ 115.688980][ T7665] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 115.742272][ T7665] device syzkaller0 entered promiscuous mode [ 116.089433][ T7686] device wg2 entered promiscuous mode [ 116.242930][ T7684] geneve1: tun_chr_ioctl cmd 1074025681 [ 116.667763][ T7727] device syzkaller0 entered promiscuous mode [ 116.874575][ T7769] tap0: tun_chr_ioctl cmd 1074025673 [ 119.097148][ T7880] device pim6reg1 entered promiscuous mode [ 119.340493][ T7886] device pim6reg1 entered promiscuous mode [ 120.146123][ T7914] syz.2.2133[7914] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.146708][ T7914] syz.2.2133[7914] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.811746][ T7993] device syzkaller0 entered promiscuous mode [ 122.397903][ T8029] syz.1.2168[8029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.397937][ T8029] syz.1.2168[8029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.623340][ T8037] syz.1.2168[8037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.635636][ T8037] syz.1.2168[8037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.686425][ T8048] syz.0.2172[8048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.768942][ T8048] syz.0.2172[8048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.837582][ T8052] syz.0.2172[8052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.872577][ T8052] syz.0.2172[8052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.039097][ T8048] device syzkaller0 entered promiscuous mode [ 124.065289][ T8134] device pim6reg1 entered promiscuous mode [ 125.867607][ T8236] bpf_get_probe_write_proto: 4 callbacks suppressed [ 125.867617][ T8236] syz.3.2222[8236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.887941][ T8236] syz.3.2222[8236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.405337][ T8266] device pim6reg1 entered promiscuous mode [ 126.796267][ T8299] device syzkaller0 entered promiscuous mode [ 127.074741][ T8324] device pim6reg1 entered promiscuous mode [ 127.460700][ T8343] syz.2.2253[8343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.460758][ T8343] syz.2.2253[8343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.544385][ T8352] syz.0.2254[8352] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.955341][ T8365] device syzkaller0 entered promiscuous mode [ 128.457243][ T8374] device veth0_vlan left promiscuous mode [ 128.527271][ T8374] device veth0_vlan entered promiscuous mode [ 129.734247][ T8439] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 129.840489][ T8439] device syzkaller0 entered promiscuous mode [ 130.010720][ T8453] syz.4.2283[8453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.010770][ T8453] syz.4.2283[8453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.393634][ T8458] device veth1_macvtap entered promiscuous mode [ 130.548263][ T8458] device macsec0 entered promiscuous mode [ 130.590922][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 132.800849][ T8633] device syzkaller0 entered promiscuous mode [ 133.038874][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 133.177285][ T8645] device syzkaller0 entered promiscuous mode [ 133.599067][ T8693] syz.4.2348[8693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.599119][ T8693] syz.4.2348[8693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.766841][ T8693] syz.4.2348[8693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.907278][ T8693] syz.4.2348[8693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.056748][ T8711] device syzkaller0 entered promiscuous mode [ 134.912481][ T24] audit: type=1400 audit(1720378622.130:170): avc: denied { create } for pid=8820 comm="syz.0.2376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 135.846102][ T8899] sock: sock_set_timeout: `syz.0.2400' (pid 8899) tries to set negative timeout [ 136.422956][ T8938] device pim6reg1 entered promiscuous mode [ 139.172925][ T9011] device pim6reg1 entered promiscuous mode [ 139.872504][ T9025] device syzkaller0 entered promiscuous mode [ 141.355601][ T9134] device pim6reg1 entered promiscuous mode [ 141.669154][ T9167] device pim6reg1 entered promiscuous mode [ 141.820211][ T9182] device pim6reg1 entered promiscuous mode [ 142.032233][ T9199] : renamed from pim6reg1 [ 142.135257][ T9196] device pim6reg1 entered promiscuous mode [ 142.148895][ T9215] device lo entered promiscuous mode [ 142.158355][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 142.229457][ T9228] device bridge_slave_0 entered promiscuous mode [ 142.235920][ T6323] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 143.000598][ T9267] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 143.121719][ T9267] device syzkaller0 entered promiscuous mode [ 143.403284][ T9298] device syzkaller0 entered promiscuous mode [ 143.478363][ T9300] device pim6reg1 entered promiscuous mode [ 143.527943][ T9305] device syzkaller0 entered promiscuous mode [ 143.595867][ T9312] device pim6reg1 entered promiscuous mode [ 143.617672][ T9314] syz.2.2507[9314] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.617717][ T9314] syz.2.2507[9314] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.678701][ T9322] syz.2.2507[9322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.715588][ T9322] syz.2.2507[9322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.273756][ T9361] device veth1_macvtap left promiscuous mode [ 144.363695][ T9361] device macsec0 entered promiscuous mode [ 144.531823][ T9377] device syzkaller0 entered promiscuous mode [ 145.544541][ T9407] device veth0_vlan left promiscuous mode [ 145.583472][ T9407] device veth0_vlan entered promiscuous mode [ 145.659026][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 145.677132][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 145.727622][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 146.293467][ T9418] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.397145][ T9418] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.443162][ T9418] device bridge_slave_0 entered promiscuous mode [ 146.531438][ T9418] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.573112][ T9418] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.580891][ T9418] device bridge_slave_1 entered promiscuous mode [ 146.703103][ T6326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 146.717378][ T6326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 146.787787][ T6326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 146.796013][ T6326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 146.888330][ T6326] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.895193][ T6326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.967553][ T6326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 146.975841][ T6326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 146.983993][ T6326] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.990837][ T6326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.998111][ T6326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 147.005874][ T6326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 147.057601][ T6334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 147.087202][ T739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 147.106451][ T693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 147.117718][ T693] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 147.140630][ T693] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 147.163255][ T9418] device veth0_vlan entered promiscuous mode [ 147.208355][ T739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 147.244356][ T9418] device veth1_macvtap entered promiscuous mode [ 147.319062][ T693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 147.332783][ T693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 147.870952][ T9540] syzkaller0: refused to change device tx_queue_len [ 147.888092][ T9541] syzkaller0: refused to change device tx_queue_len [ 148.372359][ T9577] device pim6reg1 entered promiscuous mode [ 148.408862][ T9583] device pim6reg1 entered promiscuous mode [ 148.548796][ T9607] syz.4.2582[9607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.548846][ T9607] syz.4.2582[9607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.769335][ T9728] device syzkaller0 entered promiscuous mode [ 151.416768][ T9810] device pim6reg1 entered promiscuous mode [ 151.992037][ T9839] syz.0.2642[9839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.994769][ T9839] syz.0.2642[9839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.872182][ T9852] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.940413][ T9860] device macsec0 entered promiscuous mode [ 153.061344][ T9865] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 153.109827][ T9865] device syzkaller0 entered promiscuous mode [ 153.156677][ T9873] device syzkaller0 entered promiscuous mode [ 153.805318][ T9934] device veth0_vlan left promiscuous mode [ 153.857969][ T9934] device veth0_vlan entered promiscuous mode [ 154.390333][T10011] device macsec0 left promiscuous mode [ 154.703678][T10023] device syzkaller0 entered promiscuous mode [ 154.900276][T10039] device pim6reg1 entered promiscuous mode [ 155.560952][T10061] device syzkaller0 entered promiscuous mode [ 155.705126][T10075] device sit0 left promiscuous mode [ 155.789816][T10078] device sit0 entered promiscuous mode [ 156.702072][T10135] device syzkaller0 entered promiscuous mode [ 157.063767][T10168] bridge0: port 3(veth0_to_batadv) entered blocking state [ 157.070735][T10168] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 157.078308][T10168] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.085159][T10168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 157.092251][T10168] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.099154][T10168] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.215356][T10168] device bridge0 entered promiscuous mode [ 157.291683][T10181] device syzkaller0 entered promiscuous mode [ 157.302687][ T739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 157.460289][T10190] device pim6reg1 entered promiscuous mode [ 157.807840][T10218] device syzkaller0 entered promiscuous mode [ 157.852722][T10228] device veth1_macvtap left promiscuous mode [ 157.859008][T10228] device macsec0 left promiscuous mode [ 158.214872][T10287] syz.1.2763[10287] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.214924][T10287] syz.1.2763[10287] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.720195][T10439] device veth1_macvtap entered promiscuous mode [ 160.842480][T10439] device macsec0 entered promiscuous mode [ 160.849354][T10442] device veth1_macvtap left promiscuous mode [ 160.855148][T10442] device macsec0 left promiscuous mode [ 160.884115][ T6335] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 161.432356][T10480] syz.3.2813[10480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.435603][T10480] syz.3.2813[10480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.278266][T10539] device syzkaller0 entered promiscuous mode [ 162.327409][T10542] syz.0.2829[10542] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.327463][T10542] syz.0.2829[10542] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.694601][T10551] device syzkaller0 entered promiscuous mode SYZFAIL: proc resp pipe read failed n=-1 (errno 11: Resource temporarily unavailable) [ 163.867724][ T391] device bridge_slave_1 left promiscuous mode [ 163.873656][ T391] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.881324][ T391] device bridge_slave_0 left promiscuous mode [ 163.887336][ T391] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.895416][ T391] device veth0_vlan left promiscuous mode [ 165.189260][ T391] device bridge_slave_1 left promiscuous mode [ 165.195319][ T391] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.203970][ T391] device bridge_slave_0 left promiscuous mode [ 165.209966][ T391] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.217897][ T391] device bridge_slave_1 left promiscuous mode [ 165.223808][ T391] : port 2(bridge_slave_1) entered disabled state [ 165.231157][ T391] device bridge_slave_0 left promiscuous mode [ 165.237213][ T391] : port 1(bridge_slave_0) entered disabled state [ 165.245699][ T391] device veth0_to_batadv left promiscuous mode [ 165.252002][ T391] bridge0: port 3(veth0_to_batadv) entered disabled state [ 165.259481][ T391] device bridge_slave_1 left promiscuous mode [ 165.265397][ T391] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.272910][ T391] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.282159][ T391] device veth1_macvtap left promiscuous mode [ 165.288662][ T391] device veth1_macvtap left promiscuous mode [ 165.294684][ T391] device veth0_vlan left promiscuous mode [ 165.300742][ T391] device veth1_macvtap left promiscuous mode [ 170.998032][ T391] device vlan1 left promiscuous mode [ 171.003506][ T391] bridge0: port 3(vlan1) entered disabled state [ 171.010116][ T391] device bridge_slave_1 left promiscuous mode [ 171.016045][ T391] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.023192][ T391] device O3c left promiscuous mode [ 171.028421][ T391] bridge0: port 1(O3c) entered disabled state