last executing test programs: 9.366443925s ago: executing program 3 (id=3398): bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x0, 0x0, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000380), 0x20000000}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r3, 0x0, 0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000540)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454da, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 7.897303305s ago: executing program 3 (id=3410): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x10) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x19, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r4}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r5, 0x0, 0x0) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)=@generic={&(0x7f00000003c0)='./file0\x00'}, 0x18) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r6, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) (async) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) 7.855571878s ago: executing program 3 (id=3411): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x2683d291, 0xb, 0xb, 0x2124, 0xffffffffffffffff, 0xb4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x8, &(0x7f0000001dc0)=ANY=[@ANYBLOB="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"/3816], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x11, &(0x7f0000001000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085100000010000009500000000000000bf91101000000000b7020000000000008500000000000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x0, 0x200008, 0x1}, 0x99) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x5}, 0x48) (async, rerun: 32) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) (async, rerun: 32) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)=@generic={&(0x7f00000004c0)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r7}, 0x18) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x90) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) (async, rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{}, &(0x7f0000000000), &(0x7f00000002c0)}, 0x20) (async, rerun: 64) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89a0, &(0x7f0000000080)) 7.779360594s ago: executing program 3 (id=3416): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], 0x0, 0x27, &(0x7f0000000140)=[{}, {}], 0x10, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x53, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0xd1b, '\x00', r1, 0xffffffffffffffff, 0x2, 0x4, 0x1}, 0x48) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000400), 0x2, 0x0) write$cgroup_freezer_state(r3, &(0x7f0000000440)='FROZEN\x00', 0x7) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@func={0x1, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x5f, 0xfbffa91bcb8a8e44, 0x5f, 0x30]}}, &(0x7f00000004c0)=""/231, 0x2a, 0xe7, 0x1, 0xffffffff}, 0x20) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x4, '\x00', 0x0, r4, 0x0, 0x2}, 0x48) r6 = perf_event_open$cgroup(&(0x7f0000000740)={0x1, 0x80, 0xfb, 0x7, 0x81, 0xf9, 0x0, 0x65, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0x1, 0x8000000000000001}, 0x4000, 0x9, 0xf, 0xe, 0x9, 0x8001, 0x1000, 0x0, 0x3d, 0x0, 0xbbf4}, r0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000006c0)={0x0, 0x80, 0x69, 0x2a, 0x3, 0x19, 0x0, 0x75c6, 0x2011, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x164d, 0x0, @perf_bp={&(0x7f0000000680), 0x4}, 0x140, 0x4, 0x200, 0x1, 0xff, 0x1ff, 0x7, 0x0, 0x8c, 0x0, 0x10}, 0xffffffffffffffff, 0xffffffffffffffff, r6, 0xa) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000800)={0x4, &(0x7f00000007c0)=[{0x6, 0xd, 0x4f, 0xf3c4}, {0x4, 0x5, 0x8, 0x7}, {0xfaac, 0x1, 0x7, 0x7f}, {0x8, 0x75, 0xec, 0x4}]}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000840), 0x882, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000880)={'veth0_to_batadv\x00', 0x2000}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000008c0), 0x82c40, 0x0) ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000940)={0x4, &(0x7f0000000900)=[{0x3, 0x17, 0x5, 0x2b8}, {0x561d, 0x6, 0x1, 0x7}, {0x2, 0x6, 0x0, 0x6}, {0x2, 0x13, 0x81}]}) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000980)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x2, '\x00', 0x0, r4, 0x4, 0x1, 0x5}, 0x48) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) ioctl$TUNDETACHFILTER(r7, 0x401054d6, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000a00)=r1) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001d40)={&(0x7f0000000a40)="be3feb0c0405147251a529a4d0940ca14f21d45dba3a6af28082ead0d20723d0f51024ee185a745ea64bdf3e6c6f79dbdf49d7a5f1cd75ae30b55c1800e6f8f22bbfcdf3ad2fd60ef9fb7cf6bc2a0b300d810dc6b6408bfd30c2b3db8202743832e5003dfc29ee24ff543197cde549c8da25a7738ce83e54e6b7e5d32e71a8aa834e3c3d11a8a48c886adc823580059d57f8807c7d5d6b1db3de5e1957ac436d95426c45d071dc2d26bc5bb931687a58dceb7f3b6aeb9547076862e5e251973b28e0770f8ba8053fcd26a393e297fc0cc933eaaac5e04c5ee7cdbd637db7f70f402bb55be4b55658c64aad34fba291e7e245f0f3cf5bd5", &(0x7f0000000b40)=""/232, &(0x7f0000000c40)="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", &(0x7f0000001c40)="af22d2af092e1729f7e5e6847e5c1e4a94942a7fcd9572f900fa84e8a360a29746fd99dd6827eed652a7a20b2f7917863a42eabf912a0e68ad90adbbd612badddaffb4dc9947e88c32b5a56bbc5287e0695807762441b9064750a59d030184927c8adcdf4be68f34c6c03b113f545dcc3746fab521021e12e8492dc797ffa743fe5300bb404f9fbc36279b6b4bc99038835d2d1041b794e258db8b0cb4df3560e9b5cbb5ff4520f5d3d4ccf9266ba60b0e7e9a3dec7a5ba540ec7380a43ce917884e8147aea1563fa16e", 0x60, r2}, 0x38) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d80)={0x400, 0x0}, 0x8) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001dc0)={r10, 0x55f, 0x8}, 0xc) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000001e00)='devices.deny\x00', 0x2, 0x0) r12 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000022c0)={0x6, 0x22, &(0x7f0000002000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5e60, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@generic={0x2, 0x2, 0x4, 0x8, 0xeaf8}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r11}}, @tail_call], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000002140)='syzkaller\x00', 0x7, 0x17, &(0x7f0000002180)=""/23, 0x41100, 0x40, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f00000021c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000002200)={0x3, 0x10, 0x95, 0x6}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000002240)=[r11, r9, r11], &(0x7f0000002280)=[{0x2, 0x5, 0x2, 0x4}, {0x4, 0x1, 0xe, 0xc}, {0x0, 0x3, 0x7, 0x7}], 0x10, 0x10001}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000002440)={0x12, 0x3, &(0x7f0000001e40)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x8, 0x0, 0x4, 0xe, 0x10}], &(0x7f0000001e80)='GPL\x00', 0x7, 0xd2, &(0x7f0000001ec0)=""/210, 0x40f00, 0x0, '\x00', r1, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000001fc0)={0x6, 0x2}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r12, 0x6, &(0x7f0000002380)=[r2, r9, r5], &(0x7f00000023c0)=[{0x0, 0x2, 0xf, 0x3}, {0x4, 0x2, 0x7, 0x7}, {0x5, 0x2, 0x7}, {0x3, 0x2, 0x1, 0x7}, {0x4, 0x4, 0xa, 0x1}, {0x2, 0x4, 0x8, 0xa}], 0x10, 0x2}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r13, &(0x7f0000002840)={&(0x7f0000002540), 0x6e, &(0x7f0000002800)=[{&(0x7f00000025c0)=""/18, 0x12}, {&(0x7f0000002600)=""/224, 0xe0}, {&(0x7f0000002700)=""/251, 0xfb}], 0x3}, 0x2001) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000002880)={0x2}, 0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000002900)={0x1, 0x80, 0x6, 0x1, 0xa, 0x77, 0x0, 0x8, 0xc3008, 0x4, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000028c0), 0x5}, 0x1808a, 0x1e1, 0x100000, 0x4, 0xa, 0x8, 0x8, 0x0, 0xfffffffa, 0x0, 0x200}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002980)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002cc0)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x80000000, '\x00', 0x0, r4, 0x5, 0x5}, 0x48) 7.741468777s ago: executing program 3 (id=3417): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000f40)=ANY=[@ANYBLOB="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"/527, @ANYRES32, @ANYRES32=r0], 0x0, 0x0, 0xffffff0f}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x14, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xe24}, {0x0, 0x4000}, {0x0}, {0x0}, {&(0x7f00000020c0), 0x500}], 0x5}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xc, 0x6, 0x8, 0x0, 0x296, 0xffffffffffffffff, 0x0, '\x00', 0x0, r4}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x3}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) 7.059506543s ago: executing program 3 (id=3421): r0 = gettid() r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xcf, 0x0, 0x3, 0xb7, 0x0, 0x17742a16, 0x10000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xe0dd, 0x4, @perf_config_ext={0xd26, 0x101}, 0x8000, 0x8, 0x5, 0x6, 0x3, 0x1ff, 0x8001, 0x0, 0x6, 0x0, 0x42}, r0, 0x5, 0xffffffffffffffff, 0xe) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@generic={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x18) (async) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)=@o_path={&(0x7f0000000100)='./file0\x00', 0x0, 0x10, r1}, 0x18) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000180)={r2, r3}, 0xc) (async) sendmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f00000001c0)=@isdn={0x22, 0x7, 0x9, 0x61, 0xb0}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000240)="6158e45ca50c0d12a5e171e9cab0db5d24c8a9a4f6529e57dce9c9331804448f91871c66e365e1c7ccc4a52896673b891a05a2d4ca755c865c530825ca35224f1dff8bf0fe2508af8b99d11893168e77c9af2fa3060de6a7244abb874cf3d0d0903e9d43bca9d1671a9059a5b57382cb40a0137a364ed7fcff0f8ceacc923c2f2d826f9bf179a6f275f440b0dd3b8182f78b3800bf1a546a285e2ba295688652364ba808750f051933e1bf75408de16bfb7c8e5b94762b9e4571b5ae5226e232e2b021d63c52b103800366c9e91b81f2bd4f4e59d24d57b2975fdecb010dc9b2c2a1339974fb399da642fab8ad9bdbae", 0xf0}, {&(0x7f0000000340)="dbf4953e6ff5a5c8839fe7d293bf37790faa7e2395cdbe45954f58c13561b2a7f962309ccd5e64aaacc34167408d67e40937c5ea118e050d1d917f116900ade821ea9c0ccfdf51958427a79987a4d472d51c29c5f22f39ad4e0cc961c1c4580350b79c56d1a8cefab6db8d134b724043e7fb8eecd23689b10cfdf6e1e8ae84ac3fbd79c0274b8c833fb716d47df4e0de3fdba9a36fe0cb6b64623d4d6a5e4e351d712647695a57385f4b7f03c88a21efba857f9bd004d4f3a9a0f6bbd656a6b063836eb12fda", 0xc6}, {&(0x7f0000000440)="cc55da94b037bcacad574103855d29ad6fc731369f68f4311c6dbee150b1d3049d06f5acc3fe8ac12d160f17775b7a0c5fd100b47d183186fd23486c7d98c421eba329fe62911e09338de57a68c2f457fc3b9a7f2d5a0df6f82f1ec6d114e3fe9ff65da9d0d74b59a30767e1ff3417678bced89d559678d9781e0151e7ec5ac7d141c2cab54b39a2ef675f89", 0x8c}, {&(0x7f0000000500)="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", 0xfb}, {&(0x7f0000000600)="e1a50863adf0dc9d7c262e372dd6552e2c9f9b845cdfe50182e7f360fff648bf05cf8dec51cc1a75c2a218d9f8920d605dc77b06cff879a0f8261c0024aa74cdca1c4d4822ac872059ecd52db26e21df8175dcc0407b45c4f56cd0d2792a5f396f37fdfffb4652c36c3af6d0984b7ea1fde24b598924690cbba1c084b43f5c49cbcc59367e5a75d0c233a8e6cd7c21584372ab3d", 0x94}, {&(0x7f00000006c0)="fa12028e9c9ef4340c7f77ab348c1656adee2c760c", 