last executing test programs: 10.613321215s ago: executing program 4 (id=2678): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000000000070100b702000008000000b70300000000000085000000710000009500"/88], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)=@o_path={&(0x7f0000000340)='./file0\x00', 0x0, 0x4000}, 0x18) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x1, 0x2}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x101, 0x2, 0x8, 0x802, r1, 0x0, '\x00', 0x0, r2, 0x2, 0x0, 0x0, 0xf}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r3}, &(0x7f0000000180), &(0x7f0000000200)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x102000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1b, 0x2, 0x63f, 0x7f, 0x80, r1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x1}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8946, &(0x7f0000000900)={'veth0_vlan\x00', @random='\x00\x00\x00 \x00'}) syz_clone(0x0, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) 8.630618996s ago: executing program 4 (id=2678): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000000000070100b702000008000000b70300000000000085000000710000009500"/88], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)=@o_path={&(0x7f0000000340)='./file0\x00', 0x0, 0x4000}, 0x18) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x1, 0x2}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x101, 0x2, 0x8, 0x802, r1, 0x0, '\x00', 0x0, r2, 0x2, 0x0, 0x0, 0xf}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r3}, &(0x7f0000000180), &(0x7f0000000200)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x102000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1b, 0x2, 0x63f, 0x7f, 0x80, r1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x1}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8946, &(0x7f0000000900)={'veth0_vlan\x00', @random='\x00\x00\x00 \x00'}) syz_clone(0x0, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) 6.276480958s ago: executing program 4 (id=2678): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000000000070100b702000008000000b70300000000000085000000710000009500"/88], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)=@o_path={&(0x7f0000000340)='./file0\x00', 0x0, 0x4000}, 0x18) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x1, 0x2}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x101, 0x2, 0x8, 0x802, r1, 0x0, '\x00', 0x0, r2, 0x2, 0x0, 0x0, 0xf}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r3}, &(0x7f0000000180), &(0x7f0000000200)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x102000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1b, 0x2, 0x63f, 0x7f, 0x80, r1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x1}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8946, &(0x7f0000000900)={'veth0_vlan\x00', @random='\x00\x00\x00 \x00'}) syz_clone(0x0, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) 4.379298793s ago: executing program 1 (id=2832): syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9009, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000380)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xa2, &(0x7f00000005c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0xca, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000800), 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020100008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='cpuset.effective_mems\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_tracing={0x1a, 0x10, &(0x7f0000000280)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x3}, @jmp={0x5, 0x0, 0xa, 0x3, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}, @generic={0x4, 0x7, 0x0, 0x9, 0x200}, @exit, @btf_id={0x18, 0x9, 0x3, 0x0, 0x1}, @exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x8b, &(0x7f00000004c0)=""/139, 0x41000, 0x0, '\x00', r2, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2125, r0, 0x4, &(0x7f0000000880)=[r4, r5, r7], &(0x7f00000008c0)=[{0x0, 0x2, 0x1, 0x1}, {0x4, 0x2, 0x10, 0x4}, {0x3, 0x5, 0x4, 0x7}, {0x4, 0x4, 0x7, 0x7}], 0x10, 0x3ff}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000003c0), 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000012c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000080)="2392a23e7e", 0x0}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0}, 0x20) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r11 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r11, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r10, 0x40047438, 0x20000014) 4.377809333s ago: executing program 2 (id=2833): syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0x9, 0x1029, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000680)='mm_vmscan_write_folio\x00', r0}, 0xffffffffffffff26) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000001}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xf4, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='svc_xprt_enqueue\x00', r4}, 0x10) close(r3) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0), 0x0, 0x9c, &(0x7f0000000200)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x93, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x16, 0x3, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x69, 0x11, 0x50}}, &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='ext4_sync_file_exit\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r6, &(0x7f0000000980), 0x12) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x42332c7e56e9d24, 0x0) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x1) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000180), 0x6e, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/179, 0x20000773}], 0x1}, 0x0) 4.315773118s ago: executing program 4 (id=2678): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000000000070100b702000008000000b70300000000000085000000710000009500"/88], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)=@o_path={&(0x7f0000000340)='./file0\x00', 0x0, 0x4000}, 0x18) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x1, 0x2}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x101, 0x2, 0x8, 0x802, r1, 0x0, '\x00', 0x0, r2, 0x2, 0x0, 0x0, 0xf}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r3}, &(0x7f0000000180), &(0x7f0000000200)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x102000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1b, 0x2, 0x63f, 0x7f, 0x80, r1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x1}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8946, &(0x7f0000000900)={'veth0_vlan\x00', @random='\x00\x00\x00 \x00'}) syz_clone(0x0, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) 2.347275649s ago: executing program 1 (id=2836): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x6, 0x1c00, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000340)={{r0, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f0000000300)='%ps \x00'}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x10}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r2, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x70, &(0x7f0000000800)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0xbb, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) sendmsg$inet(r6, &(0x7f0000000b80)={&(0x7f00000002c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000300)="72f2cf38b5a1ca07b2ef75bb4b69cdb2df2e6d18a58414f5454377ac2e4d50e97c27ac22ae616571aac0d22abad93ebcd149cf66b03f85ca12155f32ee181ec23bb016c1e5c1860f313b2363531f9e29feb3dae18439d21f4ebcbcf4d1df7cbaeea7af5f86715af5eba0d32a88233fdcc361be83e8b5da6e7b99b0a95f0278ed81fa513ffeacd3a5313277cd8c951e1dc62dda4a001e792f389422c6669c159d769d0953081d2e693cf1905ed13ea5be44956e6715d8e0e91fcaa93b88f45c05984fd8", 0xc3}, {&(0x7f0000000400)="bb256cd22313826a1320e9640705ec1206cb602e54e58d7098053a5dc72d657ee7704f87fadb9f67c3749bc0557b4031454be00bf697a7d2e1040e656f2c1fbe4b7d1d41f9ded09659875baf515648ab77e61397324bbf180730057e545f723d58a065ca4d00e329610d6f63291e25009c2b79df49692e6c", 0x78}, {&(0x7f0000000480)="a39eef6946a9c4098fba35da898fe6ab93876005ad4931ebcc8b4b8f4e11257c0ab0afd4ca019430454d46441f392aa9ffb7ae7a79388ab9648baa335a41a968bd1af83ecdb394d97d52d9f1bb1eb65939df7a51823ce86cb71ada28e539ca2acd007c71d6894f6affa7b424950629b05775d6deb24b7855d54c94586f00397e6a819225e232197f35535449e95ddca03aa40671df9f725763a5f5e2aaf399b7da595e12aa78b0c42768427682f6e820a7790dd078ed0424d528d2ec8597ef2254a7afdd3d686d2813d88c6d7df5367665d848726e950f1bb0f372435377aff4f9dda322c85be0b2b17212d8fc0b87503b415484ab84361d0fc7af2aae44e3", 0xff}, {&(0x7f0000000580)="daf3e5a72d1ba3a8337a46edf2db10b61eb1aeaee39886c8a124184d01d97acc3d01d0b4fc216087d6b45d00f153e9235534e8c047d8a8f17c939509b65255226610dfebe24b8c8e4683721713f33724ca37c398c5a938af41f1107d5a6670fac53bd7926d", 0x65}, {&(0x7f0000000600)="6dfac60f377e05ae84b544f6d70c27f37893a14ff5d05fb7fb48", 0x1a}, {&(0x7f0000000640)="182900d5b8984cc49b3ced69480051aeb330dfb356c1d6ded7f279a2b24485d0a4ce30318b01c8b9c691245a7c8cd9b145e6eecede8c1f", 0x37}, {&(0x7f0000000680)="fa822afee12af5b434f9109243dc8491bcbd87be268838d24e6180c9838d864f1e23c12d9402e13fc475", 0x2a}], 0x7, &(0x7f0000000e40)=ANY=[@ANYBLOB="1c00000000000000000000762d1342007e3a545901006e0685d656fcfb7c26005b00d31806008e09000000", @ANYRES32=r7, @ANYBLOB="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"], 0x130}, 0x40050) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000e00)={&(0x7f0000000c00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12c, 0x12c, 0xc, [@struct={0xf, 0x4, 0x0, 0x4, 0x1, 0x1, [{0x9, 0x0, 0x4967}, {0x4, 0x5, 0x6}, {0x5, 0x0, 0x5}, {0x10, 0x2, 0x1}]}, @const={0x7, 0x0, 0x0, 0xa, 0x3}, @datasec={0xc, 0x1, 0x0, 0xf, 0x2, [{0x4, 0x6, 0x2}], '\nl'}, @struct={0x2, 0x1, 0x0, 0x4, 0x0, 0xc4d, [{0x9, 0x0, 0x101}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x1, 0x3}]}, @restrict={0x1, 0x0, 0x0, 0xb, 0x5}, @const={0x9, 0x0, 0x0, 0xa, 0x5}, @func={0xc, 0x0, 0x0, 0xc, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0xfffffff7}}, @datasec={0xd, 0x7, 0x0, 0xf, 0x2, [{0x5, 0x2, 0x5}, {0x2, 0xfa3, 0x6}, {0x2, 0x2, 0xf98e}, {0x2, 0x9, 0x40}, {0x3, 0xe, 0x2}, {0x5, 0x63, 0x6}, {0x1, 0x4, 0x99fc}], "f610"}]}, {0x0, [0x30, 0x5f, 0x0, 0x0, 0x61, 0x61, 0x5f, 0x0, 0x2e, 0x0]}}, &(0x7f0000000d80)=""/108, 0x150, 0x6c, 0x0, 0x10001}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x3, 0x3, 0x9, 0xffffffff, 0x440, r1, 0x2, '\x00', 0x0, r8, 0x1, 0x2, 0x1}, 0x48) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000a40)) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYRES64=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r9}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_netprio_ifpriomap(r2, &(0x7f0000000bc0)={'vlan0', 0x32, 0x30}, 0x8) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r10, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0], 0x0, 0xf, &(0x7f0000000580)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0xd3, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES16=r11, @ANYRESHEX=r12], 0x0, 0x8000, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r12}, 0x4) 2.345839759s ago: executing program 2 (id=2837): r0 = gettid() (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f0000000080)={'batadv0\x00'}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x11, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) ioctl$TUNSETIFF(r4, 0x400454da, &(0x7f0000000140)={'batadv0\x00'}) (async) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000100)={'pimreg0\x00', 0x1}) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_subtree(r6, &(0x7f0000000340)=ANY=[], 0x7) (async) r7 = openat$cgroup_ro(r6, &(0x7f0000001580)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000240)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x800, '\x00', 0x0, 0x0, 0x0, 0x1}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000300)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffff03}, 0x90) (async, rerun: 32) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, r8, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r8, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000008000000000000000000000850000006d0000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r12}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x20}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) (async) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000880)='blkio.bfq.io_serviced_recursive\x00', 0x100002, 0x0) write$cgroup_type(r13, &(0x7f0000000180), 0x40010) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x4, 0x0}, 0x8) (async) sendmsg$unix(r6, &(0x7f0000001e00)={&(0x7f00000008c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001c80)=[{&(0x7f0000000940)="75e06f3ec6c89eec6704673827c32f2718e2fc53dea54e0d0ce5b1207ad2255bbfcba48eb863bf23105716a5d578aa7abf4dc2f87410f87e56bd028bca08e9558d9bde3c4409f77e7b6b8d77f30f88af74d6a59093ba2252125b19c6938d5df0d85a67e31d7f36f264beb66d029cb345ac2103452a208a484582d4f008e0d3f130b1112b490c6c11b9dd1d17ce370af851c13a505d09574b189ac6d82f2f9e7c96fda240d316bbe69497cea6da9562ab2ff82c4e2f4c340e989f2ce34bb5d62b5f27f82c4cb77c6aa3cc", 0xca}, {&(0x7f0000000a40)="85cdb4927c13e022fe4a9fee77641733cf5494511fdcb68dce91965c1c3b4369d87048c65327d9eff9a6e8693a71dc9be4d3778a070e61a5d3143e059629c119438d97fe2e82a9b0634ce17de2362e0474d07adfe967a756c9d2e9561ada7ab20dcfca33978c2ab700af1b6c819d0b6c6c841e2717fce3b30547fb09", 0x7c}, {&(0x7f0000001a00)="dd5f3cb73d22ed9b408bee158c3706bb52342c0e60248a7fe46f133a0dcb9f5a3d4339a993f12328d43440d8db007fc0698c0f888f4bf5b6cd6e7aaa8cb1ff0e39fd796d887afb195ec3bcc395efed89da4a0864d1162cbb6a33060e17cea614a022f19de09ef3d4fc076808268b78245204672f2642317fddbdfb902c839ccd789f6f3ff2089aea930eb267753ef2746d9e0195931809943a44042392dfe0c3870adf9c545569", 0xa7}, {&(0x7f0000000ac0)="72b8381e4fd4ba0731430c0f798b0923efb078c7e52d9f", 0x17}, {&(0x7f0000001ac0)="0c6bf2bb88e94c9c63daa160cdb19498eedc4fa019c8bd900d699f62f1c4d80ed6065359837c02e9c50801a02025e7a49030cd824719875a4eaa1b148f0f630c2212718e704d1ce8a3741bea21542ab298ad60b363de785519f46f2e7f815c45f15d776924327d1f20bfeb192d639ff874387fdb8c9457502ff2a555391407cfd6524369c7c6ecd1688f3dca162253070867b740235641372f2266e19862f97d3a76a6bf758d861869309439a2fd12caf74782115332faccc7ddf87ac1064a", 0xbf}, {&(0x7f0000001b80)="875ca0670640120174a5ad4b909ff10434e4f6001f6c459256c1ab77975357ce68679d92901cbe59b70f", 0x2a}, {&(0x7f0000001bc0)="769af7963c99c6fe065007c42a6a1cb3603b385da8d83d31884fa4aa31e2753b37e604983e730554ef6802bb1de69b65271501bd719e6367ab087280d33246592a2db3bde02715135f06004c6a79906dadf7b70abd7bed02f195c087b6f96286ed1330741761848c217ecd36342daeec29e01b571116b0bff538502274a24ffb3c2e5805cd32", 0x86}], 0x7, &(0x7f0000001d00)=[@rights={{0x18, 0x1, 0x1, [r13, r10]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xee00}}}, @rights={{0x20, 0x1, 0x1, [r10, r1, r6, r1]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xee00}}}], 0xd8, 0x400c0}, 0x8021) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000b00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, r14, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001540)={{r13, 0xffffffffffffffff}, &(0x7f0000000540), &(0x7f0000000580)='%-010d \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x7, 0x1a, &(0x7f0000001640)=ANY=[@ANYBLOB="1800000000000080000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085200000020000001850000008000000000000000000000018240000", @ANYRES32=r15, @ANYBLOB="00000000559800006121fb07030400007d95fcff080000001841000004000008000000000000000018340000040000000000000000000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f00000005c0)='GPL\x00', 0x8, 0xdd, &(0x7f0000000600)=""/221, 0x41100, 0x40, '\x00', r11, 0x34, r13, 0x8, &(0x7f00000007c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000800)={0x5, 0x4, 0x83a2}, 0x10, r14, r9, 0x0, &(0x7f0000000840)=[r8, r8, r8], 0x0, 0x10, 0x40}, 0x90) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000000)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffd7, r14, r6, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) 2.345508409s ago: executing program 3 (id=2838): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[], 0x128}, 0x0) (async) close(r0) (async) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000045b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='hrtimer_init\x00', r3}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000107000000000000000026001811", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000004c0)='fscache_acquire\x00'}, 0x10) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r4}, 0x10) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r5) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x6, 0xff, 0x11, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r6, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x79ecfac6bea06dca}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x10) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r7) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x124, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) close(r7) (async, rerun: 64) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) (rerun: 64) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r9, &(0x7f0000000600)="07187cff173841d5170f8fcedd6ac3ee695986ab527d20cc83daf3b4da0295fb7d23e595b055eec3980e92b8f557b13724581a6099a4393a5ef51e70e02142d0f7bed8b1e2dee313b3c77bfbc0052bdf014b328c7275ca7f580c569688a0b4beddfa9fc72ce3d2bfb7a767664564d18dd3a4a396282d9e3f039572f2ebed3d07d0e651684f7cef4749eba2e4c2baceac5fb56d7e24f42c", &(0x7f0000000540)=""/154}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.326414761s