last executing test programs: 5.178311695s ago: executing program 2 (id=6163): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffff7a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000740), 0x0, &(0x7f00000003c0), &(0x7f0000000280), &(0x7f00000008c0)) (async) r6 = syz_clone(0x0, &(0x7f0000000740), 0x0, &(0x7f00000003c0), &(0x7f0000000280), &(0x7f00000008c0)) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) perf_event_open(&(0x7f0000000700)={0x3, 0x80, 0x9, 0x9, 0x0, 0x0, 0x0, 0x3fe, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100400000000004}, 0x0, 0x0, 0x6, 0x3, 0x8000000}, r6, 0x0, r4, 0x2) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) (async) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x80000003, 0x4, 0x9, 0x100, r1, 0xff, '\x00', 0x0, r0, 0x4, 0x5, 0x3, 0x4}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='f2fs_direct_IO_exit\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 4.905458498s ago: executing program 2 (id=6169): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1d, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001200)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xcb, 0x2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x7, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) (async) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0xb) write$cgroup_subtree(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100036c00fc08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000080)) 4.881227519s ago: executing program 2 (id=6173): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d649379071c33390e418ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad95a1c57a05f4f979ea13201bafe4f0f6ea508000000a0c548552b5708005647323c78a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177dc46c4604bca492ecec37e83efceefd7ca2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6fe2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bdb1d0b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31a0445859a5ece8fb11a4ee8e46354c9c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679043e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d264e77124d18d4f5987baab97a9bfbd8f185b5631820420b75b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21579fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b1a4090631e1b9e16587bb5f721303e6b89e5c54d680ac66d09af0a1f5b83e69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e0bb24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c3868ffd08cd0e05023f4d8f95712207450e39a7550f42419bf30b31cac3fa1404e449c1cee0fff0d86a98dc9bf38a1e0b4fa5225dae5e781b43545b51681b2158f41bab16f8a7df758b00ffa6e8522bd83e320ff897f177367278a1f0cdbde082d9983308b40c39740b6fd1ba4aa10c3a19c7374278d00"/1952], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/1952], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r2}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8f41c288d409ef0e169a340295f36d4b4", &(0x7f0000000280), 0x5, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x14, &(0x7f0000000dc0)=ANY=[@ANYBLOB="1800000008000000000000000200000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000003010200070000004ca7feff040000007d800800ffffffff95000000000000000522060000000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000da82c8e831ebcfcbbd7c003fe07842beb3fd535e072213ceffc4c82dd2bc81705fc49d5fe2c860424a93f0b0abab1ef8"], &(0x7f0000000280)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000c00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000c40)={0x3, 0x9, 0x6, 0x9031}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c80)=[r5], &(0x7f0000000cc0), 0x10, 0x9}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x14, &(0x7f0000000dc0)=ANY=[@ANYBLOB="1800000008000000000000000200000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000003010200070000004ca7feff040000007d800800ffffffff95000000000000000522060000000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000da82c8e831ebcfcbbd7c003fe07842beb3fd535e072213ceffc4c82dd2bc81705fc49d5fe2c860424a93f0b0abab1ef8"], &(0x7f0000000280)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000c00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000c40)={0x3, 0x9, 0x6, 0x9031}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c80)=[r5], &(0x7f0000000cc0), 0x10, 0x9}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r6, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x4018}, 0x18) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@bloom_filter={0x1e, 0x6, 0xc, 0x8, 0x800, 0xffffffffffffffff, 0x84b, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x1, 0x7}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x0, r3}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7020000020000008500000086000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r11}, 0x48) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r11}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r12, &(0x7f0000000240), 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r12, &(0x7f0000000240), 0x0}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000880)={{r11}, &(0x7f0000000800), &(0x7f0000000840)='%pK \x00'}, 0x20) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000880)={{r11, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000840)='%pK \x00'}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="a98906000200000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007030000f8ffffffb702000008000000b70300000400000085000000060000008500000015000000852000000300000018270000", @ANYRES32, @ANYBLOB="0000000000008001"], &(0x7f0000000340)='GPL\x00', 0x8000, 0x75, &(0x7f0000000380)=""/117, 0x41100, 0x1a, '\x00', 0x0, 0x25, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f00000005c0)={0x0, 0xb, 0x34}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000940)=[r7, r8, r9, r10, r12, r13, 0xffffffffffffffff], &(0x7f0000000980)=[{0x0, 0x5, 0x80009, 0x5}, {0x0, 0x3, 0x3, 0x9}, {0x3, 0x4, 0x8, 0x3}, {0x5, 0x2, 0xf, 0x6}, {0x2, 0x0, 0xe}, {0x5, 0x3, 0x6, 0x6}]}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="a98906000200000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007030000f8ffffffb702000008000000b70300000400000085000000060000008500000015000000852000000300000018270000", @ANYRES32, @ANYBLOB="0000000000008001"], &(0x7f0000000340)='GPL\x00', 0x8000, 0x75, &(0x7f0000000380)=""/117, 0x41100, 0x1a, '\x00', 0x0, 0x25, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f00000005c0)={0x0, 0xb, 0x34}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000940)=[r7, r8, r9, r10, r12, r13, 0xffffffffffffffff], &(0x7f0000000980)=[{0x0, 0x5, 0x80009, 0x5}, {0x0, 0x3, 0x3, 0x9}, {0x3, 0x4, 0x8, 0x3}, {0x5, 0x2, 0xf, 0x6}, {0x2, 0x0, 0xe}, {0x5, 0x3, 0x6, 0x6}]}, 0x90) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x118) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) 4.496282451s ago: executing program 2 (id=6181): perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x4, 0x8, 0x10, 0x0, 0x0, 0xc20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8a93, 0x4}, 0x0, 0x0, 0xb46, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffe10) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x12, 0x8, 0x2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x0, 0xb, 0xff, 0x0, 0x0, 0xb9, 0x10000, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x6, 0xff}, 0xd040, 0x8, 0x3c9, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x5, r1, 0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000340)={{r2}, &(0x7f0000000280), &(0x7f00000001c0)='%-5lx \x00'}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1a, 0x3, 0x1, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x2001, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) close(r7) write$cgroup_subtree(r6, &(0x7f0000000600)=ANY=[], 0x28) 4.494997311s ago: executing program 2 (id=6183): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xb, &(0x7f0000000440)=@framed={{}, [@printk={@llx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4408, 0x0, 0x7, 0x6, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, 0x0, &(0x7f0000000040)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000080)={r6, &(0x7f0000000080), 0x0}, 0x20) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000001bc0)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r8}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r10, 0x0, 0x0) recvmsg$unix(r9, 0x0, 0x0) 4.115501522s ago: executing program 2 (id=6187): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0xfffffffc, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x9, 0x3, 0xf4, 0x7fff, 0xd0}, 0x48) 2.075305939s ago: executing program 1 (id=6215): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xb, &(0x7f0000000180)=ANY=[@ANYRESHEX=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xb, &(0x7f0000000180)=ANY=[@ANYRESHEX=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f00000008c0)='f2fs_write_begin\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000007f1600850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x10, 0x2, 0x0, &(0x7f0000000080)={0x0, 0x0}) close(r5) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b40)={@ifindex, 0xffffffffffffffff, 0x2f, 0x201c, 0x0, @prog_id}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={@map=r4, r2, 0x1, 0x2004}, 0x20) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={@map=r4, r2, 0x1, 0x2004}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x10000, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x10000, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xa, 0x8, 0x1, 0x8, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r7, &(0x7f00000000c0), 0x0}, 0x20) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x40010061) (async) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x40010061) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r8}, 0x38) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r8}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r2, @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r2, @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f00000004c0)='cachefiles_ondemand_close\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000740)={0x0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000500)='percpu_create_chunk\x00'}, 0x30) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) 1.926227671s ago: executing program 4 (id=6218): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0xc}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000500), &(0x7f00000005c0)}, 0x20) bpf$PROG_LOAD(0x2, &(0x7f0000000680)={0x3, 0x3, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000080)='filemap_set_wb_err\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2e6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ee0000850000000d000000b70000000000000095000000000000002c3f2cc2b7956244cef7baf48e6d2885a09a87507ebfc75b5b0f4e4309ebcdac5f7a860c000c9c781f6410457253e89ad528d985636a86ec0f68f59cd1159a2c2e85d726859a919cc9548a349980d1ccdce27f94bc074c27f81078545c146a0857153b7b8f00034debae58a4ab415b0d7ff0575cc272cd3d7e8d974927676468ff2d86e0ffac94792ed9cf6b40b3cf252a47c05af3a70d57cc3e067d1867b54d24e20000000000000020009ebf84d3b042d6e4e4e29d8b33fbdd02e86a6432cd080e3b57239f0127473e6ba922aff649609d40b47ec331ccba3ce8f530ffff19a6471bf5abc742d9cbcfb964b13831034694a6aad84cf08a6c7b2235dc99de9aa3e6b77c7a2877261ed32da90864987f30926c9013eec3b86836ae50447aa5a79f40c235000000453302712c3d8fc4e2b61adb0695e800000000d4f4e91f0000002c33df871a8e782339bc424d1bafe5725c8a404724f8a4f1cda7997b65954f74097579b91da309b887af2485c2d9ab09b506000000000000000bf7b2ff4602aec1eea200000064881c5630521a08e051374cf05c921a06fb78183e7e68de9dc8d95e0e5b365d10e1004dae58b3b5b89709b0ff47b200000000004000cbefd9a6bb70f60eb9c01dd2fc79b85e4d961498f3a80131d21d85618ba2189f45d011ef1da5c6d57bb8fd387ccea9c3899a914e47e82f040000009de2323f927355408f87264797d3fa970949793b94329d580500d1f91c0d22587e05a61e3d8576ca168e88d7a9af95b04a37c27bfffab9abbb31fa8c0080258cfa6d3f166e695f3c56490aeef464d9965d70a50f1282619344f223548e75fa39643adac1322c87ca253ff2fb1882760d6feab16bacdf83c11816dbe959ebc5ec479c8319f73e2249eab0486b110702a481d3b51976a52303056e800b4ae5acc2df636a65eb1d672bf2000000cda8462cc9b16624998be65683321e970000000009b8e20762c1bf4a3eb6769f2b23e842bacd9c685edea0ffa3e975424f8ede49e61a4de808a38ba3512d64dc71867df4eee3f1ff791cf7c9862f98b45852e4b2f78721b978addf2f2a29a387c6f0576b36038f819286eea99a6a434811cf2a117d775fe986a49fb82cf5f15972d55185ab18f1045384501adabb20f7b0e15ff47f1744e2341b59034959a1289ba6e243668e671d305707e3de7652bfc5b60c76deff43a1d6fd6a4180ab723735abbeffe7f2ec3a0bb86f9eddfc0f3d1d503d7a540f64000000000000fbb4c256409e54daefbb107c381fa729ff5fe607d93430da178d685d7730f5e129438a5214f722096d2986334c25e454474f92e65828b018174a9f4738b8c71fbdead06ab95e02f9a847182766964976b1fccdb9f35721e43e33883cf16ed1343fb7429eb395123b0a4262b7023c22039b9002589a379ed4c6267965af78b861bd335312538cec97966b8973d4e299d9802264d06e40ae118e1d242d1128dcedeb44030df12ef68ffce8d141e8960ef790fb0078215d65f96eb55db8cbcb060000000d988374e45451a694ffe38a1d03912b31c98d42e1a1bda1290de1a499a5d6849914c1788a7aca37177cc34102f44fec5c5e0abae01c439a1b0311e074e81ae9993b5b3459553ecece78d4c1541c70f5d81e0725d5b273755c0000000000000000aa4234e282182952a76233d18e7d49638aeb04e7a9e9e7eafb7c255372795d2d192a0a33cab0f5bf2e93e0544fcdf2df2bc6ce96e5a7d72fcdb0a11993d54d97a23754ac828674dbb93c0ad345715be4a13678b01edf76d8a9236558fea2c88cce004505ab45d8f5f88aa887bbce5c18970428516f6099bdbb2cd7a2356397f1a0a23e662e2a6c4834400cbaa41c3c574ea68da5ec1ae49f968bbe0e0bf9878516f553639f5b4828e92019b61f5874be1c7cdd9482df50bc24a8a1fa10d291390eb84e26a2e8dbeaa45604b05a116c1210a7540bf81005044273f5a8ffc538db289350eb248e483bd8920efcf30a798c2b636243e0a37262ca47dfeefa1ce69b4475d7d714ba0c636e6ae9f710411d30ef424aeaabe057c7df6ff8f767bcd9012e1047c686f5ccb76ab3a5df53cbc22ba7ea8f6a8edc19d6c1be841503850803bc2c2d5e0e34270a7f1cca0c6c53a8e5f891f7a793a70da62d6d88fbb90d220acc687931b42d6be83ab870da3c0a567f5e65ec0457f4ad2a4ec0b671b36388afd5520a8483a4b11f7d02a41b315f0f9e59f47668d68a74838d6976e12fd45200014041dffacbf60892ec8bd7560686f137a806d3dfaba900b47cac62f828342fff009adb5b2251461a1b9d6ba625b8fe04e69a1a4be2696f24bb68f486e172932e03000000000000005942e1b9d6dc28ab8e19e1111dd893e8d5bc5642faf21eef40d6e7de3ef62c4bc5ff17e7aeb2841098f0cf74f845d1cc9ec4eee79c290fb0ba939b13707004e2e9cc0d350538c1c8c6bb9a38c6ac5ca07df32601240ea3f160d3a7b83ecd0509ce9eba0c7bf7843799b1b56a234f9eaab8a3f14f1472bb6aaeb8ac9ee4055f05558ab31f339f6a4caf2ee2fd01f34dca330000000000000000000000000000000000000000000000000000000000000000000000000095e6f945ba9a941cef5e70b8c152321e24b5b29bcf374dcf5a29a35d76e6e2bf8df95462690a4fc9ec8129e92b6ebb4b40a992a75d3c5954d0bfc87db24d856359079b29b3c374d081c300b2cfaa596d24e800ef8e2201f2fb7a9946f89f9f31f7cbd6f7fd7f8898c70b5c65f2e28f22e983892c383882809f557affbda5e1850d66a4a1ee73b2084681f880a754acddcdafe3ceeeebc0b5f2fedfe7d198e3067f3dbac9441a9ab8409cbbb7e15b9ae3944097de34de2001c8533a3766e6e4c4c4702ccb932a27a3962814cd6aa8fc684beeaa3932efae9052be8eec1e95f6ad8d41dd34829504ba4b66e27154cb6e34aa13450522df1723130b6fe347c93f00e40e293c98d849a33f773c743728992f40faccd5c23130a1c6bfd6fc661bca1598137ddd1090ded672f5a48a40cab3f640c8241a364cbdd3f188eec7da7bccafbd5bf28a46f0eecc6b550471b06a5a411c0e0b19e15a461e7c6833ba936e214b013f2819ec6572a43b5cd32b11d7e4f8dcf8f7820a17b7b2ee6178a03351dd31091e46bfd82a3979b9cad109fd6217cd52aa81bdabd50826a474bd16b8f7e6aed12a305366599f5f029a7b24558c02750500002f1c19d16a6f391906000000cc03bbfb8c698ecc137d96711100e01031aa74fad86b99eebf0527552a9331e646c424b14ffbb815622bfd2f635855bed1b164d0a56bd104be069854111c5b26ec3c652b5f0a6b9676dae987ec23456ba05a4dfb15321ef6b76e7e547a688c67ab531cfc86784c9f940d9fb0464a72ce635e14b80dc5c1c64e8f58c570e7afd83ee77f157c146aa747b728969aeb4aba1d8f9de1b3fb8ab6ea50e884c2ea98e6400bf0c5ae2887cd1da0e57ccfdf5eca2b455247efcc13102846c0a85f20c80007c0ce6efce627b95b8ad3003385de97101678fb2163ecea6e70a77a6fbc089e31a5ccece932229b8f79faa6863d6857c3d9a9710f938ad16eeb8342278f1c1cbc226498028234d21466892983378fe64acbb44f694cd78e43c74aa75505cb1c91b189f8f89f233a05f5cd4e173a373178557843dd705268f74a9e5429945503195aefd6706e587f7ee8375fa559c3ad195d3795df1a8364cd13acc3256ee4634c73eeb6954d0fcf09ab84df0b8900e0c6fea2cc0e7c207b8942fafd70530a0fc4622ecf132d1d5bdc9ffc79f0549b82df521817651d5fead5128205b92ccdccc69407ab556217af277af999dbd456dfc43dd061b6c91485dcc208cf0b3d0bf851de413f5de5ec015e296914afab6411109355e027ce04990d9aae251b9deb11b7db45b9f15b7b55d8fdbedd9e6cf891205694f02be8b9ea8ecd41308a0e1b93ae3435bfa88b440b1f701b4d0fc49c82193f27f8023b630ea97edbf3bf421a0a1a2b4ac7bb30bcd1cdd172c0df37408fd6827bb03e8742fc1c7a2be0d1299928c5f79e846a8dc7ca648d960a759e6711b69776896a9656d59af6d44bff348229fa84034faf8421a22c4b4c17a3d24a4aeee0d0850371feefd77cc4eef51c2b417c8c7458ddd7dd9d1a863bf0a9e1a30a19020490038017a5c7e474c83302a2b59654d49a11c6736ac63e8eb383760fc2b5c976dacf3dda7191c757f28e44f6a5f95db7055f7ed983f5665210f20a494fabb0dbcd335700000000000000000000000000000086666201251aa4f139d0485ffcf89f01639fd1579a3802f720a0215c720a97071f5065a23642a5826fdbca444b00e2e5835185d5d5b2796eb0fe32cf3b0633f58ecc7648c3c6efe82f93a3008052416512eea30ea9472e0b456a652883c0907323cf03be193ad0438cdef7a98a1671a1918df310dc4bfd61c3db3c22673884dca370558936b85737e14819ab1c57b348a8ff16d36364a20fe846d11d045de81f069bac8425b31c5d08b433562ffb318c1285011f9b78b2401989384311101e452f54661ecdb251ab9eefc8e400191f0f0f8c679b0000000000000000000000b41b0ae67d9351c49e1ff285d05a3cc39a5b0cd20afe0a00086650f8fad20c0e1e7131836c85b2cbacd41593928207312189fdd66abc45a139f0c9dbcc58237cec5bd56ffe0c6de23254a7951a298501ca04ab30b5723df6dd01d0b1a87c197b83b286374ba9a9dd1bd09ea1b71b24a1f527bf59d9633e3d15ed3757acc494f464482e49884c13780cc392bfe67b5d91e5b513daea48cac7645db35f07ba41aa187f65c5344717d7a0ee353a7e36b14fdce5898a613cef224d3addb3d2de74cef73f7520dc8cc8ffaa62cbd25e691ef4c45fdd25675b32c129a8464f08c4da9c08713b54416f3b56a04086dab1d196884e062287ad4758e883d2f99833d8aaf0c56718f6b0434740900faf4ab824662a719bf370fd0b2de04c1455ec14908ce5cbec79466f2f2cc337c53437d626254e00000000000000000000000000000000c34646f8ae68c095e7298300feab8a3dfe2c43fc971385b13b4f3b61ddbf5044ff572defcc67930f0e715774e1e970751534398faf79350255cfa9021378f10c2043e7ecd5649c9720530da7ea227b792f31cb5d688b5f1eba9ff5f85c97b35e00ecf76282912b483e31c76e303e527e98a9ca14f718d495ad45db16c4500011de506f0ca35f7ea96ed1831e3c1219f985b26cb8a70e7c8efcb287984871e0fed3f1985cf63f00289292b378188ad0dfae12c265b88961a9223b48cf7055d641595e0cb926d63c1f8a207f48bd482290b79867285c2155e655e017bca6cbba43f9b49042fb2fb390c436b3306e8a0800000090d159004da838a50235b91f5273c1fe083067ce1e2d8011c9e2b6d3ea69dfc3712e5ce440432fbd29ffd004000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x20e, 0x5ee, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 1.711092479s ago: executing program 1 (id=6220): bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x0, 0x0, 0x4}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001640)='freezer.parent_freezing\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000008000000000000000000000d0ad0000", @ANYRES32=r1, @ANYRESOCT, @ANYRES8=r1, @ANYBLOB="3fc8b6857a17c77253c2c5095eeac1e243d68e6ab96c7927897b80039a817f0c9a18b59ab95a7f1b2f318186769974aacf1a37fe7934f9d36d4e45a3e03adf181be403c074fcfb9ad99110451f5f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055aaaeb6db4ee9bcb64db04ed6dd26eea", 0x23}, {&(0x7f00000002c0)="bc8a34dc403610c2c37577ff36c7", 0xe}, {0x0}], 0x3}, 0x0) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907003675f3757f0086dd6317ce800000000000e0865a6596aff57b00000000000000000000000000ac1414"], 0xfe1b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) 1.669420853s ago: executing program 3 (id=6221): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x0, 0x0, 0x2, 0x4}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB], 0x0}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f00000003c0)=[0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0], 0x0, 0xe9, &(0x7f00000004c0)=[{}], 0x8, 0x10, &(0x7f0000000500), &(0x7f0000000600), 0x8, 0x13, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000800)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r1}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000ffff0018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair(0xa, 0x3, 0x87, &(0x7f0000000040)) 1.591820659s ago: executing program 1 (id=6222): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffe98) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r1, r2, 0x0, 0x12, &(0x7f0000000100)='./cgroup.net/syz1\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x28) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000004340)={0x6, 0x14, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r6}, 0xc) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000080), 