last executing test programs: 6.398826867s ago: executing program 0 (id=1812): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2d, 'blkio'}, {0x2d, 'rdma'}, {0x8fa7759c4ccd883b, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'io'}, {0x2d, 'io'}, {0x2d, 'devices'}]}, 0x2b) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001240)={&(0x7f0000000080)="d85da7256ccf529945e469a1048e6e4575084df2e74ffb731d57a2672ca1662c98cf28b3816eb3", &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)="604b702948b3eb166e1ce1746e80d9a2a3ee13ceedef47de3ea9d3fbd46c3b64fccedc6817af47afc7500ff863e969de83b1ebc1eb6641c22d297a359a1332c9778acd9a665ace7df3b663580d883907a85848c7d45c68fcb7e011fa95dc600997f3e4d866640908f267712777323359af258478df7bcbab266a9044b918433fba294341662c84cd8cca1b7671dec0f9ca8935ff3fcf4449d51adb10e1ebbaa1008d8163d13f163cc4aa06621d6cfdd0cb83bb92a764d475a50af95fc4d8f595224e4c9a305cb595031cc6e0d5ad330dfcc19843685adabd4f4ad003f0cb32afede84112be568674d3ba24d2c2f2c02a36ecf241ff265feebe", &(0x7f00000011c0)="62d08e321e44f08ec3cd93eae986a817415b87109d834e7b9d2a6ed70de5b647a541f5345ef930f324e9e1d952672afb75c2ed56e0d5e7148daba3e7344890b1d616", 0x6, r0}, 0x38) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001280)={r0}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000012c0)='hugetlb.1GB.rsvd.usage_in_bytes\x00') ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000001300)={'veth1_to_batadv\x00', 0x8000}) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001340)={0x1b, 0x0, 0x0, 0x3, 0x0, r0, 0x1, '\x00', 0x0, r0, 0x0, 0x0, 0x5}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001680)={r0, 0x20, &(0x7f0000001640)={&(0x7f0000001500)=""/57, 0x39, 0x0, &(0x7f0000001540)=""/196, 0xc4}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001740)={{r0, 0xffffffffffffffff}, &(0x7f00000016c0), &(0x7f0000001700)=r0}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x4, 0xf, &(0x7f00000013c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001440)='GPL\x00', 0x1, 0x1e, &(0x7f0000001480)=""/30, 0x41100, 0x63f65ddbabb6717f, '\x00', 0x0, 0xf, r0, 0x8, &(0x7f00000014c0)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, r3, r1, 0x4, &(0x7f0000001780)=[r1, r4], &(0x7f00000017c0)=[{0x0, 0x1, 0xa, 0x9}, {0x1, 0x4, 0x5, 0x9}, {0x5, 0x3, 0x5, 0xc}, {0x0, 0x2, 0xa, 0x2}], 0x10, 0x5}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0xe, 0xc, &(0x7f0000001900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8aa, 0x0, 0x0, 0x0, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}]}, &(0x7f0000001980)='GPL\x00', 0x4, 0x86, &(0x7f00000019c0)=""/134, 0x41000, 0x56, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001a80)={0x2, 0xb, 0xf, 0x763}, 0x10, r3, r5, 0x5, 0x0, &(0x7f0000001ac0)=[{0x2, 0x1, 0xd, 0xb}, {0x3, 0x4, 0x2, 0xb}, {0x2, 0x2, 0x9}, {0x0, 0x1, 0x9, 0x8}, {0x3, 0x5, 0x6, 0xb}], 0x10, 0xfffffffe}, 0x90) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001c00)=@o_path={&(0x7f00000018c0)='./file0\x00', r6, 0x4000, r2}, 0x18) recvmsg$unix(r1, &(0x7f00000040c0)={0x0, 0x0, &(0x7f0000003f80)=[{&(0x7f0000001c40)=""/148, 0x94}, {&(0x7f0000001d00)=""/244, 0xf4}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000002e00)=""/4096, 0x1000}, {&(0x7f0000003e00)=""/218, 0xda}, {&(0x7f0000003f00)=""/127, 0x7f}], 0x6, &(0x7f0000004000)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xa0}, 0x21) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000004100)={r8, 0xffffffffffffffff}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004180)={&(0x7f0000004140)='afs_flock_ev\x00', r9}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000004480)={&(0x7f00000041c0)="8117ae36ab31ff950384a1e01268ef3470f927cb5495e6e42e76e9229e9fa76b2882efc3d1af55cf03bbac0c4caf29f00c68562c82769e8d9b5a49d13508bde31c0e3e955925adbaca93d284e3d5b1f739f5f673e27db0a3ec216e82733b48661c601d3d718d562bb25d253dc6d6aec1ef25bb840013a52fc248c00b42df81799ade63a4e88cda01e810cfc463dee89f5ccedf75154642d1665580c58dfde07052bb4772b59c2ee83abd8e8c9cd8636059a99063733ba8d4a38d5815bad1360290d8d69706dc2e69ac09fc8e1113e884314fae1d53d2affd7d76", &(0x7f00000042c0)=""/49, &(0x7f0000004300)="95904c651ee6338986abe2ac888653a61c72a62ad6943d029b2c76d97ee63f7cefe39696175a8d7b8f19ee87b87ec2b4656afb13181ffbf8f829f6f327d60d8ea9f8d410e4301c6d275d657cbdda6a48b5944eda99d64308a29fc457ff26fe5d092e1d93fcc657679c2446d05a20b424f6e8d17337f35d8e885899f92eb147083e93c64e9b59d89ff72c6354842ad55f74a0211db8d4591235bf38f75b16f49434fa89d6d25ea2df9d32fdaca6cd4912c148c795b23bf4ec7a4ef14e95869bcc3773c33836a5c265a2bb2bfe06c6813a3015578a71a781c7781ddf4cb6072921d05aced160dcf3101eba4fc766af96", &(0x7f0000004400)="bb47f9bebb134fa367e372ee06f519e3961280bc3d09bd50153bcad3fdd7a3f63b440d349255cebc968e243bd19820b9691dac604769da1ef364681b8dc3144275846e5edecd7b24d2", 0x3, r10, 0x4}, 0x38) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000044c0)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000004500)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000045c0)={{r1, 0xffffffffffffffff}, &(0x7f0000004540), &(0x7f0000004580)=r8}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004600)) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000004640)={0x7ff}, 0x8) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004740)=r3, 0x4) r16 = bpf$MAP_CREATE(0x0, &(0x7f0000004800)=@bloom_filter={0x1e, 0x9, 0x2, 0x1, 0x2008, r12, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x0, 0x1}, 0x48) r17 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000004880)={0x1b, 0x0, 0x0, 0x800, 0x0, r0, 0xefa, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4}, 0x48) r18 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000004900)={0x0, 0x5178, 0x10}, 0xc) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000004980)={0x10, 0x7, &(0x7f0000004680)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r11}}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffd}], &(0x7f00000046c0)='GPL\x00', 0x3, 0x21, &(0x7f0000004700)=""/33, 0x41100, 0x6, '\x00', 0x0, 0x26, r15, 0x8, &(0x7f0000004780)={0x8, 0x5}, 0x8, 0x10, &(0x7f00000047c0)={0x0, 0x0, 0x7, 0x2ef}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000004940)=[r16, r2, r17, r18, r9], 0x0, 0x10, 0xb}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000004a40)=@base={0x9, 0x3, 0x732, 0x6, 0x400, r18, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x2}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004fc0)={r19, 0xe0, &(0x7f0000004ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000004d00)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000004d40)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000004d80)=[0x0], 0x0, 0xa9, &(0x7f0000004dc0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000004e00), &(0x7f0000004e40), 0x8, 0x2f, 0x8, 0x8, &(0x7f0000004e80)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000005100)={0x1, 0x1f, &(0x7f0000004ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x101}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@ldst={0x3, 0x0, 0x1, 0xb, 0x9, 0x50, 0xfffffffffffffffc}, @cb_func={0x18, 0x3, 0x4, 0x0, 0x4}, @generic={0x8, 0x9, 0x5, 0x6, 0x6}, @map_val={0x18, 0x7, 0x2, 0x0, r13, 0x0, 0x0, 0x0, 0x401}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, @printk={@d}], {{}, {}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000004bc0)='GPL\x00', 0x7, 0xea, &(0x7f0000004c00)=""/234, 0x41000, 0x23, '\x00', r20, 0x2a, r15, 0x8, &(0x7f0000005000)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000005040)={0x0, 0xa, 0xffff7fff, 0x1}, 0x10, r3, r7, 0x3, &(0x7f0000005080)=[r14, r8, r14], &(0x7f00000050c0)=[{0x5, 0x2, 0x10, 0xa}, {0x3, 0x1, 0x1, 0xa}, {0x3, 0x5, 0xf}], 0x10, 0x5bd8}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000051c0)=@base={0x1e, 0x401, 0x82b, 0xffffffd9, 0x208, r18, 0xffffffff, '\x00', 0x0, r1, 0x1, 0x5, 0x2}, 0x48) 6.221592933s ago: executing program 0 (id=1814): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0xa, 0x45}, 0x48) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/mnt\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x16}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd", 0x69}, {&(0x7f0000000300)="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", 0xca7}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)}, 0x40000100) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0x4, 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x30}, 0x181) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1020c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000001280), 0x56) sendmsg$inet(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000008c0)='H', 0x1}], 0x1}, 0x881) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="78000000000000000000000007000000070fb27f000001e0000002ac1414bb8927cce0000002e0000001e0000001ffffffff00000000ac141423e00000017f000001ac14144300440cc401ac1e010100000fff94040100000bba416311049117549344142cb1e00000010000c6707f000001fffffc01000014000000000000000000000001000000f70c0000000000001c000000000000000000000008000000", @ANYRES32, @ANYBLOB="ffffffffffffffff0000000014000000000000000000000001000000090000000000000011000000000000000000000001000000b400000000000000110000000000000000000000010000007a00000000"], 0x118}, 0x0) recvmsg(r3, &(0x7f0000000fc0)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) 5.909299291s ago: executing program 4 (id=1823): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001dc0)={&(0x7f0000001d00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x7, 0x0, 0x0, 0xe, 0x1}]}, {0x0, [0x30]}}, &(0x7f0000001d40)=""/116, 0x2b, 0x74, 0x0, 0x40}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000001c80)=ANY=[@ANYRES8=r2, @ANYRES64=r1, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001880)={&(0x7f0000000800)=ANY=[@ANYRES32], &(0x7f0000001e00)=""/4100, 0x6b, 0xfffffffffffffef3, 0x0, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001940)={0x0, 0x800100, 0x8}, 0xc) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r6, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0xe) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xee, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r8 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='notify_on_release\x00', 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f0000001480)=ANY=[], 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='task_newtask\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000001c0)='cpu&-0\t\t\t') bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r7}, 0x4) 1.611059778s ago: executing program 0 (id=1829): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x0, 0x8, 0x8, 0x1a0939b0e1b2832b, r0, 0x9, '\x00', 0x0, r0, 0x0, 0x0, 0x5, 0x2}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYRES8=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='sched_kthread_work_queue_work\x00', r6}, 0x10) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x10) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r8}, 0x10) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r2}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r10}, 0x10) (async) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) 1.609580709s ago: executing program 4 (id=1830): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='module_request\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x82}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffd}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) 1.537728215s ago: executing program 3 (id=1832): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0xc}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000005700000000000000000000850000000500000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000001040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000380), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX, @ANYBLOB="0000000000000000b7080000800000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) r5 = openat$cgroup_freezer_state(r3, &(0x7f0000002b00), 0x2, 0x0) close(r5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x2, 0x13, &(0x7f0000000080)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x12, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x90) 1.4842483s ago: executing program 4 (id=1833): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000003c0)=ANY=[@ANYBLOB="18060000000000020000000000000040180100002020702500000000002020207b1af8a100000000000007010000f8ffffffb702000003000000b70300000002000085000000730000009509bc000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x41200100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={r0, &(0x7f00000009c0)="e47cc01bc511e0f02bed466b3799dfcf1ec803cb3c92d5c6c1678d8c928d945203289d3ee04a06d306e0b2d2e316657de689669dcfeeb4f55eb073da8fc252410214e36aca99a2c4efdead", &(0x7f0000000340)=""/3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000006b113d00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x2, 0x8, &(0x7f00000002c0)='\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000120000002400000008000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='rss_stat\x00', r4}, 0x10) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) write$cgroup_int(r6, &(0x7f00000001c0)=0x8200000000000000, 0xfffffdef) 1.457701842s ago: executing program 0 (id=1834): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}, @enum]}}, 0x0, 0x42}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x24) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r2}, &(0x7f0000000040), &(0x7f0000000140)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='timer_start\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18004000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ff1900b802000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x2400, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f00000002c0)='timer_start\x00', r9}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) 1.409874236s ago: executing program 0 (id=1836): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00', 0x4000}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) write$cgroup_int(r2, &(0x7f0000000280)=0x7, 0x12) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000700)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$ENABLE_STATS(0x20, &(0x7f0000000040), 0x4) sendmsg$inet(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000400)='host1x_syncpt_load_min\x00'}, 0xffffff82) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20025, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x80) socketpair(0x5, 0x1, 0x8000003, &(0x7f00000003c0)={0x0, 0x0}) close(r5) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.408350846s ago: executing program 3 (id=1837): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) close(r1) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000480)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x42008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x14}, 0x0, 0xc8, 0x0, 0x0, 0x34}, 0x0, 0x7, 0xffffffffffffffff, 0x9) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x42008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x14}, 0x0, 0xc8, 0x0, 0x0, 0x34}, 0x0, 0x7, 0xffffffffffffffff, 0x9) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180500000000c800000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180500000000c800000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1f, 0x2, &(0x7f0000001c40)=ANY=[@ANYBLOB="85000000a800000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x8, 0x10002, 0x0, 0x1}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000680)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xe7e1, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x1}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r7}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000024c0), &(0x7f0000001280), 0x2, r8}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r8, &(0x7f0000000100), &(0x7f0000000140)=""/94}, 0x20) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1c, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 1.300639616s ago: executing program 2 (id=1839): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000200000000f82818110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000200850000008600000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x0, 0x0}, 0x8) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0)=r2, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r3, 0x20, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000001100)=""/179, 0xb3}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x5, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, r3, 0x3, 0xfffffffe}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) unlink(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x25, r3, 0x8, 0x0, 0xfffffffffffffd20}, 0x90) perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0x1) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000009c0)) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_devices(r7, &(0x7f0000000840)=ANY=[@ANYBLOB="1e0308004d6b71ef2885630182700008"], 0xffdd) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r9}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x40082406, &(0x7f00000001c0)='GPL\x00') 1.299692526s ago: executing program 1 (id=1840): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000009d000000030000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r2, @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r10}, 0x10) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000640)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce81020329080000000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x29f498feae8cc605, 0x3, &(0x7f00000004c0)=@raw=[@jmp={0x5, 0x1, 0x5, 0x1a, 0xc, 0xc, 0x1}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x31}], &(0x7f0000000500)='GPL\x00', 0x400, 0x4, &(0x7f0000000540)=""/4, 0x41000, 0x0, '\x00', 0x0, 0x9, r11, 0x8, &(0x7f0000000a40)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000a80)=[r5, 0xffffffffffffffff, r11, r4, r6], 0x0, 0x10, 0x2}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r12}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10068, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r13, &(0x7f0000000180), 0x40001) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r3, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000002c0)={r14, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)=@generic={0x0, r15}, 0x18) 1.245525441s ago: executing program 1 (id=1841): perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000010000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='tlb_flush\x00', r0}, 0x10) (async, rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r0, 0x58, &(0x7f0000001440)}, 0x10) (async, rerun: 32) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (rerun: 32) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x7}, 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r2}, 0x10) (async, rerun: 64) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) (rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x20e, 0xe40, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 1.210531074s ago: executing program 3 (id=1842): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004b74ffec850000006d000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000000)='mm_lru_insertion\x00', r1}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000640)) write$cgroup_type(r0, &(0x7f0000000180), 0x9) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000600)={0x9}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000008c50000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) (async, rerun: 64) sendmsg$inet(r2, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 64) sendmsg$inet(r3, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r6}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) (async) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40010) (async, rerun: 64) write$cgroup_subtree(r5, &(0x7f0000000140)=ANY=[], 0xfdef) (async, rerun: 64) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xf, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x70, '\x00', 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r7}, 0x10) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0xe, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000f0ffffff0000000000000018"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) (async) openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x100002, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)=@id={0x1e, 0x3, 0x3, {0x4e21, 0x3}}, 0x10, &(0x7f0000000280)=[{&(0x7f00000004c0)="918ae370eb85daaa4b522df1c7bb3d60b54d3661745e7f4a4c41baef1e0d3f08a0bf8dc66f8ea002b68825f8ce16fb967dee1d86188133d4961059c8ccc2f337a41f6124fedd49f4e46e2ea67727d2a1d3331cf8ac0ba18904ab905e88fd8c183ca08be8272f2c87972543a77526ecea0af0e2bac460e26764f6cf2eac0f449da28c3789bdb2253b4a4d0995712a89a611f39ac54feea021055cf1b7c95549db5d1e2b657438", 0xa6}, {&(0x7f0000000580)="4289a2cd108947ae032efbf577301da1b8efb6a8187cce922c7ecd64ebc97db184d5fe61e6559b6bbd05c1c5fa69616066ad2a50ca6ba94c5109a4d8e6d4e92611af6da95996acd29b54c34ddbae67b7d73424b1906232ae5d1735bc2577596390518d550671266a5fd8e1356c5f27a700757ec4d1419d41de2b08b15e4f547cc44f29ed5e822b626d3377c591090006e37dfecf0b71d38e9d64d5b8a2e5feef6cafea9f2f9d5868318a81", 