ago: executing program 2 (id=2839): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xdff, 0x5}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xdff, 0x5}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1}, &(0x7f0000000180), &(0x7f0000000300)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) (async) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000540)={&(0x7f0000000200)=@id, 0x10, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_procs(r5, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) close(r6) 2.309838742s ago: executing program 3 (id=2840): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180), 0x4) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000006c0)='tasks\x00', 0x2, 0x0) r4 = syz_clone(0x4080, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f00000007c0)=r4, 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1f, 0x9, 0x2, 0x9, 0x131a, r0, 0x3, '\x00', 0x0, r1, 0x1, 0x4, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89b0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f00000005c0)='GPL\x00', 0x6908b664, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xa}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) ioctl$TUNSETTXFILTER(r5, 0x400454d1, &(0x7f0000000300)={0x1, 0x3, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0x33}, @remote, @empty]}) 2.253143486s ago: executing program 0 (id=2841): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="18002098010700f9ffffff00457a4c9518110000d6f4edf0819bf7009855fda7854aa8040d72832e33aed2414587c5a1e4749e4ea4c56d5f9f87de6e39baf488e4692fdf5e3277c99067869fca36c8dc1c4f63abf266d17f777b0c412b93dfe5c25a0e3c711b66143f5d1abdf5d13cf59938bb362351abbd98569a7d7fcb243d7d79994afd2bbea39fb8f937e2d197366f3e7d6ea58d1672f59b68ef00ca1e551da0a801d39ac3c82107cc8d919027e00473b8fdc68863ad0cf1cd4661167fdaa00e2ec0", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2d) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1080}, 0x0, 0xffffffffffffffff, r3, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffffffffffeac) write$cgroup_pid(r6, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000001940)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r9, &(0x7f0000000380), 0x2, 0x0) r10 = openat$cgroup_freezer_state(r9, &(0x7f0000002b00), 0x2, 0x0) close(r10) 2.250593756s ago: executing program 2 (id=2842): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x8, [@ptr={0x5, 0x0, 0x0, 0x2, 0x2}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x6d, 0x0, 0x53, 0x2}, @fwd={0xa}, @volatile={0x9}, @typedef={0x2, 0x0, 0x0, 0x8, 0x1}]}, {0x0, [0x61, 0x30, 0x5f, 0x0, 0x61, 0x5f]}}, &(0x7f0000000440), 0x60, 0x0, 0x1, 0x7}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000500)={0x5, 0x0}, 0x8) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001700)={0x9, 0x14, &(0x7f0000000540)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='syzkaller\x00', 0xf8d, 0x1000, &(0x7f0000000640)=""/4096, 0x40f00, 0x4, '\x00', 0x0, 0x2a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001640)={0x4, 0x4, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x4, &(0x7f0000001680)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000016c0)=[{0x5, 0x4, 0xc, 0xb}, {0x4, 0x3, 0xa, 0x1}, {0x4, 0x2, 0x1, 0xb}, {0x2, 0x5, 0xb, 0xd}], 0x10, 0x4b}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000017c0)=@bloom_filter={0x1e, 0x4, 0x5, 0x6, 0x2000, 0x1, 0x1ff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x1, 0x3}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000018c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001840), &(0x7f0000001880)='%-010d \x00'}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000019c0)={0x1, 0x1d, &(0x7f0000000140)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x95}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @exit], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0x50, &(0x7f0000000280)=""/80, 0x41100, 0x16, '\x00', r2, 0x18, r3, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x7, &(0x7f0000001900)=[0x1, r6, r7], &(0x7f0000001940)=[{0x0, 0x4, 0xd, 0x2}, {0x4, 0x1, 0x7, 0x3}, {0x5, 0x2, 0x6, 0xa}, {0x2, 0x5, 0x10, 0x6}, {0x2, 0x2, 0x10}, {0x1, 0x1, 0xc, 0x2}, {0x0, 0x2, 0x6}]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001e40)={r8, 0xe0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001b40)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000001b80)=[0x0, 0x0], &(0x7f0000001bc0)=[0x0], 0x0, 0xe2, &(0x7f0000001c00)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000001c80), &(0x7f0000001cc0), 0x8, 0xf3, 0x8, 0x8, &(0x7f0000001d00)}}, 0x10) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001f40)={0x6, 0xc, &(0x7f0000001a80)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1ff}}]}, &(0x7f0000001b00)='GPL\x00', 0x48, 0x0, 0x0, 0x41000, 0x66, '\x00', r9, 0x25, r3, 0x8, &(0x7f0000001e80)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x3, 0x6, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001f00), 0x0, 0x10, 0x4}, 0x90) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002000)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0x6, '\x00', r9, r3, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000020c0)={r11, &(0x7f0000002080)="5c2740d25cd4f315e69ce50ef4b31b85441d7ed79e3b"}, 0x20) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000002100)=r0, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002180)={&(0x7f0000002140)='powernv_throttle\x00', r5}, 0x10) bpf$ENABLE_STATS(0x20, &(0x7f00000021c0), 0x4) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000002200), 0x8) write$cgroup_subtree(r12, &(0x7f0000002240)={[{0x2b, 'cpuacct'}, {0x2b, 'perf_event'}, {0x2b, 'devices'}, {0x2d, 'cpuacct'}]}, 0x27) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000022c0)={&(0x7f0000002280)='f2fs_filemap_fault\x00', r12}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000023c0)={&(0x7f0000002300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@ptr={0x7, 0x0, 0x0, 0x2, 0x2}]}, {0x0, [0x30, 0x61, 0x61, 0x2e, 0x5f, 0x5f, 0x0, 0x61]}}, &(0x7f0000002340)=""/95, 0x2e, 0x5f, 0x0, 0x100}, 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(r13, 0x40042408, r12) openat$ppp(0xffffffffffffff9c, &(0x7f0000002400), 0x180, 0x0) r14 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002780)={0x18, 0x1d, &(0x7f0000002440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4da, 0x0, 0x0, 0x0, 0x100}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@jmp={0x5, 0x1, 0x4, 0xb, 0x2, 0x50, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7ff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r12}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002540)='GPL\x00', 0x9, 0x75, &(0x7f0000002580)=""/117, 0x41000, 0x48, '\x00', r9, 0x0, r12, 0x8, &(0x7f0000002600)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000002640)={0x1, 0xa, 0x0, 0x1ff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000002680)=[r12], &(0x7f00000026c0)=[{0x0, 0x5, 0xd, 0xa}, {0x0, 0x3, 0xd, 0x7}, {0x3, 0x4, 0x10, 0x3}, {0x0, 0x3, 0xf, 0xc}, {0x5, 0x2, 0xfcd, 0x7}, {0x1, 0x5, 0xa, 0x9}, {0x0, 0x5, 0x9}, {0x0, 0x4, 0xb, 0x2}, {0x3, 0x1, 0x9, 0x9}, {0x2, 0x5, 0x6, 0x5}], 0x10, 0x7}, 0x90) r15 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000002840)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x6020, '\x00', r2, 0xffffffffffffffff, 0x2, 0x0, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002dc0)={r10, 0xe0, &(0x7f0000002cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000002b00)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000002b40)=[0x0, 0x0], &(0x7f0000002b80)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x40, &(0x7f0000002bc0)=[{}], 0x8, 0x10, &(0x7f0000002c00), &(0x7f0000002c40), 0x8, 0xb0, 0x8, 0x8, &(0x7f0000002c80)}}, 0x10) r17 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002ec0)=@generic={&(0x7f0000002e80)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1a, &(0x7f00000028c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r15}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_val={0x18, 0xa, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000029c0)='GPL\x00', 0x9, 0xe0, &(0x7f0000002a00)=""/224, 0x40f00, 0x51, '\x00', r16, 0x0, r3, 0x8, &(0x7f0000002e00)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000002e40)={0x3, 0x8, 0x800, 0xfffffffa}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002f00)=[r17]}, 0x90) setsockopt$sock_attach_bpf(r12, 0x1, 0x32, &(0x7f0000003000)=r14, 0x4) r18 = bpf$MAP_CREATE(0x0, &(0x7f00000031c0)=@bloom_filter={0x1e, 0x5, 0x36f1, 0x3, 0x54, r1, 0xf5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3, 0x6}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000032c0)={0x18, 0x12, &(0x7f0000003040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x7e}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000003100)='GPL\x00', 0x3ff, 0x0, 0x0, 0x40f00, 0x40, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000003140)={0x6, 0xc}, 0x8, 0x10, &(0x7f0000003180)={0x3, 0xf, 0x5, 0x7fff}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000003240)=[r6, r0, r0, r1, r18, r6], &(0x7f0000003280)=[{0x4, 0x5, 0x2}], 0x10, 0x6}, 0x90) 2.249671377s ago: executing program 1 (id=2843): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x204, 0x4, 0x5, 0x292, 0xffffffffffffffff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='qdisc_dequeue\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000}, 0x1e) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102036c00fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) close(r10) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfdef) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000010c0)={r1, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, &(0x7f0000001080)=[0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x36, &(0x7f0000000500)=[{}], 0x8, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x59, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000780)={0xb0e, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYRES8=r8, @ANYRESDEC=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', r11, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x11, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r14 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000180)=ANY=[@ANYRESDEC], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r14, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x32, 0xd0, 0x3, 0x5, 0x22, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff}, 0x48) 2.249027797s ago: executing program 2 (id=2844): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc5, &(0x7f0000000300)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000400), &(0x7f00000004c0), 0x8, 0xba, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580), 0x4) (async) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580), 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xa, 0x7, 0xf73, 0x2010, 0xffffffffffffffff, 0x1, '\x00', r1, r2, 0x2, 0x2, 0x1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800fdffb60400000100000085000000030000009500000000000002"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000050001046c0000000040958d10000000000008080000000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x54}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYRES32=r0], &(0x7f0000000340)='syzkaller\x00'}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000d00000000000018110000", @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x11, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085100000010000009500000000000000bf91000000000000b7020000000000008500000000000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r9}, 0x10) 2.244056537s ago: executing program 3 (id=2845): r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x2d, 'blkio'}, {0x2d, 'hugetlb'}, {0x2b, 'memory'}, {0x2d, 'cpu'}, {0x2b, 'pids'}, {0x2b, 'io'}, {0x2d, 'cpuset'}, {0x2d, 'net_cls'}]}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x19, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x8, 0x9f66, 0x80, 0x9, 0x1, r0, 0xc443, '\x00', r1, r0, 0x3, 0x2, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0, 0xffffffffffffffff}, 0x4) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000004c0)=r2, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={r3, 0xffffffffffffffff}, 0x4) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x10, &(0x7f0000000400)=@raw=[@jmp={0x5, 0x1, 0x7, 0x5, 0x7, 0x30, 0xfffffffffffffffc}, @exit, @exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}], &(0x7f0000000480)='syzkaller\x00', 0xa, 0x0, 0x0, 0x41100, 0x66, '\x00', r1, 0x25, r5, 0x8, &(0x7f0000000500)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000540)={0x2, 0x10, 0xfffffffb, 0x6}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000005c0)=[r0, r3, r3, r0, r6], &(0x7f0000000600)=[{0x2, 0x4, 0xd, 0xc}], 0x10, 0x8}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a00)={{r0, 0xffffffffffffffff}, &(0x7f0000000980), &(0x7f00000009c0)=r0}, 0x20) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0xffffffffffffffff, 0x4}, 0xc) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xe, 0x13, &(0x7f0000000700)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x101}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x6c}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000007c0)='syzkaller\x00', 0x1, 0xff, &(0x7f0000000800)=""/255, 0x41100, 0x20, '\x00', r1, 0x2a, r5, 0x8, &(0x7f0000000900)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000940)={0x0, 0x10, 0xfffffffc, 0x4}, 0x10, 0x0, r7, 0x1, &(0x7f0000000a80)=[r6, r8, r6, r9, r6], &(0x7f0000000ac0)=[{0x0, 0x1, 0xe, 0x1}], 0x10, 0x7fffffff}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000c40)={{r0, 0xffffffffffffffff}, &(0x7f0000000bc0), &(0x7f0000000c00)='%pi6 \x00'}, 0x20) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000c80)={'ip6gretap0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000cc0)='cpu') r12 = openat$cgroup(r0, &(0x7f0000000d00)='syz0\x00', 0x200002, 0x0) openat$cgroup(r12, &(0x7f0000000d40)='syz0\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e00)={{r12, 0xffffffffffffffff}, &(0x7f0000000d80), &(0x7f0000000dc0)=r10}, 0x20) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x1c, 0xd, &(0x7f0000000e40)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x1}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, @tail_call={{0x18, 0x2, 0x1, 0x0, r13}}, @jmp={0x5, 0x1, 0xb, 0x0, 0x4, 0x1, 0x1}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x5}, @map_val={0x18, 0xa, 0x2, 0x0, r11, 0x0, 0x0, 0x0, 0xfffffff6}], &(0x7f0000000ec0)='syzkaller\x00', 0x80000000, 0xba, &(0x7f0000000f00)=""/186, 0x41000, 0xa, '\x00', r1, 0x9, r0, 0x8, &(0x7f0000000fc0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000001000)={0x2, 0x2, 0x9, 0x80000001}, 0x10, 0x0, r0, 0x3, &(0x7f0000001040)=[r4], &(0x7f0000001080)=[{0x3, 0x2, 0x8, 0x4}, {0x3, 0x5, 0x3, 0x3}, {0x0, 0x4, 0xc, 0x3}], 0x10, 0x101}, 0x90) close(r9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r0, 0xe0, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, &(0x7f00000011c0)=[0x0, 0x0, 0x0], &(0x7f0000001200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x6c, &(0x7f0000001240)=[{}], 0x8, 0x10, &(0x7f0000001280), &(0x7f00000012c0), 0x8, 0x6d, 0x8, 0x8, &(0x7f0000001300)}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001740)={{r11, 0xffffffffffffffff}, &(0x7f00000016c0), &(0x7f0000001700)='%+9llu \x00'}, 0x20) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0xe, 0x19, &(0x7f0000001480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @map_fd={0x18, 0x3, 0x1, 0x0, r11}, @jmp={0x5, 0x0, 0x1, 0x8, 0x8, 0x1, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000001580)='syzkaller\x00', 0x8001, 0xa5, &(0x7f00000015c0)=""/165, 0x41000, 0x20, '\x00', 0x0, 0x30, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001680)={0x2, 0xa, 0x10, 0x93a}, 0x10, r2, r14, 0x1, &(0x7f0000001780)=[r9, r15, r11, r8], &(0x7f00000017c0)=[{0x5, 0x1, 0x9, 0x4}], 0x10, 0x7f}, 0x90) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000018c0)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000019c0)={r15, &(0x7f0000001900)="b9be9978210e217ce15e0bacab43786da849146ebf3e832b24452f221e6a185e50e632cd9e15060335dbe060f5e39a36e5570f6d760f0bb34aaabfc09f218eefffae1f5c97860a08bf958f353f5ba0b55e3dc44295034317f2afa65318ec4e04a64206d3a87a7fab37456155428c19882a6e69d14a31b4f636a80e91a4805e8ff7"}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{r13, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)=r0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001c00)={r17, &(0x7f0000001ac0)="8ab92a84367a8bb9b9a3b5899c0ab15687e3e5f83be6688475d042282e401653a9456ce279048cbb90fee9ad290f7c53ac068796d3938b6010f0b755ef1d3f0111e2206d913093a00e8c1a448ad78b7a4c3998e5cc0582119d19d30f7db715155c9357b35158bb11950642510d64c656b57c0bf1fcae3ef834c237a363f780a2b68d4e8034ee30697b7aa3c4867a3a07fc3caa266ce8c434fa8f45932e90b37003c44b88648fc2950f", &(0x7f0000001b80)=""/105}, 0x20) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000001c40)={r0, r16, 0x4, r16}, 0x10) close(r14) r18 = syz_clone(0x8001000, &(0x7f0000001c80)="c1a4bfff74a28f52a8b67724925126694e1eb8c7111d56add10cb391ea535f24055a683366da387e8573acf35fe27b5820ef6b459a50a404904eb1a92262fadd090750b7fca8e63699375e30169e237c3a3775fed1322356f800e443d5c7e70c5cb63bd8f80856294bdd6f09bd4088381e55a9c7edb7783d338961304202feba28751c2230ff4bfb636060618e34da85c15daab182ad567d5c0bd870997e618d1ef923644163a31a4942b85ce4a37b2c1c855f1911055cee649b714c", 