0x0}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000010b00dfd80d897c184adf87fac1fbf3ff00000000bd55cd9541f4555f509cb71d1ce6bd1a70210a550a7e546f21", @ANYRESDEC=r4], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="180000000000000000000000000000007112390000000000950000001d000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) 1.591476819s ago: executing program 4 (id=6223): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x8, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r0, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0xe) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 1.566437201s ago: executing program 4 (id=6224): bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x0, 0x3, 0x1, 0x1400, r0, 0xb, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x8, 0x2, 0xf}, 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x0, 0x3, 0x1, 0x1400, r0, 0xb, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x8, 0x2, 0xf}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x14, &(0x7f0000000840)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x14, &(0x7f0000000840)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xf, &(0x7f0000000280)=ANY=[@ANYRES16=r2, @ANYRESHEX=r2, @ANYRES16], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x44b7394118da2fdb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000ff0f0000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_unlink_enter\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000004c0)='kvm_ioapic_set_irq\x00', r4}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x8, r6}, 0x18) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x8, r6}, 0x18) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) (async) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x20001400) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1a04"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x80) ioctl$TUNSETOFFLOAD(r7, 0x4010744d, 0x20000000) (async) ioctl$TUNSETOFFLOAD(r7, 0x4010744d, 0x20000000) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x2}, 0x200, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r8 = gettid() bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x13, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="b4050000200000006110600000000000c6000000000000009500000000000000f074be037592f760036063fe01cfe55060b9e67544d50207737c0265d6c147e6f2ea7dbd8f53f65deeab103ca918509882ed9ad6ae8c3723a08dabcc399e0a0f02fc76978d4a43f28ee73e5b04111ff9ade53b2670b95937319d20a2b9044f067b56c32b15c843eea982847d2ca68304ea29a94b60cde63631cd687c700ed670795b42a23fd65edcab0c2f3f781abd891b240330c2a82e779fe2e79c5937d094e9d82cf242ca"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x55, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6}, 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, r1}, 0x90) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xffff}, 0x0, 0xa, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xffff}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000001c0)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r9, &(0x7f0000000200)=ANY=[@ANYBLOB='a \x00\x00\x00\x00rIH'], 0x9) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xff, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xff, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, r8, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, r8, 0x0, 0xffffffffffffffff, 0x0) 1.472007239s ago: executing program 3 (id=6226): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x1, 0xc, &(0x7f0000000a80)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000a80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x7d, &(0x7f0000000680)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x65, 0x8, 0x8, &(0x7f0000000740)}}, 0xffffffffffffffa3) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x82, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000005c0)=""/151, 0x84}], 0x1, &(0x7f0000002f40)=""/244, 0xf4}, 0x0) sendmsg$tipc(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="b8d3d8e48974aae5039847936746be1d81a34f9b68100dbf05177b2436f9d642df271fd6b9aa6701365ffc723899ad120c5a54b1c64080f64f103ee1de769e5e9dd8cbb6f069a662eaad499c52a16f40cb3a1f6f3d5f8df14c53b2e6b5397f7806b6ff846de37a34c8342b9ac5a51eacf8a09cede8676044eafd3d7935f90698aa2d9c572763", 0x86}, {&(0x7f00000003c0)="95740a", 0x3}, {&(0x7f0000000540)="d1fd97c2df863a553e3e2c8a", 0xc}], 0x3}, 0x0) close(r8) close(r3) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext={0x0, 0x400}, 0x200000}, 0x0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000002400000024000000060000000000000001000004000000000300000002000000000000000000000000000005000004000000005f"], 0x0, 0x42}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r6, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r9}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) close(r2) bpf$MAP_CREATE_TAIL_CALL(0x15, 0x0, 0x0) 1.371489517s ago: executing program 4 (id=6228): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x0, 0x400}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000080)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x9a}, [@ldst={0x6, 0x0, 0x3}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) gettid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001400a685b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe4, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r3}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xb, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 1.232593769s ago: executing program 1 (id=6229): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8902, &(0x7f0000000900)={'wg2\x00', @random='\x00\x00\x00 \x00'}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000340)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, 0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r8}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[], 0xffbf) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 986.352099ms ago: executing program 3 (id=6231): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0xfff, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x5452, 0x20001439) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r1, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0], 0x0, 0xa8, &(0x7f0000000580), 0x0, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0x30, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x25, &(0x7f0000000280)=ANY=[@ANYBLOB="180000004000000000000000000000fc18110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085000000a7000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180104002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000200008500000006000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000003c0)='syzkaller\x00', 0xb, 0x1000, &(0x7f0000001b80)=""/4096, 0x41100, 0x4, '\x00', r6, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r4, r0, r0]}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfffffffeffffffff}, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0xfdef) (async) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRES16], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x32}, 0x90) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r7, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 911.536435ms ago: executing program 3 (id=6233): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014fa0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x10002, 0x0, 0x1}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18010000000020000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdir(0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB='\x00'], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) 821.369672ms ago: executing program 1 (id=6236): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000480)={0x4, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x430, 0x0, 0x0, 0x0, 0x0, 0x39f, 0xffff, 0x0, 0x3, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = perf_event_open(&(0x7f0000000480)={0x4, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x430, 0x0, 0x0, 0x0, 0x0, 0x39f, 0xffff, 0x0, 0x3, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1}, 0x48) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x13, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000180000003d030100000000009500f000000000006926000000000000bf670000000000005606020015ff07007706000020000000170200000ee60000bf250000000000002d350000000000006507000002080000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad15010000000000840400000000000014000000100000009500000000000000db13d5d8b741f2cdaabc8383c8f56b8c2b848b00ea6553f3040000705fad86c8e1a53cb300815dcf00c3ee7b042d1937ba52037fdefeb0cff9fc56357d81b2cc1a9e37d7b75c020b070000003eb22062a1faca036d9cc7db6671573e202e0a63fe4ba12b064985cc32d1ac0b9ecc8f604dcac256621c90491726de3b"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) openat$cgroup_freezer_state(r5, &(0x7f00000000c0), 0x2, 0x0) (async) r6 = openat$cgroup_freezer_state(r5, &(0x7f00000000c0), 0x2, 0x0) r7 = openat$cgroup_procs(r5, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000180), 0x12) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x99, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x90}}, 0x0, 0xffffffffffffffff, r3, 0x0) (async) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x99, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x90}}, 0x0, 0xffffffffffffffff, r3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write$cgroup_freezer_state(r6, &(0x7f0000000400)='FROZEN\x00', 0x7) (async) write$cgroup_freezer_state(r6, &(0x7f0000000400)='FROZEN\x00', 0x7) close(r9) write$cgroup_pid(r7, &(0x7f00000002c0)=r4, 0x12) write$cgroup_freezer_state(r6, &(0x7f0000000200)='THAWED\x00', 0x7) (async) write$cgroup_freezer_state(r6, &(0x7f0000000200)='THAWED\x00', 0x7) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100411, 0x0, 0x0, 0x0, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, r2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xc4be7132c5072d89, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000000500000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) (async) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xc4be7132c5072d89, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000000500000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffee6) (async) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffee6) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) 520.429467ms ago: executing program 4 (id=6238): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x5}, 0x2000}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'macvlan0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x1, 0x5, 0x862a, 0x401, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x0, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x7, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x15) r3 = gettid() syz_open_procfs$namespace(r3, &(0x7f0000000400)='ns/pid_for_children\x00') perf_event_open(&(0x7f0000000b80)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x11, 0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000006c0)={0xffffffffffffffff, &(0x7f0000000600)="5f38cf18ca74c39b95d9ed0603c46587250c50f11c4fed4a25b825160eb2dc9ccc99257f2c282b", &(0x7f0000000640)=""/92}, 0x20) syz_clone(0x24001100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0xe, 0xa, 0x0, 0x4, 0xaa013, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x24766855, 0x4, @perf_config_ext={0x4}, 0x104402, 0x8, 0x8001, 0x7, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000107000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 501.089319ms ago: executing program 1 (id=6239): r0 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1050, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) r4 = gettid() r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r4, r6, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() r10 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000001540)=[{0x0}, {0x0}, {&(0x7f0000001340)=""/70, 0x46}, {&(0x7f00000013c0)=""/232, 0xe8}, {0x0}], 0x5, &(0x7f00000015c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x40}, 0x1) r14 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r15 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRESHEX, @ANYBLOB="1c0000000000000001000000", @ANYRES8=r10, @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYBLOB="00000473004a5c572cc9bf0000", @ANYRES32=0x0, @ANYRES32=r11, @ANYRES32=r13, @ANYRES16=r15, @ANYRES32=r12, @ANYRES32, @ANYRES32, @ANYBLOB="0003d200010000000204000001040000010000002000003f000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000", @ANYRES64, @ANYRES32=0xee01, @ANYRESDEC=r14], 0xe0, 0x20000001}, 0x0) r16 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x103a, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2a3}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r16, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef2408002900119386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d50000000100000014000005002433106558d320d98a61a90021c9bf", 0x0, 0x400, 0x0, 0x0, 0x0, &(0x7f0000000b80)}, 0x22) r17 = getpid() sendmsg$unix(r8, &(0x7f0000001580)={&(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000014c0)=[{&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="8010911ac26143c4c41bd0c76ee12aa5b4b76e98d4760f30b30227acbcb86ce315620a9e8d9634fb958567c39d2e0e811bc08234b094ec31bfb5b068ba9e0809d7e51d96ba8147aa780ff804f67f64ae0f06b99ee9bbd31edac8bd8699545d673766c5f551893207a0fe9e8d0f353603228345bfca0ab5bbc056e82683f5c5735522dd9eb2ac47b57266fb0db271f401616d6271ba", 0x95}, {&(0x7f0000001400)}], 0x3, &(0x7f0000001500)=[@cred={{0x1c, 0x1, 0x2, {r9, 0xee00, r13}}}, @rights={{0x28, 0x1, 0x1, [r7, r16, r8, r7, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r17, 0xee01, 0xee00}}}], 0x68, 0x4001}, 0x20000800) r18 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x20f42, 0x0) ioctl$TUNSETIFF(r18, 0x400454ca, &(0x7f0000000140)={'\x00', 0x6132}) write$cgroup_subtree(r18, &(0x7f0000000080), 0x0) r19 = getpid() sendmsg$unix(r2, &(0x7f0000000280)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f00000001c0)=[{&(0x7f00000000c0)="e6742e0b066676b1b6a420f850f62c47c19326f7929cf0ef5dc2dcb0bb2b40b6371d9e73d4472e930f1be09740507729c98f07a11a751109d4bf184a382ac7231303db6ed0b40ca6aead8a9d6bff7652a44a39a750587a8ae23f99a5464d1e0e2fc6e32b8dcf3d59cefcd6c143f5e22d79cb9610172fa97d2d0d503b0cf500d7eccb2599181f67fdb9f6cac5d337607b098cb252a8260bde24cc295eca268143f5d67610057aecd81f22e9552df2331cb68798e4f42e33dd13263e3bd24914884f9e", 0xc2}], 0x1, &(0x7f0000000200)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01, r13}}}, @rights={{0x24, 0x1, 0x1, [r3, r0, r3, r2, r18]}}, @cred={{0x1c, 0x1, 0x2, {r19, 0xee01}}}], 0x80, 0x10}, 0x4058840) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000140)="cbd9045e2ac1e6cfeda5d0021f5ea1ae4eff53b75bc7c2a2c836e965a03f473cbaa61625707503c8e220119e1cee2b62e0e4f5e3a27634f6ec50fc4815a2315a29b144df204dfb10b5bc02d6711ccb8e78033b31d169b011f6dfbf46e12d4507402b28ba7eee0561fee484df8e1449", 0x6f}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r13}}}], 0x40, 0x40001}, 0x4000) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r20 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r20}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 412.735876ms ago: executing program 0 (id=6240): r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000840), 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 32) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x0) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x5, 0x0, 0x9, 0x1}, 0x48) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000008000000000", @ANYRESOCT], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400)={r2}, 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000780)=ANY=[@ANYRES64=r0, @ANYRES16], &(0x7f0000000680)='syzkaller\x00', 0xfffffffd, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x0, 0x4}, 0x3b) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) getpid() (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x800006, 0x0, 0x0, 0x0, 0x96c4}, @exit, @alu={0x5, 0x1, 0xc, 0xa, 0xa}]}, &(0x7f0000000300)='GPL\x00', 0x4, 0xdd, &(0x7f00000004c0)=""/221}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 370.999739ms ago: executing program 0 (id=6241): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], 0x0}, 0x90) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={0xffffffffffffffff, 0x18000000000002a0, 0x6, 0x0, &(0x7f0000000040)="76389e147583", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='block_plug\x00'}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='block_plug\x00'}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x1) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002300)=ANY=[@ANYBLOB="1800000000000000000000000000000065f5f95f6437cbb6e7adff3745c856330407855d30a889e7bed1e20f8b690fc42d40cec854c57542fb3d0bc5634590ff", @ANYRES32, @ANYRES32=0x0, @ANYRES16=0x0, @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYRES32, @ANYRESDEC], 0xe0, 0x20000001}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xe, 0x1c, &(0x7f0000000680)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b70300002bb91a007a00000008000000bc0900000000000045090101002000009500000000000000b7020000000000007b9af8ff00000000b5090000000000007baaf0ff68178139ce94c9fdffffbfa400000000000007040000f0ffffffc40200000800000018220000fd254ff51f3eae145b453154cc6a18a947d7d2b0f430ded3368baea9ee00fbb76352ee421a87d25254000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7050000080000004608efff76000000bf9800000000000056090000000000008500000000000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 258.244838ms ago: executing program 0 (id=6242): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000100000000000c0000000c0000030000000002000000000000040000000000005f615f00"], 0x0, 0x2a}, 0x20) (async) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x1, 0xa, 0x8}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x0, 0x3, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x20000, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x0, 0x800}, 0x48) (async) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x800000000}, 0x10010, 0x80000001, 0xfffffffc, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) (async) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0xc0681, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000580)=ANY=[@ANYBLOB="188b0ac06d581b605a8fc53216277f00cb4dfa1912b7ea57a6a6f6fe77715a7a4bf68e3b26389b6214ebcab05ba99c9fe81719e17a38c6d65847970e65047311d7bcae8430811af45028c79cacb00b4be76af31bd71934b4d1c624b69a22b38cdb506f305f2b10400eefc9478429e920f2012a3c7a9a77ef", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) ioctl$SIOCSIFHWADDR(r4, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8943, &(0x7f0000000080)) 117.55903ms ago: executing program 0 (id=6243): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000340)='%pB \x00'}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x20, 0x0, 0x6, 0xe50, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5, 0xf}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r0, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffe47, 0x0, 0x0, 0x0, 0x20000001}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYRESDEC=r2, @ANYRES8=r2, @ANYRESHEX], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5a, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x14, 0x81, 0x7f, 0x7f, 0x2802, 0xffffffffffffffff, 0xfffffffa, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x1}, 0x48) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.controllers\x00', 0x0, 0x0) (async, rerun: 32) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) (rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r4 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r4}, 0x8) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x5, 0xef, 0x7, 0x1, 0x0, 0x0, 0x0, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000140)}, 0x0, 0x287d, 0x8001, 0x2, 0x7, 0x5, 0x0, 0x0, 0x4, 0x0, 0x2}, 0x0, 0xd, r5, 0xb) (async, rerun: 32) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0x1f2f, 0xe, 0x0, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0x0, 0x0, 0x0}, 0x50) (async, rerun: 32) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) (async) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x80047441, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000a173444e9495f85fcd852b137848c60b75de75e10f4fff6c7143d473e141faecd64affeccbb8a24fab9dc321bbe5644edadd", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRES8=r1, @ANYRESHEX=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async, rerun: 32) bpf$MAP_LOOKUP_ELEM(0x15, 0x0, 0x0) (rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) (rerun: 32) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x49, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r8}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) 