0x15}, {&(0x7f0000000700)="8b0ff0ac3043e7120e27b683c97752850c694c9e0630bb7addaf89a415473217cabec9db5a8860bf5c379d9b0ac162b18815cae00faf150de624804eb7078b82509d3b7cd30ecdac1983e05f34b512325abbea5fea7509feb2700f2c111d1e3941590290ac8cac536ebc865abc1da73f1722849bd71edb0c400e79e0227ec5c75ca3046f834afb9df2c11b462040d9914277c4534ade6c4d0f19d29e3a017691612891ee8f0aed62d25afbdc3d8c3bd23cdb1dff27e70a841d0d", 0xba}, {&(0x7f00000007c0)="4d7bea997704c794b9bf60fb791696bb7f94fe9958c14a0245c23886f1f6db596b7cfb5b0595dd9cbdf1ca40bb53d84627", 0x31}, {&(0x7f0000000800)="0d5c199fdec44facafbbb7c6cb9fb71efcb5", 0x12}], 0x9}, 0x20000000) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000009c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000940), &(0x7f0000000980)='%ps \x00'}, 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f40)={r2, 0xe0, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000c80)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x9, &(0x7f0000000cc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000d00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe6, &(0x7f0000000d40)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000d80), &(0x7f0000000dc0), 0x8, 0x82, 0x8, 0x8, &(0x7f0000000e00)}}, 0x10) (async) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001000)=@o_path={&(0x7f0000000fc0)='./file0\x00', 0x0, 0x8, r3}, 0x18) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000010c0)={0xfbfa63306f9de626, 0x2a, &(0x7f0000000a00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x7}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8}, @map_fd={0x18, 0x4, 0x1, 0x0, r4}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}]}, &(0x7f0000000b80)='syzkaller\x00', 0x23, 0xb8, &(0x7f0000000bc0)=""/184, 0x40f00, 0x40, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000f80)={0x4, 0x1, 0x9, 0x6}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001040)=[r3, r3, r7, r3, r3, r3, r3, r3, r3, r3], &(0x7f0000001080)=[{0x1, 0x3, 0x3, 0xb}]}, 0x90) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001180)) (async) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000011c0)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x4d, '\x00', r5, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001580)={&(0x7f0000001380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x6, [@const={0x8, 0x0, 0x0, 0xa, 0x5}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x2b, 0x0, 0x5, 0x4}, @const={0x2}, @struct={0xe, 0xa, 0x0, 0x4, 0x0, 0x9, [{0x10, 0x5, 0x5c}, {0xb, 0x4, 0x95}, {0x4, 0x0, 0x7}, {0xf, 0x3, 0x7d7}, {0xf, 0x1, 0xfffff506}, {0x10, 0x2, 0xf2e}, {0x8, 0x4, 0x2}, {0xc, 0x5, 0x401}, {0x8, 0x5, 0xff}, {0x2, 0x1, 0xd}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x8, [{0xe, 0x4, 0x28}, {0xc, 0x5, 0x3}]}, @func={0xd, 0x0, 0x0, 0xc, 0x4}]}, {0x0, [0x61, 0x5f, 0x0, 0x5f]}}, &(0x7f0000001480)=""/243, 0xfa, 0xf3, 0x1, 0x8001}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x1f, 0x4, &(0x7f0000001240)=@raw=[@call={0x85, 0x0, 0x0, 0xa6}, @call={0x85, 0x0, 0x0, 0x6}, @map_idx={0x18, 0x6, 0x5, 0x0, 0xe}], &(0x7f0000001280)='syzkaller\x00', 0x7203247a, 0xb1, &(0x7f00000012c0)=""/177, 0x40f00, 0x10, '\x00', 0x0, 0x24, r10, 0x8, &(0x7f00000015c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000001600)={0x0, 0xb, 0x8, 0x2f}, 0x10, r6, r8, 0x1, &(0x7f0000001640)=[r7, r7, r9, r3, r4], &(0x7f0000001680)=[{0x3, 0x5, 0xb, 0x9}], 0x10, 0x25}, 0x90) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001780)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x80000000, '\x00', r5, 0xffffffffffffffff, 0x4, 0x5, 0x1}, 0x48) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001980)={&(0x7f0000001800), &(0x7f0000001840)=""/37, &(0x7f0000001880)="b5c661c4c106dd584ced0b", &(0x7f00000018c0)="7a2209c9ccfcb50eb15db58c0691170e6200bd882e6d4987bd95dd52f8d778ba6a76caf4f910cc2d77b494c06581a9b77dcb183082fe1e2492cf25f9227f132929425bc754078c9651fe0f724cf710f062f9bce47f74a7818217cca766634c117a0067c341e91d459132089204c65ebe1ae187f91be331e7caf356bd7925fb70214b067fb391385c639d43ba4710d9fb", 0xffffff7f, r9}, 0x38) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001a00)={&(0x7f00000019c0)='vnet_skip_tx_trigger\x00', r11}, 0x10) (async) r13 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001a40)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(r13, &(0x7f0000001a80)='syz0\x00', 0x200002, 0x0) (async) r14 = openat$cgroup_procs(r13, &(0x7f0000001ac0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r14, &(0x7f0000001b00)=r0, 0x12) (async) recvmsg$unix(r12, &(0x7f0000001f00)={&(0x7f0000001b40), 0x6e, &(0x7f0000001d40)=[{&(0x7f0000001bc0)=""/85, 0x55}, {&(0x7f0000001c40)=""/205, 0xcd}], 0x2, &(0x7f0000001d80)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x168}, 0x40002143) ioctl$TUNSETFILTEREBPF(r20, 0x800454e1, &(0x7f0000001f40)=r19) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001f80)='./cgroup/syz0\x00', 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001fc0)) (async) close(0xffffffffffffffff) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000002000)) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002280)={{r15, 0xffffffffffffffff}, &(0x7f0000002200), &(0x7f0000002240)='%pB \x00'}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002340)={0x6, 0x13, &(0x7f0000002040)=@raw=[@btf_id={0x18, 0x8, 0x3, 0x0, 0x4}, @cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffa}, @ldst={0x0, 0x2, 0x4, 0x7, 0x2, 0xffffffffffffffc0, 0xfffffffffffffffc}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @jmp={0x5, 0x0, 0xb, 0x4, 0x0, 0x6, 0x8}], &(0x7f0000002100)='syzkaller\x00', 0x6, 0x1c, &(0x7f0000002140)=""/28, 0x40f00, 0x39, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002180)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000021c0)={0x0, 0x7, 0x0, 0x49b}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000022c0)=[r23, r24, r16, r4, r18, r21, r22, r12, r21], &(0x7f0000002300)=[{0x4, 0x4, 0x10, 0x5}, {0x4, 0x3, 0x0, 0x1}, {0x5, 0x1, 0x9}, {0x1, 0x4, 0xf, 0xc}], 0x10, 0x1}, 0x90) (async) ioctl$SIOCSIFHWADDR(r17, 0x8924, &(0x7f0000002400)={'nicvf0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2d}}) 1.325556372s ago: executing program 0 (id=3452): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1c000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x21}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000000e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000853c3dc20a0f0000001d000000950000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000900)='mm_page_alloc\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x24c129e275504e82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x0, 0x4}, 0xa5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r3}, &(0x7f0000000380), &(0x7f00000003c0)='%pK \x00'}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000004c0)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) 1.323997062s ago: executing program 1 (id=3453): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32, @ANYRESHEX=r0, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x80000001, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/231, 0x2c, 0xe7}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0x0}, 0x10) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x10) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000280)}, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xb, &(0x7f0000000500)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xdff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.317188922s ago: executing program 1 (id=3454): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x8, 0x42, 0x40, 0x42}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x2, 0x0, 0x0, 0x0, 0x61, 0x19, 0x4c}, [@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x27}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x49, 0x10, &(0x7f0000000000), 0x3}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0x8}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={0x0, 0x91, 0x8}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r1, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000400)=[0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x61, &(0x7f0000000500)=[{}, {}], 0x10, 0x10, &(0x7f0000000740), &(0x7f0000000780), 0x8, 0xc8, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000940), 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000b00)={{r2, 0xffffffffffffffff}, &(0x7f0000000a80), &(0x7f0000000ac0)='%ps \x00'}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x15, &(0x7f0000000580)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @alu={0x7, 0x0, 0x3, 0x8, 0x6, 0xfffffffffffffff0, 0x8}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}], &(0x7f0000000280)='syzkaller\x00', 0x80, 0xcc, &(0x7f0000000640)=""/204, 0x41100, 0x2, '\x00', r5, 0x25, r6, 0x8, &(0x7f0000000980)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000a40)={0x1, 0x8, 0xa61, 0x9}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000b40)=[r7], &(0x7f0000000b80)=[{0x0, 0x4, 0xa, 0x6}, {0x4, 0x2, 0x9, 0xc}], 0x10, 0x40}, 0x90) r8 = gettid() perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x1, 0x1, 0x8, 0x0, 0x0, 0xc56, 0x2a248, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f4, 0x0, @perf_config_ext={0x3, 0xfffffffffffffff7}, 0x100080, 0x1, 0x81, 0x0, 0x3, 0x6, 0x19, 0x0, 0x800, 0x0, 0x800}, r8, 0x7, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x21}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r0}, 0x38) 1.246472388s ago: executing program 0 (id=3455): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0xfdef) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfd4b) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="85100023040000009500000000000000180000000000000000000000000000009500000000000000851000c738fffffe9500000000000000"], &(0x7f00000000c0)='GPL\x00'}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r2, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r4, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r0, @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdd2}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) 1.113170759s ago: executing program 0 (id=3456): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a0ef010095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907021175f37538e486dd6300a273000000000000686158bbcfe8875a06030000ff23000000000000000000000000ac1414aa3b200007"], 0xfdef) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) (async, rerun: 64) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) (async, rerun: 64) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c"], 0xfdef) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) (async, rerun: 64) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x3, 0x1, 0x8}, 0x48) (rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r4, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000004018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)="e4", &(0x7f0000000300)="beb41d45f27b73b0ed01bf96c4f4cc1802ee6666b773682ff3a13b72980e724e31028783d7dffe4aa59bdbde1c4a0c82e08adb04e128916e271072c254bbe3791d7f6cefa5b69102204b39ca139cbb9f37ae9acf6263ca09b3e85584d6aa2fac56221738544f9de0a2d7ffb098f89e3bbd47df05f93b747896c6afb048734607b3dceae385d26c6a4c0fa02533b4253aa67b1915bbc08a9ba8a5dd33b346f8375bae7262780fbc4f6deb91b04a03249f3fe92e89b1bb6786bbb980f9b11e74", 