0xbc, &(0x7f0000001d40), &(0x7f0000001d80), &(0x7f0000001dc0)="49d81e301e8d3016c83373e2be7d3781bb800793eb16ee9a4a221a2148bbf7cead6869b04059aa1a05afd5b57559797174166cd329cc076d5d614d27f3cce3b2cfc6d7d53d937cab5a1c91d96fdfd6d6047e4cf6e41ba02901cc17ea4b7a68a944d610a237a51516c398b3a5b42e10958aa4855b9cf54cef04a6e856bddda856182366b293eca42a47d4b7502469815950d89f5840385d41b9177d96a765504219d8e113cfcbe1abd494fa68778dce8ef26b43d641f4919cbedfc6558fc691a125807304bd2e3cbdf9a16b") syz_open_procfs$namespace(r18, &(0x7f0000001ec0)='ns/net\x00') 2.243540847s ago: executing program 4 (id=2678): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000000000070100b702000008000000b70300000000000085000000710000009500"/88], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)=@o_path={&(0x7f0000000340)='./file0\x00', 0x0, 0x4000}, 0x18) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x1, 0x2}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x101, 0x2, 0x8, 0x802, r1, 0x0, '\x00', 0x0, r2, 0x2, 0x0, 0x0, 0xf}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r3}, &(0x7f0000000180), &(0x7f0000000200)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x102000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1b, 0x2, 0x63f, 0x7f, 0x80, r1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x1}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8946, &(0x7f0000000900)={'veth0_vlan\x00', @random='\x00\x00\x00 \x00'}) syz_clone(0x0, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) 221.324512ms ago: executing program 0 (id=2846): getpid() (async) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB="9feb01001800000000100000680000006800000007000000090000000100070000000f0000000200000000800000070000000200000604000000070000000e00000007000000070000000fb5d69cca8ec44c00000000000001000000004100050703000000020000857f0000000b00000003000000d804ffff0500000003000000ff010000002e5f00002e00218ed0c1d36ffdb6217febe15919d591f30b008fc69908526bfa"], &(0x7f0000000280)=""/105, 0x87, 0x69, 0x1, 0x6}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x11, 0x1ff, 0x10001, 0x7, 0x10, r2, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x1}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x7, 0x6, 0xac3, 0x30, 0x1, 0x7fff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x2, 0x8}, 0x48) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001fc0)={@ifindex, 0xffffffffffffffff, 0x1e, 0x0, 0x0, @link_id}, 0x20) (async, rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{}, &(0x7f0000000040), 0x0}, 0x20) (async, rerun: 64) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='fib6_table_lookup\x00') (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r5}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) (async, rerun: 32) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) (async) close(r6) 220.855622ms ago: executing program 2 (id=2847): syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9009, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000380)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xa2, &(0x7f00000005c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0xca, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000800), 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020100008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='cpuset.effective_mems\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_tracing={0x1a, 0x10, &(0x7f0000000280)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x3}, @jmp={0x5, 0x0, 0xa, 0x3, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}, @generic={0x4, 0x7, 0x0, 0x9, 0x200}, @exit, @btf_id={0x18, 0x9, 0x3, 0x0, 0x1}, @exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x8b, &(0x7f00000004c0)=""/139, 0x41000, 0x0, '\x00', r2, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2125, r0, 0x4, &(0x7f0000000880)=[r4, r5, r7], &(0x7f00000008c0)=[{0x0, 0x2, 0x1, 0x1}, {0x4, 0x2, 0x10, 0x4}, {0x3, 0x5, 0x4, 0x7}, {0x4, 0x4, 0x7, 0x7}], 0x10, 0x3ff}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000003c0), 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000012c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000080)="2392a23e7e", 0x0}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0}, 0x20) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r11 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r11, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r10, 0x40047438, 0x20000014) 219.402083ms ago: executing program 3 (id=2848): r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x2, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x7) close(r2) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x81, 0x81}, 0x48) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x15) 219.136803ms ago: executing program 1 (id=2853): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"/306], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) close(r0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0xa}, 0x48) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289e01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cf84ded40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c86e00f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302000000b0eea24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec231fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce41fd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895012f1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41c8c12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f45f90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a9f9b444aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c3405000000000000003871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000000000d6d5210d7503000000a87a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e873f8703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd70400000000946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009556237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d37261774cc5a3bf6b466cb72812da518ff602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945ecefa26b8471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d50a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b0fdf9743af932cd6db49a47613808bad959710300000000000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d8af9753387e0cd8d718f54a29df6eba3bd4c440e6e2172e3fcc01b8babb757b5c59217b80d0db3ba582814a604e4ef7a803e9ca7c85b35c9b93a9e0885e238b44ae1c2e64cce3b27083b8246829e64056000302bffff15405bd5f2eba20000000000000000000000000000000000009a9823fd8fbc5aa165099c5ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1f85ab030e788d38788ee5b5428d4a971cc97db9fd231088e570735ce129e7e77fc2777692664a1488fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b24052137e9637f3efbab71720f88c3c44b3b7486f979e8a31b16ac5fb73fe0e5239c000be2733c49546f6e8a9175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf0155a39f97580e079175426c088a0208040982a0000000000000000000000000051ceaaf0159fe61f2eade7603d0a7a56fb09cd119ac06adb6597155ae47846892bb423c024d8cbe9240b71ec6dc2124d3a19e2d714b273d95d1d3aa737cb04a33615ff2a730e51067d5d675d7122361c37c61a43b5afd865b60d4cae891b73220f17d25985a7f76834995e53a93a1c7b9eef267df691ca983a0b15bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c697724c057d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2df27c0cb8a67ad026bf953f88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9493b963f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7ffa06ca861551189d155bd077a79fe2c7e961352e56824f727d21d41eae78bfec4a2d7a7edbc8ef958c5ea599f7c25bf71c2340558aa12fdd24a88aaad5921aee7dae6a2f3009d9cb43ab4898d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a5fe1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8525611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c721b7ea4544bf51c95c86fcac1f434d09d1ee4928aafe23de66fed972e0dddfb33f64e48701b049239e7f552d816441d11c4c2647c014462344359198d97c4b6e9ed31ca18987b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a03b085abf3e8e3efc842a8d328733461f04c99607061c65ed14c61322a5ac2d371a95b8ad867ec92d13a4fa4ae033a09673866cd77f4bcdaaa05207166b19a8758d8855400d8c6a7242dc207251e8797eca24ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a268921738938aa9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e3ad001b072b1a751b588ac4639f35a58e00a50c0270608c7a7f10132b1c25b9d66ebbc8bab4ea81232fbef665f6212f875b2a00000000000000aceb111b66a500ca52fd8f848088c67ee65dfdcc4c580e9bc18c1699dca07d019bf1bf9dd3da480d6c155d7e60674ce88ab5ae07a9d16e22792d99986b531ab4e592ab5925da779e700cf20309a2137877690dc5c07956fc82d7b3bb46d3138041af18508938c9be4e5d0a98073463a5cff6c146d020743da474cb81677a6f389f0e00c33b70b7f8bab95435c27167f365a29fb09cbf35bf192f6a65616fa2ad9a6c7ca3a3ecd96aaecd993e8badb40e7eb8a22b0015e70c885cd519e28448168c6d914265998bff74ea1b0e651a6cae9419096248a0e41573827ad60fafce6e6540734c1f23f75337d836c31497e8112969a039d65aa297e2b046b5f4d11116a89f9f65693d4dc3e70fbfe0b2044fdb3f87e887d1daae8e38a0c19f668f776e19a02bb2449ee4384f6536879c85d7e41bc0276ee2b125d41ff358323311703ec01d64a573bdeb75bdcc87d01de38365ab9222713d2d1640a742d62fefb5403b2ed9969c32a0841e8c36b0107bb888eb14ac62e6d4bdfaeb9ee7436b97bf3825a19d6c8997ce285edf1d277ed703f560460417bfe702af833e83c5b987befb6d1fcf765ab7ea537d9dafb622a1ba8686cb9b1c63b84470364942e90d1cf856cead864f5e38c83b9ed86cc5725a20299ce512b165"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0, 0xffff0000}, 0x48) 205.341994ms ago: executing program 0 (id=2849): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x8}, 0x48) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xe) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x3, 0xe, &(0x7f0000000200)=ANY=[@ANYRES64=r3], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fff}, 0x90) 152.960188ms ago: executing program 3 (id=2850): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000080000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000040008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffff03000000000000850000002d00000095000000000000004000a4ed97328f017be64ee5748dbbdabd196eee7ca281508df2ae214f0affba83bb5ed7c3987f9a5997fe42b19b15562f3b2e2447d1eaae37bcefc90fdf09579e8dd4b75dc37b8d1e559a9eefbb82ef09fe696c1fff4d88d9c3df4dcab6d2a20c6eb5d2e76e45df804ea460fa7e539fd2e056c27aaf10d7f732b4b9c2abcf5d366ec3798d9c000000000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x51) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000927dfcffffffffffffff95"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x8}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 152.058348ms ago: executing program 1 (id=2851): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_tracing={0x1a, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000008000000000000000900000014e00100000000008c1f0794f703fdb7f27d4a2b4b2900b2481bae3fbeeceb6e399c297cb90885b27812aab5cd5ffc48e3452b7fb93ce654cc9b0ad0a6a3505038a6d7e2dca70a794b853cd16e279deb40ff457893a7e42bdf8657dfadb93ddb36da54d370ad26a44b66c4497988823e993a1baa2ce5d3dfcf852b7ef115a29528fa0d2b3058a250764368810c3f3241cdad72c55396c7a005f48d8e1bb5c134e0005b4a2a72bc27300b3345b9b26ea85cd8b37203559a54c2cbb31a548c920e667545ce8d09163e4a59a12d00"/243], &(0x7f0000000380)='syzkaller\x00', 0x1, 0xb6, &(0x7f0000000540)=""/182, 0x41100, 0x14, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x5, 0x3, 0x7f, 0x10000}, 0x10, 0xd964, 0xffffffffffffffff, 0x9, 0x0, &(0x7f0000000d80)=[{0x3, 0x5, 0xa, 0x5}, {0x4, 0x4, 0x7, 0x1}, {0x1, 0x2, 0x100b, 0x7}, {0x0, 0x5, 0x4, 0xc}, {0x1, 0x4, 0xf, 0x3}, {0x2, 0x4, 0xf, 0x8}, {0x4, 0x2, 0x9, 0x7}, {0x0, 0x3, 0x4, 0xb}, {0x0, 0x1, 0x7}], 0x10, 0x3ff}, 0x90) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'\x00', 0x6132}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f00000004c0)=ANY=[@ANYRES16=r1, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fcae68da850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x18, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfe3a) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x5460, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r5 = perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000009c0)=ANY=[@ANYBLOB="180000000000a8dc78a6cf6393dd0000181100002d7d219d86bd32013b0ab0c28e7687f3f2d2d10fc910dd2c857eb8ed46c99bd4355c7c46596ecfe3b29afef3bc82176aa87b5cc4d21400"/84, @ANYRES32, @ANYBLOB], 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000001b80)=ANY=[]) bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x800800, &(0x7f00000006c0)="c477f77234ee70ba59ca0a22d758ba7b7ed4e9577da627763d643ac95f8e81ebae1787139b63a05a8f7ffc250794918b0d079e2f2b2953caf1b4d34518ff712dfa9b87843f6129ebb7", 0x49, &(0x7f0000000400), &(0x7f0000000740), &(0x7f0000000780)="c985ab4dcec28a2cb0ab83fe19dc4bfc3b12dbef46f409c22faed632b0") r7 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x24, 0x1ac31844}, 0x0, 0xc8, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x2, 0xffffffffffffffff, 0x1) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={r7, 0x58, &(0x7f0000000880)}, 0x10) 151.250508ms ago: executing program 0 (id=2852): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e8500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, 0x0, 0x26e1, 0x0) (async) r4 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f0000000000), &(0x7f0000000280)}, 0x20) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8929, &(0x7f0000001f40)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\xf5\a\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'5\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\x06\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xdcZ\xb9\xd7Z\x88\x9b\xdff[\x90\xfa\x9a{b\xf4Dq') (async) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x20001400) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x7, [@var={0x4, 0x0, 0x0, 0xe, 0x4}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x4}, @typedef={0x0, 0x0, 0x0, 0x10, 0x4}, @volatile={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f, 0x5f]}}, 0x0, 0x53}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000001c0)='qrtr_ns_server_add\x00'}, 0xfd19) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)}, 0x0) (async) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/251, 0x2}], 0x1}, 0x40000100) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) ioctl$TUNSETOFFLOAD(r6, 0x4008744b, 0x2000001d) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, 0x0) write$cgroup_pid(r3, 0x0, 0x6a) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) 147.951178ms ago: executing program 0 (id=2854): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xb, 0x1, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x2, 0xc}, 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xb, 0x1, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x2, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x2, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d00000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000300000008000000ee0000000000005bfd1a300f11f9706caa21aec60461755732d0fe24851323ec51c34ac486878cbfff9b7e53be59b0ae7a2accabf2cb989dce44bcb9108abf979aa2102b432062acfb3454211f65c76e0ea49061", @ANYRESDEC=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x4e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x0, 0x0, r1}, 0x48) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0xd110, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x0, 0xf}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x0, 0x5}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) (async) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8749c, 0x5, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x1, @perf_bp={&(0x7f0000000080), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x7, 0x0, 0xbc0, 0x40, 0xffffffffffffffff, 0x7ff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x802, 0x4}, 0x42) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x7, 0x0, 0xbc0, 0x40, 0xffffffffffffffff, 0x7ff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x802, 0x4}, 0x42) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a0ef010095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) socketpair(0x0, 0x80000, 0x1, &(0x7f0000000000)) (async) socketpair(0x0, 0x80000, 0x1, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000005900000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000680)='xs_stream_read_data\x00', r2}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000680)='xs_stream_read_data\x00', r2}, 0x10) socketpair(0x2, 0x0, 0x7fffffff, &(0x7f00000006c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x4, 0x8, 0x8, 0x2}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x4, 0x8, 0x8, 0x2}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x4, 0x2, 0xbf22, 0x10}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x4, 0x2, 0xbf22, 0x10}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x58, &(0x7f0000000300)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 124.12824ms ago: executing program 1 (id=2855): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20025, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="61122800000000006113140000000000bf1000000000000025000200091b00003d030000000000008701000000000000bc26000000000000bf67000000000000150300000ee600f0670200001400000015030000ffffffffbf050000000000000f650000000000006507f4ff02000400070700006b3128fe1f75000000000000bf540000000000000705000003001500ae430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a82983d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe70305863f970eac3590ac99b798f8125f1c322c2a154a8a8d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4}, 