0xab}, {&(0x7f00000001c0)="c16721414a6a16695d9b59a06fed3bc9552467fb0882b59046e6fc0ec35aaa9abf6ae5069e4b261b9c0391bc3a5b4dd91dff38189b13c3782507c9c8480b74", 0x3f}, {&(0x7f0000000640)="75cb5be33ac737ad27f27f7d3529813f438f742619a779f438e555026c8eccc29e070b6dee48282f7c4f948c79430dd9b34dc51772efdf4afc124af7a1e27ef0ff41ebc69654761fa76084c36e40f3d9b9b4e7d72eae5bbd485ab2fef3a8243e67a498afa6e6a990d6e7032e732f4844757a40f07f326d3a112678311a81efb7c69bdeaef0ab1065992f4618cd6f29f270e29150c905590f47166e956017a1890fdac160", 0xa4}, {0x0}], 0x5, &(0x7f00000003c0)="cba48b8913d7db4745b7fdd7da6b731cc102dae609437898ed209e38ec87105afbb434c58eade0251a4b36eef5d077a28e10dcde43a014fb60634ecfe9b6196516d08fbd1d8559ed1377f40c390dda5475e49528d724cd02f918e028437ab71eef5f0af8a491", 0x66, 0x4000}, 0x40) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x9, 0x1000}, 0x48) 1.153630649s ago: executing program 1 (id=1843): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) r11 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r11, r5, 0x0, 0x5, &(0x7f0000000000)=',:-[\x00'}, 0x30) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x3abe, 0x0, r10, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) 1.105976113s ago: executing program 3 (id=1844): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x4a, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) socketpair(0x1, 0x1, 0x0, 0x0) (async, rerun: 32) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8912, &(0x7f0000000080)) (async, rerun: 32) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r2}, 0x10) (async, rerun: 32) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r5}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (rerun: 64) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) close(r6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700"], 0xfdef) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0xfffffff6) 1.081658305s ago: executing program 3 (id=1845): socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000107000000000000000026", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{}, &(0x7f00000005c0), &(0x7f0000000600)='%-010d \x00'}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0xf6bb, 0x8, 0x6a00, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x2, 0x5}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB='+blkio +n'], 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x15) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1400000000000000", @ANYRES32=r2], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) socketpair(0x9, 0x3, 0x8001, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f00000009c0)=ANY=[@ANYBLOB="18080000000000000000000000000000181100000c001624e22f0bafac22611edf9740a539be5bf2231c0f269c8706d1c22cfc1a0f9a694ff26ca03d6fd20b741d2b78983276100f8e254c2e2a88aadeaf9a864930dbcb76fc797b980fb8dc5cd2a394b10eaac346c7353667ada491923c475bf22823d68e7de6c70c0293d433307c3a69b4180ba3e1598f4c75f50304cac5114b5632273a2bb8e840abb62105dd888b74714b2c5c253b3dd0d57f4b4dd8972e8a2d208e2c", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b70300002bb91a008500000008000000bc0900000000000045090100002000009500000000000000b7020000000000007b9af8ff00000000b5090000000000007baaf0ff00000000bf2700000000000007080000fffdffffbfa400000000000007040000f0ffffffc40200000800000018220000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7050000080000004608efff76000000bf9800000000000056090000000000008500000000000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) 1.021206531s ago: executing program 2 (id=1846): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0xb) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100004b028ee7000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1a}, 0x80) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000050000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r2}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="70d370117ddb"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='workqueue_activate_work\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x5, 0x10001, 0x8, 0x1}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000711231000000000095000000000000000f80b0303defef28ba94ff8c71822bf00afd021201e8b20bad09087c4c35c3b3370517bf9ebbbefb68d456c0d5809b94d6a145556e497ee8df60df8740078fb7e290baa6e384550c34466fb0a9484afbf6ac9b992e567b7fe835fe85975b6f52154035a9d890bc4f4f9ddf31c2b3e58f18afcebfadda5de996b7fd79ca33e92b8f512d9a6196a6915202a7c0ef1b9f00f443eaf34e05bc77ad44bd9052e8a3b79ee1e2edad1873b0bbb43d62ee65b0240bee375c10d4360e9151d3bca8ada04a59202f43697bfd5f7f7d8a9bb13a14d6ef9d91"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x8, 0x0, 0x0, 0x2000, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0xfffffffd}, 0x48) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000002aec00000000000000009500000000000000ef2108e0ef8887e2bc5b76f1cc4310fdb6f2682b250235eb3b68923243b871202681f4bab08c42ce4c7ccdf6965525314c422329e08dba520382c86c75ca56fef2350efdf9989268f4fdc0d4a5d42c9d4002ad07b3345f602819afe9d3f027e0fdd786cf4ca826f08cf8e77fc8b7ad38d00097f83efe7916a167d21cb3812888c2e0962998536d632f4b5c929525f5c0b9318b42b194c68944102b20ed2dd8517de33777c61abc7e2b98eacbb60c2d071787953666"], 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r5, 0x0, 0x0}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000001c0)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x5, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1b, 0x6, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x2, 0x7d, &(0x7f0000000280)=""/125, 0x41000, 0x20, '\x00', 0x0, 0x26, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x2, 0xb, 0x3}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f00000003c0)=[0xffffffffffffffff], &(0x7f0000000400)=[{0x4, 0x7, 0xc, 0x6}, {0x4, 0x1, 0x0, 0x2}, {0x0, 0x4, 0x0, 0x7}, {0x2, 0x3, 0x0, 0x9}], 0x10, 0x4}, 0x90) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000016c0)={0xffffffffffffffff, 0x20, &(0x7f0000001680)={&(0x7f00000014c0)=""/193, 0xc1, 0x0, &(0x7f00000015c0)=""/134, 0x86}}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) 923.921859ms ago: executing program 2 (id=1847): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0xc}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000005700000000000000000000850000000500000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000001040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000380), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX, @ANYBLOB="0000000000000000b7080000800000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) r5 = openat$cgroup_freezer_state(r3, &(0x7f0000002b00), 0x2, 0x0) close(r5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x2, 0x13, &(0x7f0000000080)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x12, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x90) 910.44455ms ago: executing program 1 (id=1848): r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x7fff, 0x8}, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffff21, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20000000000000, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x29, &(0x7f0000000140), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000002400000024000000020000000000000000000004000000030000000001000006040000000000feff0000000d02002100000033c54008eac369769f127157d9d917b9be365abc2bf335f9bd841d21a8ec42ce32cc59d288b2c133f9530606a0fc4b822262e7fdc82c7929e41152606d5a1dda05a24bf9f9562326a280a2cc497449528e5fe44a"], 0xffffffffffffffff, 0x3e, 0xb1, 0x2}, 0x20) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000a5000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008500000092000000bf91000000000000b7020000000000008500000084000000b7000000000000009100000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41000, 0x30, '\x00', r4, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x3, 0x3, 0x2, 0x1}, 0x10, 0xffffffffffffffff, r1, 0x0, 0x0, &(0x7f0000000300), 0x10, 0x3ff}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x0, 0x6, 0x5, 0xa00, r0, 0x7fff, '\x00', r4, 0xffffffffffffffff, 0x5, 0x5, 0x5, 0xd}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000000fad413e550000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r9}, 0x10) r11 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r10}, 0x8) write$cgroup_int(r11, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000007d000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='mm_page_alloc\x00', r13}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xb, &(0x7f0000000340)=@framed={{}, [@printk={@lld, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x6b}}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x10, 0x1c, &(0x7f0000000ec0)=ANY=[@ANYBLOB="18000300", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000183200000100000000000000000000002d2801001000000085000000c20000008520000003000000ac5840000800000018530000080000000000000000000000852000000200000058a4040005000000cd300100ffffffff184a0000060000000000000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000500)='syzkaller\x00', 0xf, 0xc6, &(0x7f0000000fc0)=""/198, 0x41100, 0x33, '\x00', r4, 0x27, r6, 0x8, &(0x7f00000005c0)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0xb, 0x75, 0x2}, 0x10, 0xffffffffffffffff, r7, 0x4, &(0x7f00000006c0)=[r12, r12, r8], &(0x7f0000000700)=[{0x5, 0x1, 0x6, 0x6}, {0x0, 0x2, 0xe, 0x4}, {0x4, 0x5, 0x5, 0x4}, {0x0, 0x3, 0x5, 0x5}], 0x10, 0x19}, 0x90) 817.446268ms ago: executing program 2 (id=1849): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x5}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000d40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{r0}, &(0x7f0000000580), &(0x7f0000000680)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000080000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x96, 0x8, 0x0, 0x0}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x96, 0x8, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) (async) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) 762.341234ms ago: executing program 2 (id=1850): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffff, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x2, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40010) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 664.217622ms ago: executing program 1 (id=1851): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) write$cgroup_subtree(r0, 0x0, 0xfdef) 549.590462ms ago: executing program 4 (id=1852): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x100004, 0x220104, 0xfffffff7, 0x101, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240), 0x0, 0x2, r0}, 0x38) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x4020, r3}, 0x18) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x5, 0x5, 0x6415, 0x20, r5, 0x8100000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x1}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) close(r3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x13, 0xe, &(0x7f00000021c0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 546.758073ms ago: executing program 2 (id=1853): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x49, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xd, &(0x7f00000003c0)=ANY=[@ANYBLOB="98bc5b375dd4d131e8b666a135", @ANYRES16=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300"], &(0x7f0000000040)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffffffffffef1) perf_event_open(&(0x7f00000004c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000002c0), 0x7}, 0x110000, 0x0, 0x6, 0x0, 0x0, 0x10000009}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x66, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) 544.194213ms ago: executing program 4 (id=1854): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x6, 0xffffffff, 0x3, 0x100, 0xffffffffffffffff, 0x3c, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x3, 0x0, 0x1}, 0xffffffaa) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000a50000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x83, 0xb}, 0x0, 0xc8}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x19) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) sendmsg$tipc(r0, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xd4d}], 0x1}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000d40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="2e5fc6951d56ce5809f95af96d793cc168ad6ae734934c87f35d6c115a325cba423e3909c912b37e547e8e2601803ad6d1e053e61f16d845ba2c4e5a236ef5b6803b7b619e869b98582f7ecb2bb68709f0b136f5d78cc77a4e90e1675a0bdaf1c983596286d637712341ebedb2c9458d34e772a5c7a737258e0b4bc8117b436b0c9d8907e65a9df14a37e8c34349c29865f954317ee0e76ec465f8f392ba7f2d4e7b0550b09aaa39a1df7d4a34642542f228bc39543418abcf567a88277e9f7726db271015508bb3c7c7d22f48167b0e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={0x0}, 0x10) r7 = perf_event_open$cgroup(&(0x7f0000000940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x4082, 0x0, 0x81, 0x0, 0x0, 0x80000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r7, 0x4008240b, &(0x7f00000013c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000540)='\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 483.208558ms ago: executing program 0 (id=1855): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1}, &(0x7f0000000040), &(0x7f0000000140)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x80000001, 0xeca, 0x5, 0x8, 0xffffffffffffffff, 0xffff0001, '\x00', r3, r4, 0x3, 0x2, 0x3, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000006c0)='signal_generate\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1}, &(0x7f0000000040), &(0x7f0000000140)=r0}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r1, 0x58, &(0x7f0000000300)}, 0x10) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=0xffffffffffffffff, 0x4) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x80000001, 0xeca, 0x5, 0x8, 0xffffffffffffffff, 0xffff0001, '\x00', r3, r4, 0x3, 0x2, 0x3, 0x4}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000006c0)='signal_generate\x00', r6}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r7}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) (async) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 421.691503ms ago: executing program 1 (id=1856): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_ext={0x1c, 0x2, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000700)={0x0, 0x5, 0x5, 0x7d}, 0x10, 0x7c86, 0xffffffffffffffff, 0x3, &(0x7f0000000800)=[r0, 0xffffffffffffffff, r0], &(0x7f0000000840)=[{0x1, 0x3, 0x10, 0xb}, {0x1, 0x3, 0xe, 0x1}, {0x3, 0x4, 0x5}], 0x10, 0x7e}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x3, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) close(r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='block_plug\x00'}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x18, 0x3, &(0x7f00000008c0)=ANY=[@ANYRESHEX=r0, @ANYRESDEC], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x30}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='tasks\x00', 0x2, 0x0) r6 = getpid() write$cgroup_pid(r5, &(0x7f0000000880)=r6, 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) r9 = openat$cgroup_procs(r7, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000380), 0x12) r10 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) setsockopt$sock_attach_bpf(r3, 0x1, 0x14, &(0x7f0000000040)=r10, 0x3b) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1d, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="070542000400000018130000", @ANYRES32=r2, @ANYBLOB="0000000000000000950000000000000018000000000200000000000006000000"], &(0x7f0000000240)='GPL\x00', 0x2, 0xc7, &(0x7f0000000300)=""/199, 0x41000, 0x4a, '\x00', 0x0, 0xd, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x20005, 0xb, 0x9, 0x401}, 0x10, 0x0, r10, 0x9, 0x0, &(0x7f0000000580)=[{0x0, 0x1, 0x2, 0xe}, {0x2, 0x2, 0x4, 0x7}, {0x1, 0x4, 0xc, 0x7}, {0x4, 0x5, 0x2, 0xa}, {0x3, 0x3, 0x4, 0x4}, {0x4, 0x3, 0x1, 0xb}, {0x1, 0x5, 0x7, 0x5}, {0x2, 0x3, 0x3, 0x9}, {0x2, 0x2, 0xfffffffd, 0xa}], 0x10, 0x3}, 0x90) recvmsg$unix(r3, &(0x7f00000002c0)={0x0, 0xfffffd13, 0x0}, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40d, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xd, 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000800850000008f00000095"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 420.747973ms ago: executing program 4 (id=1857): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xfebd) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x7, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000000000000081, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000000180)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10, &(0x7f0000001300)=[{&(0x7f00000001c0)="e1569d2075ddc806ae5df3e95b82863eb25917cf394bc52b13d6530932edbbd8a7dbfe8a60a1f51ff209faf47bb8e5c712687ea31c5ef05a5c8a3f2f589404fc9588761f2b22a4665aa835c02853e3d7fe75a0856840f9defea76e5bc16a43e1c904ed064290a297efb6f4eea984ceebbf7cd87b8b7b2018061a67455b2e6eb7a651560ba2f8a29c778ef45b5d95de691c5dc82bd9131763dee4b936f9867cbb5cd8cdc2b28df2f44b154062ca5ee0f405915be9016dfe5e41229c07653caaec85c8626669bc1b35c53db388e2a6b0c0ac7083dfb7ee79da7706a422d9372ba4ecddb46536771d82beb55caa740ade0f8ada7bd9a57f5df783310e369a7f2af1a24cfa84cb3577cb6d8da8468c20c4f45888f4036b870bfffda8c67eb35ad06a11f7bd6f00104d17d8d509a241705b38147b9c36467c044363b11968a9f30a06868509b332d86ef39d6db40cf816616fd55a60d2cf84b60b9f463541dc25efdcc80b84b3976c5bd1de08da4d4fa7b224b9d5c5d05865ecd88f09c244c716cb7ac534bc8e1d5a6bfffa8b83883346b1a5b80e3a947c54a33665114e89a317bc2b6c1faed71cab17043bf7bb2de1e9e0eb87527e3c5ef83b0907d57f32bf3754447962d105fbc3d13fe693ab96e5f75b4114d9941e6a22e5c3b433daec3e12b47d17179e63f9b5371e367c2ca39ed945d9afec540353bdf223f73ccc1c4c8a557b28c36121acf02859cce53f9465193787be20b9086ec02d73e92e1408bb30fa08b459661443653d7ba4a9de9933315c8bd1c9ba5f3a5630e6d8a4ca653ca0b4ee7fd50ec31bfe62ea2d6942fbd386df4576c34270ee927e8791ef29a8487eb542c6727bd5af988a6568933091c36363a136dfdabdfe5c986ea831110c3b0b7f5affb76026714d85dee18afe3efcacdedee244d7d8ec0eb5c7893abadb1c3743462d2f2e65b620bbfdde9ad276dd87eebaa00da51618168915abaa527d9824cbaaef7559c0cc00902bc0fbc429b78e2314c051de5c811cdcd85a4ed806c453ae01936ae437160dbe5d52a88e38811c7cd0dae042787610181603f0b3252a1b94a2b17dae079146b23d38389f967b2d7f5b0d84ac638faa4f6a7c68eca4d00f05bc50208622c58af6f3b19cb7f6af6bf1a77838381e02bd40b48149cbb7d15ed54969862ef0d757d9ee9b354e3f6f1ab03fc8fbafb44378f6e61c3ca0dd7afd78829170470ea5655deb153a36b6c90c730dcbba76e65cbb98880d2f11e3eb94cd7599f44fdbcd4c737044b1d3537c964493d69beda7a27691e890fbf2a73107b26463ecf80ab15b0153353d46b3f27da718a08e01feea6d2b5b4413dcae9bcc63b7c524c03c8373e7681d86f7a2254a488480b545b126b9d9203583408b408208e9487de0fbb7ed1bd663ddd60b4d75f96710cdff608cb943236ea032324f3d48e8ef88b85f238d14540dbf1d940f0b061cf430b90cffcd50b913b86a5fcecf72f8bdde8aa82660ea36fd28ffd29b2c511a95e53ef144ab4daa278c88f50864e909be169b31d43adc7631aeec6a9116378535bd8a82aec97ad02b68529bcac596d802291d5ba56bd2c3cc5bd005f7b28536a24a79b6ced3d8461a2943f1e7c414276632ceb94c99363c31ecc84415481f9f3f53538931fe324c140f1710f33185c369e45f08a50560bf52d3f6c52e104c2927a55ce79c30e293425fe68e31a7c06d8b1c64b09774d394ee75a4a011ff6e9996a0e2bf991be2909a2f9332ada4a5483ce0dbb7ffab98bbaa33c13d381e61eb2e2056cd0a6db5a4101eb9f34390bc27963f33b58147b722be401710b93ef7e8f5959fd075ada3c0fe5f3db5b9dbb6f6914ef0860d90f810b5d7e121edf2e3334a9b3a0bc403394484d62ec4254a2ee584791c55ff0308a053b6c409128434c3e9008e1242ed50df66e5d4178525b8e902e3c51cc96007b309caffcdc94921a35dae8cac06f5d64f2cb9ffa115fc6ed556296d3e40c4c68ae2d21ff25dd86b8c5f9f51d1778c4eb885fda499a3eb9188266e442be10aedce81634e872ba4704dbf1899a2819beb7dfbf2b070c3a692de996fb4024dfa1cf7cd7916af9ba4b48c270102c16b2ffde1c400589034df75078ee57bb00b0d8c27426d8210c9f1387be429877e2d919328b69ddbf244eb83c4d8262b07280bc0eae256d1ab70eaa85db5973d1d23ada2fc359aefb3dd1df5bd0cb6d122445d15c147f6016200025f36acd7001640e6b12e93f56322a4f6db2cb02b97f2f9e0d99c225be27c3a1fb13fb283daa80f4226774086e814475a6d244ca25fb2a056415e9e8479e4238c42ad19bcf0c5e9191a1a6b732acd9c3b42de82e757b30df02bd4772b8b9bce661603bb951bb2ea8e6fed166bc7285747e129a3fbd0250c53028067726835b0db70c646b0f1f2f45cdb1936d3ff184cc17d7376dc743e0e545fb7d8ccf8a72349dd3529132582d525403721106bfd73afcc1bbff6bb4e5aa26c2fcd8d456ed8537eb55be16facae3d59a0365a7d76424eb5a16043322c838d51e6fbac6309039015ab6a350ec7380a9f034ac8e50253315733791948d592f6419171da3b01b34bb78c5dee756a3d26edb0f0db29af06a54a9b17888effc1d8a25b6155339c4005e2094c06f8a15fae85e9badc4e260cf646487ee6395bf0c665e5b75896a2523e4263b9eb73d460441740bddc3a33bfd983d3fb0a43fd55e22acff24d9517bf806e8d7abcf21bb64635b0aaa6efb1e5fd4b9b7dd7ea1ab5f22ec2a3da75daad8c0acb2a320d12125d3269653b8aee5b69c573aa0bccba52fb0fe4e435a1c8626d65da2203887a33e4a38b70d86d0da4911f345e965166479bb023094103c8d5df3c2bba10c832daa95bf12d7126e8596adca423a00c50b79c0bdb0485e1a91ab39c75baf9e6b4c86e0a4cd9ac1d27b0966eae1b1e375bc254026d7c607880a707bd7f357cdab4048fd70691ca6b6fe028534571d89e8078c94d301e73ebf3a13f212ec59e06bb91550058f93c487788c4caba30770e21ad1f9967408c88bf10b553fbe0bc035c0893c39a80a70b73c047fb4f198b0db73176055e37be3e3a351f102fabfc2183e40610bec5566f390e9bac1eb812aeecfc90e3570b8d222ad0963cfe1e5780f95ddc6a6f488ceebc351bb1576e8ae5ae6954bbd1eddf1fae7a9d17df2f9ad0b6d46d167b570e023d03a44ce7c179b7956b5fb81bb6fc733b73ba95dac97a493cf5b789c68fd0695b0fb709e0278a36d485dd2ac26495a6d7c4ca312255159301ac92b541af039e2d6a972612512e37f4082726e318d15440708dcc97c140a10c81038b237ee85dec3073237c75f0ca355771bea593d63843c35eddaf27e1854dbed26a848b9ce92e4256e08172f7cb8949e23bfc045d464c079d6f35ef3e3f462b4c23e330268fdbf068e9cd15299195534a243475bba8bebf77d4583e8ff64bde1f26f63a616e45e080bb27b739fbe25b86627113f8f2b03ff0a4f825b1b40e9a81799e3359b32f2016dfbbe458b371c0c2c221c7df2f41fa777f6b43e15e45f2809478ad2713df87fd7113e973972698ff3d08c8ed25c2be7232c7a4b4956edca00f63c2a6ad5839bf5512b2b494ff2e24792ca004ab17e71a833313349d4832b84690feee830241893ddb2d22d0e6fcbc77997650cc009bd0714816daa86bd9acb397bb86def8d18fc12b2e13a7e8a83127946481b033cb6d9fdd8d3d23a5dfb263eb17babe91ae9f02014f34323ce9c9ad6f0a6c4504e1decb9a7a58ac94f8542f15a92284f6e2764c8a532699019b2eb9a043a8a636e2ade71e49f0dd96252b50b5fee02a88e712bc4531dd0f6e152c50446a25540f8402af80c6bdf48d385cde5cae5b707a750aaad56f34d2622d33e8ba2abb18c4e47412bf78e8b4bb04835d42c9d352ef88f6c798f6519890bbf7dfcc37ec6248fe982d1c0f0af67c2ca8bd025f3827345d6b91eada53a091febff71bf1e4d07eef75be746a33aef1db9893c2b98fc0e0329872f1bdf8e2069ded8a34701e9cfe9f58686d76fdd8a5531337cfa7798ed0a5e7b832c1ce6f14ca91c76a942fc252b366698ba5784f9d9f31f7b665cedcc0ebd44ec668c312a9830a75c781be92835cdfc15816e235decf9e0b5d73a99aaf9b07f11dc9b24db4bb1e3748e6fd62f483ae0e0dcbf5331a0426513888a195d7aa052a5d0f13253507e3d0e48b3624eee7c5c1e427b62ace4080b1dbe0545397656483227891463e707458e3b9f4a87717e53f9a13af7afeaf511718e0b996082dcd4128e8097d070628b8d2fd719111665c4f0628ed9c77b0e1ee192da63143c9b9bfe5550bed52028f1ad1fb51e966240263b79c8e613a12785d2b74a513f194ce31a3cd1da46fb49dba5ba1e8d0bb58b103b5d31c3dd4873266385b83fd24fc106c52e10d2471a4901c00bccd3c4c42d8af5de7563c4bb4daf589104187fb1109791c4039777ec1195e98bb10e5c4db6e0861fb050c4462ca9a73b604c0d30c9abaef7ae7c8329b463882ad3fa935800d4f08f7721e26606eb6f3cec4f6348445da3d2173dedb4b2cbbb6b939d461454ae3b79b32b905e86acfe89e4ac8d28deac7111859f31497eeefbb482558357631fffe7b24253f929f8902053eea8aee636f92c1adb0162c69f15ac187f079b614eb8a18c6a0a23357deb6b328fa792423a280e3385bb1a30125583f82b5b545783a85a24a9825afe1ebc82d6bcc5e70cfd8d3eb6ef18f6efb3288e78d6af765a78ea98b81d8a8f311e0842ef4d759b21f4af9066cadf9cc67fe9e24becbfbbd", 