103.209991ms ago: executing program 0 (id=6244): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x0, 0x5}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) (async) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000080), 0x0}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000080), 0x0}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x7, 0x8295, 0x0, 0x40, 0xffffffffffffffff, 0x7ff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x802, 0x4}, 0x42) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRESDEC=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00'}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1}, 0x48) 93.628192ms ago: executing program 3 (id=6245): openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000004c0)={{0x1, 0xffffffffffffffff}, &(0x7f00000003c0), 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x27, 0xffffff83, 0xfffffffffffffd6b, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="021a0000000002000000000000000000000000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x89f1, &(0x7f0000000900)={'ip6gre0\x00', @random="0600002000"}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={&(0x7f0000000280)="04d146f90897476964238265be169a68f237641315ed1feca541dc60c91867266a7995e5ebb3895d1f9fb43f69aa90d84affde11b94fde1f6be8ee4ddcec285d353cb9f8cd492fa57265b974cb3b4828d357406d9f65d82e4cef1051a9099b187153d28de08b42ec18dfd21ce70f845a45b0e2721c74918aa019a1c9c80c742a34d5ab53ccaa2873c50e7aa4ebb4bd1b4cc1ab951d2f6996cbd86cc940464cfe57a20b77fb763b99b6503233e34221e2a9ae5952898d15cc251e0e65fa8d2b47ab81532d3438eaa3f8e917ed2b4fddb2d4fd5f5f", &(0x7f0000000f80)=""/4096, &(0x7f0000000000)="eff7", 0x0, 0x2, r0, 0x4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x10) (async) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000b80)=ANY=[@ANYBLOB="9feb01005ffc"], 0x0, 0xfc5f}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) write$cgroup_subtree(r4, &(0x7f0000000180)=ANY=[], 0xffbf) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 41.721596ms ago: executing program 4 (id=6246): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) socketpair(0xf, 0x0, 0x2, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffff7d, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x200005}, 0x81) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000700), 0x4) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}, {}, {}, {0x7, 0x0, 0xb, 0x7}}, @printk]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r3}, &(0x7f0000000200), &(0x7f00000003c0)=r5}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r3}, &(0x7f0000000080), &(0x7f00000000c0)=r5}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth1_vlan\x00', 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8b0f, 0x20000000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x42008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x14}, 0x0, 0xc8, 0x0, 0x0, 0x34}, 0x0, 0x7, 0xffffffffffffffff, 0x9) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 36.446816ms ago: executing program 3 (id=6247): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x2448, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0xe}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYRES16], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), 0x0}, 0x20) (async) ioctl$SIOCSIFHWADDR(r1, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) 0s ago: executing program 0 (id=6248): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x9) (async) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) (async) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) (async, rerun: 64) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f00000009c0)={'dvmrp0\x00', @local}) (rerun: 64) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001000)={0xffffffffffffffff, 0x20, &(0x7f0000000fc0)={&(0x7f0000000e40)=""/248, 0xf8, 0x0, &(0x7f0000000f40)=""/126, 0x7e}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x1c, 0xa, &(0x7f0000000c00)=ANY=[@ANYBLOB="180000000000010000000000010400008520000001000000950000000000000018110000", @ANYRES32, @ANYBLOB="000000d41e9687dd8abc5e9ef34d4f01558b0000000000b7020000000000"], &(0x7f0000000c80)='GPL\x00', 0x0, 0x7f, &(0x7f0000000cc0)=""/127, 0x40f00, 0x73, '\x00', 0x0, 0x3f, 0xffffffffffffffff, 0x8, &(0x7f0000000d40)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, r6, 0xffffffffffffffff, 0x0, &(0x7f0000000d80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xdb}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="ffe45b693950c9df0800000000000000c282250e", @ANYRES32=0x0, @ANYRESDEC], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x2, 0x1f, &(0x7f00000009c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @ldst={0x2, 0x1, 0x0, 0x0, 0x1, 0x40, 0x10}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}}, @alu={0x7, 0x0, 0x4, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x444911c82f8ab4be}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000000040)='syzkaller\x00', 0xd4, 0x4d, &(0x7f0000000180)=""/77, 0x40f00, 0x48, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x1, 0xd, 0x6}, 0x10, r6, 0xffffffffffffffff, 0x14, 0x0, 0x0, 0x10, 0x3}, 0x90) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xd, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, [@map_fd={0x18, 0x1, 0x1, 0x0, 0x1}]}, &(0x7f0000000200)='GPL\x00', 0x81, 0x34, &(0x7f0000000280)=""/52, 0x41100, 0x20, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x1, 0xfd85, 0xde3}, 0x10, r6, r2, 0x2, 0x0, &(0x7f0000000700)=[{0x4, 0x5, 0xa, 0x1}, {0x0, 0x4, 0x0, 0x5}], 0x10, 0x4}, 0x90) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) socketpair$unix(0x1, 0x0, 0x0, 0x0) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e40)={0x11, 0x13, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000018000000fbffffff0000000000000000186000000c000000000000000900000085200000050000008520000004000000007307000700000018110000", @ANYRES8=r2, @ANYRES8=r6], &(0x7f00000003c0)='syzkaller\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000cc0)={0x4, 0x0, 0x800, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000dc0)=[0xffffffffffffffff], &(0x7f0000000e00), 0x10, 0x2}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000001000)=@base={0x3, 0xe, 0x8, 0x7fff, 0xb, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={r2, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00), ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000a80)=[0x0], 0x0, 0x59, &(0x7f0000000ac0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000b00), &(0x7f0000000b40), 0x8, 0xd5, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=@base={0xa, 0xe, 0x7fff, 0xffffffef, 0x410, 0xffffffffffffffff, 0x9, '\x00', r7, r3, 0x0, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) (rerun: 32) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300), 0x10) kernel console output (not intermixed with test programs): may corrupt user memory! [ 57.307575][ T2270] device veth1_macvtap left promiscuous mode [ 57.413591][ T2270] device macsec0 entered promiscuous mode [ 57.593856][ T2286] syz.2.535[2286] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.596512][ T2286] syz.2.535[2286] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.070821][ T2328] bridge0: port 3(veth0_to_batadv) entered blocking state [ 58.089299][ T2328] bridge0: port 3(veth0_to_batadv) entered disabled state [ 58.096689][ T2328] device veth0_to_batadv entered promiscuous mode [ 58.325542][ T24] audit: type=1400 audit(1722804884.420:147): avc: denied { create } for pid=2345 comm="syz.2.552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 58.454810][ T2351] device syzkaller0 entered promiscuous mode [ 59.982800][ T2456] device sit0 entered promiscuous mode [ 60.273515][ T2471] device syzkaller0 entered promiscuous mode [ 60.794630][ T2520] syz.2.598[2520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.794684][ T2520] syz.2.598[2520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.813973][ T2520] device pim6reg1 entered promiscuous mode [ 61.342088][ T24] audit: type=1400 audit(1722804887.440:148): avc: denied { create } for pid=2540 comm="syz.0.604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 61.706029][ T2558] syz.0.609[2558] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.706078][ T2558] syz.0.609[2558] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.725280][ T2560] device pim6reg1 entered promiscuous mode [ 62.372335][ T2633] : renamed from vlan0 [ 62.475781][ T2648] device pim6reg1 entered promiscuous mode [ 62.590958][ T2667] device sit0 left promiscuous mode [ 62.626113][ T2667] device sit0 entered promiscuous mode [ 62.646472][ T24] audit: type=1400 audit(1722804888.740:149): avc: denied { create } for pid=2676 comm="syz.0.648" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 62.752660][ T2694] device veth0_vlan left promiscuous mode [ 62.814464][ T2694] device veth0_vlan entered promiscuous mode [ 62.906460][ T2707] device sit0 left promiscuous mode [ 63.475476][ T2734] device syzkaller0 entered promiscuous mode [ 63.708175][ T2740] device veth0_vlan left promiscuous mode [ 63.714612][ T2740] device veth0_vlan entered promiscuous mode [ 63.760059][ T2053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 63.772690][ T2053] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 63.780773][ T2053] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 64.249728][ T2765] device pim6reg1 entered promiscuous mode [ 64.742540][ T24] audit: type=1400 audit(1722804890.840:150): avc: denied { create } for pid=2816 comm="syz.3.684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 64.784989][ T24] audit: type=1400 audit(1722804890.860:151): avc: denied { create } for pid=2816 comm="syz.3.684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 65.476415][ T24] audit: type=1400 audit(1722804891.570:152): avc: denied { create } for pid=2864 comm="syz.2.697" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 65.508812][ T2859] device syzkaller0 entered promiscuous mode [ 65.646128][ T2872] syz.3.699[2872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.646207][ T2872] syz.3.699[2872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.666155][ T2868] device sit0 entered promiscuous mode [ 67.199930][ T2956] device veth0_vlan left promiscuous mode [ 67.230723][ T2956] device veth0_vlan entered promiscuous mode [ 67.238065][ T2459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.260848][ T2459] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 67.329151][ T2459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 68.420618][ T3052] -: renamed from syzkaller0 [ 68.508617][ T3050] device syzkaller0 entered promiscuous mode [ 70.443659][ T3149] device pim6reg1 entered promiscuous mode [ 71.080414][ T3250] device syzkaller0 entered promiscuous mode [ 72.367734][ T3337] device veth0_vlan left promiscuous mode [ 72.376176][ T3337] device veth0_vlan entered promiscuous mode [ 72.413553][ T3287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.425300][ T3287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.432905][ T3287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 72.648602][ T3356] device syzkaller0 entered promiscuous mode [ 72.899002][ T3381] syz.2.812[3381] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.899082][ T3381] syz.2.812[3381] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.216736][ T24] audit: type=1400 audit(1722804899.310:153): avc: denied { create } for pid=3402 comm="syz.3.816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 73.353193][ T3400] : renamed from pim6reg1 [ 73.779249][ T3431] device veth1_macvtap left promiscuous mode [ 74.126427][ T3474] device sit0 left promiscuous mode [ 74.891127][ T3568] syzkaller0: refused to change device tx_queue_len [ 75.194974][ T3572] device syzkaller0 entered promiscuous mode [ 75.364295][ T3585] device sit0 left promiscuous mode [ 75.467094][ T3585] device sit0 entered promiscuous mode [ 75.699832][ T3588] device veth0_vlan left promiscuous mode [ 75.709291][ T3588] device veth0_vlan entered promiscuous mode [ 75.717190][ T3590] device syzkaller0 entered promiscuous mode [ 75.884757][ T3601] device syzkaller0 entered promiscuous mode [ 76.132287][ T3634] device pim6reg1 entered promiscuous mode [ 76.884570][ T3701] device pim6reg1 entered promiscuous mode [ 77.258314][ T3727] veth1_vlan: mtu less than device minimum [ 78.327595][ T3763] device pim6reg1 entered promiscuous mode [ 78.494979][ T3784] device pim6reg1 entered promiscuous mode [ 78.586960][ T3788] : renamed from vlan0 [ 78.701671][ T3829] syz.0.937[3829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.701728][ T3829] syz.0.937[3829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.857141][ T24] audit: type=1400 audit(1722804904.950:154): avc: denied { create } for pid=3843 comm="syz.1.940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 78.965562][ T3850] device syzkaller0 entered promiscuous mode [ 79.021339][ T3852] device syzkaller0 entered promiscuous mode [ 79.048478][ T24] audit: type=1400 audit(1722804905.080:155): avc: denied { append } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 79.108596][ T24] audit: type=1400 audit(1722804905.080:156): avc: denied { open } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 79.171518][ T24] audit: type=1400 audit(1722804905.080:157): avc: denied { getattr } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 79.791105][ T3890] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.801167][ T3890] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.768604][ T3951] device sit0 entered promiscuous mode [ 81.041716][ T3968] device veth1_macvtap entered promiscuous mode [ 81.061594][ T3191] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 81.845157][ T4037] device syzkaller0 entered promiscuous mode [ 82.498396][ T4080] device macsec0 left promiscuous mode [ 83.068905][ T4108] device syzkaller0 entered promiscuous mode [ 83.539049][ T24] audit: type=1400 audit(1722804909.640:158): avc: denied { attach_queue } for pid=4148 comm="syz.2.1017" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 83.682838][ T4152] device syzkaller0 entered promiscuous mode [ 85.003062][ T24] audit: type=1400 audit(1722804911.080:159): avc: denied { create } for pid=4209 comm="syz.1.1033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 85.108580][ T4220] device sit0 entered promiscuous mode [ 85.116117][ T4223] syz.1.1036[4223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.116172][ T4223] syz.1.1036[4223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.305090][ T4255] : renamed from syzkaller1 [ 86.518741][ T4277] device syzkaller0 entered promiscuous mode [ 86.868315][ T4293] device pim6reg1 entered promiscuous mode [ 89.207329][ T4401] device wg2 left promiscuous mode [ 89.277945][ T4407] device wg2 entered promiscuous mode [ 89.484807][ T24] audit: type=1400 audit(1722804915.580:160): avc: denied { ioctl } for pid=4421 comm="syz.0.1093" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 89.513495][ T4419] device sit0 entered promiscuous mode [ 89.652540][ T4428] device syzkaller0 entered promiscuous mode [ 91.171319][ T4550] device veth1_macvtap left promiscuous mode [ 91.208765][ T4550] device veth1_macvtap entered promiscuous mode [ 91.270152][ T24] audit: type=1400 audit(1722804917.370:161): avc: denied { create } for pid=4557 comm="syz.4.1128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 91.492025][ T4567] device pim6reg1 entered promiscuous mode [ 91.648246][ T4569] tun0: tun_chr_ioctl cmd 1074025676 [ 91.730493][ T4569] tun0: owner set to 0 [ 92.148631][ T4614] device veth0_vlan left promiscuous mode [ 92.171615][ T4614] device veth0_vlan entered promiscuous mode [ 92.208858][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 92.293231][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 92.333693][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 92.560194][ T4628] device syzkaller0 entered promiscuous mode [ 93.547567][ T4666] device syzkaller0 entered promiscuous mode [ 93.674699][ T4670] bridge_slave_0: mtu greater than device maximum [ 93.823160][ T4679] syz.3.1157[4679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.823210][ T4679] syz.3.1157[4679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.918170][ T4684] syz.3.1157[4684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.929960][ T24] audit: type=1400 audit(1722804920.030:162): avc: denied { create } for pid=4673 comm="syz.4.1154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 93.969080][ T4679] syz.3.1157[4679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.969137][ T4679] syz.3.1157[4679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.007813][ T4684] syz.3.1157[4684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.747959][ T4735] device syzkaller0 entered promiscuous mode [ 95.100658][ T4752] syz.4.1175[4752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.100712][ T4752] syz.4.1175[4752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.707525][ T4795] device syzkaller0 entered promiscuous mode [ 96.443285][ T4850] device veth0_vlan left promiscuous mode [ 96.464139][ T4850] device veth0_vlan entered promiscuous mode [ 96.536622][ T2459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 96.552683][ T2459] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 96.604094][ T2459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.232940][ T4888] device pim6reg1 entered promiscuous mode [ 97.465417][ T4905] device syzkaller0 entered promiscuous mode [ 99.355163][ T5002] syz.2.1248[5002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.355220][ T5002] syz.2.1248[5002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.527898][ T5007] device sit0 left promiscuous mode [ 99.631080][ T5007] device sit0 entered promiscuous mode [ 99.840104][ T5020] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x32 [ 101.985866][ T5178] device pim6reg1 entered promiscuous mode [ 104.633969][ T5308] syz.4.1330[5308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.634026][ T5308] syz.4.1330[5308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.703873][ T5314] device veth0_to_batadv left promiscuous mode [ 104.730101][ T5314] bridge0: port 3(veth0_to_batadv) entered disabled state [ 105.029197][ T5333] device syzkaller0 entered promiscuous mode [ 105.042550][ T5342] syz.4.1341[5342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.042628][ T5342] syz.4.1341[5342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.120796][ T5344] device veth0_to_team entered promiscuous mode [ 105.913727][ T5386] device sit0 left promiscuous mode [ 105.975912][ T5386] device sit0 entered promiscuous mode [ 106.353016][ T5407] syz.0.1362 (5407) used obsolete PPPIOCDETACH ioctl [ 107.454279][ T5489] bridge0: port 3(veth0_to_batadv) entered blocking state [ 107.461664][ T5489] bridge0: port 3(veth0_to_batadv) entered disabled state [ 107.482149][ T5489] device veth0_to_batadv entered promiscuous mode [ 107.524784][ T5502] device veth1_macvtap entered promiscuous mode [ 107.531947][ T5502] device macsec0 entered promiscuous mode [ 107.539066][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 107.619628][ T5509] device syzkaller0 entered promiscuous mode [ 107.671439][ T5514] device syzkaller0 entered promiscuous mode [ 109.438938][ T5609] device syzkaller0 entered promiscuous mode [ 110.248450][ T5688] syz.0.1432[5688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.409688][ T5692] device syzkaller0 entered promiscuous mode [ 110.529807][ T5696] device pim6reg1 entered promiscuous mode [ 111.204373][ T5709] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.255778][ T5709] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.341772][ T5709] device bridge_slave_0 entered promiscuous mode [ 111.446091][ T5709] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.486553][ T5709] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.529445][ T5709] device bridge_slave_1 entered promiscuous mode [ 111.608225][ T5735] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 111.615325][ T5735] pim6reg0: linktype set to 769 [ 111.672281][ T5737] device pim6reg1 entered promiscuous mode [ 111.878222][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.895878][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.942239][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 111.952965][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.963937][ T3190] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.970815][ T3190] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.978710][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 112.000676][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 112.009104][ T3190] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.016060][ T3190] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.025225][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 112.033433][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 112.041579][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 112.050480][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 112.075410][ T5756] device veth0_vlan left promiscuous mode [ 112.091536][ T5756] device veth0_vlan entered promiscuous mode [ 112.132734][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 112.140756][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 112.156277][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 112.187023][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.201240][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 112.209762][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.222186][ T5709] device veth0_vlan entered promiscuous mode [ 112.241434][ T5758] device pim6reg1 entered promiscuous mode [ 112.260625][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 112.272859][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.281522][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 112.289955][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 112.320622][ T5709] device veth1_macvtap entered promiscuous mode [ 112.340619][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 112.348326][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.365886][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 112.393679][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 112.403455][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 112.418884][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 112.445398][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 113.238319][ T5827] device syzkaller0 entered promiscuous mode [ 113.261324][ T5821] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 113.445990][ T5843] device syzkaller0 entered promiscuous mode [ 114.097559][ T5922] device pim6reg1 entered promiscuous mode [ 114.499519][ T5947] tap1: tun_chr_ioctl cmd 1074025673 [ 114.617404][ T5948] tap1: tun_chr_ioctl cmd 1074025677 [ 114.647697][ T5948] tap1: linktype set to 512 [ 114.701994][ T5947] tap1: tun_chr_ioctl cmd 1074025677 [ 114.727788][ T5947] tap1: linktype set to 512 [ 115.172402][ T5968] device syzkaller0 entered promiscuous mode [ 115.711493][ T6019] device syzkaller0 entered promiscuous mode [ 115.914338][ T6054] device syzkaller0 entered promiscuous mode [ 115.920609][ T6056] syz.0.1531[6056] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.920664][ T6056] syz.0.1531[6056] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.423346][ T6078] device sit0 left promiscuous mode [ 116.481325][ T6078] device sit0 entered promiscuous mode [ 117.079046][ T6128] device veth1_macvtap left promiscuous mode [ 117.084905][ T6128] device macsec0 left promiscuous mode [ 117.153699][ T6102] device sit0 entered promiscuous mode [ 117.363667][ T6128] device veth1_macvtap entered promiscuous mode [ 117.369922][ T6128] device macsec0 entered promiscuous mode [ 117.384095][ T3195] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 117.463664][ T6164] device sit0 left promiscuous mode [ 117.886766][ T6207] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.893810][ T6207] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.960904][ T6220] device syzkaller0 entered promiscuous mode [ 118.280662][ T6232] device syzkaller0 entered promiscuous mode [ 119.052886][ T6274] syz.3.1589[6274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.052969][ T6274] syz.3.1589[6274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.216911][ T6283] device syzkaller0 entered promiscuous mode [ 119.347214][ T6309] device syzkaller0 entered promiscuous mode [ 120.132054][ T6409] device pim6reg1 entered promiscuous mode [ 120.180604][ T6407] syz.1.1628[6407] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.180656][ T6407] syz.1.1628[6407] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.216589][ T6409] device veth0_vlan left promiscuous mode [ 120.331240][ T6409] device veth0_vlan entered promiscuous mode [ 120.370993][ T5899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 120.400945][ T5899] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 120.431287][ T5899] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 120.819697][ T6438] device syzkaller0 entered promiscuous mode [ 121.372347][ T24] audit: type=1400 audit(1722804947.470:163): avc: denied { create } for pid=6502 comm="syz.1.1650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 121.805609][ T6514] device syzkaller0 entered promiscuous mode [ 122.002297][ T6555] device pim6reg1 entered promiscuous mode [ 122.306015][ T6576] device syzkaller0 entered promiscuous mode [ 123.041385][ T6623] device veth0_vlan left promiscuous mode [ 123.051512][ T6623] device veth0_vlan entered promiscuous mode [ 123.265631][ T6663] device syzkaller0 entered promiscuous mode [ 123.307510][ T6665] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.314493][ T6665] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.321618][ T6665] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.328473][ T6665] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.447702][ T6665] device bridge0 entered promiscuous mode [ 123.828114][ T6678] device syzkaller0 entered promiscuous mode [ 123.843141][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 123.881952][ T6702] device syzkaller0 entered promiscuous mode [ 124.272488][ T24] audit: type=1400 audit(1722804950.360:164): avc: denied { create } for pid=6731 comm="syz.0.1721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 125.674314][ T6828] device sit0 left promiscuous mode [ 125.748189][ T6822] : renamed from pim6reg1 [ 125.777716][ T6828] device sit0 entered promiscuous mode [ 126.137093][ T6865] device syzkaller0 entered promiscuous mode [ 126.748854][ T6900] device veth0_vlan left promiscuous mode [ 126.779972][ T6900] device veth0_vlan entered promiscuous mode [ 126.889055][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 126.903270][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 126.914618][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 127.161486][ T6925] device sit0 left promiscuous mode [ 127.501409][ T6940] device sit0 left promiscuous mode [ 127.642891][ T6946] device sit0 entered promiscuous mode [ 128.129014][ T6954] device syzkaller0 entered promiscuous mode [ 128.141316][ T24] audit: type=1400 audit(1722804954.240:165): avc: denied { remove_name } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 128.163793][ T24] audit: type=1400 audit(1722804954.240:166): avc: denied { rename } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 128.186445][ T6970] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.186587][ T24] audit: type=1400 audit(1722804954.240:167): avc: denied { create } for pid=75 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 128.193350][ T6970] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.194609][ T6970] device bridge0 left promiscuous mode [ 128.305798][ T6970] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.312701][ T6970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.319779][ T6970] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.326529][ T6970] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.334193][ T6970] device bridge0 entered promiscuous mode [ 128.503557][ T6977] device syzkaller0 entered promiscuous mode [ 130.749380][ T7072] device syzkaller0 entered promiscuous mode [ 130.787286][ T7078] : renamed from vlan0 [ 131.998776][ T7132] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.005663][ T7132] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.016497][ T7132] device bridge0 left promiscuous mode [ 132.047275][ T7131] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.054246][ T7131] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.062996][ T7131] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.070021][ T7131] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.096943][ T7131] device bridge0 entered promiscuous mode [ 133.131412][ T7263] device syzkaller0 entered promiscuous mode [ 133.869129][ T7338] device pim6reg1 entered promiscuous mode [ 134.262875][ T7344] device syzkaller0 entered promiscuous mode [ 136.705357][ T7491] device syzkaller0 entered promiscuous mode [ 137.190312][ T7508] device syzkaller0 entered promiscuous mode [ 137.229649][ T7525] device sit0 entered promiscuous mode [ 137.624912][ T7539] device veth0_vlan left promiscuous mode [ 137.670563][ T7539] device veth0_vlan entered promiscuous mode [ 137.787004][ T7540] device syzkaller0 entered promiscuous mode [ 137.831271][ T5893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 137.842128][ T5893] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 137.854856][ T5893] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 137.970714][ T7563] device vxcan1 entered promiscuous mode [ 138.374832][ T7596] device syzkaller0 entered promiscuous mode [ 138.399235][ T7597] device syzkaller0 entered promiscuous mode [ 139.607074][ T7703] device veth0_vlan left promiscuous mode [ 139.620355][ T7703] device veth0_vlan entered promiscuous mode [ 139.959427][ T7729] device syzkaller0 entered promiscuous mode [ 141.002364][ T24] audit: type=1400 audit(1722804967.100:168): avc: denied { create } for pid=7812 comm="syz.2.2011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 141.382550][ T7827] syz.3.2015[7827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.382600][ T7827] syz.3.2015[7827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.468874][ T7838] device pim6reg1 entered promiscuous mode [ 141.561193][ T93] udevd[93]: worker [310] terminated by signal 33 (Unknown signal 33) [ 141.572689][ T93] udevd[93]: worker [310] failed while handling '/devices/virtual/block/loop0' [ 141.585428][ T7848] cgroup: fork rejected by pids controller in /syz2 [ 141.769845][ T7877] pim6reg0: tun_chr_ioctl cmd 1074025680 [ 141.786079][ T7872] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.793232][ T7872] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.800573][ T7872] device bridge_slave_0 entered promiscuous mode [ 141.807258][ T7872] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.814172][ T7872] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.821468][ T7872] device bridge_slave_1 entered promiscuous mode [ 141.881940][ T7883] device veth0_vlan left promiscuous mode [ 141.913092][ T7883] device veth0_vlan entered promiscuous mode [ 141.945882][ T7872] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.952770][ T7872] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.959872][ T7872] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.966615][ T7872] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.974436][ T3188] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.981816][ T3188] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.007941][ T3188] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 142.015337][ T3188] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 142.024922][ T3188] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.031815][ T3188] bridge0: port 1(bridge_slave_0) entered forwarding state [ 142.048552][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 142.056511][ T3189] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.063365][ T3189] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.072249][ T5896] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 142.099197][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 142.123689][ T7894] device syzkaller0 entered promiscuous mode [ 142.154446][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 142.167120][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 142.176202][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 142.183907][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 142.192939][ T7872] device veth0_vlan entered promiscuous mode [ 142.209844][ T7898] device sit0 left promiscuous mode [ 142.219479][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 142.229446][ T7898] device sit0 entered promiscuous mode [ 142.314334][ T7872] device veth1_macvtap entered promiscuous mode [ 142.340269][ T3191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 142.355561][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 143.009996][ T9] device veth0_vlan left promiscuous mode [ 144.872931][ T8055] device veth0_vlan left promiscuous mode [ 144.916803][ T8055] device veth0_vlan entered promiscuous mode [ 144.998134][ T5889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 145.006302][ T5889] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 145.016891][ T5889] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 145.878859][ T8102] device wg2 entered promiscuous mode [ 146.152895][ T8119] : renamed from vlan0 [ 146.266642][ T8132] bridge_slave_0: mtu greater than device maximum [ 146.319543][ T8139] device sit0 entered promiscuous mode [ 147.265849][ T8182] device veth0_vlan left promiscuous mode [ 147.278253][ T8185] syz.4.2119[8185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.278305][ T8185] syz.4.2119[8185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.304289][ T8182] device veth0_vlan entered promiscuous mode [ 147.382659][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 147.409710][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 147.418256][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 147.965944][ T8215] device syzkaller0 entered promiscuous mode [ 148.153431][ T8222] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.167663][ T8222] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.175043][ T8222] device bridge_slave_0 entered promiscuous mode [ 148.182003][ T8222] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.189178][ T8222] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.196566][ T8222] device bridge_slave_1 entered promiscuous mode [ 148.481030][ T8222] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.487933][ T8222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.495013][ T8222] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.501954][ T8222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.690082][ T5896] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.725968][ T5896] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.764091][ T8251] geneve1: tun_chr_ioctl cmd 1074025681 [ 148.908176][ T5894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 148.916059][ T5894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.927059][ T5894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.936546][ T5894] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.945384][ T5894] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.952266][ T5894] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.960276][ T5894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 148.968557][ T5894] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.976816][ T5894] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.983690][ T5894] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.027990][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 149.046155][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.106148][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 149.114510][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.123236][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 149.133068][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 149.143854][ T8222] device veth0_vlan entered promiscuous mode [ 149.150662][ T5889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 149.158860][ T5889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 149.173306][ T8222] device veth1_macvtap entered promiscuous mode [ 149.195057][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 149.203662][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 149.215593][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 149.265775][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 149.280985][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 149.325849][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 149.334218][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 149.343414][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 149.353288][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 150.125365][ T8325] device pim6reg1 entered promiscuous mode [ 150.229101][ T8329] device veth0_vlan left promiscuous mode [ 150.240154][ T8329] device veth0_vlan entered promiscuous mode [ 150.569421][ T8371] device veth0_vlan left promiscuous mode [ 150.612068][ T8371] device veth0_vlan entered promiscuous mode [ 150.642819][ T5895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 150.654027][ T5895] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 150.665675][ T5895] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 151.480830][ T8431] device syzkaller0 entered promiscuous mode [ 151.585461][ T8426] device pim6reg1 entered promiscuous mode [ 152.795313][ T8553] device syzkaller0 entered promiscuous mode [ 152.997872][ T8570] device syzkaller0 entered promiscuous mode [ 153.584402][ T8597] device pim6reg1 entered promiscuous mode [ 153.776980][ T8609] device pim6reg1 entered promiscuous mode [ 155.817479][ T8743] bridge0: port 3(veth0_to_batadv) entered blocking state [ 155.835549][ T8743] bridge0: port 3(veth0_to_batadv) entered disabled state [ 155.867520][ T8743] device veth0_to_batadv entered promiscuous mode [ 155.916573][ T8749] device veth0_to_batadv left promiscuous mode [ 155.944205][ T8749] bridge0: port 3(veth0_to_batadv) entered disabled state [ 156.685514][ T8807] device pim6reg1 entered promiscuous mode [ 157.333847][ T8847] device team_slave_1 entered promiscuous mode [ 157.382726][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 157.418148][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 157.703110][ T8881] device pim6reg1 entered promiscuous mode [ 157.715553][ T8882] syz.3.2314[8882] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.715606][ T8882] syz.3.2314[8882] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.840463][ T8893] device bridge_slave_1 left promiscuous mode [ 157.868419][ T8893] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.895761][ T8893] device bridge_slave_0 left promiscuous mode [ 157.901829][ T8893] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.519277][ T8930] device pim6reg1 entered promiscuous mode [ 158.720352][ T8943] device macsec0 left promiscuous mode [ 158.762803][ T8937] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 158.797733][ T8937] pim6reg0: linktype set to 773 [ 158.802680][ T8943] device veth1_macvtap entered promiscuous mode [ 158.809691][ T8943] device macsec0 entered promiscuous mode [ 158.860702][ T5896] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 159.519481][ T8990] device veth1_macvtap left promiscuous mode [ 159.690103][ T9015] syz.3.2344[9015] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.690154][ T9015] syz.3.2344[9015] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.209930][ T9043] syz.2.2359[9043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.222657][ T9043] syz.2.2359[9043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.554476][ T9073] device lo entered promiscuous mode [ 160.875568][ T9092] device syzkaller0 entered promiscuous mode [ 161.131691][ T9107] device syzkaller0 entered promiscuous mode [ 161.657882][ T9131] device veth1_macvtap left promiscuous mode [ 161.663705][ T9131] device macsec0 left promiscuous mode [ 162.242851][ T9155] device syzkaller0 entered promiscuous mode [ 162.735275][ T9167] device macsec0 entered promiscuous mode [ 164.178687][ T9207] device syzkaller0 entered promiscuous mode [ 164.874409][ T9248] : renamed from vlan0 [ 165.023088][ T9254] device syzkaller0 entered promiscuous mode [ 165.286334][ T9294] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.296568][ T9294] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.276900][ T9374] device pim6reg1 entered promiscuous mode [ 166.291970][ T9377] syz.3.2460[9377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.292992][ T9377] syz.3.2460[9377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.661919][ T9434] device veth0_vlan left promiscuous mode [ 166.703411][ T9434] device veth0_vlan entered promiscuous mode [ 166.875103][ T9457] device pim6reg1 entered promiscuous mode [ 166.948100][ T9460] syz.4.2479[9460] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.948157][ T9460] syz.4.2479[9460] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.930505][ T9541] device syzkaller0 entered promiscuous mode [ 168.060807][ T24] audit: type=1400 audit(1722804994.160:169): avc: denied { create } for pid=9551 comm="syz.1.2508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 168.152412][ T9558] syz.1.2511[9558] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.152464][ T9558] syz.1.2511[9558] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.195302][ T9564] device veth1_macvtap left promiscuous mode [ 168.231339][ T9564] device macsec0 left promiscuous mode [ 168.245783][ T9564] syz.0.2513[9564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.245834][ T9564] syz.0.2513[9564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.266320][ T9564] device veth1_macvtap entered promiscuous mode [ 168.285375][ T9564] device macsec0 entered promiscuous mode [ 168.466527][ T9591] device syzkaller0 entered promiscuous mode [ 170.136449][ T9723] device syzkaller0 entered promiscuous mode [ 170.186192][ T9732] device sit0 left promiscuous mode [ 170.236593][ T9739] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.243600][ T9739] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.263760][ T9732] device sit0 entered promiscuous mode [ 170.531599][ T9740] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.538512][ T9740] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.545549][ T9740] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.552381][ T9740] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.578863][ T9740] device bridge0 entered promiscuous mode [ 170.651560][ T9747] device syzkaller0 entered promiscuous mode [ 170.773531][ T9769] device vxcan1 entered promiscuous mode [ 171.127145][ T9801] pim6reg: tun_chr_ioctl cmd 1074025673 [ 171.166822][ T9803] device veth0_vlan left promiscuous mode [ 171.188319][ T9803] device veth0_vlan entered promiscuous mode [ 171.443324][ T9824] bridge0: port 4(veth1_macvtap) entered blocking state [ 171.451173][ T9824] bridge0: port 4(veth1_macvtap) entered disabled state [ 171.535598][ T9831] device macsec0 entered promiscuous mode [ 171.837564][ T9881] device sit0 left promiscuous mode [ 171.874261][ T9891] device vlan1 entered promiscuous mode [ 171.883891][ T9881] device sit0 entered promiscuous mode [ 172.065097][ T9903] device syzkaller0 entered promiscuous mode [ 172.161669][ T9915] device pim6reg1 entered promiscuous mode [ 173.352801][ T9992] device syzkaller0 entered promiscuous mode [ 173.762844][T10017] device syzkaller0 entered promiscuous mode [ 174.108517][T10056] FAULT_INJECTION: forcing a failure. [ 174.108517][T10056] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 174.122449][T10056] CPU: 0 PID: 10056 Comm: syz.4.2657 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 174.133635][T10056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 174.143644][T10056] Call Trace: [ 174.146759][T10056] dump_stack_lvl+0x1e2/0x24b [ 174.151260][T10056] ? bfq_pos_tree_add_move+0x43b/0x43b [ 174.156555][T10056] ? 