0x48) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async, rerun: 64) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000090000000000000000000000009531000700000000beca12bc0e476102ec5fec9980cb53752eade460c0fc284a00"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f0000000040)}, 0x20) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a00000000000000957b72fb9900010045"], 0x0}, 0x90) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000000)='ext4_fc_track_range\x00'}, 0x10) (async, rerun: 32) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000640)={&(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x803e}, 0x24004044) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async, rerun: 64) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={r1, 0x20, &(0x7f0000000300)={&(0x7f0000000440)=""/134, 0x86, 0x0, &(0x7f0000000500)=""/73, 0x49}}, 0x10) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 119.640721ms ago: executing program 0 (id=2856): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20025, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x20}) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x69, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x7, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000500)=ANY=[@ANYRESOCT=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x2000000, 0xe, 0xfffffffffffffdb0, &(0x7f0000000400)="63eced8e46dc3f0adf1dc9f7b9867f9ecc4a3c3256d5fe6a596c93280c41a9e35b18f8c853feeb9791f8d9aadf1b0738fc2c389b20", 0x0, 0x3803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x2, 0x1, &(0x7f0000000180)=""/1, 0x40f00, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x9, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000740)=[{0x0, 0x2, 0x6, 0x9}, {0x1, 0x2, 0xb, 0x8}, {0x5, 0x3, 0xe, 0x6}, {0x5, 0x1, 0xd}, {0x4, 0x5, 0xf, 0x8}], 0x10, 0x17a4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00'}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb707000008000000b70400200000000085000000030000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 57.043176ms ago: executing program 3 (id=2857): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000480)={0x1, &(0x7f00000004c0)=[{0x6}]}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811ee", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x8, 0x12, 0x400007, 0x841, r2, 0xada3, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x3, 0xb}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000a50000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb6bba880100000048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c27", 0x39}], 0x1}, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000012c0), 0x1}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0xff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) recvmsg(r4, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x1008, 0x0, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x3, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000020007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r9}, 0x10) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) 0s ago: executing program 4 (id=2678): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000000000070100b702000008000000b70300000000000085000000710000009500"/88], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)=@o_path={&(0x7f0000000340)='./file0\x00', 0x0, 0x4000}, 0x18) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x1, 0x2}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x101, 0x2, 0x8, 0x802, r1, 0x0, '\x00', 0x0, r2, 0x2, 0x0, 0x0, 0xf}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r3}, &(0x7f0000000180), &(0x7f0000000200)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x7, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x102000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1b, 0x2, 0x63f, 0x7f, 0x80, r1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x1}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8946, &(0x7f0000000900)={'veth0_vlan\x00', @random='\x00\x00\x00 \x00'}) syz_clone(0x0, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.234' (ED25519) to the list of known hosts. [ 19.313067][ T24] audit: type=1400 audit(1724057471.680:66): avc: denied { mounton } for pid=272 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.314100][ T272] cgroup: Unknown subsys name 'net' [ 19.316382][ T24] audit: type=1400 audit(1724057471.680:67): avc: denied { mount } for pid=272 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.320118][ T24] audit: type=1400 audit(1724057471.690:68): avc: denied { unmount } for pid=272 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.320259][ T272] cgroup: Unknown subsys name 'devices' [ 19.466544][ T272] cgroup: Unknown subsys name 'hugetlb' [ 19.471920][ T272] cgroup: Unknown subsys name 'rlimit' [ 19.604488][ T24] audit: type=1400 audit(1724057471.970:69): avc: denied { setattr } for pid=272 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.627402][ T24] audit: type=1400 audit(1724057471.970:70): avc: denied { mounton } for pid=272 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 19.636335][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 19.652034][ T24] audit: type=1400 audit(1724057471.970:71): avc: denied { mount } for pid=272 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 19.683209][ T24] audit: type=1400 audit(1724057472.030:72): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.708389][ T24] audit: type=1400 audit(1724057472.030:73): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.733743][ T24] audit: type=1400 audit(1724057472.090:74): avc: denied { read } for pid=272 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.733792][ T272] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 19.759005][ T24] audit: type=1400 audit(1724057472.090:75): avc: denied { open } for pid=272 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.484885][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.491839][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.499002][ T283] device bridge_slave_0 entered promiscuous mode [ 20.505666][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.512505][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.519700][ T283] device bridge_slave_1 entered promiscuous mode [ 20.564453][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.571307][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.578478][ T285] device bridge_slave_0 entered promiscuous mode [ 20.584947][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.591784][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.598926][ T285] device bridge_slave_1 entered promiscuous mode [ 20.608358][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.615195][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.622321][ T284] device bridge_slave_0 entered promiscuous mode [ 20.630515][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.637356][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.644485][ T284] device bridge_slave_1 entered promiscuous mode [ 20.683285][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.690224][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.697432][ T286] device bridge_slave_0 entered promiscuous mode [ 20.714416][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.721258][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.728456][ T286] device bridge_slave_1 entered promiscuous mode [ 20.773936][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.780788][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.787998][ T287] device bridge_slave_0 entered promiscuous mode [ 20.816710][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.823634][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.831186][ T287] device bridge_slave_1 entered promiscuous mode [ 20.868002][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.874913][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.882019][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.888803][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.902653][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.909486][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.916580][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.923361][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.950737][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.957567][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.964642][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.971461][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.982146][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.989104][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.996181][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.002975][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.025122][ T283] device veth0_vlan entered promiscuous mode [ 21.035487][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.042320][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.049410][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.056205][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.065623][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.074737][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.083116][ T54] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.090134][ T54] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.097075][ T54] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.103883][ T54] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.110887][ T54] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.117816][ T54] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.124653][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.132406][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.140077][ T54] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.147170][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.155712][ T54] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.162625][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.170306][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.177429][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.184699][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.191881][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.210639][ T283] device veth1_macvtap entered promiscuous mode [ 21.219479][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.239668][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.246965][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.254114][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.262802][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.271483][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.279416][ T15] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.286258][ T15] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.293456][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.301532][ T15] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.308371][ T15] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.315512][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.323285][ T15] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.330068][ T15] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.348011][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.355403][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.363292][ T54] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.370052][ T54] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.378180][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.386201][ T54] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.393013][ T54] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.408413][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.416241][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.423856][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.459102][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.467427][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.475169][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.482362][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.490789][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.498730][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.505550][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.512693][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.520661][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.528466][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.536333][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.543091][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.550247][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.558110][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.564932][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.572074][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.579763][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.587527][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.595912][ T284] device veth0_vlan entered promiscuous mode [ 21.605526][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.613328][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.621416][ T283] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 21.630956][ T285] device veth0_vlan entered promiscuous mode [ 21.643453][ T287] device veth0_vlan entered promiscuous mode [ 21.655651][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.663907][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.672234][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.680729][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.688603][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.697058][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.705100][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.713170][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.721138][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.729347][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.737600][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.744821][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.752213][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.759690][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.769386][ T284] device veth1_macvtap entered promiscuous mode [ 21.782604][ T287] device veth1_macvtap entered promiscuous mode [ 21.792253][ T286] device veth0_vlan entered promiscuous mode [ 21.798579][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.807273][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.815756][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.823134][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.831369][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.840434][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.848022][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.855797][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.867487][ T285] device veth1_macvtap entered promiscuous mode [ 21.891791][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.899795][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.915342][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.923219][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.935346][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.942845][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.951337][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.960863][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.969415][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.970606][ C1] hrtimer: interrupt took 32263 ns [ 21.977709][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.990412][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.998809][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.006999][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.033991][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.049211][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.058066][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.066708][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.074594][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.083026][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.098272][ T286] device veth1_macvtap entered promiscuous mode [ 22.132403][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.141569][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.150002][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.159467][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.167587][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.339577][ T331] device veth0_vlan left promiscuous mode [ 22.450877][ T331] device veth0_vlan entered promiscuous mode [ 22.866491][ T357] device pim6reg1 entered promiscuous mode [ 23.471192][ T397] device syzkaller0 entered promiscuous mode [ 23.730741][ T412] device pim6reg1 entered promiscuous mode [ 24.039439][ T443] cgroup: syz.2.39 (443) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 24.119261][ T434] bridge0: mtu less than device minimum [ 24.128143][ T443] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 24.167842][ T461] syz.4.43[461] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.167885][ T461] syz.4.43[461] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.403665][ T479] device wg2 entered promiscuous mode [ 24.579008][ T476] Â: renamed from pim6reg1 [ 24.745872][ T499] device syzkaller0 entered promiscuous mode [ 25.097632][ T527] device syzkaller0 entered promiscuous mode [ 25.122323][ T24] kauditd_printk_skb: 40 callbacks suppressed [ 25.122333][ T24] audit: type=1400 audit(1724057477.490:116): avc: denied { create } for pid=535 comm="syz.4.