0xd4d}], 0x1}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r8}, &(0x7f00000008c0), &(0x7f0000000900)=r7}, 0x20) 0s ago: executing program 3 (id=1858): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x1a, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0xc5, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfc3, 0x71, 0x4, 0x212, r0, 0x6, '\x00', r1, 0xffffffffffffffff, 0x3, 0x2, 0x0, 0x5}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r4, &(0x7f0000000480), 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xf, 0x1, &(0x7f00000004c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], &(0x7f0000000500)='GPL\x00', 0x5fca, 0x0, 0x0, 0x41000, 0x10, '\x00', r1, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0xe, 0x8, 0x3}, 0x10, r2, 0xffffffffffffffff, 0x7, &(0x7f00000005c0)=[r3, r3, r3, r0, 0x1, r3, r0, r3, r3], &(0x7f0000000600)=[{0x5, 0x1, 0x7, 0x4}, {0x5, 0x1, 0xc, 0xb}, {0x2, 0x3, 0xa, 0x6}, {0x0, 0x1, 0x6}, {0x5, 0xe, 0xe, 0x3}, {0x2, 0x1, 0xb, 0x4}, {0x3, 0x3, 0x4, 0x2}], 0x10, 0xffff}, 0x90) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000740), 0x10400, 0x0) ioctl$TUNGETSNDBUF(r6, 0x800454d3, &(0x7f0000000780)) r7 = openat$cgroup_int(r4, &(0x7f00000007c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) r8 = openat$cgroup_procs(r4, &(0x7f0000000800)='cgroup.threads\x00', 0x2, 0x0) r9 = getpid() write$cgroup_pid(r8, &(0x7f0000000840)=r9, 0x12) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000880)=r2, 0x4) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xa, 0x0, 0xfffffff9, 0x5, 0x211, 0x1, 0x401, '\x00', r1, r10, 0x3, 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r5, 0xe0, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000a80)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000ac0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000b00)=[0x0, 0x0], 0x0, 0x82, &(0x7f0000000b40)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000b80), &(0x7f0000000bc0), 0x8, 0x22, 0x8, 0x8, &(0x7f0000000c00)}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e40)={{r11, 0xffffffffffffffff}, &(0x7f0000000dc0), &(0x7f0000000e00)=r5}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000f00)={0xa, 0x10, &(0x7f0000000940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x915}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@alu={0x7, 0x2, 0x0, 0x3, 0x5289c0e2005c0762, 0x50, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000009c0)='GPL\x00', 0x7, 0x5d, &(0x7f0000000a00)=""/93, 0x41000, 0xa, '\x00', r12, 0x3f, r10, 0x8, &(0x7f0000000d80)={0x8, 0x1}, 0x8, 0x10, 0x0, 0x0, r2, r5, 0x4, &(0x7f0000000e80)=[r11, r13, r11, r0], &(0x7f0000000ec0)=[{0x1, 0x5, 0xa, 0x3}, {0x1, 0x2, 0xe, 0x9}, {0x2, 0x1, 0x0, 0xa}, {0x4, 0x1, 0x0, 0x2}], 0x10, 0x3}, 0x90) r14 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001080)={&(0x7f0000000fc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x43, 0x43, 0x5, [@int={0x2, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x35, 0x6}, @func={0x4, 0x0, 0x0, 0xc, 0x1}, @datasec={0x2, 0x1, 0x0, 0xf, 0x3, [{0x4, 0x2, 0x8}], "0f674e"}, @const={0xc, 0x0, 0x0, 0xa, 0x5}]}, {0x0, [0x2e, 0x0, 0x30]}}, &(0x7f0000001040)=""/4, 0x61, 0x4, 0x1, 0x3}, 0x20) close(r14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000010c0)={0xffffffffffffffff}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001280)={r14, 0x20, &(0x7f0000001240)={&(0x7f0000001100)=""/144, 0x90, 0x0, &(0x7f00000011c0)=""/105, 0x69}}, 0x10) r16 = syz_clone(0x80000, &(0x7f00000012c0)="5eef71b24282eb12bd277717deaa206616f8d13515f2787893e44aa1c0691257acec2ed102ccfe6d50c8287b2606381974286f80294900f37b520df8dd6ae45bdfa1f61623e0ea30951a66293e9e12ba3b79958e209f7ffb7f12293c92e2da4f8478ba76f22e8ede5dce5b4a97624807716eef7026445659b12aec55c451ae445f619320c26d3721f30a407d4a62e8420996ce565dcd90d3e5b32d1c199f8b614672d141f2102702a30bcba5f301cd9fa747069465f9222cbeccfdf4b9b5837e1e901b7a192852d5a4330bb6de4a", 0xce, &(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)="e8e0a258b6367e741145a6a77ed4425097e662444d317125eebeaf5e1f89aec500419813ee455271a38f96f42b7dc229f86d08edb3d49f1ce0dce5b1c79e1ccc8577a1196e96a8dc5910f2be0c65de370983c8725f530a4f161b030f93266a901cab0d6abf7b922ea3f0f9a193f24ddf7b") syz_open_procfs$namespace(r16, &(0x7f00000014c0)='ns/time_for_children\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001740)={0x6, 0x9, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x478}, [@map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8001}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xa}]}, &(0x7f0000001580)='GPL\x00', 0x5, 0x45, &(0x7f00000015c0)=""/69, 0x40f00, 0x8, '\x00', 0x0, 0x25, r14, 0x8, &(0x7f0000001640)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x0, 0x10, 0x27, 0x1}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000016c0)=[r3, r7, r13], &(0x7f0000001700)=[{0x3, 0x1, 0x9, 0x4}], 0x10, 0x7}, 0x90) syz_open_procfs$namespace(0x0, &(0x7f0000001800)='ns/time\x00') r17 = openat$cgroup_subtree(r4, &(0x7f0000001840), 0x2, 0x0) write$cgroup_subtree(r17, &(0x7f0000001880)={[{0x2d, 'memory'}, {0x0, 'hugetlb'}]}, 0x11) write$cgroup_int(r7, &(0x7f00000018c0)=0x8001, 0x12) recvmsg(r15, &(0x7f0000001ac0)={&(0x7f0000001900)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000001980)=""/115, 0x73}], 0x1, &(0x7f0000001a40)=""/69, 0x45}, 0x10120) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)=@base={0x1f, 0x7, 0x3, 0x0, 0x8, 0xffffffffffffffff, 0x4, '\x00', r1, r10, 0x1, 0x2, 0x4}, 0x48) kernel console output (not intermixed with test programs): nk becomes ready [ 21.833281][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.840519][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.847814][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.854958][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.863525][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.873427][ T291] device veth0_vlan entered promiscuous mode [ 21.880099][ T288] device veth0_vlan entered promiscuous mode [ 21.886794][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.894657][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.901929][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.917783][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.927611][ T288] device veth1_macvtap entered promiscuous mode [ 21.940730][ T289] device veth1_macvtap entered promiscuous mode [ 21.948580][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.956493][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.964530][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.972417][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.980614][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.995426][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.003470][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.016055][ T287] device veth0_vlan entered promiscuous mode [ 22.025082][ T291] device veth1_macvtap entered promiscuous mode [ 22.035352][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.043996][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.052211][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.059907][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.067673][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.075773][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.083088][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.095567][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.103863][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.112062][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.120140][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.128793][ T290] device veth1_macvtap entered promiscuous mode [ 22.156311][ T287] device veth1_macvtap entered promiscuous mode [ 22.165630][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.180047][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.188437][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.221961][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.232159][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.244365][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.252655][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.261028][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.269246][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.277908][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.286050][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.294604][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.303656][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.312026][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.320242][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.379572][ C0] hrtimer: interrupt took 27621 ns [ 22.672416][ T327] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.679493][ T327] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.411297][ T375] device syzkaller0 entered promiscuous mode [ 24.613514][ T382] device pim6reg1 entered promiscuous mode [ 25.168460][ T30] kauditd_printk_skb: 40 callbacks suppressed [ 25.168477][ T30] audit: type=1400 audit(1725782253.453:116): avc: denied { write } for pid=392 comm="syz.4.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 25.392033][ T410] bond_slave_1: mtu less than device minimum [ 25.462005][ T30] audit: type=1400 audit(1725782253.753:117): avc: denied { append } for pid=408 comm="syz.4.26" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.750900][ T422] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.760207][ T422] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.852553][ T432] device macsec0 entered promiscuous mode [ 25.908626][ T428] device veth1_macvtap left promiscuous mode [ 25.915598][ T428] device macsec0 left promiscuous mode [ 26.081946][ T438] device pim6reg1 entered promiscuous mode [ 26.534485][ T468] device veth0_vlan left promiscuous mode [ 26.603600][ T468] device veth0_vlan entered promiscuous mode [ 26.698766][ T30] audit: type=1400 audit(1725782254.993:118): avc: denied { relabelfrom } for pid=463 comm="syz.2.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 26.867858][ T30] audit: type=1400 audit(1725782255.023:119): avc: denied { relabelto } for pid=463 comm="syz.2.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 27.207685][ T494] device pim6reg1 entered promiscuous mode [ 27.580266][ T505] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.590005][ T505] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.737421][ T30] audit: type=1400 audit(1725782256.023:120): avc: denied { ioctl } for pid=531 comm="syz.1.61" path="pid:[4026532284]" dev="nsfs" ino=4026532284 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 27.800116][ T337] syz.2.3 (337) used greatest stack depth: 21840 bytes left [ 27.813625][ T30] audit: type=1400 audit(1725782256.103:121): avc: denied { write } for pid=533 comm="syz.2.60" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.891733][ T535] device pim6reg1 entered promiscuous mode [ 29.213755][ T603] device pim6reg1 entered promiscuous mode [ 29.427424][ T30] audit: type=1400 audit(1725782257.723:122): avc: denied { create } for pid=608 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 29.484609][ T604] device wg2 entered promiscuous mode [ 29.687308][ T30] audit: type=1400 audit(1725782257.963:123): avc: denied { create } for pid=618 comm="syz.4.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 29.743901][ T30] audit: type=1400 audit(1725782258.003:124): avc: denied { create } for pid=635 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 29.790502][ T643] syz.0.93[643] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.790573][ T643] syz.0.93[643] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.817311][ T30] audit: type=1400 audit(1725782258.033:125): avc: denied { create } for pid=635 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 29.862598][ T643] device pim6reg1 entered promiscuous mode [ 29.880943][ T655] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 30.414746][ T696] device pim6reg1 entered promiscuous mode [ 30.629168][ T703] device pim6reg1 entered promiscuous mode [ 30.693541][ T713] syz.0.112[713] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.693614][ T713] syz.0.112[713] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.883543][ T713] device pim6reg1 entered promiscuous mode [ 31.536609][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 31.536626][ T30] audit: type=1400 audit(1725782259.823:128): avc: denied { create } for pid=749 comm="syz.4.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 32.111836][ T30] audit: type=1400 audit(1725782260.403:129): avc: denied { create } for pid=763 comm="syz.4.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 32.258309][ T771] syz.1.130[771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.258369][ T771] syz.1.130[771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.310430][ T771] device pim6reg1 entered promiscuous mode [ 32.940955][ T796] device veth1_macvtap left promiscuous mode [ 33.439799][ T821] syz.1.145[821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.439869][ T821] syz.1.145[821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.546494][ T821] device pim6reg1 entered promiscuous mode [ 33.628113][ T826] device veth0_vlan left promiscuous mode [ 33.634058][ T826] device veth0_vlan entered promiscuous mode [ 33.754104][ T835] device pim6reg1 entered promiscuous mode [ 33.784613][ T836] device veth0_vlan left promiscuous mode [ 33.803150][ T836] device veth0_vlan entered promiscuous mode [ 33.822176][ T30] audit: type=1400 audit(1725782262.113:130): avc: denied { tracepoint } for pid=839 comm="syz.3.152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 34.104529][ T855] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.111582][ T855] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.118716][ T855] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.125548][ T855] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.170506][ T855] device bridge0 entered promiscuous mode [ 34.336713][ T867] syz.2.161[867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.336779][ T867] syz.2.161[867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.359895][ T867] device pim6reg1 entered promiscuous mode [ 34.427335][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 34.479119][ T30] audit: type=1400 audit(1725782262.763:131): avc: denied { create } for pid=876 comm="syz.1.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 35.033780][ T904] device pim6reg1 entered promiscuous mode [ 35.172318][ T911] syz.0.176[911] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.172388][ T911] syz.0.176[911] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.359975][ T911] device pim6reg1 entered promiscuous mode [ 35.393575][ T928] syz.3.180[928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.393644][ T928] syz.3.180[928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.460792][ T928] syz.3.180[928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.473682][ T928] syz.3.180[928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.507104][ T937] device pim6reg1 entered promiscuous mode [ 35.551493][ T939] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.632628][ T942] syz.1.182 (942) used greatest stack depth: 21504 bytes left [ 36.593762][ T978] syz.3.195[978] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.593834][ T978] syz.3.195[978] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.688811][ T978] device pim6reg1 entered promiscuous mode [ 36.811290][ T30] audit: type=1400 audit(1725782265.103:132): avc: denied { create } for pid=995 comm="syz.2.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 36.962869][ T1005] bond_slave_1: mtu less than device minimum [ 37.388563][ T1026] device pim6reg1 entered promiscuous mode [ 37.458408][ T1033] device wg2 entered promiscuous mode [ 37.470809][ T1026] device wg2 left promiscuous mode [ 37.529125][ T1036] syz.0.212[1036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.529183][ T1036] syz.0.212[1036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.577832][ T1038] device wg2 left promiscuous mode [ 37.624637][ T1036] device pim6reg1 entered promiscuous mode [ 37.649783][ T1038] device wg2 entered promiscuous mode [ 38.969824][ T1086] device pim6reg1 entered promiscuous mode [ 39.058213][ T1082] device wg2 entered promiscuous mode [ 39.583373][ T1112] device syzkaller0 entered promiscuous mode [ 39.613981][ T1113] device pim6reg1 entered promiscuous mode [ 39.863492][ T1149] device pim6reg1 entered promiscuous mode [ 39.893913][ T1148] device pim6reg1 entered promiscuous mode [ 40.030267][ T1183] syzkaller0: refused to change device tx_queue_len [ 40.114142][ T30] audit: type=1400 audit(1725782268.403:133): avc: denied { create } for pid=1193 comm="syz.0.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 40.287405][ T30] audit: type=1400 audit(1725782268.453:134): avc: denied { create } for pid=1195 comm="syz.2.262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 40.356560][ T30] audit: type=1400 audit(1725782268.613:135): avc: denied { write } for pid=1200 comm="syz.4.264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 40.381513][ T1216] device veth1_macvtap left promiscuous mode [ 40.387745][ T1216] device macsec0 entered promiscuous mode [ 40.399181][ T1216] device veth1_macvtap entered promiscuous mode [ 40.461442][ T1221] bpf_get_probe_write_proto: 4 callbacks suppressed [ 40.461460][ T1221] syz.0.267[1221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.582554][ T1221] syz.0.267[1221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.632320][ T1221] device pim6reg1 entered promiscuous mode [ 40.852077][ T30] audit: type=1400 audit(1725782269.133:136): avc: denied { create } for pid=1262 comm="syz.3.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 41.205347][ T1284] device syzkaller0 entered promiscuous mode [ 41.255147][ T30] audit: type=1400 audit(1725782269.543:137): avc: denied { create } for pid=1296 comm="syz.3.