0x7, r5}, 0x38) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x6, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000280)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x3}, 0x48) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1}, 0x48) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r8}, &(0x7f0000000240), &(0x7f0000000280)=r9}, 0x20) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x17, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='ext4_mballoc_prealloc\x00', r10}, 0x10) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1e, 0x4, 0xf1, 0x5}, 0x48) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0x2, &(0x7f0000000340)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x53, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 991.680739ms ago: executing program 0 (id=3457): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000087b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000039c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffffe8}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x5, 0x2, 0x8, 0xc}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000780)={{r6}, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r7}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r5, 0x18000000000002a0, 0x38, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f086dd", 0x0, 0x63, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8000, '\x00', r1, r2, 0x2, 0x0, 0x4}, 0x48) 990.925209ms ago: executing program 1 (id=3458): bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f0000000200), 0x0, 0x0, &(0x7f0000000600)=""/4096, 0x1000}}, 0x10) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f0000000200), 0x0, 0x0, &(0x7f0000000600)=""/4096, 0x1000}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x13, &(0x7f0000000140)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_query={{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0xfca804a0, 0x6, 0x8, &(0x7f00000002c0)="b80000050000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x9, 0x1, 0x7c}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x80) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x9, 0x1, 0x7c}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x80) close(0xffffffffffffffff) (async) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) (async) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @link_local}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x3, [@struct={0x0, 0x2, 0x0, 0x4, 0x1, 0x0, [{0xd, 0x0, 0x1000}, {0x6, 0x0, 0xfff}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x3, 0x101}}]}, {0x0, [0x0]}}, &(0x7f0000000580)=""/73, 0x57, 0x49}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) (async) recvmsg$unix(r3, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x41, &(0x7f0000000040), 0x4) (async) setsockopt$sock_attach_bpf(r5, 0x1, 0x41, &(0x7f0000000040), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001b40)={&(0x7f0000001a40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@volatile={0x1, 0x0, 0x0, 0x9, 0x1}]}, {0x0, [0x5f, 0x30, 0x2e, 0x1e]}}, 0x0, 0x2a}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c40)={0x18, 0x0, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x400, 0x67, &(0x7f00000016c0)=""/103, 0x41100, 0x0, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001bc0)={0x0, 0xd, 0xda}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000001c00)=[{0x0, 0x3, 0x0, 0x9}, {0x2, 0x1, 0x9, 0xa}], 0x10, 0x2}, 0x90) 971.34177ms ago: executing program 0 (id=3459): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xca}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000d9a30f2d42618710000c0000000c00000002000d000000000000"], 0x0, 0x26}, 0x20) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d00)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x7, [@struct={0xc, 0x7, 0x0, 0x4, 0x0, 0x3, [{0x3, 0x0, 0xfb0}, {0xe, 0x0, 0x5}, {0x0, 0x5, 0x7}, {0xd, 0x2}, {0xb}, {0x10, 0x1, 0x2}, {0x6, 0x4, 0x5}]}, @volatile={0xa, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x2e, 0x0, 0x61, 0x30, 0x30]}}, &(0x7f0000000cc0)=""/54, 0x8b, 0x36, 0x0, 0x9}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r3, 0x20, &(0x7f0000000ec0)={&(0x7f0000000d40)=""/244, 0xf4, 0x0, &(0x7f0000000e40)=""/83, 0x53}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="1800110000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0xc, &(0x7f00000000c0), 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000c40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x108240, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x5452, &(0x7f00000015c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5$\x00\x00\x00QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04b{\x18z\xa2\xe8\xc9\xde\xea\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000200)=0x7fff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000f40)=ANY=[@ANYBLOB="b702000026000000bfa300000000000007030000007effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400010000050404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf27fb6d2c643db7e2d5fb4b0936cdf827fb43a431ca711fcd0cdfa146ed3d09a6175037958e27106e225b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc525d78c07f34e4d5b3185b310efcfa89147a09000000f110026e6d2ef831ab7ea0c34f17e3ad6eecbb622003b538dfd8e0125f9578e51bc53099e90f4580d760551b5b0a341a2d7cbdb9cd38bdb2ca8e050000003a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c214733a18c8b6619f28d9961b626c57c2691208173656d60a17e3c184b751c51160fbcbbdb5b1e7be6148ba532e60a0ac346dfeb00000000000000334d83099dd27080e71113610e10d858e8327ef01fb6c86acac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e957bc73ddc4eabba08ab1e1ad828267d4eadd3964663e88535c133f7130856f756436303767d2e24f29e5dad9796edb697a6ea0192babc190ae2ebf8aad34732181feb215139f15ea7e8cb0bae7c34d5ac5e7c805210600000000000000c3dec04b25dfc17975238345d4f71ab158c36657b7218baa0700f781c0a99bd50499ccc421ace5e845885efb5b9964e4beba3da8223fe5308e4e65ee93e107000000f8ddebf70132a4d0175b989b8eccf707882042e716df9b57b290c661d4e85031086197bcc5cb0e221a0c34323c129102b6ff0100002e88a1940b3ca84dc255a91a9ba99ffabb9189107282b53fbf5c199967b9927b6240cc6993106dc6ef56e15617a9352ff4f3408226db0be57110"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1d}, 0x90) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0}, 0x90) write$cgroup_subtree(r5, &(0x7f0000000c00)=ANY=[@ANYRES8=r1, @ANYBLOB='>'], 0x12) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000200)={'pimreg\x00', 0x8ad5f7d5c4922ed6}) close(r6) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="2e0000000000000000000000000000002f110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) 886.994827ms ago: executing program 2 (id=3373): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000480)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0xcc4, '\x00', r2, 0xffffffffffffffff, 0x3, 0x1}, 0x48) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=0xffffffffffffffff, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0x20, &(0x7f0000000b40)={&(0x7f0000000940)=""/255, 0xff, 0x0, &(0x7f0000000a40)=""/221, 0xdd}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x1f, 0x11, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x60ad}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='syzkaller\x00', 0x7f, 0x0, 0x0, 0x41000, 0x28, '\x00', r2, 0x4, r5, 0x8, &(0x7f00000008c0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x4, 0xe, 0xfffeffff, 0x7554fe3a}, 0x10, r6, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000bc0)=[{0x4, 0x3, 0x4, 0x6}, {0x3, 0x4, 0xd, 0xc}, {0x4, 0x5, 0x6, 0x2}, {0x4, 0x4, 0xa, 0xc}, {0x0, 0x3, 0x5, 0x6}, {0x0, 0x1, 0xe, 0x5}], 0x10, 0x7}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe7ee9d60958e9725, '\x00', r2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 827.488312ms ago: executing program 0 (id=3460): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0xe8034000, 0x0, 0x1, 0x0, &(0x7f00000000c0)="c6"}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8943, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) perf_event_open(&(0x7f0000000700)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r6) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) 826.820432ms ago: executing program 4 (id=3443): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x4}}, &(0x7f00000005c0)='GPL\x00'}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x9}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b708000000005aab7b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000008000000850000009500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r4}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[], 0xe) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000000000000", @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0xe0}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f2, &(0x7f0000000080)) 768.750737ms ago: executing program 2 (id=3373): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000480)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0xcc4, '\x00', r2, 0xffffffffffffffff, 0x3, 0x1}, 0x48) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=0xffffffffffffffff, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0x20, &(0x7f0000000b40)={&(0x7f0000000940)=""/255, 0xff, 0x0, &(0x7f0000000a40)=""/221, 0xdd}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x1f, 0x11, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x60ad}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='syzkaller\x00', 0x7f, 0x0, 0x0, 0x41000, 0x28, '\x00', r2, 0x4, r5, 0x8, &(0x7f00000008c0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x4, 0xe, 0xfffeffff, 0x7554fe3a}, 0x10, r6, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000bc0)=[{0x4, 0x3, 0x4, 0x6}, {0x3, 0x4, 0xd, 0xc}, {0x4, 0x5, 0x6, 0x2}, {0x4, 0x4, 0xa, 0xc}, {0x0, 0x3, 0x5, 0x6}, {0x0, 0x1, 0xe, 0x5}], 0x10, 0x7}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe7ee9d60958e9725, '\x00', r2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 688.502553ms ago: executing program 4 (id=3443): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x4}}, &(0x7f00000005c0)='GPL\x00'}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x9}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b708000000005aab7b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000008000000850000009500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r4}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[], 0xe) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000000000000", @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0xe0}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f2, &(0x7f0000000080)) 593.960041ms ago: executing program 2 (id=3373): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000480)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0xcc4, '\x00', r2, 0xffffffffffffffff, 0x3, 0x1}, 0x48) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=0xffffffffffffffff, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0x20, &(0x7f0000000b40)={&(0x7f0000000940)=""/255, 0xff, 0x0, &(0x7f0000000a40)=""/221, 