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 25.178307][ T24] audit: type=1400 audit(1724057477.550:117): avc: denied { read } for pid=535 comm="syz.4.66" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.253496][ T24] audit: type=1400 audit(1724057477.550:118): avc: denied { open } for pid=535 comm="syz.4.66" path="/dev/ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.325506][ T24] audit: type=1400 audit(1724057477.660:119): avc: denied { append } for pid=560 comm="syz.2.72" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.349875][ T561] device syzkaller0 entered promiscuous mode [ 25.460440][ T24] audit: type=1400 audit(1724057477.660:120): avc: denied { ioctl } for pid=560 comm="syz.2.72" path="/dev/ppp" dev="devtmpfs" ino=133 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.484690][ T24] audit: type=1400 audit(1724057477.710:121): avc: denied { create } for pid=557 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 25.505372][ T24] audit: type=1400 audit(1724057477.730:122): avc: denied { create } for pid=562 comm="syz.4.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 25.524660][ T24] audit: type=1400 audit(1724057477.730:123): avc: denied { relabelfrom } for pid=560 comm="syz.2.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 25.544160][ T24] audit: type=1400 audit(1724057477.730:124): avc: denied { relabelto } for pid=560 comm="syz.2.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 25.563478][ T24] audit: type=1400 audit(1724057477.780:125): avc: denied { create } for pid=562 comm="syz.4.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 26.323240][ T653] device syzkaller0 entered promiscuous mode [ 26.381926][ T657] device pim6reg1 entered promiscuous mode [ 26.641300][ T679] device syzkaller0 entered promiscuous mode [ 26.823671][ T684] device syzkaller0 entered promiscuous mode [ 27.038128][ T698] device sit0 entered promiscuous mode [ 27.068732][ T708] device pim6reg1 entered promiscuous mode [ 27.594131][ T766] device pim6reg1 entered promiscuous mode [ 27.648931][ T806] syz.3.137 (806) used obsolete PPPIOCDETACH ioctl [ 27.868425][ T816] : renamed from ipvlan1 [ 27.899432][ T815] device pim6reg1 entered promiscuous mode [ 27.926508][ T818] device veth1_macvtap left promiscuous mode [ 28.014521][ T818] device veth1_macvtap entered promiscuous mode [ 28.020668][ T818] device macsec0 entered promiscuous mode [ 28.131585][ T839] device syzkaller0 entered promiscuous mode [ 28.794134][ T862] device syzkaller0 entered promiscuous mode [ 29.171611][ T937] ªªªªªª: renamed from vlan0 [ 34.690393][ T1008] ------------[ cut here ]------------ [ 34.745189][ T1008] trace type BPF program uses run-time allocation [ 35.007651][ T1008] WARNING: CPU: 1 PID: 1008 at kernel/bpf/verifier.c:10493 check_map_prog_compatibility+0x65b/0x7c0 [ 35.335158][ T1008] Modules linked in: [ 35.339261][ T1008] CPU: 1 PID: 1008 Comm: syz.2.198 Not tainted 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 35.535143][ T1008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 35.815220][ T1008] RIP: 0010:check_map_prog_compatibility+0x65b/0x7c0 [ 35.822311][ T1008] Code: c8 e9 84 fe ff ff e8 24 f5 ee ff 31 db e9 85 fe ff ff e8 18 f5 ee ff c6 05 2e 13 65 05 01 48 c7 c7 20 72 45 85 e8 d5 7b c2 ff <0f> 0b e9 42 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 17 fa ff [ 36.755264][ T1008] RSP: 0000:ffffc90000e8ef90 EFLAGS: 00010246 [ 36.761727][ T1008] RAX: f9a021a0614c1600 RBX: ffff888113da1800 RCX: 0000000000040000 [ 37.206806][ T1008] RDX: ffffc90001cf1000 RSI: 0000000000000c67 RDI: 0000000000000c68 [ 37.214632][ T1008] RBP: ffffc90000e8efd0 R08: ffffffff81521b78 R09: ffffed103ee04e8b [ 37.475152][ T1008] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 37.483004][ T1008] R13: 1ffff92000013a04 R14: ffff88811775c000 R15: ffffc9000009d020 [ 37.915153][ T1008] FS: 00007f967a72a6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 37.923957][ T1008] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 38.195158][ T1008] CR2: 0000000100000001 CR3: 000000010e262000 CR4: 00000000003506b0 [ 38.203509][ T1008] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 38.875310][ T1008] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 38.883143][ T1008] Call Trace: [ 39.205322][ T1008] ? show_regs+0x58/0x60 [ 39.209440][ T1008] ? __warn+0x160/0x2f0 [ 39.213730][ T1008] ? check_map_prog_compatibility+0x65b/0x7c0 [ 39.586039][ T1008] ? report_bug+0x3d9/0x5b0 [ 39.591030][ T1008] ? check_map_prog_compatibility+0x65b/0x7c0 [ 39.816015][ T1008] ? handle_bug+0x41/0x70 [ 39.820758][ T1008] ? exc_invalid_op+0x1b/0x50 [ 40.206905][ T1008] ? asm_exc_invalid_op+0x12/0x20 [ 40.211811][ T1008] ? wake_up_klogd+0xb8/0xf0 [ 40.525365][ T1008] ? check_map_prog_compatibility+0x65b/0x7c0 [ 40.531959][ T1008] ? __fdget+0x1bc/0x240 [ 41.055285][ T1008] resolve_pseudo_ldimm64+0x586/0x1020 [ 41.060788][ T1008] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 41.245908][ T1008] ? bpf_check+0xf2b0/0xf2b0 [ 41.250325][ T1008] ? bpf_check+0x3684/0xf2b0 [ 41.254744][ T1008] ? bpf_check+0x58d0/0xf2b0 [ 41.535159][ T1008] bpf_check+0xaf21/0xf2b0 [ 41.539399][ T1008] ? __switch_to_asm+0x34/0x60 [ 41.544001][ T1008] ? release_firmware_map_entry+0x18d/0x18d [ 41.965138][ T1008] ? stack_trace_save+0x1c0/0x1c0 [ 41.970027][ T1008] ? preempt_schedule+0xd9/0xe0 [ 41.974710][ T1008] ? __kasan_check_read+0x11/0x20 [ 42.105167][ T1008] ? preempt_schedule_common+0xbe/0xf0 [ 42.110446][ T1008] ? preempt_schedule+0xd9/0xe0 [ 42.286452][ T1008] ? schedule_preempt_disabled+0x20/0x20 [ 42.291915][ T1008] ? stack_trace_save+0x1c0/0x1c0 [ 42.425176][ T1008] ? preempt_schedule_thunk+0x16/0x18 [ 42.430367][ T1008] ? 0xffffffffa00024fc [ 42.434361][ T1008] ? bpf_get_btf_vmlinux+0x60/0x60 [ 42.555196][ T1008] ? __kernel_text_address+0x9b/0x110 [ 42.560398][ T1008] ? unwind_get_return_address+0x4d/0x90 [ 42.725158][ T1008] ? arch_stack_walk+0xf3/0x140 [ 42.729925][ T1008] ? stack_trace_save+0x113/0x1c0 [ 42.734784][ T1008] ? stack_trace_snprint+0xf0/0xf0 [ 42.915139][ T1008] ? selinux_bpf_prog_alloc+0x51/0x140 [ 42.920509][ T1008] ? selinux_bpf_prog_alloc+0x51/0x140 [ 43.045141][ T1008] ? ____kasan_kmalloc+0xed/0x110 [ 43.049985][ T1008] ? ____kasan_kmalloc+0xdb/0x110 [ 43.054847][ T1008] ? __kasan_kmalloc+0x9/0x10 [ 43.215140][ T1008] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 43.220518][ T1008] ? selinux_bpf_prog_alloc+0x51/0x140 [ 43.365166][ T1008] ? security_bpf_prog_alloc+0x62/0x90 [ 43.370692][ T1008] ? __se_sys_bpf+0x9f8c/0x11cb0 [ 43.475160][ T1008] ? __x64_sys_bpf+0x7b/0x90 [ 43.479579][ T1008] ? do_syscall_64+0x34/0x70 [ 43.484001][ T1008] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 43.635432][ T1008] ? kvm_sched_clock_read+0x18/0x40 [ 43.640542][ T1008] ? sched_clock+0x3a/0x40 [ 43.644876][ T1008] ? sched_clock_cpu+0x1b/0x3b0 [ 43.855140][ T1008] ? sched_clock+0x3a/0x40 [ 43.859392][ T1008] ? __irq_exit_rcu+0x40/0x150 [ 43.863985][ T1008] ? irq_exit_rcu+0x9/0x10 [ 44.025159][ T1008] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 44.030884][ T1008] ? __se_sys_bpf+0x1077f/0x11cb0 [ 44.155261][ T1008] __se_sys_bpf+0x107a2/0x11cb0 [ 44.160037][ T1008] ? __x64_sys_bpf+0x90/0x90 [ 44.164455][ T1008] ? kvm_sched_clock_read+0x18/0x40 [ 44.305154][ T1008] ? sched_clock+0x3a/0x40 [ 44.309394][ T1008] ? sched_clock_cpu+0x1b/0x3b0 [ 44.314077][ T1008] ? sched_clock+0x3a/0x40 [ 44.505170][ T1008] ? irq_exit_rcu+0x9/0x10 [ 44.509417][ T1008] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 44.515058][ T1008] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 44.715194][ T1008] ? __send_signal+0x8a2/0xb90 [ 44.719796][ T1008] ? _raw_spin_unlock_irqrestore+0x51/0x80 [ 44.825140][ T1008] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 44.830777][ T1008] ? do_send_sig_info+0xfb/0x230 [ 44.965147][ T1008] ? group_send_sig_info+0x1b0/0x320 [ 44.970348][ T1008] ? __lock_task_sighand+0x100/0x100 [ 45.115147][ T1008] ? __hrtimer_run_queues+0x9ea/0xa50 [ 45.120438][ T1008] ? bpf_send_signal_common+0x2d8/0x420 [ 45.255141][ T1008] ? bpf_do_trace_printk+0x270/0x270 [ 45.260257][ T1008] ? clockevents_program_event+0x214/0x2c0 [ 45.515149][ T1008] ? bpf_send_signal+0x19/0x20 [ 45.519743][ T1008] ? bpf_trace_run2+0xf4/0x280 [ 45.524357][ T1008] ? __bpf_trace_sys_enter+0x62/0x70 [ 45.685172][ T1008] __x64_sys_bpf+0x7b/0x90 [ 45.689413][ T1008] do_syscall_64+0x34/0x70 [ 45.693665][ T1008] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 45.825145][ T1008] RIP: 0033:0x7f967baace79 [ 45.829387][ T1008] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 46.195139][ T1008] RSP: 002b:00007f967a72a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 46.203382][ T1008] RAX: ffffffffffffffda RBX: 00007f967bc48f80 RCX: 00007f967baace79 [ 46.355158][ T1008] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 46.363086][ T1008] RBP: 00007f967bb1a916 R08: 0000000000000000 R09: 0000000000000000 [ 46.575133][ T1008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 46.582932][ T1008] R13: 0000000000000000 R14: 00007f967bc48f80 R15: 00007ffe916c4858 [ 46.705152][ T1008] ---[ end trace 01a2e7d6f3c3bcfe ]--- [ 67.037902][ T1065] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.044755][ T1065] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.052028][ T1065] device bridge_slave_0 entered promiscuous mode [ 67.059480][ T1065] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.066453][ T1065] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.073498][ T1065] device bridge_slave_1 entered promiscuous mode [ 67.148536][ T1067] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.155407][ T1067] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.162552][ T1067] device bridge_slave_0 entered promiscuous mode [ 67.170416][ T1067] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.177273][ T1067] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.184361][ T1067] device bridge_slave_1 entered promiscuous mode [ 67.210140][ T1068] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.217043][ T1068] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.224044][ T1068] device bridge_slave_0 entered promiscuous mode [ 67.230728][ T1069] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.237575][ T1069] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.244731][ T1069] device bridge_slave_0 entered promiscuous mode [ 67.253548][ T1069] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.260390][ T1069] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.267655][ T1069] device bridge_slave_1 entered promiscuous mode [ 67.287619][ T1068] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.294441][ T1068] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.301653][ T1068] device bridge_slave_1 entered promiscuous mode [ 67.371934][ T1065] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.379321][ T1065] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.386413][ T1065] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.393199][ T1065] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.413591][ T1070] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.420518][ T1070] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.427786][ T1070] device bridge_slave_0 entered promiscuous mode [ 67.434443][ T1070] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.441310][ T1070] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.448410][ T1070] device bridge_slave_1 entered promiscuous mode [ 67.460645][ T1067] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.467479][ T1067] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.474545][ T1067] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.481364][ T1067] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.496282][ T1068] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.503102][ T1068] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.510203][ T1068] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.517003][ T1068] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.588256][ T1069] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.595106][ T1069] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.602158][ T1069] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.608990][ T1069] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.627136][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.634462][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.642649][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.651045][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.658734][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.667858][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.675868][ T54] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.683347][ T54] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.690400][ T54] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.697378][ T54] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.719822][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.727987][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.735947][ T54] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.742770][ T54] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.750294][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.758174][ T54] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.764917][ T54] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.786414][ T9] device bridge_slave_1 left promiscuous mode [ 67.792317][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.800405][ T9] device bridge_slave_0 left promiscuous mode [ 67.806638][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.814025][ T9] device veth1_macvtap left promiscuous mode [ 67.886040][ T764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.902112][ T1065] device veth0_vlan entered promiscuous mode [ 67.911515][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 67.919266][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 67.927587][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 67.935570][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 67.943190][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.951602][ T388] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.958424][ T388] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.965626][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.973582][ T388] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.980424][ T388] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.987587][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 67.995681][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 68.003665][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.010799][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.018782][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 68.026434][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.034091][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.042240][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.050235][ T388] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.057070][ T388] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.064201][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.072344][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.080266][ T388] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.087088][ T388] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.094853][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 68.102263][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 68.109457][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.130959][ T1069] device veth0_vlan entered promiscuous mode [ 68.137491][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.145478][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 68.152680][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 68.160859][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 68.168908][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.176610][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.184665][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.192427][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 68.200525][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 68.217151][ T764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 68.225223][ T764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 68.232977][ T764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.240747][ T764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 68.249072][ T764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.256864][ T764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 68.264601][ T764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.277428][ T1065] device veth1_macvtap entered promiscuous mode [ 68.289183][ T1070] device veth0_vlan entered promiscuous mode [ 68.296188][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.303917][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 68.311566][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 