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 41.277920][ T1288] bond_slave_1: mtu less than device minimum [ 41.320101][ T1309] syz.2.292[1309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.320174][ T1309] syz.2.292[1309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.321591][ T1305] ------------[ cut here ]------------ [ 41.348546][ T1305] trace type BPF program uses run-time allocation [ 41.354917][ T1305] WARNING: CPU: 1 PID: 1305 at kernel/bpf/verifier.c:11685 check_map_prog_compatibility+0x6f1/0x890 [ 41.378451][ T1305] Modules linked in: [ 41.386362][ T1305] CPU: 1 PID: 1305 Comm: syz.3.290 Not tainted 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 41.388643][ T1309] device pim6reg1 entered promiscuous mode [ 41.397479][ T1313] syz.4.293[1313] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.401693][ T1313] syz.4.293[1313] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.413388][ T1305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 41.437118][ T1305] RIP: 0010:check_map_prog_compatibility+0x6f1/0x890 [ 41.443654][ T1305] Code: db e9 f9 fc ff ff e8 4e 33 ed ff 31 db e9 ed fc ff ff e8 42 33 ed ff c6 05 8d 1d a3 05 01 48 c7 c7 e0 de 87 85 e8 7f 68 be ff <0f> 0b e9 5a fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 84 f9 ff [ 41.463261][ T1305] RSP: 0018:ffffc90000f2f328 EFLAGS: 00010246 [ 41.469894][ T1305] RAX: 949938d5a025f200 RBX: 0000000000000001 RCX: 0000000000040000 [ 41.479651][ T1305] RDX: ffffc90003789000 RSI: 00000000000222a5 RDI: 00000000000222a6 [ 41.487611][ T1305] RBP: ffffc90000f2f370 R08: ffffffff81579755 R09: fffff520001e5d8d [ 41.500689][ T1305] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 41.510896][ T1305] R13: ffff888118eb0800 R14: ffffc9000010b000 R15: dffffc0000000000 [ 41.519274][ T1305] FS: 00007f2520e036c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 41.529619][ T1305] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 41.536853][ T1305] CR2: 0000000000000000 CR3: 0000000113f62000 CR4: 00000000003506b0 [ 41.550980][ T1305] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 41.576741][ T30] audit: type=1400 audit(1725782269.863:138): avc: denied { create } for pid=1322 comm="syz.0.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 41.616137][ T1305] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 41.636281][ T1305] Call Trace: [ 41.645517][ T1305] [ 41.657258][ T1305] ? show_regs+0x58/0x60 [ 41.667687][ T1305] ? __warn+0x160/0x2f0 [ 41.700328][ T1305] ? check_map_prog_compatibility+0x6f1/0x890 [ 41.775870][ T1305] ? report_bug+0x3d9/0x5b0 [ 41.810128][ T1327] device pim6reg1 entered promiscuous mode [ 41.817002][ T1305] ? check_map_prog_compatibility+0x6f1/0x890 [ 41.851889][ T1305] ? handle_bug+0x41/0x70 [ 41.866878][ T30] audit: type=1400 audit(1725782270.153:139): avc: denied { read } for pid=1335 comm="syz.0.299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 41.877264][ T1305] ? exc_invalid_op+0x1b/0x50 [ 41.890633][ T1305] ? asm_exc_invalid_op+0x1b/0x20 [ 41.895536][ T1305] ? __wake_up_klogd+0xd5/0x110 [ 41.900310][ T1305] ? check_map_prog_compatibility+0x6f1/0x890 [ 41.940609][ T1305] ? check_map_prog_compatibility+0x6f1/0x890 [ 41.977360][ T1305] resolve_pseudo_ldimm64+0x671/0x1240 [ 42.011472][ T1305] ? check_attach_btf_id+0xef0/0xef0 [ 42.050498][ T1305] ? __mark_reg_known+0x1b0/0x1b0 [ 42.077501][ T1305] ? security_capable+0x87/0xb0 [ 42.116245][ T1305] bpf_check+0x3174/0x12bf0 [ 42.153638][ T1305] ? is_bpf_text_address+0x172/0x190 [ 42.217687][ T1305] ? stack_trace_save+0x1c0/0x1c0 [ 42.223680][ T1305] ? __kernel_text_address+0x9b/0x110 [ 42.232714][ T1305] ? unwind_get_return_address+0x4d/0x90 [ 42.241418][ T1305] ? bpf_get_btf_vmlinux+0x60/0x60 [ 42.248215][ T1305] ? arch_stack_walk+0xf3/0x140 [ 42.252955][ T1305] ? stack_trace_save+0x113/0x1c0 [ 42.257877][ T1305] ? stack_trace_snprint+0xf0/0xf0 [ 42.262855][ T1305] ? stack_trace_snprint+0xf0/0xf0 [ 42.269394][ T1305] ? __stack_depot_save+0x34/0x470 [ 42.274378][ T1305] ? ____kasan_kmalloc+0xed/0x110 [ 42.292670][ T1305] ? ____kasan_kmalloc+0xdb/0x110 [ 42.312480][ T1305] ? __kasan_kmalloc+0x9/0x10 [ 42.322481][ T1305] ? kmem_cache_alloc_trace+0x115/0x210 [ 42.334249][ T1305] ? selinux_bpf_prog_alloc+0x51/0x140 [ 42.357264][ T1305] ? security_bpf_prog_alloc+0x62/0x90 [ 42.377278][ T1305] ? bpf_prog_load+0x9ee/0x1b50 [ 42.382029][ T1305] ? __sys_bpf+0x4bc/0x760 [ 42.387012][ T1361] syz.1.305[1361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.387085][ T1361] syz.1.305[1361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.399777][ T1305] ? __x64_sys_bpf+0x7c/0x90 [ 42.418163][ T1305] ? x64_sys_call+0x87f/0x9a0 [ 42.422673][ T1305] ? do_syscall_64+0x3b/0xb0 [ 42.432115][ T1361] device pim6reg1 entered promiscuous mode [ 42.439139][ T1305] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 42.445163][ T1305] ? __kasan_kmalloc+0x9/0x10 [ 42.451201][ T1305] ? memset+0x35/0x40 [ 42.455018][ T1305] ? bpf_obj_name_cpy+0x196/0x1e0 [ 42.461777][ T1305] bpf_prog_load+0x12ac/0x1b50 [ 42.466447][ T1305] ? map_freeze+0x370/0x370 [ 42.482436][ T1305] ? selinux_bpf+0xcb/0x100 [ 42.486812][ T1305] ? security_bpf+0x82/0xb0 [ 42.491444][ T1305] __sys_bpf+0x4bc/0x760 [ 42.495559][ T1305] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 42.501357][ T1305] ? perf_trace_sys_enter+0x129/0x140 [ 42.506633][ T1305] __x64_sys_bpf+0x7c/0x90 [ 42.587076][ T1305] x64_sys_call+0x87f/0x9a0 [ 42.602713][ T1305] do_syscall_64+0x3b/0xb0 [ 42.612713][ T1305] ? clear_bhb_loop+0x35/0x90 [ 42.617254][ T1305] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 42.623089][ T1305] RIP: 0033:0x7f2522188ef9 [ 42.627577][ T1305] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 42.648473][ T1305] RSP: 002b:00007f2520e03038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 42.656722][ T1305] RAX: ffffffffffffffda RBX: 00007f2522341f80 RCX: 00007f2522188ef9 [ 42.668897][ T1305] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 42.676797][ T1305] RBP: 00007f25221fb046 R08: 0000000000000000 R09: 0000000000000000 [ 42.691518][ T1305] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 42.706904][ T30] audit: type=1400 audit(1725782270.993:140): avc: denied { setopt } for pid=1374 comm="syz.2.310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 42.708107][ T1305] R13: 0000000000000000 R14: 00007f2522341f80 R15: 00007ffc0cf28ba8 [ 42.742550][ T1305] [ 42.745579][ T1305] ---[ end trace 6be596908924ea94 ]--- [ 43.908304][ T1452] device pim6reg1 entered promiscuous mode [ 44.597091][ T30] audit: type=1400 audit(1725782272.883:141): avc: denied { create } for pid=1474 comm="syz.4.338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 44.959754][ T1496] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.966684][ T1496] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.997345][ T1496] device bridge0 left promiscuous mode [ 45.009477][ T1496] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.016344][ T1496] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.023499][ T1496] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.030357][ T1496] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.063171][ T1496] device bridge0 entered promiscuous mode [ 45.356179][ T1522] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.363981][ T1522] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.379124][ T1522] device bridge0 left promiscuous mode [ 45.535787][ T1532] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 45.570841][ T1532] device syzkaller0 entered promiscuous mode [ 47.218271][ T1601] device pim6reg1 entered promiscuous mode [ 47.392683][ T1612] device pim6reg1 entered promiscuous mode [ 47.791691][ T1634] syz.1.382[1634] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.791787][ T1634] syz.1.382[1634] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.040454][ T30] audit: type=1400 audit(1725782277.333:142): avc: denied { create } for pid=1659 comm="syz.4.389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 49.998499][ T1743] batadv_slave_0: mtu less than device minimum [ 50.210612][ T1779] device pim6reg1 entered promiscuous mode [ 50.238528][ T1781] device pim6reg1 entered promiscuous mode [ 51.764380][ T1845] device pim6reg1 entered promiscuous mode [ 52.977206][ C1] sched: RT throttling activated [ 55.152522][ T30] audit: type=1400 audit(1725782283.443:143): avc: denied { create } for pid=1882 comm="syz.2.453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 55.196022][ T1881] gretap0: refused to change device tx_queue_len [ 55.625166][ T1961] device pim6reg1 entered promiscuous mode [ 56.256988][ T2000] device pim6reg1 entered promiscuous mode [ 56.404630][ T2011] tap0: tun_chr_ioctl cmd 1074025673 [ 56.423476][ T2012] tap0: tun_chr_ioctl cmd 1074025677 [ 56.442121][ T2012] tap0: linktype set to 776 [ 56.472484][ T2011] tap0: tun_chr_ioctl cmd 1074025673 [ 56.479207][ T2011] tap0: tun_chr_ioctl cmd 1074025673 [ 56.490466][ T2012] tap0: tun_chr_ioctl cmd 1074025677 [ 56.511926][ T2012] tap0: linktype set to 776 [ 56.517820][ T2011] tap0: tun_chr_ioctl cmd 1074025673 [ 56.558182][ T2011] tap0: tun_chr_ioctl cmd 1074025673 [ 56.594992][ T2012] tap0: tun_chr_ioctl cmd 1074025677 [ 56.638199][ T2012] tap0: linktype set to 776 [ 56.675739][ T2011] tap0: tun_chr_ioctl cmd 1074025673 [ 56.706909][ T2011] tap0: tun_chr_ioctl cmd 1074025673 [ 56.742116][ T2012] tap0: tun_chr_ioctl cmd 1074025677 [ 56.775145][ T2012] tap0: linktype set to 776 [ 56.806282][ T2011] tap0: tun_chr_ioctl cmd 1074025673 [ 56.857348][ T2011] tap0: tun_chr_ioctl cmd 1074025673 [ 56.899455][ T2012] tap0: tun_chr_ioctl cmd 1074025677 [ 56.904644][ T2012] tap0: linktype set to 776 [ 56.921651][ T2011] tap0: tun_chr_ioctl cmd 1074025673 [ 56.937315][ T2011] tap0: tun_chr_ioctl cmd 1074025673 [ 56.942616][ T2012] tap0: tun_chr_ioctl cmd 1074025677 [ 56.952963][ T2028] syz.4.485[2028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.953018][ T2028] syz.4.485[2028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.971780][ T2012] tap0: linktype set to 776 [ 56.992976][ T2028] syz.4.485[2028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.993034][ T2028] syz.4.485[2028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.999101][ T2012] tap0: tun_chr_ioctl cmd 1074025677 [ 57.033609][ T2012] tap0: linktype set to 776 [ 57.043871][ T2011] tap0: tun_chr_ioctl cmd 1074025673 [ 57.059638][ T2011] tap0: tun_chr_ioctl cmd 1074025673 [ 57.071057][ T2012] tap0: tun_chr_ioctl cmd 1074025677 [ 57.076247][ T2012] tap0: linktype set to 776 [ 57.086116][ T2011] tap0: tun_chr_ioctl cmd 1074025673 [ 57.093578][ T2011] tap0: tun_chr_ioctl cmd 1074025673 [ 57.135053][ T2012] tap0: tun_chr_ioctl cmd 1074025677 [ 57.140708][ T2012] tap0: linktype set to 776 [ 57.173681][ T2011] tap0: tun_chr_ioctl cmd 1074025673 [ 57.179435][ T2011] tap0: tun_chr_ioctl cmd 1074025673 [ 57.190909][ T2012] tap0: tun_chr_ioctl cmd 1074025677 [ 57.201173][ T2012] tap0: linktype set to 776 [ 57.405081][ T2034] device wg2 entered promiscuous mode [ 59.562914][ T30] audit: type=1400 audit(1725782287.853:144): avc: denied { create } for pid=2090 comm="syz.0.505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 60.379534][ T2141] device syzkaller0 entered promiscuous mode [ 61.522695][ T2202] device pim6reg1 entered promiscuous mode [ 62.186263][ T30] audit: type=1400 audit(1725782290.473:145): avc: denied { create } for pid=2219 comm="syz.4.541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 63.124342][ T2261] device syzkaller0 entered promiscuous mode [ 63.425703][ T2275] device pim6reg1 entered promiscuous mode [ 63.529913][ T2280] tap0: tun_chr_ioctl cmd 1074025677 [ 63.539121][ T2280] tap0: linktype set to 270 [ 63.552230][ T2285] tap0: tun_chr_ioctl cmd 1074025677 [ 63.557534][ T2285] tap0: linktype set to 270 [ 63.944553][ T30] audit: type=1400 audit(1725782292.233:146): avc: denied { setattr } for pid=2298 comm="syz.0.565" path="/dev/ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 64.029731][ T2300] device pim6reg1 entered promiscuous mode [ 64.232436][ T2310] device pim6reg1 entered promiscuous mode [ 64.355793][ T30] audit: type=1400 audit(1725782292.643:147): avc: denied { create } for pid=2314 comm="syz.1.570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 64.619305][ T2321] : renamed from veth0_vlan [ 65.208929][ T30] audit: type=1400 audit(1725782293.503:148): avc: denied { create } for pid=2346 comm="syz.0.579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 65.255714][ T2352] device pim6reg1 entered promiscuous mode [ 65.555622][ T2368] ¯Êª¸}p: renamed from pim6reg1 [ 65.943054][ T2402] device pim6reg1 entered promiscuous mode [ 66.024719][ T2413] device pim6reg1 entered promiscuous mode [ 67.018683][ T2451] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.025728][ T2451] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.147511][ T2452] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.240197][ T2451] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.247076][ T2451] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.254219][ T2451] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.261080][ T2451] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.296831][ T2451] device bridge0 entered promiscuous mode [ 67.728580][ T2488] device pim6reg1 entered promiscuous mode [ 67.918586][ T2491] device wg2 left promiscuous mode [ 68.062822][ T2500] device wg2 entered promiscuous mode [ 68.201070][ T2504] device syzkaller0 entered promiscuous mode [ 68.251835][ T30] audit: type=1400 audit(1725782296.543:149): avc: denied { ioctl } for pid=2503 comm="syz.1.632" path="socket:[21096]" dev="sockfs" ino=21096 ioctlcmd=0x8943 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 68.387893][ T2531] device pim6reg1 entered promiscuous mode [ 68.589142][ T2550] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.596060][ T2550] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.603292][ T2550] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.610203][ T2550] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.700046][ T2550] device bridge0 entered promiscuous mode [ 68.711860][ T30] audit: type=1400 audit(1725782297.003:150): avc: denied { create } for pid=2560 comm="syz.0.650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 68.735757][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.975870][ T30] audit: type=1400 audit(1725782297.263:151): avc: denied { create } for pid=2569 comm="syz.3.652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 69.061046][ T2579] syz.2.655[2579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.061112][ T2579] syz.2.655[2579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.171039][ T2579] syz.2.655[2579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.237667][ T2579] syz.2.655[2579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.377788][ T2581] device pim6reg1 entered promiscuous mode [ 69.530146][ T2614] syz.2.662[2614] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.530216][ T2614] syz.2.662[2614] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.792077][ T2633] Â: renamed from pim6reg1 [ 70.075793][ T2643] device pim6reg1 entered promiscuous mode [ 70.116380][ T2649] syz.0.673[2649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.116449][ T2649] syz.0.673[2649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.189399][ T2649] syz.0.673[2649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.210699][ T2649] syz.0.673[2649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.366558][ T2668] device veth0_vlan left promiscuous mode [ 70.437919][ T2668] device veth0_vlan entered promiscuous mode [ 70.797181][ T2712] device pim6reg1 entered promiscuous mode [ 71.337391][ T2738] bond_slave_1: mtu less than device minimum [ 71.628130][ T2750] device pim6reg1 entered promiscuous mode [ 71.989797][ T2764] Â: renamed from pim6reg1 [ 72.266927][ T2793] device pim6reg1 entered promiscuous mode [ 72.451460][ T2802] tun0: tun_chr_ioctl cmd 35108 [ 72.610724][ T2818] device lo entered promiscuous mode [ 72.665050][ T2814] device wg2 left promiscuous mode [ 72.771304][ T2833] device pim6reg1 entered promiscuous mode [ 73.162195][ T2855] device macsec0 entered promiscuous mode [ 73.407318][ T2855] Â: renamed from pim6reg1 [ 73.688950][ T2887] device pim6reg1 entered promiscuous mode [ 73.888032][ T2891] device syzkaller0 entered promiscuous mode [ 74.147901][ T2901] bpf_get_probe_write_proto: 20 callbacks suppressed [ 74.147919][ T2901] syz.3.749[2901] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.156450][ T2901] syz.3.749[2901] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.243464][ T2937] syz.4.761[2937] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.254703][ T2937] syz.4.761[2937] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.277733][ T2935] syz.1.762[2935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.293621][ T2935] syz.1.762[2935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.340975][ T2935] syz.1.762[2935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.352244][ T2935] syz.1.762[2935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.372942][ T2935] device pim6reg1 entered promiscuous mode [ 81.119170][ T2992] ÿÿÿÿÿÿ: renamed from vlan1 [ 81.129034][ T2994] syz.1.779[2994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.129096][ T2994] syz.1.779[2994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.242485][ T2994] syz.1.779[2994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.317388][ T2994] syz.1.779[2994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.317981][ T3004] device pim6reg1 entered promiscuous mode [ 82.019353][ T3048] syz.3.795[3048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.019413][ T3048] syz.3.795[3048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.050707][ T3048] device pim6reg1 entered promiscuous mode [ 83.120197][ T3092] device syzkaller0 entered promiscuous mode [ 83.260057][ T3102] syz.0.811[3102] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.260127][ T3102] syz.0.811[3102] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.280971][ T30] audit: type=1400 audit(1725782311.573:152): avc: denied { create } for pid=3103 comm="syz.2.812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 83.811030][ T3138] device sit0 entered promiscuous mode [ 83.823852][ T3142] syz.1.825[3142] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.823911][ T3142] syz.1.825[3142] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.946577][ T3151] device pim6reg1 entered promiscuous mode [ 84.024725][ T3163] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 84.030897][ T3163] pim6reg0: linktype set to 769 [ 84.086670][ T30] audit: type=1400 audit(1725782312.373:153): avc: denied { create } for pid=3174 comm="syz.3.837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 85.994281][ T30] audit: type=1400 audit(1725782314.283:154): avc: denied { append } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 86.977417][ T30] audit: type=1400 audit(1725782314.283:155): avc: denied { open } for pid=82 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 87.002189][ T30] audit: type=1400 audit(1725782314.283:156): avc: denied { getattr } for pid=82 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 87.036766][ T3200] syz.0.842[3200] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.036836][ T3200] syz.0.842[3200] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.474700][ T3240] syz.1.854[3240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.486670][ T3240] syz.1.854[3240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.515877][ T3240] device pim6reg1 entered promiscuous mode [ 88.832821][ T3258] device syzkaller0 entered promiscuous mode [ 88.844148][ T3258] device pim6reg1 entered promiscuous mode [ 88.893136][ T3265] bond_slave_1: mtu less than device minimum [ 89.024945][ T3280] syz.1.867[3280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.025010][ T3280] syz.1.867[3280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.048490][ T3280] device pim6reg1 entered promiscuous mode [ 89.534291][ T3313] bond_slave_1: mtu less than device minimum [ 89.817921][ T3317] sock: sock_set_timeout: `syz.4.879' (pid 3317) tries to set negative timeout [ 90.171621][ T3331] syz.1.884[3331] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.171687][ T3331] syz.1.884[3331] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.272218][ T3331] device pim6reg1 entered promiscuous mode [ 90.410481][ T30] audit: type=1400 audit(1725782318.703:157): avc: denied { create } for pid=3343 comm="syz.3.889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 90.654431][ T3358] device veth0_vlan left promiscuous mode [ 90.675019][ T3358] device veth0_vlan entered promiscuous mode [ 90.690504][ T1954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 90.698648][ T1954] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 90.706046][ T1954] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 90.740623][ T3368] syz.1.898[3368] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.740692][ T3368] syz.1.898[3368] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.758772][ T3368] device pim6reg1 entered promiscuous mode [ 91.162455][ T3420] device pim6reg1 entered promiscuous mode [ 91.684052][ T3449] device syzkaller0 entered promiscuous mode [ 91.853274][ T3454] device syzkaller0 entered promiscuous mode [ 92.338656][ T3477] bpf_get_probe_write_proto: 2 callbacks suppressed [ 92.338673][ T3477] syz.0.928[3477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.345174][ T3477] syz.0.928[3477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.612445][ T3500] device wg2 entered promiscuous mode [ 93.278567][ T3516] syz.0.941[3516] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.278631][ T3516] syz.0.941[3516] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.640673][ T3537] device syzkaller0 entered promiscuous mode [ 94.178942][ T3564] syz.2.957[3564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.179012][ T3564] syz.2.957[3564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.308082][ T3564] device pim6reg1 entered promiscuous mode [ 95.106318][ T3609] device veth1_macvtap entered promiscuous mode [ 95.121485][ T3618] syz.4.974[3618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.121544][ T3618] syz.4.974[3618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.133419][ T3609] device macsec0 entered promiscuous mode [ 95.152425][ T1954] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 95.172262][ T3618] device pim6reg1 entered promiscuous mode [ 95.669198][ T3653] syzkaller0: refused to change device tx_queue_len [ 95.933837][ T3665] device syzkaller0 entered promiscuous mode [ 96.006810][ T3675] syz.4.990[3675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.006882][ T3675] syz.4.990[3675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.055576][ T3675] device pim6reg1 entered promiscuous mode [ 96.146621][ T3686] tap0: tun_chr_ioctl cmd 1074025692 [ 96.173091][ T3691] bridge0: port 3(veth0_macvtap) entered blocking state [ 96.197405][ T3691] bridge0: port 3(veth0_macvtap) entered disabled state [ 96.207986][ T3691] device veth0_macvtap entered promiscuous mode [ 96.214203][ T3691] bridge0: port 3(veth0_macvtap) entered blocking state [ 96.220991][ T3691] bridge0: port 3(veth0_macvtap) entered forwarding state [ 96.653073][ T3713] bridge0: port 3(veth0_to_batadv) entered blocking state [ 96.717784][ T3713] bridge0: port 3(veth0_to_batadv) entered disabled state [ 96.813386][ T3713] device veth0_to_batadv entered promiscuous mode [ 96.826291][ T3713] bridge0: port 3(veth0_to_batadv) entered blocking state [ 96.833787][ T3713] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 96.913203][ T3718] device veth0_to_batadv left promiscuous mode [ 96.957771][ T3718] bridge0: port 3(veth0_to_batadv) entered disabled state [ 97.309462][ T3748] device pim6reg1 entered promiscuous mode [ 97.389755][ T3756] geneve1: tun_chr_ioctl cmd 1074025681 [ 98.507815][ T3799] bpf_get_probe_write_proto: 2 callbacks suppressed [ 98.507834][ T3799] syz.4.1024[3799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.521012][ T3799] syz.4.1024[3799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.747522][ T3800] device pim6reg1 entered promiscuous mode [ 99.588298][ T3839] syz.1.1036[3839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.588371][ T3839] syz.1.1036[3839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.680205][ T3839] device pim6reg1 entered promiscuous mode [ 100.595433][ T3879] syz.0.1049[3879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.595508][ T3879] syz.0.1049[3879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.284502][ T287] syz-executor (287) used greatest stack depth: 20912 bytes left [ 113.338263][ T290] syz-executor (290) used greatest stack depth: 20880 bytes left [ 113.373521][ T289] syz-executor (289) used greatest stack depth: 20704 bytes left [ 113.392556][ T3911] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.401397][ T3911] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.408688][ T3911] device bridge_slave_0 entered promiscuous mode [ 113.423682][ T3911] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.430727][ T3911] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.438039][ T3911] device bridge_slave_1 entered promiscuous mode [ 113.474739][ T3914] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.481723][ T3914] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.489019][ T3914] device bridge_slave_0 entered promiscuous mode [ 113.502524][ T3914] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.509398][ T3914] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.516565][ T3914] device bridge_slave_1 entered promiscuous mode [ 113.554318][ T3910] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.561195][ T3910] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.568518][ T3910] device bridge_slave_0 entered promiscuous mode [ 113.575310][ T3910] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.582182][ T3910] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.589440][ T3910] device bridge_slave_1 entered promiscuous mode [ 113.595859][ T3912] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.602842][ T3912] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.610077][ T3912] device bridge_slave_0 entered promiscuous mode [ 113.625403][ T3912] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.632256][ T3912] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.639651][ T3912] device bridge_slave_1 entered promiscuous mode [ 113.685779][ T3913] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.692672][ T3913] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.699959][ T3913] device bridge_slave_0 entered promiscuous mode [ 113.719320][ T3913] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.726330][ T3913] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.733970][ T3913] device bridge_slave_1 entered promiscuous mode [ 113.871753][ T3914] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.878708][ T3914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.885788][ T3914] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.892602][ T3914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.909500][ T3911] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.916443][ T3911] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.923767][ T3911] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.930635][ T3911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.963646][ T3912] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.970512][ T3912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.977635][ T3912] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.984381][ T3912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.016207][ T3910] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.023085][ T3910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.030197][ T3910] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.036953][ T3910] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.074748][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 114.082254][ T1957] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.089467][ T1957] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.097412][ T1957] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.104453][ T1957] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.111706][ T1957] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.118966][ T1957] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.126001][ T1957] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.133072][ T1957] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.148126][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 114.156729][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.164710][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.171552][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.178727][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.186688][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.193526][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.253296][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 114.282918][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.291253][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.298110][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.305476][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.313600][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.320444][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.327591][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 114.335308][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 114.343096][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 114.350927][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 114.358726][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 114.366495][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 114.381741][ T3914] device veth0_vlan entered promiscuous mode [ 114.389769][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 114.396987][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 114.404456][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 114.412777][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.421987][ T1955] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.428817][ T1955] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.435962][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 114.443629][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 114.451392][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 114.459488][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.467443][ T1955] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.474282][ T1955] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.481482][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 114.488717][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 114.496306][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 114.503584][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 114.519756][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 114.527835][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.535748][ T1957] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.542600][ T1957] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.549987][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 114.558091][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.565996][ T1957] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.573002][ T1957] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.573977][ T30] audit: type=1400 audit(1725782342.863:158): avc: denied { remove_name } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 114.586868][ T3914] device veth1_macvtap entered promiscuous mode [ 114.608478][ T30] audit: type=1400 audit(1725782342.863:159): avc: denied { rename } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 114.631788][ T30] audit: type=1400 audit(1725782342.863:160): avc: denied { create } for pid=82 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 114.658110][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 114.666133][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 114.674219][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 114.682962][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 114.690872][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 114.698540][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 114.706585][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 114.714722][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 114.721992][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 114.729419][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 114.737549][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.745438][ T1955] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.752209][ T1955] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.759356][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 114.767536][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.775452][ T1955] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.782306][ T1955] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.789470][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 114.797324][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 114.805021][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 114.812962][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 114.838296][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 114.845699][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 114.853996][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 114.862878][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 114.870924][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 114.878988][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 114.886583][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 114.894569][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 114.902775][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 114.911045][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 114.918950][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 114.926207][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 114.939304][ T3911] device veth0_vlan entered promiscuous mode [ 114.965284][ T3912] device veth0_vlan entered promiscuous mode [ 114.971852][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 114.980658][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 114.988402][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 114.996132][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 115.004116][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 115.011425][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 115.024099][ T30] audit: type=1400 audit(1725782343.313:161): avc: denied { mounton } for pid=3914 comm="syz-executor" path="/root/syzkaller.F3aI9U/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 115.075702][ T30] audit: type=1400 audit(1725782343.313:162): avc: denied { mount } for pid=3914 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 115.101370][ T30] audit: type=1400 audit(1725782343.313:163): avc: denied { mounton } for pid=3914 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 115.106524][ T3910] device veth0_vlan entered promiscuous mode [ 115.136403][ T3911] device veth1_macvtap entered promiscuous mode [ 115.149147][ T1958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 115.156896][ T1958] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 115.164799][ T1958] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 115.172163][ T1958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 115.180270][ T1958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 115.188233][ T1958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 115.196086][ T1958] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 115.219579][ T1958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 115.231257][ T3910] device veth1_macvtap entered promiscuous mode [ 115.243864][ T3912] device veth1_macvtap entered promiscuous mode [ 115.254437][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 115.265058][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 115.273279][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 115.281563][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 115.289779][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 115.302086][ T3913] device veth0_vlan entered promiscuous mode [ 115.312206][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 115.320045][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 115.328094][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 115.336142][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 115.344842][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 115.352283][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 115.366858][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 115.382641][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 115.419723][ T3913] device veth1_macvtap entered promiscuous mode [ 115.428837][ T653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 115.437604][ T653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 115.445614][ T653] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 115.467280][ T1958] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 115.475473][ T1958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 115.494442][ T1958] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 115.504478][ T1958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 115.556881][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 115.570100][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 115.587488][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 115.608414][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 115.631645][ T3953] syz.3.1061[3953] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.631707][ T3953] syz.3.1061[3953] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.659067][ T3948] device pim6reg1 entered promiscuous mode [ 115.742582][ T3953] device pim6reg1 entered promiscuous mode [ 116.000422][ T3995] device syzkaller0 entered promiscuous mode [ 116.488012][ T318] device bridge_slave_1 left promiscuous mode [ 116.493976][ T318] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.547934][ T318] device bridge_slave_0 left promiscuous mode [ 116.553912][ T318] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.613545][ T318] device bridge_slave_1 left promiscuous mode [ 116.621991][ T318] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.637444][ T318] device bridge_slave_0 left promiscuous mode [ 116.647630][ T318] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.696862][ T318] device bridge_slave_1 left promiscuous mode [ 116.702863][ T318] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.727927][ T318] device bridge_slave_0 left promiscuous mode [ 116.738944][ T318] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.747924][ T318] device veth0_macvtap left promiscuous mode [ 116.754546][ T318] bridge0: port 3(veth0_macvtap) entered disabled state [ 116.763387][ T318] device bridge_slave_1 left promiscuous mode [ 116.778064][ T318] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.788180][ T318] device bridge_slave_0 left promiscuous mode [ 116.794248][ T318] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.803132][ T318] device bridge_slave_1 left promiscuous mode [ 116.809234][ T318] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.816569][ T318] device bridge_slave_0 left promiscuous mode [ 116.822641][ T318] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.832467][ T318] device veth1_macvtap left promiscuous mode [ 116.838845][ T318] device veth0_vlan left promiscuous mode [ 116.844821][ T318] device veth1_macvtap left promiscuous mode [ 116.851330][ T318] device veth1_macvtap left promiscuous mode [ 116.858656][ T318] device veth0_vlan left promiscuous mode [ 118.649952][ T4045] device syzkaller0 entered promiscuous mode [ 118.874367][ T4053] device pim6reg1 entered promiscuous mode [ 119.468715][ T4083] device pim6reg1 entered promiscuous mode [ 121.140735][ T4170] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.241194][ T4341] device syzkaller0 entered promiscuous mode [ 123.834097][ T4389] device veth0_vlan left promiscuous mode [ 123.856686][ T4389] device veth0_vlan entered promiscuous mode [ 124.097698][ T4410] device veth0_vlan left promiscuous mode [ 124.108649][ T4410] device veth0_vlan entered promiscuous mode [ 124.570447][ T4430] syz.2.1195[4430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.570512][ T4430] syz.2.1195[4430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.302661][ T4499] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.320993][ T4499] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.328226][ T4499] device bridge_slave_0 entered promiscuous mode [ 154.353403][ T4499] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.360332][ T4499] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.367587][ T4499] device bridge_slave_1 entered promiscuous mode [ 154.420216][ T4498] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.427063][ T4498] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.434422][ T4498] device bridge_slave_0 entered promiscuous mode [ 154.442865][ T4498] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.449854][ T4498] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.457028][ T4498] device bridge_slave_1 entered promiscuous mode [ 154.469595][ T4496] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.476435][ T4496] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.483723][ T4496] device bridge_slave_0 entered promiscuous mode [ 154.505311][ T4496] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.512180][ T4496] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.519583][ T4496] device bridge_slave_1 entered promiscuous mode [ 154.548314][ T4497] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.555169][ T4497] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.562528][ T4497] device bridge_slave_0 entered promiscuous mode [ 154.584141][ T4497] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.591007][ T4497] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.598273][ T4497] device bridge_slave_1 entered promiscuous mode [ 154.656909][ T4500] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.663805][ T4500] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.671195][ T4500] device bridge_slave_0 entered promiscuous mode [ 154.692652][ T4500] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.699564][ T4500] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.706708][ T4500] device bridge_slave_1 entered promiscuous mode [ 154.841884][ T4499] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.848754][ T4499] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.855848][ T4499] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.862655][ T4499] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.870804][ T415] device bridge_slave_1 left promiscuous mode [ 154.876722][ T415] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.884212][ T415] device bridge_slave_0 left promiscuous mode [ 154.890353][ T415] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.898126][ T415] device veth1_macvtap left promiscuous mode [ 154.903961][ T415] device veth0_vlan left promiscuous mode [ 155.034803][ T4498] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.041667][ T4498] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.048783][ T4498] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.055542][ T4498] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.079589][ T4496] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.086445][ T4496] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.093606][ T4496] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.100455][ T4496] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.114241][ T4497] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.121130][ T4497] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.128212][ T4497] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.134974][ T4497] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.171452][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 155.178967][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.186016][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.193392][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.200541][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.208330][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.215630][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.222955][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.230096][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.250843][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 155.258972][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.266893][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.273744][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.280913][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.289109][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.297049][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.303894][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.337000][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 155.344534][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 155.352610][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 155.361077][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.369057][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.375888][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.383110][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 155.390466][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 155.397738][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 155.405860][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.413845][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.420684][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.437697][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.445889][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.454381][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.461240][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.488772][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.496814][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.505081][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.511926][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.519271][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 155.526428][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 155.533685][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 155.541472][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.549245][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 155.557016][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.564922][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.578344][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 155.586447][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.595112][ T1953] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.601960][ T1953] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.609111][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.617149][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.625119][ T1953] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.631961][ T1953] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.639111][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 155.646938][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.668968][ T1952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 155.676207][ T1952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 155.683782][ T1952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.691644][ T1952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 155.699563][ T1952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.707375][ T1952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 155.715874][ T1952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.723911][ T1952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.744094][ T4498] device veth0_vlan entered promiscuous mode [ 155.755287][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.763434][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.770675][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.778708][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 155.786833][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.794931][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.801824][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.808979][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.817054][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.825055][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.831897][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.839137][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 155.847298][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 155.855382][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 155.863612][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 155.871735][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 155.885004][ T4499] device veth0_vlan entered promiscuous mode [ 155.909479][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 155.917294][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.925788][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.933862][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.951092][ T1952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 155.959305][ T1952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.967010][ T1952] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.974287][ T1952] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.981681][ T1952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.989753][ T1952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 156.009134][ T4497] device veth0_vlan entered promiscuous mode [ 156.016733][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 156.024955][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.032817][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.042059][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 156.049453][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 156.062370][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.070423][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.077712][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 156.086542][ T4496] device veth0_vlan entered promiscuous mode [ 156.093226][ T4500] device veth0_vlan entered promiscuous mode [ 156.102661][ T4498] device veth1_macvtap entered promiscuous mode [ 156.110001][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 156.133957][ T4499] device veth1_macvtap entered promiscuous mode [ 156.142394][ T653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 156.150685][ T653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 156.160053][ T4497] device veth1_macvtap entered promiscuous mode [ 156.176635][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 156.184801][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 156.196069][ T4496] device veth1_macvtap entered promiscuous mode [ 156.215192][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 156.223446][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 156.231612][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 156.239024][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 156.247098][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 156.255269][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 156.263275][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 156.294046][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 156.302100][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 156.310493][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 156.318567][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 156.326628][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 156.334836][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 156.343063][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 156.351254][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 156.359384][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 156.367420][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 156.375469][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 156.383488][ T1953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 156.399656][ T4500] device veth1_macvtap entered promiscuous mode [ 156.466758][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 156.477579][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 156.495939][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 156.515016][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 156.538744][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 156.563091][ T4529] ref_ctr_offset mismatch. inode: 0x1d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 157.125059][ T415] device bridge_slave_1 left promiscuous mode [ 157.164313][ T415] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.215319][ T415] device bridge_slave_0 left promiscuous mode [ 157.318309][ T415] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.410050][ T415] device bridge_slave_1 left promiscuous mode [ 157.416025][ T415] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.477401][ T415] device bridge_slave_0 left promiscuous mode [ 157.491762][ T415] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.505771][ T415] device bridge_slave_1 left promiscuous mode [ 157.515019][ T415] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.527438][ T415] device bridge_slave_0 left promiscuous mode [ 157.536671][ T415] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.550147][ T415] device bridge_slave_1 left promiscuous mode [ 157.559380][ T415] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.572012][ T415] device bridge_slave_0 left promiscuous mode [ 157.580190][ T415] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.594956][ T415] device veth1_macvtap left promiscuous mode [ 157.603058][ T415] device veth0_vlan left promiscuous mode [ 157.613108][ T415] device veth1_macvtap left promiscuous mode [ 157.621073][ T415] device veth0_vlan left promiscuous mode [ 157.631244][ T415] device veth1_macvtap left promiscuous mode [ 157.640501][ T415] device veth0_vlan left promiscuous mode [ 157.649630][ T415] device veth1_macvtap left promiscuous mode [ 157.658810][ T415] device veth0_vlan left promiscuous mode [ 158.605586][ T4574] syz.4.1222[4574] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.605662][ T4574] syz.4.1222[4574] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.926586][ T4572] device pim6reg1 entered promiscuous mode [ 159.576397][ T4586] device veth1_macvtap left promiscuous mode [ 159.591479][ T4586] device macsec0 entered promiscuous mode [ 159.611461][ T4583] device wg2 entered promiscuous mode [ 159.826948][ T4596] bridge0: port 3(veth0_to_batadv) entered blocking state [ 159.893067][ T4596] bridge0: port 3(veth0_to_batadv) entered disabled state [ 159.958678][ T4596] device veth0_to_batadv entered promiscuous mode [ 159.983781][ T4596] bridge0: port 3(veth0_to_batadv) entered blocking state [ 159.991141][ T4596] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 160.006080][ T4592] device veth0_vlan left promiscuous mode [ 160.028689][ T4592] device veth0_vlan entered promiscuous mode [ 160.202926][ T4617] syz.2.1236[4617] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.203004][ T4617] syz.2.1236[4617] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.377801][ T4615] device pim6reg1 entered promiscuous mode [ 161.042314][ T4629] device veth1_macvtap left promiscuous mode [ 161.057443][ T4629] device macsec0 entered promiscuous mode [ 161.275164][ T4631] device wg2 entered promiscuous mode [ 161.963224][ T4655] bridge0: port 3(veth0_to_batadv) entered blocking state [ 161.970738][ T4655] bridge0: port 3(veth0_to_batadv) entered disabled state [ 162.027315][ T4655] device veth0_to_batadv entered promiscuous mode [ 162.035625][ T4655] bridge0: port 3(veth0_to_batadv) entered blocking state [ 162.043218][ T4655] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 162.252189][ T4670] syz.4.1251[4670] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.252263][ T4670] syz.4.1251[4670] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.361065][ T4670] device pim6reg1 entered promiscuous mode [ 163.071062][ T4694] device veth0_vlan left promiscuous mode [ 163.142554][ T4694] device veth0_vlan entered promiscuous mode [ 163.744814][ T4707] device veth0_vlan left promiscuous mode [ 163.751687][ T4707] device veth0_vlan entered promiscuous mode [ 175.194461][ T4742] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.201357][ T4742] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.208577][ T4742] device bridge_slave_0 entered promiscuous mode [ 175.216634][ T4742] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.223554][ T4742] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.230871][ T4742] device bridge_slave_1 entered promiscuous mode [ 175.261355][ T4743] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.268236][ T4743] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.275390][ T4743] device bridge_slave_0 entered promiscuous mode [ 175.282298][ T4743] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.289169][ T4743] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.296367][ T4743] device bridge_slave_1 entered promiscuous mode [ 175.311406][ T4745] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.318558][ T4745] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.325842][ T4745] device bridge_slave_0 entered promiscuous mode [ 175.344174][ T4745] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.351033][ T4745] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.358292][ T4745] device bridge_slave_1 entered promiscuous mode [ 175.398931][ T4746] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.405775][ T4746] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.413132][ T4746] device bridge_slave_0 entered promiscuous mode [ 175.432790][ T4746] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.439663][ T4746] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.446789][ T4746] device bridge_slave_1 entered promiscuous mode [ 175.535649][ T4744] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.542653][ T4744] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.549971][ T4744] device bridge_slave_0 entered promiscuous mode [ 175.574750][ T4744] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.581609][ T4744] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.588971][ T4744] device bridge_slave_1 entered promiscuous mode [ 175.620050][ T8] device veth0_to_batadv left promiscuous mode [ 175.626094][ T8] bridge0: port 3(veth0_to_batadv) entered disabled state [ 175.634105][ T8] device bridge_slave_1 left promiscuous mode [ 175.640254][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.647599][ T8] device bridge_slave_0 left promiscuous mode [ 175.653545][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.661377][ T8] device veth1_macvtap left promiscuous mode [ 175.667225][ T8] device veth0_vlan left promiscuous mode [ 175.826053][ T4742] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.832918][ T4742] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.840040][ T4742] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.846782][ T4742] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.861329][ T4745] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.868191][ T4745] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.875289][ T4745] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.882080][ T4745] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.914555][ T4746] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.921410][ T4746] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.928670][ T4746] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.935411][ T4746] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.946036][ T4743] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.952879][ T4743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.960093][ T4743] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.966936][ T4743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.034261][ T1955] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.042525][ T1955] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.049587][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.057122][ T1955] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.064640][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.072705][ T1955] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.080019][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.088392][ T1955] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.095366][ T1955] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.109465][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 176.116621][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.123910][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 176.131994][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.140116][ T1956] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.146939][ T1956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.154286][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 176.162097][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.177274][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 176.184507][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.192442][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 176.200597][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.208517][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.215335][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.222576][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 176.230665][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.238651][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.245567][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.262015][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 176.269876][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.277690][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 176.285741][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.293795][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.300641][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.308210][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 176.316174][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.336304][ T4745] device veth0_vlan entered promiscuous mode [ 176.352482][ T1958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 176.361150][ T1958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.369788][ T1958] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.376961][ T1958] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.399615][ T4745] device veth1_macvtap entered promiscuous mode [ 176.408180][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 176.416225][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.424218][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 176.432205][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.439989][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 176.447918][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.455611][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 176.462949][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.470153][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 