0xdd}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x1f, 0x11, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x60ad}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='syzkaller\x00', 0x7f, 0x0, 0x0, 0x41000, 0x28, '\x00', r2, 0x4, r5, 0x8, &(0x7f00000008c0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x4, 0xe, 0xfffeffff, 0x7554fe3a}, 0x10, r6, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000bc0)=[{0x4, 0x3, 0x4, 0x6}, {0x3, 0x4, 0xd, 0xc}, {0x4, 0x5, 0x6, 0x2}, {0x4, 0x4, 0xa, 0xc}, {0x0, 0x3, 0x5, 0x6}, {0x0, 0x1, 0xe, 0x5}], 0x10, 0x7}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe7ee9d60958e9725, '\x00', r2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 514.789518ms ago: executing program 4 (id=3443): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x4}}, &(0x7f00000005c0)='GPL\x00'}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x9}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b708000000005aab7b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000008000000850000009500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r4}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[], 0xe) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000000000000", @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0xe0}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f2, &(0x7f0000000080)) 432.143354ms ago: executing program 2 (id=3373): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000480)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0xcc4, '\x00', r2, 0xffffffffffffffff, 0x3, 0x1}, 0x48) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=0xffffffffffffffff, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0x20, &(0x7f0000000b40)={&(0x7f0000000940)=""/255, 0xff, 0x0, &(0x7f0000000a40)=""/221, 0xdd}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x1f, 0x11, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x60ad}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='syzkaller\x00', 0x7f, 0x0, 0x0, 0x41000, 0x28, '\x00', r2, 0x4, r5, 0x8, &(0x7f00000008c0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x4, 0xe, 0xfffeffff, 0x7554fe3a}, 0x10, r6, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000bc0)=[{0x4, 0x3, 0x4, 0x6}, {0x3, 0x4, 0xd, 0xc}, {0x4, 0x5, 0x6, 0x2}, {0x4, 0x4, 0xa, 0xc}, {0x0, 0x3, 0x5, 0x6}, {0x0, 0x1, 0xe, 0x5}], 0x10, 0x7}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe7ee9d60958e9725, '\x00', r2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 352.906751ms ago: executing program 4 (id=3443): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x4}}, &(0x7f00000005c0)='GPL\x00'}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x9}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b708000000005aab7b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000008000000850000009500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r4}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[], 0xe) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000000000000", @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0xe0}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f2, &(0x7f0000000080)) 274.036557ms ago: executing program 2 (id=3373): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000480)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0xcc4, '\x00', r2, 0xffffffffffffffff, 0x3, 0x1}, 0x48) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=0xffffffffffffffff, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0x20, &(0x7f0000000b40)={&(0x7f0000000940)=""/255, 0xff, 0x0, &(0x7f0000000a40)=""/221, 0xdd}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x1f, 0x11, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x60ad}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='syzkaller\x00', 0x7f, 0x0, 0x0, 0x41000, 0x28, '\x00', r2, 0x4, r5, 0x8, &(0x7f00000008c0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x4, 0xe, 0xfffeffff, 0x7554fe3a}, 0x10, r6, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000bc0)=[{0x4, 0x3, 0x4, 0x6}, {0x3, 0x4, 0xd, 0xc}, {0x4, 0x5, 0x6, 0x2}, {0x4, 0x4, 0xa, 0xc}, {0x0, 0x3, 0x5, 0x6}, {0x0, 0x1, 0xe, 0x5}], 0x10, 0x7}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe7ee9d60958e9725, '\x00', r2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 187.410265ms ago: executing program 1 (id=3461): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000040)='GPL\x00', 0x4, 0x1b, &(0x7f0000000080)=""/27, 0x41100, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x4, 0x8, 0x101, 0x3}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000140)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000180)=[{0x2, 0x5, 0x2}, {0x4, 0x2, 0x6, 0xa}, {0x2, 0x1, 0x3, 0x7}, {0x3, 0x1, 0xe, 0x4}, {0x5, 0x3, 0x10, 0xa}, {0x3, 0x5, 0x7, 0x5}, {0x1, 0x5, 0x8, 0x9}, {0x5, 0x4, 0x6, 0x6}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r0, 0x0, 0xf8, 0x4b, &(0x7f00000002c0)="ae7815194dc61505090f82c0d7898c4391e084894b72de708c5174338cd680b26ac1a2f9c1e15e3cbf434710de7742637b233516a3bf8ef5be2cf78a4cc3ac925d50ea28f631a74ccdb65fc484bf8fec496893385aa65a9bde2ae19db63e9091ead66b2da80e95b0bc2a0e483d81158c2b56f8a0bfd84fd80d316f093513918a0fe82b5ec6eb076554e15364426bd7461c51b48137464baebc9e41de93d3035dfac905e8f8d00805a19956596d4705eaf887da1c4f8f8b62693c138906b3bb21b02819a416e54a9f3832dcb29dfb059953e9c83053b5aae1bd86ff00141a21a57aff7e9b695434d54d2a00fd360e8ba466ff5813f7de9022", &(0x7f00000003c0)=""/75, 0x10000, 0x0, 0xce, 0x80, &(0x7f0000000440)="d438bc6b27ca6836bc2e2327a0d2b82840248db4b8aecc285b89963ff714d037c554c4b8a1b9f9e4688fd3ea93bb2be328db25248ef758452ca51d1a6d083c5e8c7111c08eb647797a87ced34fd248bcf6619b08ffcdef72f7c5657d67b042e46f46bf6aea1413784c66ac5a0a52dd7627efece5f7d2699e63b481e61820ffb3eb71f95c2a5c4f9bea916871826d069283f868d62714c8d7d63cbc4c10dbf54f10af69d3a66be1ea07dcf0a8174a98bd74a4667f9712f6d26d0aa7fdb18eb8d0de9677fe2919189e1396836137f4", &(0x7f0000000540)="2f8c99dbaedc3a3b0c43b425d043de59792f150a01959be38bbcf359cff590fee65b4ca9da346ad7779c3593681fbc4a307aea3169e92a64ebb2167b8845472c62a52396ae88bc309401d515513cbff2cca22982c2dce65fcd3091ba1809a1b5f9dfe89a69b5e5c0f77bc5fd4d80985d592437a6d7717bd1a5ac8a368195a9b5", 0x1, 0x0, 0x4}, 0x50) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000640)=0x1) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000680), &(0x7f00000006c0)=r0}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001880)={0xffffffffffffffff, 0x58, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001980)={0x1b, 0x0, 0x0, 0x96d, 0x0, 0x1, 0xd, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3}, 0x48) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a40)={0x18, 0xd, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1dc8, 0x0, 0x0, 0x0, 0xfff}, [@jmp={0x5, 0x1, 0x0, 0x5, 0x3, 0x0, 0x10}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x5}, @alu={0x7, 0x1, 0x8, 0xb, 0x4, 0x0, 0xfffffffffffffffc}, @ldst={0x2, 0x0, 0x4, 0x6, 0x7, 0x2, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x5f}]}, &(0x7f00000007c0)='syzkaller\x00', 0x19, 0x1000, &(0x7f0000000800)=""/4096, 0x41000, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000001900)={0x3, 0x2, 0x1, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a00)=[r3, r4], 0x0, 0x10, 0x9}, 0x90) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001d00)=0xffffffffffffffff, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x16, 0x33, &(0x7f0000001b00)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffff81}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @ldst={0x3, 0x1, 0x6, 0x8, 0x1, 0x30, 0xfffffffffffffffc}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @jmp={0x5, 0x1, 0xb, 0x4, 0x8, 0x34, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7fffffff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ldst={0x1, 0x1, 0x0, 0x5, 0xe, 0x1}], &(0x7f0000001cc0)='GPL\x00', 0xf0c, 0x0, 0x0, 0x41000, 0x21, '\x00', 0x0, 0x2a, r6, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f0000001d40), &(0x7f0000001d80)=[{0x5, 0x1, 0xe, 0x3}], 0x10, 0x7}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={r3, 0x58, &(0x7f0000001e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001f80)={&(0x7f0000001f40)='fscache_resize\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002000)={&(0x7f0000001fc0)='fsi_master_gpio_crc_rsp_error\x00', r0}, 0x10) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000002040), 0x8) ioctl$TUNGETFEATURES(r9, 0x800454cf, &(0x7f0000002080)) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@base={0x1, 0x7fff, 0x0, 0x5, 0x20, r9, 0xffff, '\x00', r8, r6, 0x3, 0x1, 0x4}, 0x48) openat$cgroup_devices(r9, &(0x7f0000002140)='devices.deny\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r12, 0x1, 0x32, &(0x7f00000021c0)=r9, 0x4) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000024c0)={0x11, 0x17, &(0x7f0000002240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, [@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @map_fd={0x18, 0x4, 0x1, 0x0, r1}]}, &(0x7f0000002300)='GPL\x00', 0x3ff, 0x13, &(0x7f0000002340)=""/19, 0x41100, 0x1, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002380)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000023c0)={0x4, 0xa, 0xff, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002400)=[r4, r9], &(0x7f0000002440)=[{0x5, 0x2, 0xf, 0x6}, {0x1, 0x5, 0x5, 0x4}, {0x5, 0x3, 0x67, 0xc}, {0x5, 0x5, 0x1, 0x3}, {0x3, 0x1, 0x0, 0xa}], 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002580)={&(0x7f0000002200)='xdp_exception\x00', r13}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000002600)={r10, &(0x7f00000025c0)="a3bd158324a91d976a9dde4f1d8f71ab0c3c8a7ff7b1eb5f50b8e36cc452fc82e7bb6e1d7eed91aa32f1be91758f0e9072a32f"}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002640)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000002680)={0x1b, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0x7ff, '\x00', r8, r7, 0x1, 0x5, 0x2}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000028c0)={&(0x7f0000002700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xad, 0xad, 0x9, [@datasec={0xc, 0x8, 0x0, 0xf, 0x1, [{0x4, 0x2, 0x1}, {0x3, 0x2, 0x80}, {0x3, 0x1, 0x80}, {0x5, 0x4, 0x2f}, {0x4, 0x0, 0x10001}, {0x5, 0x5, 0xe}, {0x2, 0x2, 0x10001}, {0x4, 0x9, 0x33b3}], 'F'}, @const={0x6, 0x0, 0x0, 0xa, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x2, 0x8}}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x7e, 0x0, 0x78, 0x1}, @const={0x10, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x2e, 0x0, 0x0, 0x29, 0x5f, 0x61, 0x0]}}, &(0x7f0000002800)=""/167, 0xd1, 0xa7, 0x1, 0x80}, 0x20) r15 = syz_clone(0x200, &(0x7f0000002a80)="0033480cdaf3e57a502883013698c0a7219d0ca03512a87e7af1f2aaab62c9d1b8e62e5dc1f98d6ebe81ed50d51db39e0e7b5157a3baaaa4593f2ff37b255364d5a4c9a27bedde92197015be4499432d64ad9c0d0335f6e2bc2fdc7908336cb9549f63874e55013fe4781de43af2", 