0xffffffffa002a000 [ 174.160579][T10056] ? is_bpf_text_address+0x172/0x190 [ 174.165667][T10056] dump_stack+0x15/0x17 [ 174.169659][T10056] should_fail+0x3c6/0x510 [ 174.173910][T10056] should_fail_usercopy+0x1a/0x20 [ 174.178775][T10056] _copy_from_user+0x20/0xd0 [ 174.183198][T10056] __se_sys_bpf+0x232/0x11cb0 [ 174.187715][T10056] ? stack_trace_save+0x113/0x1c0 [ 174.192571][T10056] ? terminate_walk+0x407/0x4f0 [ 174.197258][T10056] ? stack_trace_snprint+0xf0/0xf0 [ 174.202210][T10056] ? kmem_cache_free+0xa9/0x1e0 [ 174.206894][T10056] ? kmem_cache_free+0xa9/0x1e0 [ 174.211580][T10056] ? kasan_set_track+0x5d/0x70 [ 174.216179][T10056] ? __x64_sys_bpf+0x90/0x90 [ 174.220609][T10056] ? __kasan_slab_free+0x11/0x20 [ 174.225466][T10056] ? slab_free_freelist_hook+0xc0/0x190 [ 174.230848][T10056] ? kmem_cache_free+0xa9/0x1e0 [ 174.235534][T10056] ? putname+0xe7/0x140 [ 174.239615][T10056] ? do_sys_openat2+0x1fc/0x710 [ 174.244301][T10056] ? __x64_sys_openat+0x243/0x290 [ 174.249164][T10056] ? do_syscall_64+0x34/0x70 [ 174.253590][T10056] ? _kstrtoull+0x3a0/0x4a0 [ 174.257928][T10056] ? kstrtouint_from_user+0x20a/0x2a0 [ 174.263136][T10056] ? kstrtol_from_user+0x310/0x310 [ 174.268082][T10056] ? make_kuid+0x700/0x700 [ 174.272336][T10056] ? memset+0x35/0x40 [ 174.276155][T10056] ? __fsnotify_parent+0x4b9/0x6c0 [ 174.281193][T10056] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 174.287791][T10056] ? proc_fail_nth_write+0x20b/0x290 [ 174.292906][T10056] ? proc_fail_nth_read+0x210/0x210 [ 174.297941][T10056] ? security_file_permission+0x86/0xb0 [ 174.303322][T10056] ? rw_verify_area+0x1c3/0x360 [ 174.308011][T10056] ? preempt_count_add+0x92/0x1a0 [ 174.312865][T10056] ? vfs_write+0x852/0xe70 [ 174.317122][T10056] ? kmem_cache_free+0x1c0/0x1e0 [ 174.321982][T10056] ? kernel_write+0x3d0/0x3d0 [ 174.326494][T10056] ? __kasan_check_write+0x14/0x20 [ 174.331441][T10056] ? mutex_lock+0xa5/0x110 [ 174.335695][T10056] ? mutex_trylock+0xa0/0xa0 [ 174.340125][T10056] ? __kasan_check_write+0x14/0x20 [ 174.345070][T10056] ? fput_many+0x160/0x1b0 [ 174.349329][T10056] ? debug_smp_processor_id+0x17/0x20 [ 174.354531][T10056] __x64_sys_bpf+0x7b/0x90 [ 174.358783][T10056] do_syscall_64+0x34/0x70 [ 174.363038][T10056] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 174.368766][T10056] RIP: 0033:0x7ff09e57c9f9 [ 174.373025][T10056] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 174.392541][T10056] RSP: 002b:00007ff09d1fc048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 174.400788][T10056] RAX: ffffffffffffffda RBX: 00007ff09e70af80 RCX: 00007ff09e57c9f9 [ 174.408597][T10056] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 174.416408][T10056] RBP: 00007ff09d1fc0a0 R08: 0000000000000000 R09: 0000000000000000 [ 174.424329][T10056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 174.432140][T10056] R13: 000000000000000b R14: 00007ff09e70af80 R15: 00007ffdf9794698 [ 174.568245][T10071] device syzkaller0 entered promiscuous mode [ 174.735032][T10089] device pim6reg1 entered promiscuous mode [ 174.742772][T10091] FAULT_INJECTION: forcing a failure. [ 174.742772][T10091] name failslab, interval 1, probability 0, space 0, times 1 [ 174.777697][T10091] CPU: 1 PID: 10091 Comm: syz.1.2669 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 174.788887][T10091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 174.798775][T10091] Call Trace: [ 174.801912][T10091] dump_stack_lvl+0x1e2/0x24b [ 174.806428][T10091] ? panic+0x812/0x812 [ 174.810327][T10091] ? bfq_pos_tree_add_move+0x43b/0x43b [ 174.815636][T10091] ? selinux_capable+0x2f1/0x430 [ 174.820394][T10091] ? selinux_capset+0xf0/0xf0 [ 174.824902][T10091] ? avc_has_perm+0x275/0x400 [ 174.829417][T10091] dump_stack+0x15/0x17 [ 174.833405][T10091] should_fail+0x3c6/0x510 [ 174.837665][T10091] ? htab_map_alloc+0x98/0x950 [ 174.842263][T10091] __should_failslab+0xa4/0xe0 [ 174.846861][T10091] should_failslab+0x9/0x20 [ 174.851201][T10091] kmem_cache_alloc_trace+0x3a/0x2e0 [ 174.856322][T10091] ? security_capable+0x87/0xb0 [ 174.861007][T10091] htab_map_alloc+0x98/0x950 [ 174.865433][T10091] ? htab_map_alloc_check+0x35f/0x460 [ 174.870639][T10091] __se_sys_bpf+0x620f/0x11cb0 [ 174.875251][T10091] ? stack_trace_save+0x113/0x1c0 [ 174.880104][T10091] ? terminate_walk+0x407/0x4f0 [ 174.884784][T10091] ? stack_trace_snprint+0xf0/0xf0 [ 174.889743][T10091] ? kmem_cache_free+0xa9/0x1e0 [ 174.894509][T10091] ? kmem_cache_free+0xa9/0x1e0 [ 174.899192][T10091] ? kasan_set_track+0x5d/0x70 [ 174.903791][T10091] ? __x64_sys_bpf+0x90/0x90 [ 174.908220][T10091] ? __kasan_slab_free+0x11/0x20 [ 174.912990][T10091] ? slab_free_freelist_hook+0xc0/0x190 [ 174.918375][T10091] ? kmem_cache_free+0xa9/0x1e0 [ 174.923061][T10091] ? putname+0xe7/0x140 [ 174.927050][T10091] ? do_sys_openat2+0x1fc/0x710 [ 174.931827][T10091] ? __x64_sys_openat+0x243/0x290 [ 174.936686][T10091] ? do_syscall_64+0x34/0x70 [ 174.941114][T10091] ? _kstrtoull+0x3a0/0x4a0 [ 174.945458][T10091] ? kstrtouint_from_user+0x20a/0x2a0 [ 174.950662][T10091] ? kstrtol_from_user+0x310/0x310 [ 174.955617][T10091] ? memset+0x35/0x40 [ 174.959433][T10091] ? __fsnotify_parent+0x4b9/0x6c0 [ 174.964378][T10091] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 174.970973][T10091] ? proc_fail_nth_write+0x20b/0x290 [ 174.976093][T10091] ? proc_fail_nth_read+0x210/0x210 [ 174.981128][T10091] ? security_file_permission+0x86/0xb0 [ 174.986508][T10091] ? rw_verify_area+0x1c3/0x360 [ 174.991222][T10091] ? preempt_count_add+0x92/0x1a0 [ 174.996060][T10091] ? vfs_write+0x852/0xe70 [ 175.000308][T10091] ? kmem_cache_free+0xa9/0x1e0 [ 175.004996][T10091] ? kernel_write+0x3d0/0x3d0 [ 175.009507][T10091] ? __kasan_check_write+0x14/0x20 [ 175.014454][T10091] ? mutex_lock+0xa5/0x110 [ 175.018714][T10091] ? mutex_trylock+0xa0/0xa0 [ 175.023141][T10091] ? __kasan_check_write+0x14/0x20 [ 175.028115][T10091] ? fput_many+0x160/0x1b0 [ 175.032340][T10091] ? debug_smp_processor_id+0x17/0x20 [ 175.037542][T10091] __x64_sys_bpf+0x7b/0x90 [ 175.041797][T10091] do_syscall_64+0x34/0x70 [ 175.046049][T10091] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 175.051774][T10091] RIP: 0033:0x7f2cc6d719f9 [ 175.056034][T10091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 175.075468][T10091] RSP: 002b:00007f2cc59f1048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 175.083726][T10091] RAX: ffffffffffffffda RBX: 00007f2cc6efff80 RCX: 00007f2cc6d719f9 [ 175.091525][T10091] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 175.099511][T10091] RBP: 00007f2cc59f10a0 R08: 0000000000000000 R09: 0000000000000000 [ 175.107319][T10091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 175.115224][T10091] R13: 000000000000000b R14: 00007f2cc6efff80 R15: 00007ffc98786088 [ 175.808708][T10138] device pim6reg1 entered promiscuous mode [ 175.934790][T10143] device syzkaller0 entered promiscuous mode [ 176.223895][T10183] syz.1.2694[10183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.223949][T10183] syz.1.2694[10183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.424801][T10266] device veth0_vlan left promiscuous mode [ 177.517182][T10266] device veth0_vlan entered promiscuous mode [ 177.582895][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 177.592331][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 177.600008][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 177.651290][T10285] device syzkaller0 entered promiscuous mode [ 177.703448][T10291] device macsec0 left promiscuous mode [ 177.940847][T10311] FAULT_INJECTION: forcing a failure. [ 177.940847][T10311] name failslab, interval 1, probability 0, space 0, times 0 [ 178.035813][T10311] CPU: 0 PID: 10311 Comm: syz.4.2732 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 178.047004][T10311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 178.056892][T10311] Call Trace: [ 178.060031][T10311] dump_stack_lvl+0x1e2/0x24b [ 178.064533][T10311] ? bfq_pos_tree_add_move+0x43b/0x43b [ 178.069827][T10311] ? __get_vm_area_node+0x116/0x470 [ 178.074860][T10311] ? ____kasan_kmalloc+0xed/0x110 [ 178.079721][T10311] ? __kasan_kmalloc+0x9/0x10 [ 178.084492][T10311] dump_stack+0x15/0x17 [ 178.088503][T10311] should_fail+0x3c6/0x510 [ 178.092756][T10311] ? alloc_vmap_area+0x16f/0x1a90 [ 178.097625][T10311] __should_failslab+0xa4/0xe0 [ 178.102206][T10311] should_failslab+0x9/0x20 [ 178.106543][T10311] kmem_cache_alloc+0x3d/0x2e0 [ 178.111170][T10311] alloc_vmap_area+0x16f/0x1a90 [ 178.115834][T10311] ? vm_map_ram+0x9d0/0x9d0 [ 178.120181][T10311] ? __kasan_kmalloc+0x9/0x10 [ 178.124683][T10311] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 178.130075][T10311] ? __get_vm_area_node+0x116/0x470 [ 178.135100][T10311] __get_vm_area_node+0x156/0x470 [ 178.139962][T10311] __vmalloc_node_range+0xdc/0x7c0 [ 178.144903][T10311] ? prealloc_init+0x13b/0x7f0 [ 178.149542][T10311] ? get_random_u64+0x5b0/0x5b0 [ 178.154192][T10311] bpf_map_area_alloc+0xd9/0xf0 [ 178.158875][T10311] ? prealloc_init+0x13b/0x7f0 [ 178.163471][T10311] prealloc_init+0x13b/0x7f0 [ 178.167901][T10311] ? __kmalloc+0x1aa/0x330 [ 178.172157][T10311] htab_map_alloc+0x68d/0x950 [ 178.176670][T10311] __se_sys_bpf+0x620f/0x11cb0 [ 178.181271][T10311] ? stack_trace_save+0x113/0x1c0 [ 178.186129][T10311] ? terminate_walk+0x407/0x4f0 [ 178.190814][T10311] ? stack_trace_snprint+0xf0/0xf0 [ 178.195763][T10311] ? kmem_cache_free+0xa9/0x1e0 [ 178.200451][T10311] ? kmem_cache_free+0xa9/0x1e0 [ 178.205135][T10311] ? kasan_set_track+0x5d/0x70 [ 178.209734][T10311] ? __x64_sys_bpf+0x90/0x90 [ 178.214162][T10311] ? __kasan_slab_free+0x11/0x20 [ 178.218934][T10311] ? slab_free_freelist_hook+0xc0/0x190 [ 178.224318][T10311] ? kmem_cache_free+0xa9/0x1e0 [ 178.229001][T10311] ? putname+0xe7/0x140 [ 178.232998][T10311] ? do_sys_openat2+0x1fc/0x710 [ 178.237683][T10311] ? __x64_sys_openat+0x243/0x290 [ 178.242542][T10311] ? do_syscall_64+0x34/0x70 [ 178.246970][T10311] ? _kstrtoull+0x3a0/0x4a0 [ 178.251397][T10311] ? kstrtouint_from_user+0x20a/0x2a0 [ 178.256601][T10311] ? kstrtol_from_user+0x310/0x310 [ 178.261561][T10311] ? memset+0x35/0x40 [ 178.265379][T10311] ? __fsnotify_parent+0x4b9/0x6c0 [ 178.270326][T10311] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 178.276911][T10311] ? proc_fail_nth_write+0x20b/0x290 [ 178.282036][T10311] ? proc_fail_nth_read+0x210/0x210 [ 178.287069][T10311] ? security_file_permission+0x86/0xb0 [ 178.292448][T10311] ? rw_verify_area+0x1c3/0x360 [ 178.297137][T10311] ? preempt_count_add+0x92/0x1a0 [ 178.301996][T10311] ? vfs_write+0x852/0xe70 [ 178.306250][T10311] ? kmem_cache_free+0x1c0/0x1e0 [ 178.311025][T10311] ? kernel_write+0x3d0/0x3d0 [ 178.315536][T10311] ? __kasan_check_write+0x14/0x20 [ 178.320481][T10311] ? mutex_lock+0xa5/0x110 [ 178.324734][T10311] ? mutex_trylock+0xa0/0xa0 [ 178.329166][T10311] ? __kasan_check_write+0x14/0x20 [ 178.334110][T10311] ? fput_many+0x160/0x1b0 [ 178.338371][T10311] ? debug_smp_processor_id+0x17/0x20 [ 178.343569][T10311] __x64_sys_bpf+0x7b/0x90 [ 178.347823][T10311] do_syscall_64+0x34/0x70 [ 178.352080][T10311] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 178.357804][T10311] RIP: 0033:0x7ff09e57c9f9 [ 178.362059][T10311] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 178.381497][T10311] RSP: 002b:00007ff09d1fc048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 178.389742][T10311] RAX: ffffffffffffffda RBX: 00007ff09e70af80 RCX: 00007ff09e57c9f9 [ 178.397553][T10311] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 178.405372][T10311] RBP: 00007ff09d1fc0a0 R08: 0000000000000000 R09: 0000000000000000 [ 178.413175][T10311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 178.420985][T10311] R13: 000000000000000b R14: 00007ff09e70af80 R15: 00007ffdf9794698 [ 178.455127][T10315] device pim6reg1 entered promiscuous mode [ 179.197978][T10325] device sit0 entered promiscuous mode [ 179.662337][T10374] device syzkaller0 entered promiscuous mode [ 180.061628][T10408] bridge0: port 3(veth0_to_batadv) entered blocking state [ 180.075150][T10408] bridge0: port 3(veth0_to_batadv) entered disabled state [ 180.084266][T10408] device veth0_to_batadv entered promiscuous mode [ 180.099629][T10407] device veth0_to_batadv left promiscuous mode [ 180.134764][T10407] bridge0: port 3(veth0_to_batadv) entered disabled state [ 180.460473][ T286] cgroup: fork rejected by pids controller in /syz0 [ 180.498083][T10439] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.505070][T10439] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.538192][T10439] device bridge_slave_0 entered promiscuous mode [ 180.548585][T10439] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.555565][T10439] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.563696][T10439] device bridge_slave_1 entered promiscuous mode [ 180.813457][ T3279] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 180.823029][ T3279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 180.849156][ T5893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.859507][ T5893] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.870806][ T5893] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.877674][ T5893] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.885721][ T5893] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.893955][ T5893] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.927870][ T5893] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.934713][ T5893] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.973466][ T3279] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 180.983253][ T3279] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 180.998735][ T3279] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 181.085036][T10439] device veth0_vlan entered promiscuous mode [ 181.104212][ T5893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 181.113206][ T5893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 181.121345][ T5893] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 181.130817][ T5893] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 181.145247][T10439] device veth1_macvtap entered promiscuous mode [ 181.182380][ T5903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 181.228490][ T716] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 181.236678][ T716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 181.247192][ T716] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 181.255503][ T716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 181.343829][T10472] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.354445][T10472] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.392636][T10472] device bridge_slave_0 entered promiscuous mode [ 181.409545][T10472] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.416392][T10472] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.474731][T10472] device bridge_slave_1 entered promiscuous mode [ 181.536554][T10501] device pim6reg1 entered promiscuous mode [ 182.054789][T10521] device sit0 entered promiscuous mode [ 182.228885][T10523] device veth0_vlan left promiscuous mode [ 182.268531][T10523] device veth0_vlan entered promiscuous mode [ 182.363422][ T7] device bridge_slave_1 left promiscuous mode [ 182.377721][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.388842][ T7] device bridge_slave_0 left promiscuous mode [ 182.425333][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.470365][ T7] device bridge_slave_1 left promiscuous mode [ 182.476386][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.488349][ T7] device bridge_slave_0 left promiscuous mode [ 182.498685][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.511410][ T7] device veth1_macvtap left promiscuous mode [ 182.518519][ T7] device veth1_macvtap left promiscuous mode [ 182.710099][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.717666][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.724902][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.733478][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.741463][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.748325][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.755480][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.764264][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.772296][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.779137][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.795577][T10550] device syzkaller0 entered promiscuous mode [ 182.851324][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.935554][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 182.943626][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.951636][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 182.959516][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.971966][T10472] device veth0_vlan entered promiscuous mode [ 183.026186][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 183.034496][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 183.042786][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 183.051111][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.059114][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 183.066729][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 183.130324][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 183.138774][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 183.148475][T10472] device veth1_macvtap entered promiscuous mode [ 183.181276][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 183.189074][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 183.197171][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 183.262227][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 183.272534][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 183.845453][T10591] device veth0_vlan left promiscuous mode [ 183.851826][T10591] device veth0_vlan entered promiscuous