176.478336][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.486259][ T1956] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.493100][ T1956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.500344][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 176.508970][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.516885][ T1956] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.523726][ T1956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.549346][ T1958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 176.557921][ T1958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 176.565109][ T1958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.572556][ T1958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 176.580855][ T1958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.588900][ T1958] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.596092][ T1958] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.603427][ T1958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 176.611543][ T1958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.619542][ T1958] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.626366][ T1958] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.646626][ T4742] device veth0_vlan entered promiscuous mode [ 176.672465][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.680312][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.689501][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.696838][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 176.704340][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 176.712450][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 176.720605][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.728337][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.736007][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 176.743740][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.751470][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 176.759516][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 176.767789][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.775022][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.783655][ T4746] device veth0_vlan entered promiscuous mode [ 176.798535][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 176.806656][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 176.826306][ T4746] device veth1_macvtap entered promiscuous mode [ 176.838558][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 176.846731][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 176.854982][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.862815][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.870612][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.877876][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 176.885640][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.893417][ T1956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.901337][ T4744] device veth0_vlan entered promiscuous mode [ 176.912682][ T4742] device veth1_macvtap entered promiscuous mode [ 176.934541][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 176.942778][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 176.951177][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 176.960916][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 176.976586][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 177.002295][ T4744] device veth1_macvtap entered promiscuous mode [ 177.013772][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 177.022296][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 177.030527][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 177.038989][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 177.047077][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 177.076923][ T4743] device veth0_vlan entered promiscuous mode [ 177.089033][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 177.117380][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 177.125428][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 177.132864][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 177.188562][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 177.196637][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 177.316491][ T1952] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 177.324786][ T1952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 177.340668][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 177.350004][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 177.412060][ T4743] device veth1_macvtap entered promiscuous mode [ 177.554571][ T4781] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 177.564142][ T4781] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 177.572735][ T4781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 177.580910][ T4781] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 177.588941][ T4781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 177.632885][ T4785] device wg2 entered promiscuous mode [ 177.796368][ T4798] device pim6reg1 entered promiscuous mode [ 177.905102][ T4806] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.186134][ T8] device bridge_slave_1 left promiscuous mode [ 179.193150][ T4843] syz.0.1293[4843] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.193222][ T4843] syz.0.1293[4843] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.214359][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.235169][ T4843] syz.0.1293[4843] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.235239][ T4843] syz.0.1293[4843] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.247337][ T8] device bridge_slave_0 left promiscuous mode [ 179.264450][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.272616][ T8] device veth0_to_batadv left promiscuous mode [ 179.283053][ T8] bridge0: port 3(veth0_to_batadv) entered disabled state [ 179.294806][ T8] device bridge_slave_1 left promiscuous mode [ 179.300870][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.308503][ T8] device bridge_slave_0 left promiscuous mode [ 179.315064][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.323487][ T8] device bridge_slave_1 left promiscuous mode [ 179.329613][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.336958][ T8] device bridge_slave_0 left promiscuous mode [ 179.343211][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.351100][ T8] device bridge_slave_1 left promiscuous mode [ 179.357059][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.364460][ T8] device bridge_slave_0 left promiscuous mode [ 179.370879][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.379831][ T8] device veth0_vlan left promiscuous mode [ 179.385719][ T8] device veth1_macvtap left promiscuous mode [ 179.391730][ T8] device veth0_vlan left promiscuous mode [ 179.397609][ T8] device veth1_macvtap left promiscuous mode [ 179.403424][ T8] device veth0_vlan left promiscuous mode [ 179.409499][ T8] device veth0_vlan left promiscuous mode [ 179.705068][ T4828] device veth0_vlan left promiscuous mode [ 179.725527][ T4828] device veth0_vlan entered promiscuous mode [ 180.937655][ T4920] device veth0_vlan left promiscuous mode [ 181.000321][ T4920] device veth0_vlan entered promiscuous mode [ 181.096105][ T4929] syz.1.1319[4929] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.096187][ T4929] syz.1.1319[4929] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.536215][ T4976] syz.2.1336[4976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.569825][ T4976] syz.2.1336[4976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.667235][ T4981] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.688224][ T4981] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.381098][ T5021] syz.3.1344 (5021) used obsolete PPPIOCDETACH ioctl [ 183.058356][ T5060] device syzkaller0 entered promiscuous mode [ 183.509367][ T5079] device pim6reg1 entered promiscuous mode [ 183.565847][ T5081] device pim6reg1 entered promiscuous mode [ 184.255862][ T5129] syz.0.1382[5129] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.255931][ T5129] syz.0.1382[5129] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.075649][ T5169] syz.0.1396[5169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.127957][ T5175] FAULT_INJECTION: forcing a failure. [ 185.127957][ T5175] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 185.175654][ T5178] device veth1_macvtap left promiscuous mode [ 185.186400][ T5169] syz.0.1396[5169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.327251][ T5175] CPU: 1 PID: 5175 Comm: syz.0.1396 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 185.349490][ T5175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 185.359390][ T5175] Call Trace: [ 185.362504][ T5175] [ 185.365296][ T5175] dump_stack_lvl+0x151/0x1c0 [ 185.369797][ T5175] ? io_uring_drop_tctx_refs+0x190/0x190 [ 185.375264][ T5175] ? __kasan_check_write+0x14/0x20 [ 185.380211][ T5175] dump_stack+0x15/0x20 [ 185.384202][ T5175] should_fail+0x3c6/0x510 [ 185.388457][ T5175] should_fail_usercopy+0x1a/0x20 [ 185.393316][ T5175] _copy_from_user+0x20/0xd0 [ 185.397743][ T5175] sock_do_ioctl+0x229/0x5a0 [ 185.402170][ T5175] ? sock_show_fdinfo+0xa0/0xa0 [ 185.406860][ T5175] ? selinux_file_ioctl+0x3cc/0x540 [ 185.411890][ T5175] sock_ioctl+0x455/0x740 [ 185.416057][ T5175] ? sock_poll+0x400/0x400 [ 185.420309][ T5175] ? __fget_files+0x31e/0x380 [ 185.424823][ T5175] ? security_file_ioctl+0x84/0xb0 [ 185.429767][ T5175] ? sock_poll+0x400/0x400 [ 185.434019][ T5175] __se_sys_ioctl+0x114/0x190 [ 185.438534][ T5175] __x64_sys_ioctl+0x7b/0x90 [ 185.442959][ T5175] x64_sys_call+0x98/0x9a0 [ 185.447211][ T5175] do_syscall_64+0x3b/0xb0 [ 185.451471][ T5175] ? clear_bhb_loop+0x35/0x90 [ 185.455987][ T5175] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 185.461714][ T5175] RIP: 0033:0x7f7680afaef9 [ 185.465964][ T5175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 185.485399][ T5175] RSP: 002b:00007f767f754038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 185.493646][ T5175] RAX: ffffffffffffffda RBX: 00007f7680cb4058 RCX: 00007f7680afaef9 [ 185.501470][ T5175] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 000000000000000a [ 185.509269][ T5175] RBP: 00007f767f754090 R08: 0000000000000000 R09: 0000000000000000 [ 185.517086][ T5175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 185.524891][ T5175] R13: 0000000000000000 R14: 00007f7680cb4058 R15: 00007ffe3a3944d8 [ 185.532710][ T5175] [ 185.785547][ T5210] syz.1.1406[5210] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.785630][ T5210] syz.1.1406[5210] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.898951][ T5210] device pim6reg1 entered promiscuous mode [ 186.188481][ T5243] syz.3.1415[5243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.188553][ T5243] syz.3.1415[5243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.257695][ T5238] syz.3.1415[5238] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.257756][ T5252] syz.3.1415[5252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.389243][ T5254] ÿÿÿÿÿÿ: renamed from vlan1 [ 186.684039][ T5274] device wg2 entered promiscuous mode [ 187.112051][ T5282] device syzkaller0 entered promiscuous mode [ 189.888416][ T5449] device pim6reg1 entered promiscuous mode [ 190.526990][ T5466] device wg2 entered promiscuous mode [ 191.644663][ T5542] device pim6reg1 entered promiscuous mode [ 192.231892][ T5569] device syzkaller0 entered promiscuous mode [ 192.363729][ T5581] device pim6reg1 entered promiscuous mode [ 193.493544][ T5647] device pim6reg1 entered promiscuous mode [ 194.081357][ T5663] device lo entered promiscuous mode [ 194.414246][ T5671] device veth0_vlan left promiscuous mode [ 194.456358][ T5671] device veth0_vlan entered promiscuous mode [ 194.547553][ T819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 194.555739][ T819] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 194.599589][ T819] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 195.898644][ T30] audit: type=1400 audit(1725782424.183:164): avc: denied { create } for pid=5778 comm="syz.1.1578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 195.944591][ T5791] bpf_get_probe_write_proto: 14 callbacks suppressed [ 195.944610][ T5791] syz.0.1584[5791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.957693][ T5791] syz.0.1584[5791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.983159][ T5791] syz.0.1584[5791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.995035][ T5791] syz.0.1584[5791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.092690][ T5791] syz.0.1584[5791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.104213][ T5791] syz.0.1584[5791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.191121][ T5827] device wg2 left promiscuous mode [ 196.214791][ T5837] device wg2 entered promiscuous mode [ 196.223140][ T5836] bond_slave_1: mtu less than device minimum [ 196.331712][ T5849] syz.2.1601[5849] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.331773][ T5849] syz.2.1601[5849] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.365727][ T5849] device pim6reg1 entered promiscuous mode [ 196.456731][ T5865] device syzkaller0 entered promiscuous mode [ 196.748063][ T5887] device syzkaller0 entered promiscuous mode [ 196.930837][ T5928] syz.3.1624[5928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.930898][ T5928] syz.3.1624[5928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.957449][ T5928] device pim6reg1 entered promiscuous mode [ 197.132292][ T5933] device sit0 entered promiscuous mode [ 198.021107][ T5981] device syzkaller0 entered promiscuous mode [ 198.130752][ T30] audit: type=1400 audit(1725782426.423:165): avc: denied { create } for pid=5997 comm="syz.1.1644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 198.131994][ T5978] device pim6reg1 entered promiscuous mode [ 198.239302][ T5994] device syzkaller0 entered promiscuous mode [ 198.411965][ T6042] device syzkaller0 entered promiscuous mode [ 198.504591][ T6041] device veth1_macvtap left promiscuous mode [ 199.301732][ T6093] device veth1_macvtap left promiscuous mode [ 199.473809][ T6093] device veth1_macvtap entered promiscuous mode [ 199.481708][ T6093] device macsec0 entered promiscuous mode [ 199.557223][ T30] audit: type=1400 audit(1725782427.843:166): avc: denied { attach_queue } for pid=6103 comm="syz.1.1676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 199.577851][ T6106] device veth0_vlan left promiscuous mode [ 199.625334][ T6106] device veth0_vlan entered promiscuous mode [ 199.699225][ T819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 199.713196][ T819] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 199.722258][ T819] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 199.810031][ T6112] device pim6reg1 entered promiscuous mode [ 200.385489][ T6156] syzkaller0: create flow: hash 1084832932 index 3 [ 200.541454][ T1922] syzkaller0 selects TX queue 3, but real number of TX queues is 3 [ 200.549205][ T1922] syzkaller0: tun_net_xmit 76 [ 200.567295][ T1922] syzkaller0 selects TX queue 3, but real number of TX queues is 3 [ 200.575022][ T1922] syzkaller0: tun_net_xmit 48 [ 200.583336][ T1922] syzkaller0 selects TX queue 3, but real number of TX queues is 3 [ 200.591074][ T1922] syzkaller0: tun_net_xmit 76 [ 200.597635][ T6148] syzkaller0: delete flow: hash 1084832932 index 3 [ 200.649994][ T6176] device pim6reg1 entered promiscuous mode [ 201.030850][ T6193] device veth1_macvtap entered promiscuous mode [ 201.037741][ T6193] device macsec0 entered promiscuous mode [ 201.075663][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 201.520838][ T6214] device syzkaller0 entered promiscuous mode [ 201.569696][ T6216] device veth0_vlan left promiscuous mode [ 201.639518][ T6216] device veth0_vlan entered promiscuous mode [ 201.819187][ T6227] bpf_get_probe_write_proto: 6 callbacks suppressed [ 201.819205][ T6227] syz.4.1712[6227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.836244][ T6227] syz.4.1712[6227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.872941][ T6237] device pim6reg1 entered promiscuous mode [ 202.394553][ T6289] tap0: tun_chr_ioctl cmd 2148553947 [ 202.402272][ T6287] device pim6reg1 entered promiscuous mode [ 205.131298][ T6317] bridge0: port 3(veth0_to_batadv) entered blocking state [ 205.138450][ T6317] bridge0: port 3(veth0_to_batadv) entered disabled state [ 205.178965][ T6317] device veth0_to_batadv entered promiscuous mode [ 205.187023][ T6317] bridge0: port 3(veth0_to_batadv) entered blocking state [ 205.194303][ T6317] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 205.209009][ T6332] device pim6reg1 entered promiscuous mode [ 205.228646][ T6328] bridge0: port 3(veth0_to_batadv) entered blocking state [ 205.235957][ T6328] bridge0: port 3(veth0_to_batadv) entered disabled state [ 205.253158][ T6328] device veth0_to_batadv entered promiscuous mode [ 205.271331][ T6328] bridge0: port 3(veth0_to_batadv) entered blocking state [ 205.278782][ T6328] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 206.115469][ T6369] device syzkaller0 entered promiscuous mode [ 206.229256][ T6377] syz.0.1761[6377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.229336][ T6377] syz.0.1761[6377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.689505][ T6416] device syzkaller0 entered promiscuous mode [ 206.786913][ T6431] device pim6reg1 entered promiscuous mode [ 207.042959][ T6458] bridge0: port 3(veth0_to_batadv) entered disabled state [ 207.050890][ T6458] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.060458][ T6458] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.603809][ T6469] device veth0_to_batadv left promiscuous mode [ 207.610062][ T6469] bridge0: port 3(veth0_to_batadv) entered disabled state [ 207.618159][ T6469] device bridge_slave_1 left promiscuous mode [ 207.624202][ T6469] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.631684][ T6469] device bridge_slave_0 left promiscuous mode [ 207.637722][ T6469] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.999989][ T6498] device pim6reg1 entered promiscuous mode [ 208.180478][ T6524] device syzkaller0 entered promiscuous mode [ 208.299270][ T6543] device sit0 entered promiscuous mode [ 208.349197][ T6546] syz.4.1808[6546] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.349266][ T6546] syz.4.1808[6546] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.498487][ T6546] device pim6reg1 entered promiscuous mode [ 208.934849][ T6560] device pim6reg1 entered promiscuous mode [ 213.671651][ T6639] device veth1_macvtap left promiscuous mode [ 213.682736][ T6639] device macsec0 left promiscuous mode [ 213.734697][ T6646] device veth1_macvtap left promiscuous mode [ 213.766321][ T6646] device macsec0 left promiscuous mode [ 213.825695][ T6646] device veth1_macvtap entered promiscuous mode [ 213.847572][ T6646] device macsec0 entered promiscuous mode [ 214.044117][ T6674] device veth1_macvtap left promiscuous mode [ 214.227530][ T6685] device veth0_vlan left promiscuous mode [ 214.254178][ T6685] device veth0_vlan entered promiscuous mode [ 214.333520][ T6691] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.340665][ T6691] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.399967][ T6691] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.406869][ T6691] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.413989][ T6691] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.420755][ T6691] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.437750][ T6691] device bridge0 entered promiscuous mode [ 317.507205][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 317.513634][ C0] rcu: 0-...!: (10003 ticks this GP) idle=58d/1/0x4000000000000000 softirq=41061/41084 fqs=0 last_accelerate: de06/068b dyntick_enabled: 1 [ 317.527693][ C0] (t=10002 jiffies g=31749 q=252) [ 317.532630][ C0] rcu: rcu_preempt kthread timer wakeup didn't happen for 10001 jiffies! g31749 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 [ 317.544780][ C0] rcu: Possible timer handling issue on cpu=1 timer-softirq=8376 [ 317.552417][ C0] rcu: rcu_preempt kthread starved for 10004 jiffies! g31749 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=1 [ 317.563614][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 317.573422][ C0] rcu: RCU grace-period kthread stack dump: [ 317.579152][ C0] task:rcu_preempt state:I stack:28288 pid: 14 ppid: 2 flags:0x00004000 [ 317.588263][ C0] Call Trace: [ 317.591389][ C0] [ 317.594170][ C0] __schedule+0xccc/0x1590 [ 317.598422][ C0] ? release_firmware_map_entry+0x190/0x190 [ 317.604147][ C0] ? __kasan_check_write+0x14/0x20 [ 317.609093][ C0] ? __kasan_check_write+0x14/0x20 [ 317.614045][ C0] schedule+0x11f/0x1e0 [ 317.618037][ C0] schedule_timeout+0x18c/0x370 [ 317.622730][ C0] ? console_conditional_schedule+0x30/0x30 [ 317.628455][ C0] ? update_process_times+0x200/0x200 [ 317.633660][ C0] ? prepare_to_swait_event+0x308/0x320 [ 317.639042][ C0] rcu_gp_fqs_loop+0x2af/0xf80 [ 317.643642][ C0] ? debug_smp_processor_id+0x17/0x20 [ 317.648959][ C0] ? __note_gp_changes+0x4ab/0x920 [ 317.653906][ C0] ? rcu_gp_init+0xc30/0xc30 [ 317.658331][ C0] ? _raw_spin_unlock_irq+0x4e/0x70 [ 317.663364][ C0] ? rcu_gp_init+0x9cf/0xc30 [ 317.667796][ C0] rcu_gp_kthread+0xa4/0x350 [ 317.672217][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 317.676903][ C0] ? wake_nocb_gp+0x1e0/0x1e0 [ 317.681424][ C0] ? __kasan_check_read+0x11/0x20 [ 317.686277][ C0] ? __kthread_parkme+0xb2/0x200 [ 317.691139][ C0] kthread+0x421/0x510 [ 317.695044][ C0] ? wake_nocb_gp+0x1e0/0x1e0 [ 317.699560][ C0] ? kthread_blkcg+0xd0/0xd0 [ 317.703984][ C0] ret_from_fork+0x1f/0x30 [ 317.708241][ C0] [ 317.711099][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 317.717273][ C0] Sending NMI from CPU 0 to CPUs 1: [ 317.722319][ C1] NMI backtrace for cpu 1 [ 317.722330][ C1] CPU: 1 PID: 6706 Comm: syz.0.1855 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 317.722349][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 317.722359][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 317.722385][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d ab ec 12 04 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 317.722406][ C1] RSP: 0018:ffffc90000d77600 EFLAGS: 00000246 [ 317.722422][ C1] RAX: 0000000000000003 RBX: 1ffff920001aeec4 RCX: ffffffff81552fff [ 317.722434][ C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff88810a4be298 [ 317.722447][ C1] RBP: ffffc90000d776b0 R08: dffffc0000000000 R09: ffffed1021497c54 [ 317.722460][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 317.722472][ C1] R13: ffff88810a4be298 R14: 0000000000000003 R15: 1ffff920001aeec8 [ 317.722485][ C1] FS: 00007f767f7756c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 317.722501][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 317.722513][ C1] CR2: 00007f76817e376e CR3: 0000000126413000 CR4: 00000000003506a0 [ 317.722528][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 317.722538][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 317.722549][ C1] Call Trace: [ 317.722555][ C1] [ 317.722561][ C1] ? show_regs+0x58/0x60 [ 317.722580][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 317.722602][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 317.722624][ C1] ? kvm_wait+0x147/0x180 [ 317.722639][ C1] ? kvm_wait+0x147/0x180 [ 317.722655][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 317.722675][ C1] ? nmi_handle+0xa8/0x280 [ 317.722692][ C1] ? kvm_wait+0x147/0x180 [ 317.722708][ C1] ? default_do_nmi+0x69/0x160 [ 317.722725][ C1] ? exc_nmi+0xad/0x100 [ 317.722740][ C1] ? end_repeat_nmi+0x16/0x31 [ 317.722757][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 317.722781][ C1] ? kvm_wait+0x147/0x180 [ 317.722797][ C1] ? kvm_wait+0x147/0x180 [ 317.722813][ C1] ? kvm_wait+0x147/0x180 [ 317.722828][ C1] [ 317.722833][ C1] [ 317.722839][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 317.722856][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 317.722874][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 317.722895][ C1] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 317.722917][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 317.722940][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 317.722958][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 317.722977][ C1] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 317.723000][ C1] sock_hash_delete_elem+0x177/0x400 [ 317.723019][ C1] ? ____kasan_kmalloc+0xdb/0x110 [ 317.723035][ C1] ? __kasan_kmalloc+0x9/0x10 [ 317.723051][ C1] ? __kmalloc+0x13a/0x270 [ 317.723069][ C1] ? sock_hash_lookup+0x610/0x610 [ 317.723086][ C1] ? do_syscall_64+0x3b/0xb0 [ 317.723107][ C1] ? sock_map_unref+0x352/0x4d0 [ 317.723126][ C1] bpf_prog_586ab708469db861+0x41/0x820 [ 317.723141][ C1] bpf_trace_run2+0xec/0x210 [ 317.723161][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 317.723179][ C1] ? sock_map_unref+0x352/0x4d0 [ 317.723198][ C1] ? sock_map_unref+0x352/0x4d0 [ 317.723217][ C1] __bpf_trace_kfree+0x6f/0x90 [ 317.723234][ C1] ? sock_map_unref+0x352/0x4d0 [ 317.723258][ C1] kfree+0x1f3/0x220 [ 317.723277][ C1] sock_map_unref+0x352/0x4d0 [ 317.723298][ C1] sock_hash_update_common+0x839/0x940 [ 317.723321][ C1] sock_map_update_elem_sys+0x3f2/0x660 [ 317.723340][ C1] ? __kasan_kmalloc+0x9/0x10 [ 317.723357][ C1] ? sock_map_prog_detach+0x2a0/0x2a0 [ 317.723377][ C1] ? kvmalloc_node+0x281/0x4d0 [ 317.723401][ C1] bpf_map_update_value+0x164/0x3c0 [ 317.723421][ C1] map_update_elem+0x644/0x770 [ 317.723441][ C1] __sys_bpf+0x405/0x760 [ 317.723458][ C1] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 317.723479][ C1] ? __kasan_check_read+0x11/0x20 [ 317.723499][ C1] __x64_sys_bpf+0x7c/0x90 [ 317.723516][ C1] x64_sys_call+0x87f/0x9a0 [ 317.723531][ C1] do_syscall_64+0x3b/0xb0 [ 317.723549][ C1] ? clear_bhb_loop+0x35/0x90 [ 317.723564][ C1] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 317.723583][ C1] RIP: 0033:0x7f7680afaef9 [ 317.723599][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 317.723614][ C1] RSP: 002b:00007f767f775038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 317.723631][ C1] RAX: ffffffffffffffda RBX: 00007f7680cb3f80 RCX: 00007f7680afaef9 [ 317.723644][ C1] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000002 [ 317.723654][ C1] RBP: 00007f7680b6d046 R08: 0000000000000000 R09: 0000000000000000 [ 317.723665][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 317.723675][ C1] R13: 0000000000000000 R14: 00007f7680cb3f80 R15: 00007ffe3a3944d8 [ 317.723692][ C1] [ 317.724321][ C0] NMI backtrace for cpu 0 [ 318.206481][ C0] CPU: 0 PID: 6710 Comm: syz.0.1855 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 318.217590][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 318.227482][ C0] Call Trace: [ 318.230607][ C0] [ 318.233300][ C0] dump_stack_lvl+0x151/0x1c0 [ 318.237810][ C0] ? io_uring_drop_tctx_refs+0x190/0x190 [ 318.243278][ C0] ? ttwu_do_wakeup+0x187/0x430 [ 318.247965][ C0] dump_stack+0x15/0x20 [ 318.251957][ C0] nmi_cpu_backtrace+0x2f7/0x300 [ 318.256730][ C0] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 318.262718][ C0] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 318.268022][ C0] ? __kasan_check_write+0x14/0x20 [ 318.272962][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 318.277651][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 318.283549][ C0] nmi_trigger_cpumask_backtrace+0x15d/0x270 [ 318.289378][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 318.295267][ C0] arch_trigger_cpumask_backtrace+0x10/0x20 [ 318.300995][ C0] rcu_dump_cpu_stacks+0x1d8/0x330 [ 318.305942][ C0] print_cpu_stall+0x315/0x5f0 [ 318.310543][ C0] rcu_sched_clock_irq+0x989/0x12f0 [ 318.315581][ C0] ? rcu_boost_kthread_setaffinity+0x340/0x340 [ 318.321567][ C0] ? hrtimer_run_queues+0x15f/0x440 [ 318.326599][ C0] update_process_times+0x198/0x200 [ 318.331632][ C0] tick_sched_timer+0x188/0x240 [ 318.336318][ C0] ? tick_setup_sched_timer+0x480/0x480 [ 318.341699][ C0] __hrtimer_run_queues+0x41a/0xad0 [ 318.346738][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 318.351684][ C0] ? clockevents_program_event+0x22f/0x300 [ 318.357323][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 318.363313][ C0] hrtimer_interrupt+0x40c/0xaa0 [ 318.368090][ C0] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 318.373815][ C0] sysvec_apic_timer_interrupt+0x95/0xc0 [ 318.379285][ C0] [ 318.382059][ C0] [ 318.384835][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 318.390653][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 318.395424][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d ab ec 12 04 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 318.414871][ C0] RSP: 0018:ffffc90000b67420 EFLAGS: 00000246 [ 318.420769][ C0] RAX: 0000000000000001 RBX: 1ffff9200016ce88 RCX: 1ffffffff0d5ab14 [ 318.428586][ C0] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7038ad4 [ 318.436392][ C0] RBP: ffffc90000b674d0 R08: dffffc0000000000 R09: ffffed103ee0715b [ 318.444203][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 318.452013][ C0] R13: ffff8881f7038ad4 R14: 0000000000000001 R15: 1ffff9200016ce8c [ 318.459836][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 318.465812][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 318.470764][ C0] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 318.476751][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 318.482998][ C0] ? unwind_get_return_address+0x4d/0x90 [ 318.488470][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 318.493239][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 318.498275][ C0] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 318.503569][ C0] sock_hash_delete_elem+0x177/0x400 [ 318.508692][ C0] ? sock_hash_lookup+0x610/0x610 [ 318.513549][ C0] ? 0xffffffffa0028000 [ 318.517541][ C0] ? is_bpf_text_address+0x172/0x190 [ 318.523098][ C0] ? security_compute_sid+0x1d7d/0x1f40 [ 318.528490][ C0] bpf_prog_586ab708469db861+0x41/0x820 [ 318.533856][ C0] bpf_trace_run2+0xec/0x210 [ 318.538287][ C0] ? context_to_sid+0x5a8/0x600 [ 318.543145][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 318.547807][ C0] ? security_compute_sid+0x1d7d/0x1f40 [ 318.553189][ C0] ? security_compute_sid+0x1d7d/0x1f40 [ 318.558573][ C0] __bpf_trace_kfree+0x6f/0x90 [ 318.563173][ C0] ? security_compute_sid+0x1d7d/0x1f40 [ 318.568554][ C0] kfree+0x1f3/0x220 [ 318.572281][ C0] ? policydb_context_isvalid+0x1de/0x430 [ 318.577851][ C0] security_compute_sid+0x1d7d/0x1f40 [ 318.583045][ C0] ? security_sk_alloc+0x31/0xb0 [ 318.587823][ C0] ? security_transition_sid+0x90/0x90 [ 318.593119][ C0] ? __kasan_kmalloc+0x9/0x10 [ 318.597629][ C0] ? selinux_sk_alloc_security+0x7d/0x1a0 [ 318.603180][ C0] ? selinux_sk_alloc_security+0x91/0x1a0 [ 318.608738][ C0] security_transition_sid+0x7d/0x90 [ 318.613857][ C0] selinux_socket_post_create+0x37f/0x500 [ 318.619411][ C0] ? selinux_socket_create+0x330/0x330 [ 318.624712][ C0] ? __local_bh_enable_ip+0x58/0x80 [ 318.629742][ C0] ? local_bh_enable+0x1f/0x30 [ 318.634340][ C0] ? unix_create1+0x528/0x610 [ 318.638855][ C0] security_socket_post_create+0x82/0xb0 [ 318.645548][ C0] __sock_create+0x43f/0x760 [ 318.650338][ C0] __sys_socketpair+0x29f/0x6e0 [ 318.655013][ C0] ? __ia32_sys_socket+0x90/0x90 [ 318.659783][ C0] ? debug_smp_processor_id+0x17/0x20 [ 318.664991][ C0] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 318.671039][ C0] __x64_sys_socketpair+0x9b/0xb0 [ 318.675892][ C0] x64_sys_call+0x19b/0x9a0 [ 318.680230][ C0] do_syscall_64+0x3b/0xb0 [ 318.684922][ C0] ? clear_bhb_loop+0x35/0x90 [ 318.689433][ C0] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 318.695158][ C0] RIP: 0033:0x7f7680afaef9 [ 318.699505][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 318.718951][ C0] RSP: 002b:00007f767f754038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 318.727196][ C0] RAX: ffffffffffffffda RBX: 00007f7680cb4058 RCX: 00007f7680afaef9 [ 318.735117][ C0] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 318.742928][ C0] RBP: 00007f7680b6d046 R08: 0000000000000000 R09: 0000000000000000 [ 318.750736][ C0] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000000 [ 318.758550][ C0] R13: 0000000000000001 R14: 00007f7680cb4058 R15: 00007ffe3a3944d8 [ 318.766494][ C0] [ 463.018547][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 246s! [syz.0.1855:6706] [ 463.027418][ C1] Modules linked in: [ 463.031131][ C1] CPU: 1 PID: 6706 Comm: syz.0.1855 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 463.042239][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 463.052135][ C1] RIP: 0010:__pv_queued_spin_lock_slowpath+0x5ba/0xc40 [ 463.058905][ C1] Code: 00 00 49 89 dc c6 03 00 48 8b 44 24 10 0f b6 04 10 84 c0 0f 85 48 01 00 00 48 8b 44 24 08 c6 00 01 bb 00 80 ff ff eb 06 f3 90 c3 74 5e 41 0f b6 44 15 00 84 c0 75 36 41 80 3f 00 75 ea 4c 89 [ 463.078897][ C1] RSP: 0018:ffffc90000d776c0 EFLAGS: 00000206 [ 463.084797][ C1] RAX: 0000000000000000 RBX: 00000000ffffe709 RCX: ffffffff81552fff [ 463.092608][ C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff88810a4be298 [ 463.100422][ C1] RBP: ffffc90000d777b0 R08: dffffc0000000000 R09: ffffed1021497c54 [ 463.108231][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881f7138ad4 [ 463.116042][ C1] R13: 1ffff11021497c53 R14: 1ffff1103ee20001 R15: ffff88810a4be298 [ 463.123854][ C1] FS: 00007f767f7756c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 463.132702][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 463.139139][ C1] CR2: 00007f76817e376e CR3: 0000000126413000 CR4: 00000000003506a0 [ 463.146948][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 463.154756][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 463.162571][ C1] Call Trace: [ 463.165702][ C1] [ 463.168395][ C1] ? show_regs+0x58/0x60 [ 463.172465][ C1] ? watchdog_timer_fn+0x4b1/0x5f0 [ 463.177417][ C1] ? proc_watchdog_cpumask+0xd0/0xd0 [ 463.182532][ C1] ? __hrtimer_run_queues+0x41a/0xad0 [ 463.187843][ C1] ? hrtimer_interrupt+0xaa0/0xaa0 [ 463.192775][ C1] ? clockevents_program_event+0x22f/0x300 [ 463.198418][ C1] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 463.204319][ C1] ? hrtimer_interrupt+0x40c/0xaa0 [ 463.209269][ C1] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 463.215167][ C1] ? sysvec_apic_timer_interrupt+0x95/0xc0 [ 463.220809][ C1] [ 463.223585][ C1] [ 463.226361][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 463.232353][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 463.238430][ C1] ? __pv_queued_spin_lock_slowpath+0x5ba/0xc40 [ 463.244507][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 463.250756][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 463.255527][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 463.260562][ C1] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 463.265854][ C1] sock_hash_delete_elem+0x177/0x400 [ 463.270984][ C1] ? ____kasan_kmalloc+0xdb/0x110 [ 463.275832][ C1] ? __kasan_kmalloc+0x9/0x10 [ 463.280347][ C1] ? __kmalloc+0x13a/0x270 [ 463.284612][ C1] ? sock_hash_lookup+0x610/0x610 [ 463.289460][ C1] ? do_syscall_64+0x3b/0xb0 [ 463.293887][ C1] ? sock_map_unref+0x352/0x4d0 [ 463.298579][ C1] bpf_prog_586ab708469db861+0x41/0x820 [ 463.303955][ C1] bpf_trace_run2+0xec/0x210 [ 463.308384][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 463.313068][ C1] ? sock_map_unref+0x352/0x4d0 [ 463.317756][ C1] ? sock_map_unref+0x352/0x4d0 [ 463.322440][ C1] __bpf_trace_kfree+0x6f/0x90 [ 463.327048][ C1] ? sock_map_unref+0x352/0x4d0 [ 463.331727][ C1] kfree+0x1f3/0x220 [ 463.335480][ C1] sock_map_unref+0x352/0x4d0 [ 463.339978][ C1] sock_hash_update_common+0x839/0x940 [ 463.345273][ C1] sock_map_update_elem_sys+0x3f2/0x660 [ 463.350651][ C1] ? __kasan_kmalloc+0x9/0x10 [ 463.355164][ C1] ? sock_map_prog_detach+0x2a0/0x2a0 [ 463.360370][ C1] ? kvmalloc_node+0x281/0x4d0 [ 463.364974][ C1] bpf_map_update_value+0x164/0x3c0 [ 463.370007][ C1] map_update_elem+0x644/0x770 [ 463.374606][ C1] __sys_bpf+0x405/0x760 [ 463.378686][ C1] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 463.383895][ C1] ? __kasan_check_read+0x11/0x20 [ 463.388765][ C1] __x64_sys_bpf+0x7c/0x90 [ 463.393094][ C1] x64_sys_call+0x87f/0x9a0 [ 463.397433][ C1] do_syscall_64+0x3b/0xb0 [ 463.401684][ C1] ? clear_bhb_loop+0x35/0x90 [ 463.406196][ C1] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 463.411927][ C1] RIP: 0033:0x7f7680afaef9 [ 463.416181][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 463.435729][ C1] RSP: 002b:00007f767f775038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 463.444060][ C1] RAX: ffffffffffffffda RBX: 00007f7680cb3f80 RCX: 00007f7680afaef9 [ 463.451871][ C1] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000002 [ 463.459685][ C1] RBP: 00007f7680b6d046 R08: 0000000000000000 R09: 0000000000000000 [ 463.467497][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 463.475306][ C1] R13: 0000000000000000 R14: 00007f7680cb3f80 R15: 00007ffe3a3944d8 [ 463.483122][ C1] [ 463.485983][ C1] Sending NMI from CPU 1 to CPUs 0: [ 463.491035][ C0] NMI backtrace for cpu 0 [ 463.491046][ C0] CPU: 0 PID: 6710 Comm: syz.0.1855 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 463.491064][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 463.491074][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 463.491093][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d ab ec 12 04 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 463.491107][ C0] RSP: 0018:ffffc90000b67420 EFLAGS: 00000246 [ 463.491121][ C0] RAX: 0000000000000001 RBX: 1ffff9200016ce88 RCX: 1ffffffff0d5ab14 [ 463.491133][ C0] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7038ad4 [ 463.491144][ C0] RBP: ffffc90000b674d0 R08: dffffc0000000000 R09: ffffed103ee0715b [ 463.491157][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 463.491168][ C0] R13: ffff8881f7038ad4 R14: 0000000000000001 R15: 1ffff9200016ce8c [ 463.491180][ C0] FS: 00007f767f7546c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 463.491195][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 463.491207][ C0] CR2: 00007fe0124eb172 CR3: 0000000126413000 CR4: 00000000003506b0 [ 463.491221][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 463.491231][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 463.491242][ C0] Call Trace: [ 463.491247][ C0] [ 463.491253][ C0] ? show_regs+0x58/0x60 [ 463.491270][ C0] ? nmi_cpu_backtrace+0x29f/0x300 [ 463.491292][ C0] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 463.491313][ C0] ? kvm_wait+0x147/0x180 [ 463.491327][ C0] ? kvm_wait+0x147/0x180 [ 463.491343][ C0] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 463.491361][ C0] ? nmi_handle+0xa8/0x280 [ 463.491378][ C0] ? kvm_wait+0x147/0x180 [ 463.491392][ C0] ? default_do_nmi+0x69/0x160 [ 463.491408][ C0] ? exc_nmi+0xad/0x100 [ 463.491422][ C0] ? end_repeat_nmi+0x16/0x31 [ 463.491440][ C0] ? kvm_wait+0x147/0x180 [ 463.491455][ C0] ? kvm_wait+0x147/0x180 [ 463.491471][ C0] ? kvm_wait+0x147/0x180 [ 463.491486][ C0] [ 463.491491][ C0] [ 463.491495][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 463.491512][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 463.491531][ C0] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 463.491553][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 463.491572][ C0] ? unwind_get_return_address+0x4d/0x90 [ 463.491593][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 463.491611][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 463.491629][ C0] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 463.491650][ C0] sock_hash_delete_elem+0x177/0x400 [ 463.491670][ C0] ? sock_hash_lookup+0x610/0x610 [ 463.491688][ C0] ? 0xffffffffa0028000 [ 463.491699][ C0] ? is_bpf_text_address+0x172/0x190 [ 463.491719][ C0] ? security_compute_sid+0x1d7d/0x1f40 [ 463.491743][ C0] bpf_prog_586ab708469db861+0x41/0x820 [ 463.491756][ C0] bpf_trace_run2+0xec/0x210 [ 463.491773][ C0] ? context_to_sid+0x5a8/0x600 [ 463.491791][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 463.491808][ C0] ? security_compute_sid+0x1d7d/0x1f40 [ 463.491825][ C0] ? security_compute_sid+0x1d7d/0x1f40 [ 463.491842][ C0] __bpf_trace_kfree+0x6f/0x90 [ 463.491858][ C0] ? security_compute_sid+0x1d7d/0x1f40 [ 463.491874][ C0] kfree+0x1f3/0x220 [ 463.491891][ C0] ? policydb_context_isvalid+0x1de/0x430 [ 463.491908][ C0] security_compute_sid+0x1d7d/0x1f40 [ 463.491927][ C0] ? security_sk_alloc+0x31/0xb0 [ 463.491948][ C0] ? security_transition_sid+0x90/0x90 [ 463.491971][ C0] ? __kasan_kmalloc+0x9/0x10 [ 463.491986][ C0] ? selinux_sk_alloc_security+0x7d/0x1a0 [ 463.492004][ C0] ? selinux_sk_alloc_security+0x91/0x1a0 [ 463.492022][ C0] security_transition_sid+0x7d/0x90 [ 463.492040][ C0] selinux_socket_post_create+0x37f/0x500 [ 463.492057][ C0] ? selinux_socket_create+0x330/0x330 [ 463.492072][ C0] ? __local_bh_enable_ip+0x58/0x80 [ 463.492089][ C0] ? local_bh_enable+0x1f/0x30 [ 463.492107][ C0] ? unix_create1+0x528/0x610 [ 463.492126][ C0] security_socket_post_create+0x82/0xb0 [ 463.492144][ C0] __sock_create+0x43f/0x760 [ 463.492163][ C0] __sys_socketpair+0x29f/0x6e0 [ 463.492181][ C0] ? __ia32_sys_socket+0x90/0x90 [ 463.492198][ C0] ? debug_smp_processor_id+0x17/0x20 [ 463.492214][ C0] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 463.492234][ C0] __x64_sys_socketpair+0x9b/0xb0 [ 463.492251][ C0] x64_sys_call+0x19b/0x9a0 [ 463.492266][ C0] do_syscall_64+0x3b/0xb0 [ 463.492282][ C0] ? clear_bhb_loop+0x35/0x90 [ 463.492297][ C0] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 463.492316][ C0] RIP: 0033:0x7f7680afaef9 [ 463.492328][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 463.492341][ C0] RSP: 002b:00007f767f754038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 463.492357][ C0] RAX: ffffffffffffffda RBX: 00007f7680cb4058 RCX: 00007f7680afaef9 [ 463.492369][ C0] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 463.492378][ C0] RBP: 00007f7680b6d046 R08: 0000000000000000 R09: 0000000000000000 [ 463.492389][ C0] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000000 [ 463.492399][ C0] R13: 0000000000000001 R14: 00007f7680cb4058 R15: 00007ffe3a3944d8 [ 463.492415][ C0]