0x6e, &(0x7f0000002b00), &(0x7f0000002b40), &(0x7f0000002b80)="96934e21060a15f4adae964e4b397dc34c7cb9aa8d48a442c7ee7443d70fc0967a31a006f0e8ed320825ec908f77804f6a6980e3959f1adf7057c6d5428b960b94b7a5a40c810f88a869e59e99caee0c4a33e2923a8ba8ca01ca2267ba74dbd2d590e897ac779d826d1897878900a2f98ae987f6abdd3de818293e6f67b225f7afd8217ed4") sendmsg$unix(r9, &(0x7f0000002cc0)={&(0x7f0000002900)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000002a40)=[{&(0x7f0000002980)="9e7beec80e0011e30875ac90c3e9d93e9bdba9f0f1c3cf53b801788b8d2e7af3ccc848af7378300c1a054bb601a8fdca96d4af941141bb494d0857ea9dcf7f832333ed0f7bf6f47290ffb1ef95b61a54d23400c633c9516587f16088eb85ba45d74a4decb601be0fe2a1f5dfeffea054969eaf1afea5dd405668a00caa29a8e42170f33c995af427a26f41bdf505688ef32035e72a6d4041c1a9d212146ba67710bfc91f9c7671cfc04aa53d03fa7b6a818c324e", 0xb4}], 0x1, &(0x7f0000002c40)=[@rights={{0x14, 0x1, 0x1, [r7]}}, @cred={{0x1c, 0x1, 0x2, {r15, 0xffffffffffffffff}}}, @rights={{0x24, 0x1, 0x1, [r11, r5, r7, r14, r14]}}], 0x60, 0x4000880}, 0x40000) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000002d00)={0x9}, 0x8) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e40)={&(0x7f0000002d40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x73, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000002d80)=""/176, 0x29, 0xb0}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000002e80)={0x1b, 0x0, 0x0, 0x4, 0x0, r9, 0x6, '\x00', r8, r16, 0x0, 0x5, 0x3}, 0x48) 186.012435ms ago: executing program 4 (id=3443): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x4}}, &(0x7f00000005c0)='GPL\x00'}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x9}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b708000000005aab7b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000008000000850000009500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r4}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[], 0xe) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000000000000", @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0xe0}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f2, &(0x7f0000000080)) 97.294462ms ago: executing program 1 (id=3462): r0 = gettid() (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f0000000080)={'batadv0\x00'}) (async) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x11, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x240002, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) ioctl$TUNSETIFF(r4, 0x400454da, &(0x7f0000000140)={'batadv0\x00'}) (async) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000100)={'pimreg0\x00', 0x1}) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_subtree(r6, &(0x7f0000000340)=ANY=[], 0x7) (async) r7 = openat$cgroup_ro(r6, &(0x7f0000001580)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000240)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x800, '\x00', 0x0, 0x0, 0x0, 0x1}, 0x48) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000300)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffff03}, 0x90) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, r8, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r8, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000008000000000000000000000850000006d0000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000400)='sched_process_exec\x00', r12}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x20}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) (async) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000880)='blkio.bfq.io_serviced_recursive\x00', 0x100002, 0x0) write$cgroup_type(r13, &(0x7f0000000180), 0x40010) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x42, 0x0}, 0xfffffffffffffeea) sendmsg$unix(r6, &(0x7f0000001e00)={&(0x7f00000008c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001c80)=[{&(0x7f0000000940)="75e06f3ec6c89eec6704673827c32f2718e2fc53dea54e0d0ce5b1207ad2255bbfcba48eb863bf23105716a5d578aa7abf4dc2f87410f87e56bd028bca08e9558d9bde3c4409f77e7b6b8d77f30f88af74d6a59093ba2252125b19c6938d5df0d85a67e31d7f36f264beb66d029cb345ac2103452a208a484582d4f008e0d3f130b1112b490c6c11b9dd1d17ce370af851c13a505d09574b189ac6d82f2f9e7c96fda240d316bbe69497cea6da9562ab2ff82c4e2f4c340e989f2ce34bb5d62b5f27f82c4cb77c6aa3cc", 0xca}, {&(0x7f0000000a40)="85cdb4927c13e022fe4a9fee77641733cf5494511fdcb68dce91965c1c3b4369d87048c65327d9eff9a6e8693a71dc9be4d3778a070e61a5d3143e059629c119438d97fe2e82a9b0634ce17de2362e0474d07adfe967a756c9d2e9561ada7ab20dcfca33978c2ab700af1b6c819d0b6c6c841e2717fce3b30547fb09", 0x7c}, {&(0x7f0000001a00)="dd5f3cb73d22ed9b408bee158c3706bb52342c0e60248a7fe46f133a0dcb9f5a3d4339a993f12328d43440d8db007fc0698c0f888f4bf5b6cd6e7aaa8cb1ff0e39fd796d887afb195ec3bcc395efed89da4a0864d1162cbb6a33060e17cea614a022f19de09ef3d4fc076808268b78245204672f2642317fddbdfb902c839ccd789f6f3ff2089aea930eb267753ef2746d9e0195931809943a44042392dfe0c3870adf9c545569", 0xa7}, {&(0x7f0000000ac0)="72b8381e4fd4ba0731430c0f798b0923efb078c7e52d9f", 0x17}, {&(0x7f0000001ac0)="0c6bf2bb88e94c9c63daa160cdb19498eedc4fa019c8bd900d699f62f1c4d80ed6065359837c02e9c50801a02025e7a49030cd824719875a4eaa1b148f0f630c2212718e704d1ce8a3741bea21542ab298ad60b363de785519f46f2e7f815c45f15d776924327d1f20bfeb192d639ff874387fdb8c9457502ff2a555391407cfd6524369c7c6ecd1688f3dca162253070867b740235641372f2266e19862f97d3a76a6bf758d861869309439a2fd12caf74782115332faccc7ddf87ac1064a", 0xbf}, {&(0x7f0000001b80)="875ca0670640120174a5ad4b909ff10434e4f6001f6c459256c1ab77975357ce68679d92901cbe59b70f", 0x2a}, {&(0x7f0000001bc0)="769af7963c99c6fe065007c42a6a1cb3603b385da8d83d31884fa4aa31e2753b37e604983e730554ef6802bb1de69b65271501bd719e6367ab087280d33246592a2db3bde02715135f06004c6a79906dadf7b70abd7bed02f195c087b6f96286ed1330741761848c217ecd36342daeec29e01b571116b0bff538502274a24ffb3c2e5805cd32", 0x86}], 0x7, &(0x7f0000001d00)=[@rights={{0x18, 0x1, 0x1, [r13, r10]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xee00}}}, @rights={{0x20, 0x1, 0x1, [r10, r1, r6, r1]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xee00}}}], 0xd8, 0x400c0}, 0x8021) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000b00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, r14, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001540)={{r13, 0xffffffffffffffff}, &(0x7f0000000540), &(0x7f0000000580)='%-010d \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x10, 0x1a, &(0x7f0000001640)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @map_val={0x18, 0x4, 0x2, 0x0, r15, 0x0, 0x0, 0x0, 0x9855}, @generic={0x61, 0x1, 0x2, 0x7ff, 0x3ff}, @jmp={0x5, 0x1, 0x7, 0x5, 0x9, 0xfffffffffffffffc, 0x8}, @cb_func={0x18, 0x1, 0x4, 0x0, 0x8000001}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000005c0)='GPL\x00', 0x8, 0xdd, &(0x7f0000000600)=""/221, 0x41100, 0x40, '\x00', r11, 0x34, r13, 0x8, &(0x7f00000007c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000800)={0x5, 0x3, 0x83a2}, 0x10, r14, r9, 0x0, &(0x7f0000000840)=[r8, r8, r8], 0x0, 0x10, 0x40}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000000)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffd7, r14, r6, 0x0, 0x0, 0x0, 0x0}, 0x90) 96.809762ms ago: executing program 2 (id=3373): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000480)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0xcc4, '\x00', r2, 0xffffffffffffffff, 0x3, 0x1}, 0x48) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=0xffffffffffffffff, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0x20, &(0x7f0000000b40)={&(0x7f0000000940)=""/255, 0xff, 0x0, &(0x7f0000000a40)=""/221, 0xdd}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x1f, 0x11, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x60ad}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='syzkaller\x00', 0x7f, 0x0, 0x0, 0x41000, 0x28, '\x00', r2, 0x4, r5, 0x8, &(0x7f00000008c0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x4, 0xe, 0xfffeffff, 0x7554fe3a}, 0x10, r6, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000bc0)=[{0x4, 0x3, 0x4, 0x6}, {0x3, 0x4, 0xd, 0xc}, {0x4, 0x5, 0x6, 0x2}, {0x4, 0x4, 0xa, 0xc}, {0x0, 0x3, 0x5, 0x6}, {0x0, 0x1, 0xe, 0x5}], 0x10, 0x7}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe7ee9d60958e9725, '\x00', r2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 1.51033ms ago: executing program 1 (id=3463): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0x1}}, 0x0, 0xffffffffffffff82, r2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0xb, 0x81, 0x8, 0x80, 0xffffffffffffffff, 0x3, '\x00', 0x0, r2, 0x2, 0x4, 0x0, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x0, &(0x7f0000000c40)=ANY=[@ANYRESOCT=r2, @ANYBLOB="04ac37448b725976afd632f883f315db0d6152b3822c628a2b4e362ca11f062f651bc086d9070dd725332dff3e6f3a9793422d6d0cfc952caff77184c78ac3739ab522666e1835d6082f2706dc67c30fa73973b0af626daf072235458323f59705186cdc18c5a7103f3c9877cdb955e05390a58fd23321f473eb45"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x407}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xd, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='ext4_unlink_enter\x00', r3}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xb, &(0x7f00000008c0)=ANY=[@ANYBLOB="18000000000000090000000000000000180100002020702500b23175f56d678f9877c7d5e9000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095bf6709c0f2163c8fe1c63aa1394b5a9c7301b50b635551aa64919d43ea83a31d1b1620d4f05a6c9a2cbea8540cce22412799dfb8998c8655e767"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000011c0)='\xba#\xe8W\xf6p\x8a\x1d\x11\xff\xca\xdfK\xdb\xd0l\x1c\xdd.\xfb\x16r\xf9\x84a\"\xc4W_\xa2\x83\xd2\x81E\xc9]\x97\xb2\xf6\xc2M\xc2\x96\xc8\t\x0f|y\xa9\x10\x94\x82\x9c\xc6\xe3\xe3\xeb\x8e`\x16V\x82r\xf88\xf7\xeb\x06\xb6\xc8sVbR\x03\xdfA\x05\'\x8cjA\xef\x17Wa\xd5\xe7y;%K\xc8\x8b\nx\xb2\xe2@\x97\xb0|\x1f\xcb\x90\xfdb\xb8\xaf\xca\x06\x12Q/\x04\x1b>\x94\xe4\xd2w\x9b\x82\\A\x10q\"E\xe5\xff*g\x96\x06\xc5\xf8z\x8f$w\xedpg\xfe\x0e:\x02\x96\xc0\xc1\xe3b\x04\xf5\xd5\xaf\xe4\xfaO\xb2T\x8c\xd7x\xb1\xa7\x96k,z\xf1\x96\xf2,8\x1b\xcc66\xcf\xb0\xff\xcag\xd7X\xbe\xa4\x02a\xa5\xf6\x04m\xc5)\xde\nOg(\xc3\x8e\xd9\xf1\xb7IGy\xe0;\x98~\x81gshE\xa1\xa4\xb2\xf7\xf8V\x03\xaf\xe8\x17\xf6\xe9\xa7\xf0G=-\x97\xd9L\xee(\xf0b\x8b\x83w\xb2jr\x8f\xa0\x86v\xdd\x91\xf3\xc3\xb0?R;K\x1c\xa3B-bya\x04\xd8\xfd,\xc0z\x13\xa9[\x7f\x9a!\a.\xea\xd3\x05V\x13\xed\x1f\x97=\xa4C\x8f\xbfSU\x8c\xab\b\xb8\xe1x\xe7\xb6\xbc\xcc\xc5\xf8\x83L\x1bF\xf4\x00\xfc\x90\xd2\xc0$\x8f\xab\a\xc7U\x8d\xe3\xedPs\xa86\xf6\xae\x03\x94\f\x9es\x92@\xb8\xa4\x9d\xce\x99>\x04\x88\xedNY\xe7v\xdd\xbbgC\xb4\x9b\x10\xb6\xc1\xd3\'\x10\xbcy\a\xd0a\xb7\x1b\x9a\xc9\xbb\xfa\x83\xff\'\xfe\xc2\x018\xf6Q\xc1\xa6@-\xe0\x85\xa3K<5\xc0\xda\xfc>\xa9\x83\x02\x1fhL`\xdb\x8e\xac\xban\xfb9\xa5H9)}\xf3;\xb5\xc9|\xddn\xd8]\xaa-:\x81\xefd\x8f\x94k\x13A!