mode [ 183.872695][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.888848][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 183.926925][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 185.162117][T10668] device syzkaller0 entered promiscuous mode [ 185.492489][T10683] device syzkaller0 entered promiscuous mode [ 187.359156][T10855] device syzkaller0 entered promiscuous mode [ 188.298419][T10905] device syzkaller0 entered promiscuous mode [ 188.729061][T10922] device syzkaller0 entered promiscuous mode [ 188.755488][T10924] syz.1.2897[10924] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.755548][T10924] syz.1.2897[10924] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.618777][T11001] device veth0_vlan left promiscuous mode [ 189.656418][T11001] device veth0_vlan entered promiscuous mode [ 189.676463][ T2467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 189.685844][ T2467] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 189.703462][ T2467] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 190.063566][T11018] device macsec0 entered promiscuous mode [ 190.483845][T11034] device pim6reg1 entered promiscuous mode [ 190.774695][T11059] : renamed from pim6reg1 [ 191.670573][ T24] audit: type=1400 audit(1722805017.760:170): avc: denied { write } for pid=11097 comm="syz.1.2945" name="task" dev="proc" ino=46807 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 191.693810][T11095] device pim6reg1 entered promiscuous mode [ 191.747732][ T24] audit: type=1400 audit(1722805017.800:171): avc: denied { add_name } for pid=11097 comm="syz.1.2945" name="cgroup.stat" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 191.796340][ T24] audit: type=1400 audit(1722805017.800:172): avc: denied { create } for pid=11097 comm="syz.1.2945" name="cgroup.stat" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 191.829492][ T24] audit: type=1400 audit(1722805017.800:173): avc: denied { associate } for pid=11097 comm="syz.1.2945" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 192.426126][T11147] syz.3.2959[11147] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.426182][T11147] syz.3.2959[11147] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.201876][T11180] device syzkaller0 entered promiscuous mode [ 193.480236][T11192] device pim6reg1 entered promiscuous mode [ 193.827704][T11201] : renamed from syzkaller1 [ 193.838685][T11208] syz.2.2979[11208] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.838739][T11208] syz.2.2979[11208] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.134604][T11239] syz.4.2975[11239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.161925][T11239] syz.4.2975[11239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.622340][T11251] device pim6reg1 entered promiscuous mode [ 195.440117][T11290] device syzkaller0 entered promiscuous mode [ 196.836237][T11368] device pim6reg1 entered promiscuous mode [ 197.323804][T11415] syz.0.3030[11415] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.323864][T11415] syz.0.3030[11415] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.377096][T11415] syz.0.3030[11415] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.400015][T11415] syz.0.3030[11415] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.426938][T11415] syz.0.3030[11415] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.440715][T11415] syz.0.3030[11415] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.459125][T11415] device pim6reg1 entered promiscuous mode [ 197.661318][ T24] audit: type=1400 audit(1722805023.760:174): avc: denied { create } for pid=11470 comm="syz.0.3047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 198.671729][T11501] device veth0_vlan left promiscuous mode [ 198.783307][T11501] device veth0_vlan entered promiscuous mode [ 199.207382][T11520] bridge0: port 3(gretap0) entered blocking state [ 199.222641][T11520] bridge0: port 3(gretap0) entered disabled state [ 199.274389][T11520] device gretap0 entered promiscuous mode [ 199.368022][T11520] bridge0: port 3(gretap0) entered blocking state [ 199.374287][T11520] bridge0: port 3(gretap0) entered forwarding state [ 199.655721][T11548] device sit0 left promiscuous mode [ 199.813712][T11556] Y4`Ҙ: renamed from lo [ 200.009987][T11574] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 200.341730][T11592] device veth1_macvtap left promiscuous mode [ 201.115921][T11615] : renamed from vlan0 [ 201.453011][T11647] : renamed from pim6reg1 [ 203.231340][T11769] bpf_get_probe_write_proto: 2 callbacks suppressed [ 203.231351][T11769] syz.1.3135[11769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.249506][T11769] syz.1.3135[11769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.423129][T11788] device pim6reg1 entered promiscuous mode [ 203.778099][T11809] device pim6reg1 entered promiscuous mode [ 204.877099][T11862] device syzkaller0 entered promiscuous mode [ 205.327274][T11959] bridge0: port 3(gretap0) entered disabled state [ 205.333703][T11959] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.340636][T11959] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.389699][T11959] bridge0: port 3(gretap0) entered blocking state [ 205.395966][T11959] bridge0: port 3(gretap0) entered forwarding state [ 205.402489][T11959] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.409354][T11959] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.416440][T11959] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.423253][T11959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.545004][T11959] device bridge0 entered promiscuous mode [ 206.434365][T12028] syz.0.3204[12028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.434420][T12028] syz.0.3204[12028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.446783][T12028] syz.0.3204[12028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.458197][T12028] syz.0.3204[12028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.488789][T12028] syz.0.3204[12028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.507872][T12028] syz.0.3204[12028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.809097][T12128] tap0: tun_chr_ioctl cmd 1074025673 [ 208.869530][T12147] tap0: tun_chr_ioctl cmd 1074025692 [ 211.889221][T12294] device syzkaller0 entered promiscuous mode [ 212.223301][T12298] device syzkaller0 entered promiscuous mode [ 212.265944][T12301] device pim6reg1 entered promiscuous mode [ 212.996288][T12322] device syzkaller0 entered promiscuous mode [ 213.176323][T12349] geneve1: tun_chr_ioctl cmd 1074025672 [ 213.188556][T12349] geneve1: ignored: set checksum enabled [ 213.664010][T12375] device pim6reg1 entered promiscuous mode [ 215.001523][T12430] device pim6reg1 entered promiscuous mode [ 215.150615][T12441] device veth0_vlan left promiscuous mode [ 215.175453][T12441] device veth0_vlan entered promiscuous mode [ 215.222597][T12451] syz.2.3319[12451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.222651][T12451] syz.2.3319[12451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.231440][ T2046] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 215.253809][ T2046] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 215.261217][ T2046] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 215.301739][T12448] device pim6reg1 entered promiscuous mode [ 215.801443][T12480] syz.1.3327[12480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.801495][T12480] syz.1.3327[12480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.627178][T12545] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.666222][T12545] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.673977][T12545] device bridge_slave_0 entered promiscuous mode [ 216.681823][T12545] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.690489][T12545] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.697910][T12545] device bridge_slave_1 entered promiscuous mode [ 217.100225][ T5898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.107506][ T5898] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.178997][ T5897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.187314][ T5897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.211754][ T5897] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.218641][ T5897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.262675][ T5897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.271226][ T5897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.295204][ T5897] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.302092][ T5897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.447652][ T5889] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.460888][ T5889] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.500902][ T5889] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.739107][ T3281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 217.770975][ T3281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 217.796155][ T3281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.918371][T12545] device veth0_vlan entered promiscuous mode [ 217.933561][ T5897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.958376][ T5897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 218.131748][T12545] device veth1_macvtap entered promiscuous mode [ 218.167290][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 218.208072][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 218.216367][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 218.326798][ T509] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 218.336331][ T509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 218.352567][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 218.472104][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 218.510587][ T24] audit: type=1400 audit(1722805044.600:175): avc: denied { create } for pid=12647 comm="syz.3.3371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 218.988403][T12674] device syzkaller0 entered promiscuous mode [ 219.319852][T12699] device pim6reg1 entered promiscuous mode [ 219.372439][T12706] syz.4.3383[12706] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.372499][T12706] syz.4.3383[12706] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.553379][T12706] syz.4.3383[12706] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.724575][T12706] syz.4.3383[12706] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.859085][ T1834] device veth0_to_batadv left promiscuous mode [ 219.899619][ T1834] bridge0: port 3(veth0_to_batadv) entered disabled state [ 220.000823][ T1834] device bridge_slave_1 left promiscuous mode [ 220.044182][ T1834] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.080785][ T1834] device bridge_slave_0 left promiscuous mode [ 220.097745][ T1834] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.135139][ T1834] device veth0_vlan left promiscuous mode [ 220.242937][T12745] syz.2.3394[12745] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.242993][T12745] syz.2.3394[12745] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.769465][T12750] syz.3.3396[12750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.892162][T12750] syz.3.3396[12750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.106516][T12757] device syzkaller0 entered promiscuous mode [ 222.013284][T12809] device veth0_vlan left promiscuous mode [ 222.126272][T12809] device veth0_vlan entered promiscuous mode [ 222.275370][ T2030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.328676][ T2030] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 222.388937][ T2030] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.496265][T12813] device syzkaller0 entered promiscuous mode [ 222.845112][T12830] device syzkaller0 entered promiscuous mode [ 223.632010][T12888] syz.4.3438[12888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.632067][T12888] syz.4.3438[12888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.686221][T12888] syz.4.3438[12888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.707980][T12888] syz.4.3438[12888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.967966][T12904] device veth1_macvtap left promiscuous mode [ 224.919916][T12957] device pim6reg1 entered promiscuous mode [ 225.046978][T12978] ʮ}p: renamed from pim6reg1 [ 225.388087][T13006] tap0: tun_chr_ioctl cmd 1074025677 [ 225.397685][T13006] tap0: linktype set to 821 [ 225.656871][T13029] tun0: tun_chr_ioctl cmd 1074025673 [ 225.662612][T13027] tun0: tun_chr_ioctl cmd 1074025676 [ 225.668679][T13027] tun0: owner set to 0 [ 225.799886][T13039] device veth0_vlan left promiscuous mode [ 225.812654][T13039] device veth0_vlan entered promiscuous mode [ 225.976269][T13044] device syzkaller0 entered promiscuous mode [ 226.404567][T13066] device syzkaller0 entered promiscuous mode [ 226.813747][T13078] syz.2.3492[13078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.813805][T13078] syz.2.3492[13078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.296114][T13112] syz.4.3503[13112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.338665][T13112] syz.4.3503[13112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.415926][T13110] tap0: tun_chr_ioctl cmd 1074025675 [ 227.441219][T13110] tap0: persist enabled [ 227.626891][T13127] device syzkaller0 entered promiscuous mode [ 227.725584][T13138] bridge0: port 3(vlan1) entered blocking state [ 227.741631][T13138] bridge0: port 3(vlan1) entered disabled state [ 227.755199][T13138] device vlan1 entered promiscuous mode [ 227.767867][T13138] bridge0: port 3(vlan1) entered blocking state [ 227.773960][T13138] bridge0: port 3(vlan1) entered forwarding state [ 229.054844][T13263] device pim6reg1 entered promiscuous mode [ 229.145136][T13271] device veth1_macvtap left promiscuous mode [ 229.163473][T13271] device macsec0 entered promiscuous mode [ 229.215032][T13291] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.222524][T13291] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.250877][T13290] device bridge_slave_1 left promiscuous mode [ 229.256851][T13290] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.272078][T13290] device bridge_slave_0 left promiscuous mode [ 229.302821][T13290] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.126209][T13376] device pim6reg1 entered promiscuous mode [ 231.261262][T13392] device veth1_macvtap entered promiscuous mode [ 231.268499][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 231.320912][T13403] device pim6reg1 entered promiscuous mode [ 231.476867][T13411] device syzkaller0 entered promiscuous mode [ 232.336718][T13503] device pim6reg1 entered promiscuous mode [ 232.391629][T13473] device bridge0 entered promiscuous mode [ 232.431838][T13510] device pim6reg1 entered promiscuous mode [ 232.805397][T13562] device veth0_vlan left promiscuous mode [ 232.827082][T13562] device veth0_vlan entered promiscuous mode [ 233.097376][T13587] device syzkaller0 entered promiscuous mode [ 233.944647][T13631] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.962939][T13631] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.974746][T13631] device bridge_slave_0 entered promiscuous mode [ 233.989180][T13641] tap1: tun_chr_ioctl cmd 1074025677 [ 233.994300][T13641] tap1: linktype set to 512 [ 234.012197][T13631] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.036818][T13631] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.044380][T13631] device bridge_slave_1 entered promiscuous mode [ 234.101424][T13631] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.108297][T13631] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.115389][T13631] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.122203][T13631] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.292125][ T701] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.323415][ T701] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.337227][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.349115][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.382778][ T2030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 234.391942][ T2030] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.408453][ T2030] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.415327][ T2030] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.428547][ T2030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.437015][ T2030] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.446446][ T2030] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.453321][ T2030] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.462019][ T2030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 234.471643][ T2030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.514304][ T2030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 234.530247][ T2030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.573749][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 234.582793][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 234.611859][T13631] device veth0_vlan entered promiscuous mode [ 234.628207][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 234.640940][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 234.681893][ T724] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 234.693208][ T724] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 234.727161][ T724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 234.735478][ T724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 234.754231][T13631] device veth1_macvtap entered promiscuous mode [ 234.803460][ T724] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 234.820166][ T724] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 234.833943][ T724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 234.943235][ T2459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 234.952982][ T2459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 235.000226][T13739] device pim6reg1 entered promiscuous mode [ 235.014222][T13754] syz.4.3676[13754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.014276][T13754] syz.4.3676[13754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.045545][T13754] syz.4.3676[13754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.073712][T13754] syz.4.3676[13754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.610109][T13811] device syzkaller0 entered promiscuous mode [ 236.009931][ T9] device veth1_macvtap left promiscuous mode [ 236.676254][T13877] device pim6reg1 entered promiscuous mode [ 237.602871][ T24] audit: type=1400 audit(1722805063.700:176): avc: denied { create } for pid=13900 comm="syz.2.3717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 237.759190][T13875] device syzkaller0 entered promiscuous mode [ 238.150498][T13921] device pim6reg1 entered promiscuous mode [ 238.236990][T13921] device syzkaller0 entered promiscuous mode [ 239.267017][T13986] device pim6reg1 entered promiscuous mode [ 240.028690][T14014] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 240.732034][T14083] device syzkaller0 entered promiscuous mode [ 241.286759][T14115] device pim6reg1 entered promiscuous mode [ 243.077595][T14243] device sit0 entered promiscuous mode [ 243.457102][T14263] device veth0_vlan left promiscuous mode [ 243.492512][T14263] device veth0_vlan entered promiscuous mode [ 243.563051][ T3282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.593040][ T3282] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.609829][ T3282] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.669219][T14274] device pim6reg1 entered promiscuous mode [ 244.858445][ T1834] device bridge_slave_1 left promiscuous mode [ 244.867743][ T1834] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.887976][ T1834] device bridge_slave_0 left promiscuous mode [ 244.893908][ T1834] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.902338][ T1834] device bridge_slave_1 left promiscuous mode [ 244.908439][ T1834] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.915837][ T1834] device bridge_slave_0 left promiscuous mode [ 244.923545][ T1834] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.936876][ T1834] device bridge_slave_1 left promiscuous mode [ 244.944418][ T1834] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.952053][ T1834] device bridge_slave_0 left promiscuous mode [ 244.958186][ T1834] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.966242][ T1834] device veth1_macvtap left promiscuous mode [ 244.972396][ T1834] device veth0_vlan left promiscuous mode [ 244.978383][ T1834] device veth1_macvtap left promiscuous mode [ 244.984256][ T1834] device veth0_vlan left promiscuous mode [ 244.990245][ T1834] device veth1_macvtap left promiscuous mode [ 244.996054][ T1834] device veth0_vlan left promiscuous mode [ 245.839493][T14351] device syzkaller0 entered promiscuous