68.319912][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 68.328080][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 68.336043][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 68.351901][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 68.359917][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 68.368062][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 68.376405][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 68.384379][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 68.392352][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 68.400486][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 68.408697][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 68.422322][ T1068] device veth0_vlan entered promiscuous mode [ 68.431612][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 68.439860][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.447819][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 68.454976][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 68.468938][ T24] kauditd_printk_skb: 8 callbacks suppressed [ 68.468950][ T24] audit: type=1400 audit(1724057520.840:134): avc: denied { mounton } for pid=1065 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=357 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 68.469086][ T1070] device veth1_macvtap entered promiscuous mode [ 68.509614][ T1068] device veth1_macvtap entered promiscuous mode [ 68.520049][ T1067] device veth0_vlan entered promiscuous mode [ 68.526856][ T1069] device veth1_macvtap entered promiscuous mode [ 68.533694][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 68.542135][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 68.550072][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 68.558213][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 68.566180][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 68.573544][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 68.581302][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.589533][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 68.596858][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 68.616577][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 68.624730][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 68.633218][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 68.641457][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 68.650123][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 68.658294][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 68.666453][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 68.674544][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 68.687856][ T1067] device veth1_macvtap entered promiscuous mode [ 68.702205][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 68.710117][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 68.718377][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 68.726036][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 68.733921][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 68.745194][ T1093] device veth1_macvtap left promiscuous mode [ 68.751234][ T1093] device macsec0 entered promiscuous mode [ 68.785614][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 68.793560][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 68.806453][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 68.824785][ T24] audit: type=1400 audit(1724057521.190:135): avc: denied { create } for pid=1111 comm="syz.1.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 68.847756][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 68.932625][ T1125] syz.0.214[1125] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.932665][ T1125] syz.0.214[1125] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.383221][ T1133] device sit0 entered promiscuous mode [ 69.971572][ T24] audit: type=1400 audit(1724057522.340:136): avc: denied { create } for pid=1158 comm="syz.3.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 70.190577][ T24] audit: type=1400 audit(1724057522.560:137): avc: denied { create } for pid=1172 comm="syz.4.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 70.308950][ T1177] device sit0 entered promiscuous mode [ 70.877136][ T24] audit: type=1400 audit(1724057523.250:138): avc: denied { create } for pid=1183 comm="syz.4.231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 71.314148][ T9] device bridge_slave_1 left promiscuous mode [ 71.355682][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.436073][ T9] device bridge_slave_0 left promiscuous mode [ 71.437776][ T24] audit: type=1400 audit(1724057523.810:139): avc: denied { create } for pid=1206 comm="syz.0.240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 71.442022][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.557118][ T9] device bridge_slave_1 left promiscuous mode [ 71.563053][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.598313][ T9] device bridge_slave_0 left promiscuous mode [ 71.629968][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.696341][ T9] device bridge_slave_1 left promiscuous mode [ 71.706001][ T24] audit: type=1400 audit(1724057523.930:140): avc: denied { create } for pid=1206 comm="syz.0.240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 71.778301][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.832327][ T9] device bridge_slave_0 left promiscuous mode [ 71.867132][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.876346][ T24] audit: type=1400 audit(1724057523.990:141): avc: denied { create } for pid=1212 comm="syz.3.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 71.932088][ T9] device bridge_slave_1 left promiscuous mode [ 71.976531][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.027041][ T9] device bridge_slave_0 left promiscuous mode [ 72.065681][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.127416][ T9] device veth1_macvtap left promiscuous mode [ 72.169396][ T9] device veth1_macvtap left promiscuous mode [ 72.209416][ T9] device veth0_vlan left promiscuous mode [ 72.216327][ T9] device veth1_macvtap left promiscuous mode [ 72.222286][ T9] device veth1_macvtap left promiscuous mode [ 72.228269][ T9] device veth0_vlan left promiscuous mode [ 72.510571][ T1217] device sit0 entered promiscuous mode [ 72.673472][ T1237] device syzkaller0 entered promiscuous mode [ 72.725595][ T24] audit: type=1400 audit(1724057525.100:142): avc: denied { create } for pid=1256 comm="syz.2.253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 72.785280][ T1258] geneve1: tun_chr_ioctl cmd 1074025672 [ 72.798513][ T1258] geneve1: ignored: set checksum enabled [ 72.840495][ T1257] geneve1: tun_chr_ioctl cmd 1074025673 [ 72.864015][ T24] audit: type=1400 audit(1724057525.230:143): avc: denied { write } for pid=1265 comm="syz.4.255" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 73.123447][ T1277] device sit0 left promiscuous mode [ 73.274239][ T1284] device sit0 entered promiscuous mode [ 73.431788][ T1303] device sit0 left promiscuous mode [ 73.741990][ T1342] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 73.840656][ T1359] syz.2.283[1359] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.840697][ T1359] syz.2.283[1359] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.973457][ T24] audit: type=1400 audit(1724057527.340:144): avc: denied { create } for pid=1398 comm="syz.4.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 76.944705][ T1483] device syzkaller0 entered promiscuous mode [ 77.080485][ T1496] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.087481][ T1496] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.140919][ T93] udevd[93]: worker [1058] terminated by signal 33 (Unknown signal 33) [ 77.149105][ T93] udevd[93]: worker [1058] failed while handling '/devices/virtual/block/loop2' [ 77.205185][ T93] udevd[93]: worker [1060] terminated by signal 33 (Unknown signal 33) [ 77.214588][ T93] udevd[93]: worker [1060] failed while handling '/devices/virtual/block/loop3' [ 77.275636][ T1521] syz.1.330[1521] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.275679][ T1521] syz.1.330[1521] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.277390][ T1520] syz.1.330[1520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.663565][ T1559] device sit0 entered promiscuous mode [ 78.672145][ T1625] syz.0.352[1625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.672192][ T1625] syz.0.352[1625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.349497][ T1685] 8ûÅ: renamed from syzkaller0 [ 79.508051][ T1690] bridge0: port 3(veth0_to_batadv) entered blocking state [ 79.525277][ T1690] bridge0: port 3(veth0_to_batadv) entered disabled state [ 79.579766][ T1690] device veth0_to_batadv entered promiscuous mode [ 79.591730][ T1690] bridge0: port 3(veth0_to_batadv) entered blocking state [ 79.599042][ T1690] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 79.636378][ T1698] device veth0_to_batadv left promiscuous mode [ 79.650573][ T1698] bridge0: port 3(veth0_to_batadv) entered disabled state [ 80.087249][ T1725] device pim6reg1 entered promiscuous mode [ 80.477762][ T1774] tap0: tun_chr_ioctl cmd 1074025677 [ 80.511466][ T1774] tap0: linktype set to 65534 [ 81.212897][ T1786] device syzkaller0 entered promiscuous mode [ 81.363035][ T1806] device xfrm0 entered promiscuous mode [ 81.407168][ T1806] device wg2 entered promiscuous mode [ 81.640960][ T24] audit: type=1400 audit(1724057534.010:145): avc: denied { create } for pid=1824 comm="syz.2.407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 82.160683][ T24] audit: type=1400 audit(1724057534.530:146): avc: denied { create } for pid=1861 comm="syz.4.415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 82.323876][ T24] audit: type=1400 audit(1724057534.690:147): avc: denied { create } for pid=1856 comm="syz.1.413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 82.785819][ T1869] device syzkaller0 entered promiscuous mode [ 82.862081][ T1893] bridge0: port 3(veth1_macvtap) entered blocking state [ 82.871640][ T1893] bridge0: port 3(veth1_macvtap) entered disabled state [ 84.360779][ T2028] device syzkaller0 entered promiscuous mode [ 84.604820][ T2055] device sit0 left promiscuous mode [ 85.101460][ T2101] syz.2.470[2101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.101504][ T2101] syz.2.470[2101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.698627][ T24] audit: type=1400 audit(1724057538.070:148): avc: denied { create } for pid=2199 comm="syz.0.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 86.718154][ T2259] ÿÿÿÿÿÿ: renamed from vlan1 [ 86.886462][ T24] audit: type=1400 audit(1724057539.250:149): avc: denied { create } for pid=2262 comm="syz.0.511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 87.152559][ T2306] device veth0_vlan left promiscuous mode [ 87.180153][ T24] audit: type=1400 audit(1724057539.550:150): avc: denied { tracepoint } for pid=2314 comm="syz.0.523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 87.189808][ T2306] device veth0_vlan entered promiscuous mode [ 87.287782][ T2330] device syzkaller0 entered promiscuous mode [ 88.710401][ T2457] device pim6reg1 entered promiscuous mode [ 89.812805][ T24] audit: type=1400 audit(1724057542.180:151): avc: denied { create } for pid=2502 comm="syz.3.572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 89.882849][ T2503] device veth0_macvtap entered promiscuous mode [ 90.290582][ T2523] device syzkaller0 entered promiscuous mode [ 90.571943][ T2530] device pim6reg1 entered promiscuous mode [ 90.933161][ T24] audit: type=1400 audit(1724057543.300:152): avc: denied { create } for pid=2554 comm="syz.1.588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 91.019184][ T2556] device syzkaller0 entered promiscuous mode [ 91.233397][ T2584] device syzkaller0 entered promiscuous mode [ 91.263263][ T2589] device pim6reg1 entered promiscuous mode [ 91.518720][ T2602] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 91.529765][ T2602] pim6reg0: linktype set to 0 [ 91.535993][ T2602] device pim6reg1 entered promiscuous mode [ 91.822713][ T2637] device syzkaller0 entered promiscuous mode [ 91.945779][ T2644] device pim6reg1 entered promiscuous mode [ 93.777403][ T2787] device sit0 entered promiscuous mode [ 94.333357][ T2802] device veth0_vlan left promiscuous mode [ 94.345912][ T2802] device veth0_vlan entered promiscuous mode [ 94.438778][ T776] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.455625][ T776] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 94.520096][ T776] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 97.144857][ T2934] device syzkaller0 entered promiscuous mode [ 100.312340][ T3045] device pim6reg1 entered promiscuous mode [ 100.555053][ T3059] device sit0 entered promiscuous mode [ 101.367818][ T3113] device veth0_vlan left promiscuous mode [ 101.376039][ T3113] device veth0_vlan entered promiscuous mode [ 101.388115][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 101.396131][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 101.403365][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 101.601009][ T3173] syz.1.747[3173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.601055][ T3173] syz.1.747[3173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.630730][ T3173] device pim6reg1 entered promiscuous mode [ 101.651344][ T3186] syz.0.749[3186] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.651419][ T3186] syz.0.749[3186] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.897839][ T3219] device veth0_vlan left promiscuous mode [ 101.956398][ T3219] device veth0_vlan entered promiscuous mode [ 102.148151][ T3248] device syzkaller0 entered promiscuous mode [ 103.150505][ T3311] device pim6reg1 entered promiscuous mode [ 103.574709][ T3338] device sit0 left promiscuous mode [ 103.806950][ T3344] device sit0 entered promiscuous mode [ 104.314245][ T3363] bridge_slave_0: mtu greater than device maximum [ 104.816213][ T3379] device pim6reg1 entered promiscuous mode [ 105.875450][ T3424] device syzkaller0 entered promiscuous mode [ 106.291235][ T3467] device pim6reg1 entered promiscuous mode [ 106.500960][ T24] audit: type=1400 audit(1724057558.870:153): avc: denied { attach_queue } for pid=3464 comm="syz.3.829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 106.906644][ T3507] device syzkaller0 entered promiscuous mode [ 107.500162][ T3562] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.507197][ T3562] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.607381][ T3562] device bridge_slave_1 left promiscuous mode [ 107.613487][ T3562] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.621002][ T3562] device bridge_slave_0 left promiscuous mode [ 107.627033][ T3562] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.002274][ T3638] device syzkaller0 entered promiscuous mode [ 109.052533][ T3661] syz.4.878[3661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.052578][ T3661] syz.4.878[3661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.576955][ T3695] device syzkaller0 entered promiscuous mode [ 110.753033][ T3742] device veth1_macvtap left promiscuous mode [ 110.763329][ T24] audit: type=1400 audit(1724057563.130:154): avc: denied { ioctl } for pid=3740 comm="syz.1.903" path="socket:[25274]" dev="sockfs" ino=25274 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 110.876272][ T3743] device syzkaller0 entered promiscuous mode [ 110.938991][ T3742] device veth1_macvtap entered promiscuous mode [ 110.945475][ T3742] device macsec0 entered promiscuous mode [ 110.994904][ T3744] device pim6reg1 entered promiscuous mode [ 113.865634][ T3814] device pim6reg1 entered promiscuous mode [ 114.451652][ T3837] device syzkaller0 entered promiscuous mode [ 114.706775][ T3855] syz.4.936[3855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.706819][ T3855] syz.4.936[3855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.940531][ T3867] geneve1: tun_chr_ioctl cmd 1074025672 [ 114.996174][ T3867] geneve1: ignored: set checksum enabled [ 115.345564][ T3874] device wg2 left promiscuous mode [ 115.366350][ T3874] device wg2 entered promiscuous mode [ 115.613990][ T3902] device syzkaller0 entered promiscuous mode [ 115.783063][ T3909] syzkaller0: refused to change device tx_queue_len [ 117.881031][ T4042] device syzkaller0 entered promiscuous mode [ 118.693756][ T4094] device sit0 left promiscuous mode [ 118.820395][ T4099] device sit0 entered promiscuous mode [ 119.332473][ T4128] device veth0_vlan left promiscuous mode [ 119.352577][ T4128] device veth0_vlan entered promiscuous mode [ 119.585436][ T4141] device pim6reg1 entered promiscuous mode [ 119.757103][ T4149] device wg2 left promiscuous mode [ 119.797883][ T4152] device wg2 entered promiscuous mode [ 120.017533][ T4164] syz.0.1020[4164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.017584][ T4164] syz.0.1020[4164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.943958][ T4215] device pim6reg1 entered promiscuous mode [ 122.519622][ T4260] device syzkaller0 entered promiscuous mode [ 122.759397][ T4268] device syzkaller0 entered promiscuous mode [ 123.348530][ T4292] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 123.592487][ T4340] syz.3.1064[4340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.592531][ T4340] syz.3.1064[4340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.701918][ T4336] syz.4.1062[4336] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.817317][ T4336] syz.4.1062[4336] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.298213][ T4355] device syzkaller0 entered promiscuous mode [ 124.730929][ T4413] -: renamed from syzkaller0 [ 125.031795][ T4432] device sit0 left promiscuous mode [ 125.119912][ T4443] device sit0 entered promiscuous mode [ 125.964875][ T4489] device veth0_vlan left promiscuous mode [ 126.011582][ T4489] device veth0_vlan entered promiscuous mode [ 126.030616][ T781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 126.038589][ T781] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 126.045911][ T781] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 126.072380][ T4491] device veth1_macvtap left promiscuous mode [ 126.117886][ T24] audit: type=1400 audit(1724057578.490:155): avc: denied { create } for pid=4499 comm="syz.1.1106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 126.937546][ T24] audit: type=1400 audit(1724057579.310:156): avc: denied { append } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 127.134613][ T24] audit: type=1400 audit(1724057579.310:157): avc: denied { open } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 127.373419][ T24] audit: type=1400 audit(1724057579.310:158): avc: denied { getattr } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 129.181500][ T4581] bridge0: port 3(veth0_to_batadv) entered blocking state [ 129.188446][ T4581] bridge0: port 3(veth0_to_batadv) entered disabled state [ 129.195715][ T4581] device veth0_to_batadv entered promiscuous mode [ 129.202019][ T4581] bridge0: port 3(veth0_to_batadv) entered blocking state [ 129.208892][ T4581] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 129.305565][ T4594] device pim6reg1 entered promiscuous mode [ 130.339261][ T4617] device macsec0 entered promiscuous mode [ 132.260570][ T4675] device veth0_vlan left promiscuous mode [ 132.301211][ T4675] device veth0_vlan entered promiscuous mode [ 132.368560][ T774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.379562][ T774] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 132.388141][ T774] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 132.434239][ T4688] device syzkaller0 entered promiscuous mode [ 132.876885][ T24] audit: type=1400 audit(1724057585.250:159): avc: denied { write } for pid=4722 comm="syz.4.1164" name="cgroup.subtree_control" dev="cgroup2" ino=303 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 132.966031][ T24] audit: type=1400 audit(1724057585.280:160): avc: denied { open } for pid=4722 comm="syz.4.1164" path="" dev="cgroup2" ino=303 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 133.037460][ T4735] device pim6reg1 entered promiscuous mode [ 133.213133][ T4737] device syzkaller0 entered promiscuous mode [ 133.416009][ T4737] device syzkaller0 left promiscuous mode [ 133.812887][ T4762] device sit0 left promiscuous mode [ 135.636129][ T4839] device pim6reg1 entered promiscuous mode [ 135.645429][ T24] audit: type=1400 audit(1724057588.020:161): avc: denied { remove_name } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 135.654378][ T4838] device syzkaller0 entered promiscuous mode [ 135.667726][ T24] audit: type=1400 audit(1724057588.020:162): avc: denied { rename } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 135.700087][ T24] audit: type=1400 audit(1724057588.020:163): avc: denied { create } for pid=75 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 136.285790][ T4869] device bridge_slave_0 entered promiscuous mode [ 137.288117][ T4896] device pim6reg1 entered promiscuous mode [ 137.524880][ T4923] device syzkaller0 entered promiscuous mode [ 138.228543][ T4950] device syzkaller0 entered promiscuous mode [ 138.708453][ T4960] device syzkaller0 entered promiscuous mode [ 138.791263][ T4979] device bridge_slave_1 left promiscuous mode [ 138.797314][ T4979] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.804503][ T4979] device bridge_slave_0 left promiscuous mode [ 138.810604][ T4979] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.912663][ T4990] device syzkaller0 entered promiscuous mode [ 139.083910][ T5023] device pim6reg1 entered promiscuous mode [ 139.287578][ T5047] device pim6reg1 entered promiscuous mode [ 140.351462][ T5086] device vlan1 entered promiscuous mode [ 140.720240][ T5106] device syzkaller0 entered promiscuous mode [ 141.363145][ T5120] device syzkaller0 entered promiscuous mode [ 141.697086][ T5149] syz.3.1274[5149] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.697136][ T5149] syz.3.1274[5149] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.140875][ T5183] device veth0_vlan left promiscuous mode [ 142.180705][ T5183] device veth0_vlan entered promiscuous mode [ 142.442981][ T788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 142.459397][ T788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 142.553238][ T788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 142.707796][ T5237] device pim6reg1 entered promiscuous mode [ 143.277552][ T5276] device veth0_vlan left promiscuous mode [ 143.284145][ T5276] device veth0_vlan entered promiscuous mode [ 143.909386][ T5363] device pim6reg1 entered promiscuous mode [ 144.085211][ T5369] syzkaller0: tun_chr_ioctl cmd 1074025684 [ 144.109135][ T5369] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 144.231645][ T5395] device syzkaller0 entered promiscuous mode [ 144.392204][ T5416] device veth0_vlan left promiscuous mode [ 144.423465][ T5416] device veth0_vlan entered promiscuous mode [ 144.549788][ T5202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 144.557998][ T5202] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 144.570291][ T5202] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 144.588502][ T5438] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.595456][ T5438] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.793909][ T5452] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 144.879503][ T5452] device syzkaller0 entered promiscuous mode [ 145.079613][ T5478] device syz_tun entered promiscuous mode [ 145.313338][ T5488] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.320705][ T5488] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.331511][ T5488] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.338396][ T5488] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.386705][ T5488] device bridge0 entered promiscuous mode [ 145.475142][ T5490] device veth0_vlan left promiscuous mode [ 145.517206][ T5490] device veth0_vlan entered promiscuous mode [ 145.546874][ T790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 145.554862][ T790] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 145.605394][ T790] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 145.647478][ T5497] device wg2 entered promiscuous mode [ 145.948155][ T5200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 145.987279][ T5521] device pim6reg1 entered promiscuous mode [ 146.178424][ T24] audit: type=1400 audit(1724057598.550:164): avc: denied { create } for pid=5537 comm="syz.1.1374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 146.301182][ T5553] device syzkaller0 entered promiscuous mode [ 146.310170][ T5551] device pim6reg1 entered promiscuous mode [ 146.401622][ T5562] syz.2.1381[5562] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.401671][ T5562] syz.2.1381[5562] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.956668][ T5622] syz.1.1395[5622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.968678][ T5622] syz.1.1395[5622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.981570][ T5622] syz.1.1395[5622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.992829][ T5622] syz.1.1395[5622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.804153][ T5671] pim6reg: tun_chr_ioctl cmd 1074025677 [ 147.820766][ T5671] pim6reg: linktype set to 823 [ 148.243241][ T5701] syz.2.1420[5701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.243318][ T5701] syz.2.1420[5701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.394925][ T5702] syz.2.1420[5702] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.435352][ T5700] syz.2.1420[5700] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.497868][ T5700] syz.2.1420[5700] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.557423][ T5702] syz.2.1420[5702] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.371420][ T5843] device syzkaller0 entered promiscuous mode [ 151.165082][ T5857] device syzkaller0 entered promiscuous mode [ 151.293125][ T5885] device veth0_vlan left promiscuous mode [ 151.298904][ T5885] device veth0_vlan entered promiscuous mode [ 151.305470][ T5817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 151.313509][ T5817] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 151.321018][ T5817] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 152.324704][ T5966] device pim6reg1 entered promiscuous mode [ 153.147738][ T6005] device syzkaller0 entered promiscuous mode [ 154.395456][ T6085] device syzkaller0 entered promiscuous mode [ 155.462700][ T6152] device wg2 left promiscuous mode [ 157.542634][ T6254] device veth0_vlan left promiscuous mode [ 157.549001][ T6254] device veth0_vlan entered promiscuous mode [ 157.555851][ T4700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 157.564190][ T4700] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 157.571748][ T4700] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 157.584487][ T6251] device wg2 entered promiscuous mode [ 157.592999][ T6251] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 159.151261][ T6322] device veth0_vlan left promiscuous mode [ 159.188103][ T6322] device veth0_vlan entered promiscuous mode [ 159.488539][ T24] audit: type=1400 audit(1724057611.860:165): avc: denied { write } for pid=6334 comm="syz.0.1577" name="task" dev="proc" ino=31686 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 159.815216][ T24] audit: type=1400 audit(1724057611.890:166): avc: denied { add_name } for pid=6334 comm="syz.0.1577" name="cgroup.stat" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 160.228149][ T24] audit: type=1400 audit(1724057611.890:167): avc: denied { create } for pid=6334 comm="syz.0.1577" name="cgroup.stat" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 160.481249][ T24] audit: type=1400 audit(1724057611.890:168): avc: denied { associate } for pid=6334 comm="syz.0.1577" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 161.367941][ T6356] device syzkaller0 entered promiscuous mode [ 161.514541][ T6417] device syzkaller0 entered promiscuous mode [ 163.278651][ T6457] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.285581][ T6457] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.335190][ T6457] device bridge0 left promiscuous mode [ 163.369293][ T6458] device bridge_slave_1 left promiscuous mode [ 163.377197][ T6458] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.384635][ T6458] device bridge_slave_0 left promiscuous mode [ 163.390919][ T6458] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.249680][ T6587] device sit0 entered promiscuous mode [ 181.311273][ T6586] device macsec0 entered promiscuous mode [ 181.337280][ T6616] bpf_get_probe_write_proto: 2 callbacks suppressed [ 181.337289][ T6616] syz.1.1644[6616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.345394][ T6616] syz.1.1644[6616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.366151][ T6616] syz.1.1644[6616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.497631][ T6616] syz.1.1644[6616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.253586][ T6667] device wg2 left promiscuous mode [ 182.512323][ T6678] device syzkaller0 entered promiscuous mode [ 183.784911][ T6770] device syzkaller0 left promiscuous mode [ 183.816789][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 183.937481][ T6790] device sit0 left promiscuous mode [ 184.023723][ T6799] device wg2 entered promiscuous mode [ 184.032121][ T6799] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 184.048548][ T6790] device sit0 entered promiscuous mode [ 185.490770][ T6862] device sit0 left promiscuous mode [ 185.575131][ T6862] device veth0_vlan left promiscuous mode [ 185.613133][ T6862] device veth0_vlan entered promiscuous mode [ 185.703559][ T6871] device sit0 left promiscuous mode [ 185.717819][ T4702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.730196][ T4702] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.745348][ T4702] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 185.825705][ T6880] device pim6reg1 entered promiscuous mode [ 185.833058][ T6885] device sit0 entered promiscuous mode [ 186.316971][ T6906] device veth1_macvtap entered promiscuous mode [ 186.425133][ T4697] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 187.070525][ T6937] device pim6reg1 entered promiscuous mode [ 187.491660][ T6978] device syzkaller0 entered promiscuous mode [ 187.564058][ T7008] bridge0: port 3(veth0_to_batadv) entered disabled state [ 187.571077][ T7008] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.577936][ T7008] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.587238][ T7006] device veth0_to_batadv left promiscuous mode [ 187.593238][ T7006] bridge0: port 3(veth0_to_batadv) entered disabled state [ 187.600764][ T7006] device bridge_slave_1 left promiscuous mode [ 187.607433][ T7006] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.614659][ T7006] device bridge_slave_0 left promiscuous mode [ 187.620878][ T7006] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.050321][ T7050] device syzkaller0 entered promiscuous mode [ 188.080969][ T7052] device veth0_vlan left promiscuous mode [ 188.102777][ T7052] device veth0_vlan entered promiscuous mode [ 188.179149][ T788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.188267][ T788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.200268][ T788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 188.448073][ T7060] device veth0_vlan left promiscuous mode [ 188.550301][ T7060] device veth0_vlan entered promiscuous mode [ 188.602148][ T790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.625685][ T790] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.633054][ T790] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 188.736681][ T7084] device pim6reg1 entered promiscuous mode [ 188.795677][ T7085] device syzkaller0 entered promiscuous mode [ 189.970858][ T7207] device sit0 left promiscuous mode [ 191.892808][ T7288] device pim6reg1 entered promiscuous mode [ 192.189970][ T7316] device veth0_vlan left promiscuous mode [ 192.229735][ T7316] device veth0_vlan entered promiscuous mode [ 192.354276][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 192.363267][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 192.370542][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 192.705804][ T7367] device syzkaller0 entered promiscuous mode [ 192.848325][ T7377] device sit0 entered promiscuous mode [ 194.180299][ T7481] geneve1: tun_chr_ioctl cmd 19271 [ 194.926233][ T7520] device syzkaller0 entered promiscuous mode [ 194.940196][ T7526] device syzkaller0 entered promiscuous mode [ 195.792992][ T7632] device syzkaller0 entered promiscuous mode [ 196.165490][ T7640] device pim6reg1 entered promiscuous mode [ 196.173316][ T7642] syz.2.1925[7642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.173370][ T7642] syz.2.1925[7642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.186107][ T7642] syz.2.1925[7642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.197429][ T7642] syz.2.1925[7642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.215083][ T7690] device batadv_slave_0 entered promiscuous mode [ 197.246855][ T7692] bridge0: port 3(veth0_to_batadv) entered blocking state [ 197.258372][ T7692] bridge0: port 3(veth0_to_batadv) entered disabled state [ 197.267943][ T7692] device veth0_to_batadv entered promiscuous mode [ 197.274284][ T7692] bridge0: port 3(veth0_to_batadv) entered blocking state [ 197.281126][ T7692] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 197.329493][ T7709] device syzkaller0 entered promiscuous mode [ 197.396763][ T7714] device pim6reg1 entered promiscuous mode [ 197.521417][ T7731] device wg2 entered promiscuous mode [ 197.596174][ T7742] device sit0 left promiscuous mode [ 198.011879][ T7823] syz.3.1973[7823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.011920][ T7823] syz.3.1973[7823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.700994][ T7865] syz.0.1980[7865] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.850152][ T7865] syz.0.1980[7865] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.994077][ T7876] device syzkaller0 entered promiscuous mode [ 199.089647][ T7907] rose0: tun_chr_ioctl cmd 1074025681 [ 199.109629][ T7908] device veth1_macvtap left promiscuous mode [ 199.539022][ T7930] device syzkaller0 entered promiscuous mode [ 199.911387][ T7953] ªªªªªª: renamed from vlan0 [ 199.919274][ T7957] syz.2.2004[7957] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.919321][ T7957] syz.2.2004[7957] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.967847][ T8014] device syzkaller0 entered promiscuous mode [ 201.172564][ T788] syzkaller0: tun_net_xmit 48 [ 201.243006][ T8014] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 201.268090][ T8039] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 201.273706][ T8039] syzkaller0: Linktype set failed because interface