\xb7\x9e\x80L\x88\x16\xf6\x9d\xd8q\xf1\xe0\xa4f9\x84\xde\xa4\x9b\xf0Q\xa1\xe1\xc7\xde\xe9n\xa5\xb8\xd2\' v5\xa2\xcc\xea\x97\xfcR\xb8Rq\xc2\xe0\x03r_L\x06\x03\xc6xD\xd6\x81\xf6\xae\x833w\x9c%\x94\x84\xb2\xe1O\xc2s\x1a\x85\xcc\xf4@\x00\x00\x1c\xc6\xf6g%\x86k\xe9\xec\x12\x01\x18\xe9S\x87CJA\xa1\xaa\xd2\xa7\xa0i\xb3$\xc1z\xfd\x94Uv\x81q\xb0|\xab\xcd<^\xea\x165\xe0\xda\x14Y\x86\x1e\xd2\t;\x9d\x98j\xc6\x98\x14r\xcc\x96\xbdi\x04-\xc7\xb6\xb8\xde\xf9\x81b\xe8\xf2\xbb\xf6\x12\x04y\xc9\xabL\xb3\x14\xaa n\xe5\xac/\xb5A') r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x2004, 0x8, 0x7, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000280)='sched_switch\x00') bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000580)=ANY=[@ANYRES64=r2, @ANYRES32, @ANYRESHEX=r4, @ANYRES16=r6], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = openat$ppp(0xffffffffffffff9c, 0x0, 0x400400, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000a40)=ANY=[@ANYRES8=r7, @ANYBLOB="cbc1fdb1cf864111e8d8c0a396c4afc7e76b8a909e474c38f0b0eeb8929f4eebec3f4f02b8f0f426c9325900519b636a32f7a2df935d88d0af4ac718794850cbf57d67ecccdc6f418f6a7e3745c4d633e62e7ea12011041a7a1c5207aa8a97f88f5c745ed8ccea52acea6a", @ANYRESOCT, @ANYBLOB="9a27ceaf37ac183afbef8d439ab193db97ef6d5f9c0f503e7a66d2d00641f93b6ec90d82dd19c1cd7402467ad6082da32662dddc3f38515a76e4323feeea2b93d4f3fc582e9e406f177fd067b1eb2b40dc349c34b8e71d4410d574cf57ddd9fea146cfb6b393ed6a410bc54a4236d49c4bf80581ea48d6e508b77ef2c58f7858c24e72d89f52da421a03bd01155b3065c4edc9fbc63976ddb113855d49ef7ef775845303b5c239fb8929bdb59d85dbc36d17b73903edaaf113a974f88a14a05bcbc1e6924263822e85346ce14f927fcf94ec8c38fe43d68a30828392a8563aa6f24ccc7291bfc4a2f93b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9febd6e618000000000000002400000024000000030000003d0018270691b082ab8b6e2f00"], &(0x7f0000000440)=""/130, 0x3f, 0x82, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x2d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 0s ago: executing program 4 (id=3443): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x4}}, &(0x7f00000005c0)='GPL\x00'}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x9}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b708000000005aab7b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000008000000850000009500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r4}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[], 0xe) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000000000000", @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0xe0}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f2, &(0x7f0000000080)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.90' (ED25519) to the list of known hosts. [ 21.836044][ T24] audit: type=1400 audit(1722242031.850:66): avc: denied { mounton } for pid=274 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.837344][ T274] cgroup: Unknown subsys name 'net' [ 21.858606][ T24] audit: type=1400 audit(1722242031.850:67): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.885505][ T24] audit: type=1400 audit(1722242031.880:68): avc: denied { unmount } for pid=274 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.885672][ T274] cgroup: Unknown subsys name 'devices' [ 22.031801][ T274] cgroup: Unknown subsys name 'hugetlb' [ 22.037241][ T274] cgroup: Unknown subsys name 'rlimit' [ 22.230399][ T24] audit: type=1400 audit(1722242032.250:69): avc: denied { setattr } for pid=274 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.253442][ T24] audit: type=1400 audit(1722242032.250:70): avc: denied { mounton } for pid=274 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.257854][ T278] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.278320][ T24] audit: type=1400 audit(1722242032.250:71): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 22.309241][ T24] audit: type=1400 audit(1722242032.310:72): avc: denied { relabelto } for pid=278 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.334451][ T24] audit: type=1400 audit(1722242032.310:73): avc: denied { write } for pid=278 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.377662][ T24] audit: type=1400 audit(1722242032.390:74): avc: denied { read } for pid=274 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.402980][ T24] audit: type=1400 audit(1722242032.390:75): avc: denied { open } for pid=274 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.403023][ T274] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.996201][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.003169][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.010601][ T284] device bridge_slave_0 entered promiscuous mode [ 23.018239][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.025343][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.032574][ T284] device bridge_slave_1 entered promiscuous mode [ 23.091040][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.097889][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.105205][ T287] device bridge_slave_0 entered promiscuous mode [ 23.113006][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.119939][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.127118][ T287] device bridge_slave_1 entered promiscuous mode [ 23.167262][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.174122][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.181348][ T289] device bridge_slave_0 entered promiscuous mode [ 23.206516][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.213409][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.220737][ T289] device bridge_slave_1 entered promiscuous mode [ 23.228978][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.235879][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.242987][ T285] device bridge_slave_0 entered promiscuous mode [ 23.252335][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.259169][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.266437][ T285] device bridge_slave_1 entered promiscuous mode [ 23.320520][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.327454][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.334914][ T288] device bridge_slave_0 entered promiscuous mode [ 23.341784][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.348760][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.356018][ T288] device bridge_slave_1 entered promiscuous mode [ 23.405821][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.412774][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.419963][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.426795][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.460237][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.467088][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.474205][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.480990][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.508524][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.515392][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.522484][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.529261][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.543793][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.550657][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.557728][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.564561][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.584153][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.592581][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.601279][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.608210][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.615349][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.622408][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.629366][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.636483][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.644166][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.651465][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.685946][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.694386][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.702217][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.711397][ T53] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.718217][ T53] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.725796][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.733905][ T53] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.740758][ T53] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.747919][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.755697][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.763564][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.771524][ T53] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.778343][ T53] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.785659][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.793666][ T53] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.800672][ T53] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.821987][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.854273][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.863044][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.871337][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.879051][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.892506][ T287] device veth0_vlan entered promiscuous mode [ 23.898911][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.906676][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.914877][ T53] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.921758][ T53] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.928959][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.937006][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.944419][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.956959][ T289] device veth0_vlan entered promiscuous mode [ 23.978135][ T287] device veth1_macvtap entered promiscuous mode [ 23.986229][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.994591][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.002915][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.011055][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.018239][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.025892][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.034003][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.042118][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.048942][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.056176][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.064320][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.071169][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.078284][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.086087][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.106815][ T289] device veth1_macvtap entered promiscuous mode [ 24.115308][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.122819][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.131186][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.139160][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.146042][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.153437][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.161330][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.168988][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.176856][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.184594][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.192695][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.200727][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.208077][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.216346][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.238780][ T284] device veth0_vlan entered promiscuous mode [ 