mode [ 246.149415][T14361] device veth1_macvtap entered promiscuous mode [ 246.915314][T14412] bridge0: port 3(gretap0) entered disabled state [ 246.921670][T14412] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.928510][T14412] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.006523][T14412] device bridge0 left promiscuous mode [ 247.040041][T14418] device gretap0 left promiscuous mode [ 247.045413][T14418] bridge0: port 3(gretap0) entered disabled state [ 247.052507][T14418] device bridge_slave_1 left promiscuous mode [ 247.058530][T14418] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.066168][T14418] device bridge_slave_0 left promiscuous mode [ 247.117751][T14418] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.348205][T14435] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.357204][T14435] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.579160][T14510] device pim6reg1 entered promiscuous mode [ 248.975686][T14546] geneve1: tun_chr_ioctl cmd 1074025692 [ 249.146323][T14573] device syzkaller0 entered promiscuous mode [ 249.940751][T14659] device macsec0 entered promiscuous mode [ 250.067993][T14668] device veth1_macvtap entered promiscuous mode [ 250.810915][T14720] device pim6reg1 entered promiscuous mode [ 252.164185][T14763] bridge_slave_0: mtu greater than device maximum [ 254.492382][T14808] device syzkaller0 entered promiscuous mode [ 255.351788][T14842] device pim6reg1 entered promiscuous mode [ 255.857407][T14881] device sit0 left promiscuous mode [ 256.127732][T14901] device bridge_slave_1 left promiscuous mode [ 256.144462][T14901] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.188289][T14901] device bridge_slave_0 left promiscuous mode [ 256.194289][T14901] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.623040][T14916] device syzkaller0 entered promiscuous mode [ 256.943432][T14938] device macsec0 left promiscuous mode [ 257.522576][T14997] device pim6reg1 entered promiscuous mode [ 258.291524][T15050] device syz_tun entered promiscuous mode [ 258.874954][T15099] device syzkaller0 entered promiscuous mode [ 259.094115][T15165] device veth1_macvtap left promiscuous mode [ 259.929298][T15235] syz.1.4080[15235] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.929355][T15235] syz.1.4080[15235] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.745642][T15302] device veth1_macvtap left promiscuous mode [ 260.797557][T15302] device macsec0 left promiscuous mode [ 260.871060][T15302] device veth1_macvtap entered promiscuous mode [ 260.887659][T15302] device macsec0 entered promiscuous mode [ 261.960822][T15397] device bridge_slave_0 entered promiscuous mode [ 261.977422][T15397] O3c: renamed from bridge_slave_0 [ 262.062070][T15414] device syz_tun entered promiscuous mode [ 262.094303][T15418] syz.4.4127[15418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.094344][T15418] syz.4.4127[15418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.386318][T15447] device syzkaller0 entered promiscuous mode [ 263.000566][T15518] device syzkaller0 entered promiscuous mode [ 264.803080][T15634] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.817641][T15634] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.835930][T15634] device bridge_slave_0 entered promiscuous mode [ 264.895376][T15634] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.937652][T15634] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.945761][T15634] device bridge_slave_1 entered promiscuous mode [ 265.252159][ T513] device veth1_macvtap left promiscuous mode [ 265.642836][T15634] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.649733][T15634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.656804][T15634] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.663622][T15634] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.689316][ T722] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.697101][ T722] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.768668][ T722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.775981][ T722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.895816][T15676] bridge_slave_0: mtu greater than device maximum [ 265.919116][T15679] device pim6reg1 entered promiscuous mode [ 265.952675][ T5902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 265.964253][ T5902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.982395][ T5902] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.989326][ T5902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.017782][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 266.025962][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 266.098329][ T2049] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.105185][ T2049] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.118114][ T2027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 266.126002][ T2027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 266.134130][ T2027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 266.142661][ T2027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 266.165921][ T2033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 266.180278][ T2033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 266.199665][T15634] device veth0_vlan entered promiscuous mode [ 266.207723][ T2027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 266.215464][ T2027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 266.245491][T15634] device veth1_macvtap entered promiscuous mode [ 266.258032][ T2033] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 266.265718][ T2033] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 266.357952][ T2033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 266.459453][ T2033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 266.489328][ T2033] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 266.544513][ T2027] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 266.563344][ T2027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 266.574688][ T2027] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 266.584046][ T2027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 266.730168][T15714] syz.3.4184[15714] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.730252][T15714] syz.3.4184[15714] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.957536][T15735] bridge0: port 4(veth0_to_batadv) entered blocking state [ 267.026002][T15735] bridge0: port 4(veth0_to_batadv) entered disabled state [ 267.081537][T15735] device veth0_to_batadv entered promiscuous mode [ 267.112010][T15735] bridge0: port 4(veth0_to_batadv) entered blocking state [ 267.119105][T15735] bridge0: port 4(veth0_to_batadv) entered forwarding state [ 267.134777][T15741] device veth0_to_batadv left promiscuous mode [ 267.157980][T15741] bridge0: port 4(veth0_to_batadv) entered disabled state [ 267.315701][T15756] syz.0.4220[15756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.315757][T15756] syz.0.4220[15756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.857672][T15878] device syzkaller0 entered promiscuous mode [ 269.421123][T15908] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.428145][T15908] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.488376][T15908] device bridge_slave_1 left promiscuous mode [ 269.496662][T15908] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.517409][T15908] device bridge_slave_0 left promiscuous mode [ 269.533476][T15908] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.887087][T15922] device veth1_macvtap entered promiscuous mode [ 269.913091][T15922] device macsec0 entered promiscuous mode [ 269.931189][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 270.157773][T15936] device pim6reg1 entered promiscuous mode [ 270.782746][T15967] device syzkaller0 entered promiscuous mode [ 271.332354][T16027] device veth0_vlan left promiscuous mode [ 271.378050][T16027] device veth0_vlan entered promiscuous mode [ 271.954501][T16064] device sit0 entered promiscuous mode [ 272.597716][T16127] device sit0 left promiscuous mode [ 272.748996][T16132] device syzkaller0 entered promiscuous mode [ 272.966553][T16150] device syzkaller0 entered promiscuous mode [ 273.268332][T16172] device syzkaller0 entered promiscuous mode [ 273.396094][T16194] device syzkaller0 entered promiscuous mode [ 275.216101][T16317] device pim6reg1 entered promiscuous mode [ 275.369105][T16338] ʮ}p: renamed from pim6reg1 [ 275.552781][T16356] device syzkaller0 entered promiscuous mode [ 275.938317][T16395] device macsec0 entered promiscuous mode [ 276.474097][T16416] device syzkaller0 entered promiscuous mode [ 276.688539][T16445] device syzkaller0 entered promiscuous mode [ 277.036398][T16469] device syzkaller0 entered promiscuous mode [ 278.259729][T16534] syz.3.4417[16534] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.259791][T16534] syz.3.4417[16534] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.183981][T16641] device syzkaller0 entered promiscuous mode [ 280.351074][T16645] bridge0: port 3(vlan1) entered disabled state [ 280.459555][T16646] device veth0_vlan left promiscuous mode [ 280.515802][T16646] device veth0_vlan entered promiscuous mode [ 280.573625][T16646] bridge0: port 3(vlan1) entered blocking state [ 280.579862][T16646] bridge0: port 3(vlan1) entered forwarding state [ 282.421357][T16764] device syzkaller0 entered promiscuous mode [ 282.930650][T16796] syz.2.4494[16796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.930704][T16796] syz.2.4494[16796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.529168][T16836] : renamed from vlan0 [ 283.696443][T16871] device syzkaller0 entered promiscuous mode [ 283.716353][T16871] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 285.373436][T16945] device syzkaller0 entered promiscuous mode [ 286.574772][T17031] syz.2.4555[17031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.574850][T17031] syz.2.4555[17031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.435335][T17146] bridge0: port 3(vlan1) entered disabled state [ 288.454768][T17146] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.464426][T17146] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.522258][T17146] device bridge0 left promiscuous mode [ 288.917430][T17176] device sit0 entered promiscuous mode [ 289.224138][T17188] device veth0_vlan left promiscuous mode [ 289.287460][T17188] device veth0_vlan entered promiscuous mode [ 291.016990][T17298] device syzkaller0 entered promiscuous mode [ 291.187377][T17306] syz.2.4628[17306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.187434][T17306] syz.2.4628[17306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.209405][T17302] device pim6reg1 entered promiscuous mode [ 291.226822][T17306] syz.2.4628[17306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.226885][T17306] syz.2.4628[17306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.358904][T17320] device sit0 left promiscuous mode [ 291.679620][T17354] device veth1_macvtap left promiscuous mode [ 291.685807][T17354] device macsec0 left promiscuous mode [ 292.222791][T17366] device wg0 entered promiscuous mode [ 292.277758][T17372] device sit0 entered promiscuous mode [ 293.052640][T17403] device pim6reg1 entered promiscuous mode [ 293.335582][T17421] device pim6reg1 entered promiscuous mode [ 294.046741][T17447] device syzkaller0 entered promiscuous mode [ 294.268438][T17455] syz.4.4673[17455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.268495][T17455] syz.4.4673[17455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.508383][T17476] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 294.530054][T17476] device syzkaller0 entered promiscuous mode [ 294.731921][T17495] device syzkaller0 entered promiscuous mode [ 295.491728][T17561] device syzkaller0 entered promiscuous mode [ 295.830824][T17594] device pim6reg1 entered promiscuous mode [ 296.127437][T17611] device syzkaller0 entered promiscuous mode [ 296.594163][T17628] device syzkaller0 entered promiscuous mode [ 298.064848][T17712] device wg2 entered promiscuous mode [ 298.258725][T17724] syz.2.4755[17724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.258786][T17724] syz.2.4755[17724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.544838][T17749] device syzkaller0 entered promiscuous mode [ 298.645202][T17763] device sit0 left promiscuous mode [ 298.765593][T17769] device sit0 entered promiscuous mode [ 299.371285][T17833] device sit0 left promiscuous mode [ 299.546697][T17841] device pim6reg1 entered promiscuous mode [ 299.784432][T17851] device syzkaller0 entered promiscuous mode [ 299.892257][T17870] device syzkaller0 entered promiscuous mode [ 299.952059][T17869] device syzkaller0 entered promiscuous mode [ 300.830066][T17934] device syzkaller0 entered promiscuous mode [ 301.048632][T17956] syz.0.4826[17956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.109049][T17959] syz.2.4827[17959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.155789][T17959] syz.2.4827[17959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.282730][T17974] device pim6reg1 entered promiscuous mode [ 301.437195][T17986] syz.0.4835[17986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.437253][T17986] syz.0.4835[17986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.948819][T18011] tap0: tun_chr_ioctl cmd 1074025673 [ 302.046986][T18043] device veth1_macvtap left promiscuous mode [ 302.324388][T18053] device syzkaller0 entered promiscuous mode [ 303.262777][T18109] device sit0 entered promiscuous mode [ 303.834532][T18126] syz.3.4872[18126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.834590][T18126] syz.3.4872[18126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.775606][T18205] device pim6reg1 entered promiscuous mode [ 306.281303][T18215] : renamed from vlan0 [ 307.042908][T18256] device pim6reg1 entered promiscuous mode [ 307.474342][T18266] device syzkaller0 entered promiscuous mode [ 308.774799][T18385] device pim6reg1 entered promiscuous mode [ 309.759602][T18432] device sit0 left promiscuous mode [ 309.823904][T18432] device sit0 entered promiscuous mode [ 310.009722][T18455] device team_slave_1 entered promiscuous mode [ 310.047491][ T3282] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 310.060333][ T3282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 310.099186][T18460] device syzkaller0 entered promiscuous mode [ 310.209080][T18476] device syzkaller0 entered promiscuous mode [ 310.425346][T18492] device sit0 left promiscuous mode [ 310.475098][T18492] device sit0 entered promiscuous mode [ 311.102547][T18551] device macsec0 entered promiscuous mode [ 312.284144][T18625] device sit0 entered promiscuous mode [ 312.671659][T18639] device veth0_vlan left promiscuous mode [ 312.686056][T18643] syz.3.5017[18643] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.686114][T18643] syz.3.5017[18643] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.704020][T18639] device veth0_vlan entered promiscuous mode [ 312.739076][ T730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 312.747245][ T730] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 312.778080][ T730] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 312.847042][T18663] syz.4.5021[18663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.847101][T18663] syz.4.5021[18663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.331607][T18690] device syzkaller0 entered promiscuous mode [ 313.614918][T18692] device syzkaller0 entered promiscuous mode [ 315.352439][T18769] device sit0 entered promiscuous mode [ 316.184500][T18804] device veth0_vlan left promiscuous mode [ 316.210137][T18804] device veth0_vlan entered promiscuous mode [ 316.295448][T18824] bridge0: port 3(vlan1) entered blocking state [ 316.301695][T18824] bridge0: port 3(vlan1) entered forwarding state [ 316.309558][T18824] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.316528][T18824] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.325738][T18824] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.332684][T18824] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.348177][T18824] device bridge0 entered promiscuous mode [ 316.877985][T18852] device syzkaller0 entered promiscuous mode [ 316.898438][ T730] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 316.916197][T18855] bridge0: port 3(vlan1) entered disabled state [ 316.923112][T18855] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.930913][T18855] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.958924][T18855] device bridge0 left promiscuous mode [ 317.093053][T18871] syz.2.5084[18871] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.093117][T18871] syz.2.5084[18871] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.987184][T18979] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 318.036662][T18981] device pim6reg1 entered promiscuous mode [ 318.655046][T18998] device syzkaller0 entered promiscuous mode [ 321.662768][T19244] device syzkaller0 entered promiscuous mode [ 322.728251][T19325] Y4`Ҙ: renamed from lo [ 322.985297][T19352] device pim6reg1 entered promiscuous mode [ 323.277375][T19342] device syzkaller0 entered promiscuous mode [ 323.351399][T19376] device syzkaller0 entered promiscuous mode [ 323.666609][T19391] device syzkaller0 entered promiscuous mode [ 324.215224][T19418] : renamed from vlan0 [ 324.915859][T19436] device syzkaller0 entered promiscuous mode [ 325.014395][T19450] device sit0 left promiscuous mode [ 325.233903][T19464] device sit0 entered promiscuous mode [ 325.559534][T19505] device pim6reg1 entered promiscuous mode [ 325.704136][T19518] device syzkaller0 entered promiscuous mode [ 326.076968][T19556] device pim6reg1 entered promiscuous mode [ 326.492858][T19554] device sit0 left promiscuous mode [ 327.224735][T19607] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 327.294097][T19607] device syzkaller0 entered promiscuous mode [ 328.063815][T19654] device wg2 entered promiscuous mode [ 328.072565][T19651] device veth0_vlan left promiscuous mode [ 328.081689][T19651] device veth0_vlan entered promiscuous mode [ 328.089486][ T724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 328.098236][ T724] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 328.105748][ T724] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 328.328493][T19680] device syzkaller0 entered promiscuous mode [ 329.460691][T19752] syzkaller0: tun_chr_ioctl cmd 2148553947 [ 330.158790][T19777] device syzkaller0 entered promiscuous mode [ 330.999949][T19832] syz.1.5360[19832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.999997][T19832] syz.1.5360[19832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.352183][T19842] device syzkaller0 entered promiscuous mode [ 332.480356][T19897] syz.3.5373[19897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.480415][T19897] syz.3.5373[19897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.560526][T19909] syz.0.5381[19909] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.627722][T19909] syz.0.5381[19909] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.797095][T19919] syz.3.5383[19919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.838163][T19919] syz.3.5383[19919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.894065][T19913] device pim6reg1 entered promiscuous mode [ 334.021099][T19964] syz.3.5396[19964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.021159][T19964] syz.3.5396[19964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.155736][T19974] device pim6reg1 entered promiscuous mode [ 334.525263][T19996] device pim6reg1 entered promiscuous mode [ 335.279062][T20042] device syzkaller0 entered promiscuous mode [ 337.072040][T20180] device syzkaller0 entered promiscuous mode [ 337.916603][T20224] bpf_get_probe_write_proto: 4 callbacks suppressed [ 337.916611][T20224] syz.0.5465[20224] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.928076][T20224] syz.0.5465[20224] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.431847][T20279] device sit0 left promiscuous mode [ 338.808950][T20295] device syzkaller0 entered promiscuous mode [ 339.135536][T20308] device syzkaller0 entered promiscuous mode [ 339.583417][T20339] device pim6reg1 entered promiscuous mode [ 340.346246][T20392] device pim6reg1 entered promiscuous mode [ 340.420030][T20386] device syzkaller0 entered promiscuous mode [ 340.472238][T20403] device sit0 left promiscuous mode [ 340.565764][T20403] device sit0 entered promiscuous mode [ 341.421274][T20439] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.446021][T20439] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.482671][T20439] device bridge_slave_0 entered promiscuous mode [ 