is up [ 202.121381][ T8067] device veth1_macvtap left promiscuous mode [ 202.134244][ T8067] device macsec0 left promiscuous mode [ 202.579585][ T8134] syz.1.2051[8134] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.579626][ T8134] syz.1.2051[8134] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.783400][ T8189] device pim6reg1 entered promiscuous mode [ 205.443031][ T8271] syz.4.2087[8271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.443074][ T8271] syz.4.2087[8271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.460566][ T8269] device syzkaller0 entered promiscuous mode [ 205.696682][ T8295] device veth0_vlan left promiscuous mode [ 205.702525][ T8295] device veth0_vlan entered promiscuous mode [ 205.714704][ T795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 205.724545][ T795] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 205.731979][ T795] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 205.743881][ T24] audit: type=1400 audit(1724057658.110:169): avc: denied { ioctl } for pid=8296 comm="syz.1.2095" path="net:[4026533226]" dev="nsfs" ino=4026533226 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 205.886913][ T8336] syz.0.2103[8336] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.887115][ T8336] syz.0.2103[8336] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.278765][ T8346] ªªªªªª: renamed from vlan0 [ 206.934770][ T8379] syz.1.2117[8379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.934821][ T8379] syz.1.2117[8379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.433154][ T8392] cgroup: fork rejected by pids controller in /syz4 [ 207.590865][ T8418] device syzkaller0 entered promiscuous mode [ 207.916326][ T8540] syz_tun: tun_net_xmit 1514 [ 207.920860][ T8540] syz_tun: tun_net_xmit 1514 [ 207.925287][ T8540] syz_tun: tun_net_xmit 636 [ 208.006441][ T8537] device syzkaller0 entered promiscuous mode [ 208.013656][ T8540] syz_tun: tun_net_xmit 1514 [ 208.018111][ T8540] syz_tun: tun_net_xmit 1514 [ 208.022510][ T8540] syz_tun: tun_net_xmit 636 [ 208.028524][ T8540] syz_tun: tun_net_xmit 1514 [ 208.033044][ T8540] syz_tun: tun_net_xmit 1514 [ 208.037499][ T8540] syz_tun: tun_net_xmit 636 [ 208.042090][ T8540] syz_tun: tun_net_xmit 1514 [ 208.046524][ T8540] syz_tun: tun_net_xmit 1514 [ 208.050922][ T8540] syz_tun: tun_net_xmit 636 [ 208.055441][ T8540] syz_tun: tun_net_xmit 1514 [ 208.059861][ T8540] syz_tun: tun_net_xmit 1514 [ 208.064271][ T8540] syz_tun: tun_net_xmit 636 [ 208.068823][ T8540] syz_tun: tun_net_xmit 1514 [ 208.073249][ T8540] syz_tun: tun_net_xmit 1514 [ 208.077674][ T8540] syz_tun: tun_net_xmit 636 [ 208.082185][ T8540] syz_tun: tun_net_xmit 1514 [ 208.086727][ T8540] syz_tun: tun_net_xmit 1514 [ 208.091103][ T8540] syz_tun: tun_net_xmit 636 [ 208.095860][ T8540] syz_tun: tun_net_xmit 1514 [ 208.100288][ T8540] syz_tun: tun_net_xmit 1514 [ 208.104697][ T8540] syz_tun: tun_net_xmit 636 [ 208.109186][ T8540] syz_tun: tun_net_xmit 1514 [ 208.113595][ T8540] syz_tun: tun_net_xmit 1514 [ 208.118039][ T8540] syz_tun: tun_net_xmit 636 [ 208.122516][ T8540] syz_tun: tun_net_xmit 1514 [ 208.126948][ T8540] syz_tun: tun_net_xmit 1514 [ 208.131347][ T8540] syz_tun: tun_net_xmit 636 [ 208.137208][ T8540] syz_tun: tun_net_xmit 1514 [ 208.141622][ T8540] syz_tun: tun_net_xmit 1514 [ 208.146076][ T8540] syz_tun: tun_net_xmit 636 [ 208.152292][ T8540] syz_tun: tun_net_xmit 1514 [ 208.156757][ T8540] syz_tun: tun_net_xmit 1514 [ 208.161144][ T8540] syz_tun: tun_net_xmit 636 [ 208.374687][ T8540] syz_tun: tun_net_xmit 1514 [ 208.379310][ T8540] syz_tun: tun_net_xmit 1514 [ 208.383667][ T8540] syz_tun: tun_net_xmit 636 [ 208.429906][ T8540] syz_tun: tun_net_xmit 1514 [ 208.434464][ T8540] syz_tun: tun_net_xmit 1514 [ 208.438926][ T8540] syz_tun: tun_net_xmit 636 [ 208.450413][ T8540] syz_tun: tun_net_xmit 1514 [ 208.454848][ T8540] syz_tun: tun_net_xmit 1514 [ 208.459283][ T8540] syz_tun: tun_net_xmit 636 [ 208.468565][ T8540] syz_tun: tun_net_xmit 1514 [ 208.472993][ T8540] syz_tun: tun_net_xmit 1514 [ 208.477441][ T8540] syz_tun: tun_net_xmit 636 [ 208.482193][ T8540] syz_tun: tun_net_xmit 1514 [ 208.486620][ T8540] syz_tun: tun_net_xmit 1514 [ 208.491027][ T8540] syz_tun: tun_net_xmit 636 [ 208.495994][ T8540] syz_tun: tun_net_xmit 1514 [ 208.500427][ T8540] syz_tun: tun_net_xmit 1514 [ 208.504832][ T8540] syz_tun: tun_net_xmit 636 [ 208.509545][ T8540] syz_tun: tun_net_xmit 1514 [ 208.513964][ T8540] syz_tun: tun_net_xmit 1514 [ 208.518403][ T8540] syz_tun: tun_net_xmit 636 [ 208.528816][ T8540] syz_tun: tun_net_xmit 1514 [ 208.533262][ T8540] syz_tun: tun_net_xmit 1514 [ 208.537691][ T8540] syz_tun: tun_net_xmit 636 [ 208.549651][ T8540] syz_tun: tun_net_xmit 1514 [ 208.554185][ T8540] syz_tun: tun_net_xmit 1514 [ 208.558649][ T8540] syz_tun: tun_net_xmit 636 [ 208.564181][ T8540] syz_tun: tun_net_xmit 1514 [ 208.568735][ T8540] syz_tun: tun_net_xmit 1514 [ 208.573125][ T8540] syz_tun: tun_net_xmit 636 [ 208.577667][ T8540] syz_tun: tun_net_xmit 1514 [ 208.582107][ T8540] syz_tun: tun_net_xmit 1514 [ 208.586532][ T8540] syz_tun: tun_net_xmit 636 [ 208.591273][ T8540] syz_tun: tun_net_xmit 1514 [ 208.595723][ T8540] syz_tun: tun_net_xmit 1514 [ 208.600115][ T8540] syz_tun: tun_net_xmit 636 [ 208.600440][ T8546] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.611314][ T8546] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.618746][ T8546] device bridge_slave_0 entered promiscuous mode [ 208.628025][ T8540] syz_tun: tun_net_xmit 1514 [ 208.632442][ T8540] syz_tun: tun_net_xmit 1514 [ 208.636905][ T8540] syz_tun: tun_net_xmit 636 [ 208.641374][ T8540] syz_tun: tun_net_xmit 1514 [ 208.645816][ T8540] syz_tun: tun_net_xmit 1514 [ 208.650199][ T8540] syz_tun: tun_net_xmit 636 [ 208.654627][ T8540] syz_tun: tun_net_xmit 1514 [ 208.658992][ T8540] syz_tun: tun_net_xmit 1514 [ 208.663406][ T8540] syz_tun: tun_net_xmit 636 [ 208.667842][ T8540] syz_tun: tun_net_xmit 1514 [ 208.672179][ T8540] syz_tun: tun_net_xmit 1514 [ 208.676620][ T8540] syz_tun: tun_net_xmit 636 [ 208.734665][ T8546] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.741728][ T8546] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.749091][ T8546] device bridge_slave_1 entered promiscuous mode [ 208.830768][ T24] audit: type=1400 audit(1724057661.200:170): avc: denied { create } for pid=8546 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 208.836329][ T8546] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.857936][ T8546] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.858053][ T24] audit: type=1400 audit(1724057661.200:171): avc: denied { write } for pid=8546 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 208.865004][ T8546] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.886574][ T24] audit: type=1400 audit(1724057661.200:172): avc: denied { read } for pid=8546 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 208.892028][ T8546] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.933641][ T785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.941096][ T785] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.950033][ T785] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.961200][ T785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 208.969161][ T785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 208.976961][ T785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 209.047886][ T3033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 209.055908][ T3033] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 209.063130][ T3033] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 209.089070][ T8546] device veth0_vlan entered promiscuous mode [ 209.181144][ T8546] device veth1_macvtap entered promiscuous mode [ 209.194353][ T795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 209.206189][ T785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 209.220158][ T795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 210.255718][ T8628] device syzkaller0 entered promiscuous mode [ 210.335616][ T8639] device pim6reg1 entered promiscuous mode [ 210.939142][ T8691] device pim6reg1 entered promiscuous mode [ 211.421458][ T8738] device sit0 entered promiscuous mode [ 211.566524][ T8759] device syzkaller0 entered promiscuous mode [ 211.583596][ T8760] device syzkaller0 entered promiscuous mode [ 215.739151][ T8794] device syzkaller0 entered promiscuous mode [ 215.983584][ T8819] device veth1_macvtap left promiscuous mode [ 215.990178][ T8819] device macsec0 entered promiscuous mode [ 216.025287][ T8817] syz.0.2214[8817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.025326][ T8817] syz.0.2214[8817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.242846][ T8830] device syzkaller0 entered promiscuous mode [ 216.325273][ T8853] syz.2.2221[8853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.325314][ T8853] syz.2.2221[8853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.514495][ T8897] device syzkaller0 entered promiscuous mode [ 219.535624][ T8904] device sit0 left promiscuous mode [ 219.550772][ T8904] device sit0 entered promiscuous mode [ 219.639895][ T8919] device syzkaller0 entered promiscuous mode [ 219.871321][ T8944] device syzkaller0 entered promiscuous mode [ 220.336794][ T9006] device veth1_macvtap entered promiscuous mode [ 220.352053][ T9006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 221.850431][ T9097] tap0: tun_chr_ioctl cmd 2148553947 [ 221.855773][ T9096] tap0: tun_chr_ioctl cmd 2148553947 [ 222.216384][ T9118] syz_tun: tun_net_xmit 86 [ 223.259736][ C1] syz_tun: tun_net_xmit 86 [ 223.567637][ T9216] syz.1.2324[9216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.567681][ T9216] syz.1.2324[9216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.089474][ T9277] device xfrm0 entered promiscuous mode [ 224.285549][ C1] syz_tun: tun_net_xmit 86 [ 224.401287][ T9285] device syzkaller0 entered promiscuous mode [ 225.402829][ T9330] ref_ctr_offset mismatch. inode: 0x852 offset: 0x0 ref_ctr_offset(old): 0x7602 ref_ctr_offset(new): 0x0 [ 225.590819][ T9354] device wg2 entered promiscuous mode [ 225.792475][ T9377] device pim6reg1 entered promiscuous mode [ 225.799486][ T9380] syz.3.2371[9380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.799527][ T9380] syz.3.2371[9380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 228.073180][ T9537] syz.3.2411[9537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 228.297927][ T9537] syz.3.2411[9537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 228.901522][ T9573] device pim6reg1 entered promiscuous mode [ 229.098675][ T9600] syz_tun: tun_net_xmit 1 [ 229.108718][ T9600] syz_tun: tun_net_xmit 1 [ 229.120684][ T9600] syz_tun: tun_net_xmit 1 [ 229.148083][ T9600] syz_tun: tun_net_xmit 1 [ 229.163489][ T9600] syz_tun: tun_net_xmit 1 [ 229.185146][ T9600] syz_tun: tun_net_xmit 1 [ 229.247631][ T9600] syz_tun: tun_net_xmit 1 [ 229.257600][ T9600] syz_tun: tun_net_xmit 1 [ 229.266120][ T9600] syz_tun: tun_net_xmit 1 [ 229.272520][ T9600] syz_tun: tun_net_xmit 1 [ 229.307552][ T9600] syz_tun: tun_net_xmit 1 [ 229.395096][ T9600] syz_tun: tun_net_xmit 1 [ 229.399257][ T9600] syz_tun: tun_net_xmit 1 [ 229.403417][ T9600] syz_tun: tun_net_xmit 1 [ 229.460069][ T9600] syz_tun: tun_net_xmit 1 [ 229.464307][ T9600] syz_tun: tun_net_xmit 1 [ 229.525203][ T9600] syz_tun: tun_net_xmit 1 [ 229.529386][ T9600] syz_tun: tun_net_xmit 1 [ 229.533559][ T9600] syz_tun: tun_net_xmit 1 [ 229.537988][ T9600] syz_tun: tun_net_xmit 1 [ 229.542133][ T9600] syz_tun: tun_net_xmit 1 [ 229.546870][ T9600] syz_tun: tun_net_xmit 1 [ 229.552048][ T9600] syz_tun: tun_net_xmit 1 [ 229.569755][ T9600] syz_tun: tun_net_xmit 1 [ 229.573907][ T9600] syz_tun: tun_net_xmit 1 [ 229.578102][ T9600] syz_tun: tun_net_xmit 1 [ 229.582294][ T9600] syz_tun: tun_net_xmit 1 [ 229.586750][ T9600] syz_tun: tun_net_xmit 1 [ 229.590939][ T9600] syz_tun: tun_net_xmit 1 [ 229.596346][ T9600] syz_tun: tun_net_xmit 1 [ 229.600534][ T9600] syz_tun: tun_net_xmit 1 [ 229.604684][ T9600] syz_tun: tun_net_xmit 1 [ 229.609209][ T9600] syz_tun: tun_net_xmit 1 [ 229.613388][ T9600] syz_tun: tun_net_xmit 1 [ 229.659271][ T9600] syz_tun: tun_net_xmit 1 [ 229.669004][ T9600] syz_tun: tun_net_xmit 1 [ 229.673369][ T9600] syz_tun: tun_net_xmit 1 [ 229.691640][ T9600] syz_tun: tun_net_xmit 1 [ 229.696338][ T9600] syz_tun: tun_net_xmit 1 [ 229.701537][ T9600] syz_tun: tun_net_xmit 1 [ 229.707548][ T9600] syz_tun: tun_net_xmit 1 [ 229.711725][ T9600] syz_tun: tun_net_xmit 1 [ 229.716402][ T9600] syz_tun: tun_net_xmit 1 [ 229.721268][ T9600] syz_tun: tun_net_xmit 1 [ 229.725767][ T9600] syz_tun: tun_net_xmit 1 [ 229.730221][ T9600] syz_tun: tun_net_xmit 1 [ 229.734428][ T9600] syz_tun: tun_net_xmit 1 [ 229.767412][ T9600] syz_tun: tun_net_xmit 1 [ 229.798012][ T9600] syz_tun: tun_net_xmit 1 [ 229.885298][ T9600] syz_tun: tun_net_xmit 1 [ 229.965704][ T9600] syz_tun: tun_net_xmit 1 [ 229.970084][ T9600] syz_tun: tun_net_xmit 1 [ 230.006523][ T9600] syz_tun: tun_net_xmit 1 [ 230.011887][ T9600] syz_tun: tun_net_xmit 1 [ 230.036145][ T9600] syz_tun: tun_net_xmit 1 [ 230.040297][ T9600] syz_tun: tun_net_xmit 1 [ 230.044460][ T9600] syz_tun: tun_net_xmit 1 [ 230.048995][ T9600] syz_tun: tun_net_xmit 1 [ 230.053367][ T9600] syz_tun: tun_net_xmit 1 [ 230.219015][ T9651] Â: renamed from pim6reg1 [ 230.392124][ T9650] bridge0: port 3(veth0_to_batadv) entered blocking state [ 230.400174][ T9650] bridge0: port 3(veth0_to_batadv) entered disabled state [ 230.476978][ T9650] device veth0_to_batadv entered promiscuous mode [ 230.495448][ T9650] bridge0: port 3(veth0_to_batadv) entered blocking state [ 230.502631][ T9650] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 230.530260][ T9655] device veth0_to_batadv left promiscuous mode [ 230.568054][ T9655] bridge0: port 3(veth0_to_batadv) entered disabled state [ 230.917385][ T9714] device sit0 entered promiscuous mode [ 230.999601][ T9714] device bridge0 entered promiscuous mode [ 231.947861][ T9758] gretap0: refused to change device tx_queue_len [ 236.346608][ T9942] ªªªªªª: renamed from vlan0 [ 236.673686][ T9952] syz.1.2532[9952] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.673745][ T9952] syz.1.2532[9952] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.155647][ T9993] syz.1.2543[9993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.259019][ T9993] syz.1.2543[9993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.309136][T10003] ref_ctr_offset mismatch. inode: 0xa66 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x7602 [ 237.433944][T10009] syz.1.2548[10009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.433992][T10009] syz.1.2548[10009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.551744][T10011] syz.0.2549[10011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.671419][T10011] syz.0.2549[10011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.517180][ T24] audit: type=1400 audit(1724057691.890:173): avc: denied { setattr } for pid=10148 comm="syz.2.2587" path="pipe:[16043]" dev="pipefs" ino=16043 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 240.015011][T10194] device veth1_macvtap left promiscuous mode [ 240.138881][T10216] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 243.054340][T10408] device lo entered promiscuous mode [ 252.804371][T10483] syz.3.2681[10483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.804417][T10483] syz.3.2681[10483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.796441][ T322] device bridge_slave_1 left promiscuous mode [ 253.943680][ T322] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.009232][ T322] device bridge_slave_0 left promiscuous mode [ 254.029861][ T322] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.046565][ T322] device veth0_vlan left promiscuous mode [ 254.323007][T10553] device wg2 left promiscuous mode [ 259.245136][T10725] syz.2.2745[10725] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.245188][T10725] syz.2.2745[10725] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.297156][T10725] syz.2.2745[10725] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.411994][T10811] device wg2 left promiscuous mode [ 263.449555][T10811] device wg2 entered promiscuous mode [ 273.584265][T10917] ªªªªªª: renamed from vlan0 [ 276.969219][T10974] device veth0_vlan left promiscuous mode [ 277.015987][T10974] device veth0_vlan entered promiscuous mode [ 277.022819][ T1357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 277.043989][ T1357] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 277.055876][ T1357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 285.522933][T11102] device wg2 left promiscuous mode [ 285.559864][T11103] device wg2 entered promiscuous mode SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=4 req=2678 state=3 status=67 (errno 32: Broken pipe) [ 289.376289][ T466] device veth0_to_batadv left promiscuous mode [ 289.382506][ T466] bridge0: port 3(veth0_to_batadv) entered disabled state [ 289.389780][ T466] device bridge_slave_1 left promiscuous mode [ 289.395697][ T466] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.402826][ T466] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.412081][ T466] device veth0_vlan left promiscuous mode [ 289.417791][ T466] device veth1_macvtap left promiscuous mode [ 289.423685][ T466] device veth1_macvtap left promiscuous mode [ 289.429430][ T466] device veth0_vlan left promiscuous mode