24.245406][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.253636][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.263527][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.271612][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.279359][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.287192][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.295089][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.303322][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.311751][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.320138][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.328309][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.336907][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.345326][ T285] device veth0_vlan entered promiscuous mode [ 24.351555][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.358828][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.366564][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.374163][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.388848][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.397167][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.405556][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.413962][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.433169][ T285] device veth1_macvtap entered promiscuous mode [ 24.447459][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.455623][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.464263][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.473753][ T288] device veth0_vlan entered promiscuous mode [ 24.480216][ T289] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 24.499102][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.509460][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.521653][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.530512][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.538656][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.546957][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.555465][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.563994][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.572479][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.579777][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.606469][ T284] device veth1_macvtap entered promiscuous mode [ 24.609811][ C0] hrtimer: interrupt took 30287 ns [ 24.620450][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.628039][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.646405][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.657715][ T288] device veth1_macvtap entered promiscuous mode [ 24.669247][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.676928][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.685352][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.709277][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.720359][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.740351][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.748449][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.756850][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.769065][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.865412][ T327] device syzkaller0 entered promiscuous mode [ 24.973390][ T333] cgroup: syz.2.6 (333) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 25.016299][ T333] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 25.050905][ T336] device syzkaller0 entered promiscuous mode [ 25.680250][ T364] device syzkaller0 entered promiscuous mode [ 26.913647][ T418] syz.4.31[418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.913705][ T418] syz.4.31[418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.943331][ T418] syz.4.31[418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.957830][ T418] syz.4.31[418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.978247][ T24] kauditd_printk_skb: 40 callbacks suppressed [ 26.978259][ T24] audit: type=1400 audit(1722242036.990:116): avc: denied { create } for pid=420 comm="syz.0.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 27.028824][ T425] syz.4.31[425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.028884][ T425] syz.4.31[425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.047095][ T24] audit: type=1400 audit(1722242037.060:117): avc: denied { create } for pid=417 comm="syz.4.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 27.139883][ T24] audit: type=1400 audit(1722242037.100:118): avc: denied { create } for pid=430 comm="syz.1.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 27.230249][ T441] »»»»»»: renamed from pim6reg1 [ 27.236273][ T443] device wg2 entered promiscuous mode [ 27.971333][ T505] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.978505][ T505] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.173638][ T505] device bridge_slave_1 left promiscuous mode [ 28.211301][ T505] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.221242][ T505] device bridge_slave_0 left promiscuous mode [ 28.227358][ T505] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.331622][ T24] audit: type=1400 audit(1722242038.350:119): avc: denied { create } for pid=514 comm="syz.2.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 29.222402][ T539] device pim6reg1 entered promiscuous mode [ 29.301292][ T24] audit: type=1400 audit(1722242039.320:120): avc: denied { relabelfrom } for pid=552 comm="syz.4.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 29.369562][ T24] audit: type=1400 audit(1722242039.320:121): avc: denied { relabelto } for pid=552 comm="syz.4.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 29.415425][ T561] device syzkaller0 entered promiscuous mode [ 29.645352][ T574] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 29.903280][ T592] device pim6reg1 entered promiscuous mode [ 30.531000][ T24] audit: type=1400 audit(1722242040.540:122): avc: denied { tracepoint } for pid=613 comm="syz.3.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.812584][ T24] audit: type=1400 audit(1722242040.830:123): avc: denied { ioctl } for pid=636 comm="syz.2.97" path="socket:[16429]" dev="sockfs" ino=16429 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.309554][ T671] device syzkaller0 entered promiscuous mode [ 31.869948][ T733] device pim6reg1 entered promiscuous mode [ 33.105531][ T786] ªªªªªª: renamed from vlan0 [ 33.122146][ T811] device pim6reg1 entered promiscuous mode [ 33.309442][ T846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.323348][ T24] audit: type=1400 audit(1722242043.340:124): avc: denied { create } for pid=847 comm="syz.0.144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 33.453407][ T24] audit: type=1400 audit(1722242043.470:125): avc: denied { write } for pid=858 comm="syz.2.148" name="cgroup.subtree_control" dev="cgroup2" ino=185 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 33.490027][ T24] audit: type=1400 audit(1722242043.470:126): avc: denied { open } for pid=858 comm="syz.2.148" path="" dev="cgroup2" ino=185 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 33.577653][ T24] audit: type=1400 audit(1722242043.590:127): avc: denied { create } for pid=869 comm="syz.4.152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.693856][ T24] audit: type=1400 audit(1722242043.620:128): avc: denied { write } for pid=869 comm="syz.4.152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.708186][ T862] device syzkaller0 entered promiscuous mode [ 33.719774][ T24] audit: type=1400 audit(1722242043.620:129): avc: denied { read } for pid=869 comm="syz.4.152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.720043][ T24] audit: type=1400 audit(1722242043.650:130): avc: denied { write } for pid=869 comm="syz.4.152" name="task" dev="proc" ino=16709 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 33.720061][ T24] audit: type=1400 audit(1722242043.650:131): avc: denied { add_name } for pid=869 comm="syz.4.152" name="cgroup.stat" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 33.720078][ T24] audit: type=1400 audit(1722242043.670:132): avc: denied { create } for pid=869 comm="syz.4.152" name="cgroup.stat" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 33.720094][ T24] audit: type=1400 audit(1722242043.680:133): avc: denied { associate } for pid=869 comm="syz.4.152" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 34.554224][ T921] syz.3.165 (921) used obsolete PPPIOCDETACH ioctl [ 34.598062][ T934] device pim6reg1 entered promiscuous mode [ 35.088154][ T962] device syzkaller0 entered promiscuous mode [ 36.627169][ T1039] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.634207][ T1039] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.757525][ T1043] syz.0.197[1043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.757586][ T1043] syz.0.197[1043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.820291][ T1041] syz.0.197[1041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.838341][ T1041] syz.0.197[1041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.854280][ T1046] device pim6reg1 entered promiscuous mode [ 37.165696][ T1107] syz.3.217 uses obsolete (PF_INET,SOCK_PACKET) [ 37.814065][ T1165] device syzkaller0 entered promiscuous mode [ 37.849530][ T1167] syz.4.231[1167] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.849577][ T1167] syz.4.231[1167] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.346258][ T1204] device wg2 entered promiscuous mode [ 38.444355][ T1212] device wg2 left promiscuous mode [ 38.537263][ T1218] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.544190][ T1218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.551325][ T1218] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.558161][ T1218] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.565610][ T1218] device bridge0 entered promiscuous mode [ 39.050297][ T865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 39.199932][ T1242] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 39.233182][ T1242] pim6reg0: linktype set to 773 [ 39.537109][ T1253] device syzkaller0 entered promiscuous mode [ 40.278845][ T1296] syz.4.270[1296] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.278904][ T1296] syz.4.270[1296] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.591414][ T24] kauditd_printk_skb: 7 callbacks suppressed [ 40.591427][ T24] audit: type=1400 audit(1722242050.600:141): avc: denied { create } for pid=1317 comm="syz.4.277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 40.868437][ T24] audit: type=1400 audit(1722242050.800:142): avc: denied { create } for pid=1330 comm="syz.0.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 41.056258][ T24] audit: type=1400 audit(1722242051.070:143): avc: denied { create } for pid=1347 comm="syz.4.285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 41.209216][ T24] audit: type=1400 audit(1722242051.220:144): avc: denied { create } for pid=1366 comm="syz.1.