341.534897][T20439] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.584452][T20439] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.591849][T20439] device bridge_slave_1 entered promiscuous mode [ 341.766605][T20439] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.773526][T20439] bridge0: port 2(bridge_slave_1) entered forwarding state [ 341.780607][T20439] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.787355][T20439] bridge0: port 1(bridge_slave_0) entered forwarding state [ 341.940285][T20468] device sit0 entered promiscuous mode [ 342.115145][ T2020] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.122298][ T2020] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.131354][T20469] device macsec0 entered promiscuous mode [ 342.299576][T20489] device pim6reg1 entered promiscuous mode [ 342.338603][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 342.355345][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 342.371992][ T3194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 342.386020][ T3194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 342.397830][ T3194] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.404705][ T3194] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.412575][ T3194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 342.420935][ T3194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 342.441113][ T3194] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.448095][ T3194] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.549052][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 342.556931][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 342.565292][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 342.573868][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 342.581940][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 342.592770][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 342.617716][T20439] device veth0_vlan entered promiscuous mode [ 342.641620][T20511] device syzkaller0 entered promiscuous mode [ 342.650929][ T5] syzkaller0: tun_net_xmit 48 [ 342.655563][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 342.666510][T20511] syzkaller0: create flow: hash 3299899540 index 0 [ 342.673259][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 342.694219][T20439] device veth1_macvtap entered promiscuous mode [ 342.704772][ T730] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 342.712766][ T730] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 342.720707][ T730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 342.730032][ T730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 342.747347][ T730] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 342.839649][T20516] syzkaller0 (unregistered): delete flow: hash 3299899540 index 0 [ 342.915606][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 342.924878][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 342.933804][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 342.943284][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 343.691379][T20578] device syzkaller0 entered promiscuous mode [ 343.745031][T20581] syz.2.5558[20581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.745087][T20581] syz.2.5558[20581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.876438][T20658] tap0: tun_chr_ioctl cmd 1074025677 [ 344.908806][T20658] tap0: linktype set to 1 [ 344.957939][T20659] device sit0 left promiscuous mode [ 346.224109][T20748] device sit0 entered promiscuous mode [ 347.411630][T20843] device pim6reg1 entered promiscuous mode [ 347.542814][T20861] device syzkaller0 entered promiscuous mode [ 347.615923][T20872] device veth0_vlan left promiscuous mode [ 347.647070][T20872] device veth0_vlan entered promiscuous mode [ 347.723525][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 347.733553][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 347.749563][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 348.585830][T20927] device syzkaller0 entered promiscuous mode [ 349.929638][T21004] bridge0: port 3(vlan1) entered blocking state [ 349.935978][T21004] bridge0: port 3(vlan1) entered forwarding state [ 349.943895][T21004] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.951470][T21004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 349.960587][T21004] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.967567][T21004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.178892][T21004] device bridge0 entered promiscuous mode [ 350.212628][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 350.276245][T21014] bridge0: port 3(vlan1) entered disabled state [ 350.282488][T21014] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.289321][T21014] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.344333][T21014] device bridge0 left promiscuous mode [ 350.419780][T21016] bridge0: port 3(vlan1) entered blocking state [ 350.426393][T21016] bridge0: port 3(vlan1) entered forwarding state [ 350.434506][T21016] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.441553][T21016] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.450557][T21016] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.457629][T21016] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.528811][T21016] device bridge0 entered promiscuous mode [ 350.678593][T21023] device pim6reg1 entered promiscuous mode [ 352.998573][T21136] device veth0_vlan left promiscuous mode [ 353.087815][T21136] device veth0_vlan entered promiscuous mode [ 353.245828][T21152] syz.1.5701[21152] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.245880][T21152] syz.1.5701[21152] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.747305][T21171] device syzkaller0 entered promiscuous mode [ 353.887514][T21179] syz.2.5708[21179] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.890944][T21179] syz.2.5708[21179] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.305610][T21254] device syzkaller0 entered promiscuous mode [ 355.740857][T21289] device pim6reg1 entered promiscuous mode [ 355.923547][T21294] device pim6reg1 entered promiscuous mode [ 356.187525][T21318] device pim6reg1 entered promiscuous mode [ 356.199002][T21318] device pim6reg1 left promiscuous mode [ 357.282896][T21385] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.291237][T21385] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.298879][T21385] device bridge_slave_0 entered promiscuous mode [ 357.305963][T21385] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.313315][T21385] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.320917][T21385] device bridge_slave_1 entered promiscuous mode [ 357.474075][T21385] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.480960][T21385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.488082][T21385] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.494819][T21385] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.547670][ T719] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.557412][ T719] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.700668][ T3159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 357.748681][ T3159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 357.809879][ T3159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 357.873754][ T3159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 357.899064][ T3159] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.905938][ T3159] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.913570][ T3159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 357.921790][ T3159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 357.930063][ T3159] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.936894][ T3159] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.949766][T21436] device sit0 left promiscuous mode [ 358.022914][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 358.031128][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 358.076718][T21385] device veth0_vlan entered promiscuous mode [ 358.093292][T21385] device veth1_macvtap entered promiscuous mode [ 358.103233][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 358.112831][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 358.120938][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 358.129868][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 358.139686][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 358.150273][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 358.159127][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 358.167114][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 358.186652][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 358.207736][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 358.215029][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 358.223069][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 358.231987][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 358.240573][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 358.249079][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 358.379168][ T24] audit: type=1400 audit(1722805184.470:177): avc: denied { create } for pid=21465 comm="syz.0.5784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 358.416993][T21466] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.425875][T21466] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.564739][ T313] device vlan1 left promiscuous mode [ 358.571638][ T313] bridge0: port 3(vlan1) entered disabled state [ 358.580247][ T313] device bridge_slave_1 left promiscuous mode [ 358.587105][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.600244][ T24] audit: type=1400 audit(1722805184.700:178): avc: denied { unlink } for pid=75 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 358.624894][ T313] device bridge_slave_0 left promiscuous mode [ 358.631221][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.648494][ T313] device veth0_vlan left promiscuous mode [ 359.095990][T21507] device veth1_macvtap left promiscuous mode [ 359.104902][T21507] device macsec0 entered promiscuous mode [ 359.744511][T21529] ʮ}p: renamed from pim6reg1 [ 360.120506][T21551] device macsec0 entered promiscuous mode [ 362.065791][T21602] device syzkaller0 entered promiscuous mode [ 362.159490][T21610] device syzkaller0 entered promiscuous mode [ 362.612443][T21638] syz.3.5837[21638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.612502][T21638] syz.3.5837[21638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.922379][T21647] device veth0_vlan left promiscuous mode [ 362.941684][T21647] device veth0_vlan entered promiscuous mode [ 363.426776][T21671] syz.0.5846[21671] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.426822][T21671] syz.0.5846[21671] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.542957][T21686] syz.1.5850[21686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.547881][T21687] syz.1.5850[21687] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.572546][T21687] syz.1.5850[21687] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.583940][T21686] syz.1.5850[21686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.623425][T21691] device syzkaller0 entered promiscuous mode [ 363.649589][T21699] tap0: tun_chr_ioctl cmd 1074025677 [ 363.667580][T21699] tap0: linktype set to 1 [ 363.964254][T21724] device syzkaller0 entered promiscuous mode [ 364.035957][T21724] bridge_slave_0: mtu greater than device maximum [ 365.078308][T21818] syz.3.5888[21818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.078374][T21818] syz.3.5888[21818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.922915][T21883] device veth0_vlan left promiscuous mode [ 365.959576][T21883] device veth0_vlan entered promiscuous mode [ 366.378370][T21905] device bridge_slave_1 left promiscuous mode [ 366.384412][T21905] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.403538][T21905] device bridge_slave_0 left promiscuous mode [ 366.412932][T21905] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.656203][T21925] device pim6reg1 entered promiscuous mode [ 369.576792][T22109] device syzkaller0 entered promiscuous mode [ 369.975606][T22140] device syzkaller0 entered promiscuous mode [ 370.795338][T22179] device syzkaller0 entered promiscuous mode [ 370.804911][T22184] device pim6reg1 entered promiscuous mode [ 370.866370][T22190] device syzkaller0 entered promiscuous mode [ 370.966552][T22199] device pim6reg1 entered promiscuous mode [ 371.002577][T22197] device pim6reg1 entered promiscuous mode [ 372.244081][T22275] bpf_get_probe_write_proto: 2 callbacks suppressed [ 372.244092][T22275] syz.3.6020[22275] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.267885][T22278] syz.2.6022[22278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.294504][T22275] syz.3.6020[22275] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.350060][T22275] syz.3.6020[22275] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.363848][T22278] syz.2.6022[22278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.497649][T22275] syz.3.6020[22275] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.965134][T22317] syz.4.6029[22317] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.068416][T22317] syz.4.6029[22317] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.204673][T22356] device syzkaller0 entered promiscuous mode [ 374.849303][T22426] device pim6reg1 entered promiscuous mode [ 375.838702][T22474] bridge0: port 3(veth0_to_batadv) entered blocking state [ 375.845999][T22474] bridge0: port 3(veth0_to_batadv) entered disabled state [ 375.883587][T22474] device veth0_to_batadv entered promiscuous mode [ 375.896814][T22474] bridge0: port 3(veth0_to_batadv) entered blocking state [ 375.904333][T22474] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 375.953728][T22504] device veth0_to_batadv left promiscuous mode [ 375.960469][T22504] bridge0: port 3(veth0_to_batadv) entered disabled state [ 376.013928][T22511] device syzkaller0 entered promiscuous mode [ 376.145651][T22523] device sit0 entered promiscuous mode [ 376.370047][T22544] rose0: tun_chr_ioctl cmd 1074025673 [ 376.420730][T22543] rose0: tun_chr_ioctl cmd 1074812118 [ 376.691264][T22555] device syzkaller0 entered promiscuous mode [ 376.973861][T22569] device syzkaller0 entered promiscuous mode [ 377.263940][T22580] device syzkaller0 entered promiscuous mode [ 377.479009][T22587] device pim6reg1 entered promiscuous mode [ 377.836937][T22602] device syzkaller0 entered promiscuous mode [ 378.288358][T22650] device syzkaller0 entered promiscuous mode [ 378.534631][T22658] device syzkaller0 entered promiscuous mode [ 379.452763][T22720] device pim6reg1 entered promiscuous mode [ 379.745339][T22736] device syzkaller0 entered promiscuous mode [ 381.031183][T22837] syz.0.6177[22837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.031240][T22837] syz.0.6177[22837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.113019][T22864] device sit0 entered promiscuous mode [ 382.291618][T22879] device pim6reg1 entered promiscuous mode [ 382.739144][T22917] device sit0 left promiscuous mode [ 382.830104][T22917] device sit0 entered promiscuous mode [ 384.341840][T23001] syz.0.6227[23001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 384.653379][T23008] device syzkaller0 entered promiscuous mode [ 384.701538][T23007] device pim6reg1 entered promiscuous mode [ 385.759519][T23094] ------------[ cut here ]------------ [ 385.775400][T23094] kernel BUG at kernel/bpf/arraymap.c:977! [ 385.807586][T23094] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 385.813499][T23094] CPU: 0 PID: 23094 Comm: syz.4.6246 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 385.824777][T23094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 385.834696][T23094] RIP: 0010:prog_array_map_poke_run+0x68f/0x6b0 [ 385.840877][T23094] Code: 93 e8 ff eb 05 e8 01 93 e8 ff 48 83 c4 70 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 ed 92 e8 ff 0f 0b e9 de f9 ff ff e8 e1 92 e8 ff <0f> 0b e8 da 92 e8 ff 0f 0b e8 d3 92 e8 ff 0f 0b e8 cc 92 e8 ff 0f [ 385.860286][T23094] RSP: 0018:ffffc90000f6f720 EFLAGS: 00010287 [ 385.866186][T23094] RAX: ffffffff8182161f RBX: 00000000fffffff0 RCX: 0000000000040000 [ 385.873997][T23094] RDX: ffffc90009db7000 RSI: 0000000000000071 RDI: 0000000000000072 [ 385.881810][T23094] RBP: ffffc90000f6f7b8 R08: ffffffff818212c2 R09: fffffbfff0cdd669 [ 385.889619][T23094] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88810a56f780 [ 385.897432][T23094] R13: 0000000000000000 R14: ffff8881231dc400 R15: dffffc0000000000 [ 385.905247][T23094] FS: 00007f0af3d676c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 385.914008][T23094] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 385.920448][T23094] CR2: 00000000205e1000 CR3: 00000001127f8000 CR4: 00000000003506b0 [ 385.928242][T23094] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 385.936052][T23094] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 385.943853][T23094] Call Trace: [ 385.946991][T23094] ? __die_body+0x62/0xb0 [ 385.951155][T23094] ? die+0x88/0xb0 [ 385.954705][T23094] ? do_trap+0x1a4/0x310 [ 385.958786][T23094] ? prog_array_map_poke_run+0x68f/0x6b0 [ 385.964253][T23094] ? handle_invalid_op+0x95/0xc0 [ 385.969131][T23094] ? prog_array_map_poke_run+0x68f/0x6b0 [ 385.974608][T23094] ? exc_invalid_op+0x32/0x50 [ 385.979097][T23094] ? asm_exc_invalid_op+0x12/0x20 [ 385.983959][T23094] ? prog_array_map_poke_run+0x332/0x6b0 [ 385.989423][T23094] ? prog_array_map_poke_run+0x68f/0x6b0 [ 385.994893][T23094] ? prog_array_map_poke_run+0x68f/0x6b0 [ 386.000366][T23094] bpf_fd_array_map_update_elem+0x201/0x310 [ 386.006090][T23094] bpf_map_update_value+0xbc/0x420 [ 386.011034][T23094] __se_sys_bpf+0x7687/0x11cb0 [ 386.015639][T23094] ? futex_wait+0x6a0/0x7c0 [ 386.019978][T23094] ? __x64_sys_bpf+0x90/0x90 [ 386.024399][T23094] ? do_futex+0x17b0/0x17b0 [ 386.028752][T23094] ? do_futex+0x139a/0x17b0 [ 386.033081][T23094] ? __kasan_check_write+0x14/0x20 [ 386.038026][T23094] ? put_vma+0x8f/0xb0 [ 386.041933][T23094] ? __handle_speculative_fault+0x10c1/0x1e90 [ 386.047846][T23094] ? futex_exit_release+0x1e0/0x1e0 [ 386.052866][T23094] ? finish_fault+0xaf0/0xaf0 [ 386.057386][T23094] ? __kasan_check_write+0x14/0x20 [ 386.062330][T23094] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 386.067627][T23094] ? __se_sys_futex+0x355/0x470 [ 386.072324][T23094] ? _raw_spin_trylock_bh+0x190/0x190 [ 386.077525][T23094] ? fpu__clear_all+0x20/0x20 [ 386.082034][T23094] ? __kasan_check_read+0x11/0x20 [ 386.086891][T23094] __x64_sys_bpf+0x7b/0x90 [ 386.091148][T23094] do_syscall_64+0x34/0x70 [ 386.095397][T23094] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 386.101127][T23094] RIP: 0033:0x7f0af51089f9 [ 386.105381][T23094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 386.124913][T23094] RSP: 002b:00007f0af3d67048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 386.133147][T23094] RAX: ffffffffffffffda RBX: 00007f0af5297058 RCX: 00007f0af51089f9 [ 386.140960][T23094] RDX: 0000000000000020 RSI: 0000000020000100 RDI: 0000000000000002 [ 386.148774][T23094] RBP: 00007f0af51768ee R08: 0000000000000000 R09: 0000000000000000 [ 386.156579][T23094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 386.164392][T23094] R13: 000000000000006e R14: 00007f0af5297058 R15: 00007fff11c60558 [ 386.172208][T23094] Modules linked in: [ 386.198692][T23094] ---[ end trace f0772f50acf9383f ]--- [ 386.224228][T23094] RIP: 0010:prog_array_map_poke_run+0x68f/0x6b0 [ 386.256454][T23094] Code: 93 e8 ff eb 05 e8 01 93 e8 ff 48 83 c4 70 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 ed 92 e8 ff 0f 0b e9 de f9 ff ff e8 e1 92 e8 ff <0f> 0b e8 da 92 e8 ff 0f 0b e8 d3 92 e8 ff 0f 0b e8 cc 92 e8 ff 0f [ 386.277616][T23094] RSP: 0018:ffffc90000f6f720 EFLAGS: 00010287 [ 386.290050][T23094] RAX: ffffffff8182161f RBX: 00000000fffffff0 RCX: 0000000000040000 [ 386.306528][T23094] RDX: ffffc90009db7000 RSI: 0000000000000071 RDI: 0000000000000072 [ 386.321977][T23094] RBP: ffffc90000f6f7b8 R08: ffffffff818212c2 R09: fffffbfff0cdd669 [ 386.338474][T23094] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88810a56f780 [ 386.353877][T23094] R13: 0000000000000000 R14: ffff8881231dc400 R15: dffffc0000000000 [ 386.370388][T23094] FS: 00007f0af3d676c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 386.387883][T23094] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 386.400845][T23094] CR2: 00007febfba03178 CR3: 00000001127f8000 CR4: 00000000003506b0 [ 386.417463][T23094] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 386.432913][T23094] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 386.449504][T23094] Kernel panic - not syncing: Fatal exception [ 386.455636][T23094] Kernel Offset: disabled [ 386.459783][T23094] Rebooting in 86400 seconds..