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 41.319924][ T24] audit: type=1400 audit(1722242051.330:145): avc: denied { create } for pid=1357 comm="syz.4.289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 41.775135][ T1419] ------------[ cut here ]------------ [ 41.819655][ T1419] trace type BPF program uses run-time allocation [ 41.833777][ T1419] WARNING: CPU: 1 PID: 1419 at kernel/bpf/verifier.c:10493 check_map_prog_compatibility+0x65b/0x7c0 [ 41.874935][ T1419] Modules linked in: [ 41.890183][ T1419] CPU: 0 PID: 1419 Comm: syz.2.305 Not tainted 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 41.907192][ T1419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 41.918553][ T1419] RIP: 0010:check_map_prog_compatibility+0x65b/0x7c0 [ 42.026458][ T1419] Code: c8 e9 84 fe ff ff e8 24 f5 ee ff 31 db e9 85 fe ff ff e8 18 f5 ee ff c6 05 2e 13 65 05 01 48 c7 c7 40 73 45 85 e8 d5 7b c2 ff <0f> 0b e9 42 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 17 fa ff [ 42.188925][ T1419] RSP: 0018:ffffc900010a6f90 EFLAGS: 00010246 [ 42.258742][ T1419] RAX: a17edbd948942800 RBX: ffff8881125c5000 RCX: 0000000000040000 [ 42.335688][ T1419] RDX: ffffc90001d31000 RSI: 000000000000088a RDI: 000000000000088b [ 42.349748][ T1419] RBP: ffffc900010a6fd0 R08: ffffffff81521b78 R09: ffffed103ee2a5f8 [ 42.428541][ T1419] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 42.523673][ T1419] R13: 1ffff92000019c04 R14: ffff88811af90000 R15: ffffc900000ce020 [ 42.537460][ T1419] FS: 00007fe89ebca6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 42.546581][ T1419] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 42.568553][ T1419] CR2: 0000001b2d81fffc CR3: 000000012475c000 CR4: 00000000003506a0 [ 42.578895][ T1419] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 42.619786][ T1419] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 42.648240][ T1419] Call Trace: [ 42.668853][ T1419] ? show_regs+0x58/0x60 [ 42.675659][ T1419] ? __warn+0x160/0x2f0 [ 42.679718][ T1419] ? check_map_prog_compatibility+0x65b/0x7c0 [ 42.686160][ T1419] ? report_bug+0x3d9/0x5b0 [ 42.690688][ T1419] ? check_map_prog_compatibility+0x65b/0x7c0 [ 42.696479][ T1419] ? handle_bug+0x41/0x70 [ 42.700726][ T1419] ? exc_invalid_op+0x1b/0x50 [ 42.705161][ T1419] ? asm_exc_invalid_op+0x12/0x20 [ 42.710036][ T1419] ? wake_up_klogd+0xb8/0xf0 [ 42.714446][ T1419] ? check_map_prog_compatibility+0x65b/0x7c0 [ 42.720425][ T1419] ? __fdget+0x1bc/0x240 [ 42.724446][ T24] audit: type=1400 audit(1722242052.740:146): avc: denied { create } for pid=1490 comm="syz.3.324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 42.743788][ T1419] resolve_pseudo_ldimm64+0x586/0x1020 [ 42.749205][ T1419] ? bpf_check+0xf2b0/0xf2b0 [ 42.766500][ T1419] ? kvmalloc_node+0x82/0x130 [ 42.777880][ T1419] bpf_check+0xaf21/0xf2b0 [ 42.799886][ T1419] ? stack_depot_save+0xe/0x10 [ 42.804532][ T1419] ? __se_sys_bpf+0x9856/0x11cb0 [ 42.811551][ T1419] ? sched_clock+0x3a/0x40 [ 42.815808][ T1419] ? 0xffffffffa0002000 [ 42.842614][ T1499] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.870306][ T1419] ? bpf_get_btf_vmlinux+0x60/0x60 [ 42.875626][ T1419] ? __kernel_text_address+0x9b/0x110 [ 42.881180][ T1419] ? unwind_get_return_address+0x4d/0x90 [ 42.886666][ T1419] ? arch_stack_walk+0xf3/0x140 [ 42.893294][ T1502] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.900186][ T1502] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.908458][ T1419] ? stack_trace_save+0x113/0x1c0 [ 42.913680][ T1419] ? stack_trace_snprint+0xf0/0xf0 [ 43.023394][ T1419] ? stack_trace_snprint+0xf0/0xf0 [ 43.094950][ T1419] ? selinux_bpf_prog_alloc+0x51/0x140 [ 43.184782][ T1419] ? selinux_bpf_prog_alloc+0x51/0x140 [ 43.244418][ T24] audit: type=1400 audit(1722242053.260:147): avc: denied { create } for pid=1508 comm="syz.0.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 43.265134][ T1512] device pim6reg1 entered promiscuous mode [ 43.277431][ T1419] ? ____kasan_kmalloc+0xed/0x110 [ 43.296277][ T1419] ? ____kasan_kmalloc+0xdb/0x110 [ 43.301382][ T1419] ? __kasan_kmalloc+0x9/0x10 [ 43.305976][ T1419] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 43.316085][ T1419] ? selinux_bpf_prog_alloc+0x51/0x140 [ 43.356734][ T1419] ? security_bpf_prog_alloc+0x62/0x90 [ 43.481556][ T1419] ? __se_sys_bpf+0x9f8c/0x11cb0 [ 43.520574][ T1419] ? __x64_sys_bpf+0x7b/0x90 [ 43.535831][ T1419] ? do_syscall_64+0x34/0x70 [ 43.540362][ T1419] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 43.546665][ T1419] ? __kasan_kmalloc+0x9/0x10 [ 43.551449][ T1419] __se_sys_bpf+0x107a2/0x11cb0 [ 43.556241][ T1419] ? __kasan_check_write+0x14/0x20 [ 43.565376][ T1419] ? __x64_sys_bpf+0x90/0x90 [ 43.579858][ T1419] ? futex_wake+0x630/0x790 [ 43.589560][ T1419] ? __sys_recvmsg_sock+0x50/0x50 [ 43.613842][ T1419] ? do_futex+0x13c5/0x17b0 [ 43.619475][ T1419] ? import_iovec+0xe5/0x120 [ 43.624250][ T1419] ? ___sys_recvmsg+0x210/0x690 [ 43.628947][ T1419] ? futex_exit_release+0x1e0/0x1e0 [ 43.638206][ T1419] ? alloc_file_pseudo+0x280/0x2f0 [ 43.644187][ T1419] ? __se_sys_futex+0x355/0x470 [ 43.650092][ T1419] ? fpu__clear_all+0x20/0x20 [ 43.654775][ T1419] ? __kasan_check_read+0x11/0x20 [ 43.659723][ T1419] __x64_sys_bpf+0x7b/0x90 [ 43.664700][ T1419] do_syscall_64+0x34/0x70 [ 43.676237][ T1419] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 43.682218][ T1419] RIP: 0033:0x7fe89ff4a299 [ 43.686509][ T1419] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 43.706244][ T1419] RSP: 002b:00007fe89ebca048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 43.724086][ T1419] RAX: ffffffffffffffda RBX: 00007fe8a00d8f80 RCX: 00007fe89ff4a299 [ 43.783224][ T1419] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 43.873863][ T1419] RBP: 00007fe89ffb78e6 R08: 0000000000000000 R09: 0000000000000000 [ 43.999836][ T1419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 44.110079][ T1419] R13: 000000000000000b R14: 00007fe8a00d8f80 R15: 00007fffb31c93c8 [ 44.204890][ T1419] ---[ end trace 1e7e616d78a06302 ]--- [ 44.512334][ T1556] syz.1.343[1556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.512397][ T1556] syz.1.343[1556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.523891][ T1557] syz.1.343[1557] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.416493][ T1656] device syzkaller0 entered promiscuous mode [ 46.095237][ T1687] device veth1_macvtap left promiscuous mode [ 46.141130][ T1694] device syzkaller0 entered promiscuous mode [ 46.288175][ T1727] device syzkaller0 entered promiscuous mode [ 46.322623][ T1730] device pim6reg1 entered promiscuous mode [ 47.240054][ T24] audit: type=1400 audit(1722242057.260:148): avc: denied { create } for pid=1798 comm="syz.1.408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 47.636313][ T1830] device pim6reg1 entered promiscuous mode [ 48.735342][ T1891] device pim6reg1 entered promiscuous mode [ 48.757124][ T1895] syz.1.435[1895] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.757181][ T1895] syz.1.435[1895] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.316434][ T24] audit: type=1400 audit(1722242059.330:149): avc: denied { ioctl } for pid=1953 comm="syz.0.453" path="socket:[19513]" dev="sockfs" ino=19513 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 49.358765][ T1957] device syzkaller0 entered promiscuous mode [ 49.727847][ T1976] device syzkaller0 entered promiscuous mode [ 51.197212][ T24] audit: type=1400 audit(1722242061.210:150): avc: denied { create } for pid=2048 comm="syz.3.471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 51.880963][ T24] audit: type=1400 audit(1722242061.890:151): avc: denied { ioctl } for pid=2100 comm="syz.0.485" path="uts:[4026532402]" dev="nsfs" ino=4026532402 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 52.235803][ T2109] device syzkaller0 entered promiscuous mode [ 55.980875][ T24] audit: type=1400 audit(1722242066.000:152): avc: denied { create } for pid=2326 comm="syz.4.541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 56.266275][ T2334] device syzkaller0 entered promiscuous mode [ 56.782144][ T2360] device pim6reg1 entered promiscuous mode [ 56.878314][ T2387] device sit0 entered promiscuous mode [ 57.151587][ T24] audit: type=1400 audit(1722242067.170:153): avc: denied { create } for pid=2424 comm="syz.4.569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 57.389871][ T2444] device pim6reg1 entered promiscuous mode [ 57.522122][ T2459] device veth0_vlan left promiscuous mode [ 57.540478][ T2459] device veth0_vlan entered promiscuous mode [ 57.577973][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 57.589516][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 57.597162][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 57.869494][ T2474] device veth1_macvtap left promiscuous mode [ 58.442156][ T2513] device syzkaller0 entered promiscuous mode [ 58.486199][ T2514] device syzkaller0 entered promiscuous mode [ 58.916700][ T2556] device pim6reg1 entered promiscuous mode [ 59.489896][ T24] audit: type=1400 audit(1722242069.490:154): avc: denied { create } for pid=2571 comm="syz.3.614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 60.064985][ T2579] device syzkaller0 entered promiscuous mode [ 60.441117][ T24] audit: type=1400 audit(1722242070.460:155): avc: denied { create } for pid=2619 comm="syz.2.625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 61.776284][ T2690] device veth0_vlan left promiscuous mode [ 61.782758][ T2690] device veth0_vlan entered promiscuous mode [ 61.969278][ T2717] device vxcan1 entered promiscuous mode [ 61.982608][ T2721] device pim6reg1 entered promiscuous mode [ 62.031052][ T2730] device syzkaller0 entered promiscuous mode [ 62.149949][ T2733] device sit0 entered promiscuous mode [ 62.497104][ T2750] device syzkaller0 entered promiscuous mode [ 63.337039][ T2790] device pim6reg1 entered promiscuous mode [ 63.447906][ T2806] device syzkaller0 entered promiscuous mode [ 64.512339][ T2847] device sit0 left promiscuous mode [ 64.515613][ T2852] syz.4.695[2852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.521895][ T2852] syz.4.695[2852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.674351][ T2859] device sit0 entered promiscuous mode [ 64.719455][ T2868] device syzkaller0 entered promiscuous mode [ 65.040658][ T2914] syz.0.713[2914] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.040710][ T2914] syz.0.713[2914] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.080150][ T24] audit: type=1400 audit(1722242075.090:156): avc: denied { create } for pid=2899 comm="syz.3.709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 65.158547][ T2896] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.198795][ T2896] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.206544][ T2896] device bridge_slave_0 entered promiscuous mode [ 65.219216][ T2896] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.226117][ T2896] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.238049][ T2896] device bridge_slave_1 entered promiscuous mode [ 65.384677][ T24] audit: type=1400 audit(1722242075.400:157): avc: denied { create } for pid=2952 comm="syz.2.722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 65.456981][ T2969] syz.0.725[2969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.457042][ T2969] syz.0.725[2969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.608464][ T866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.631920][ T866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.650273][ T866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.659234][ T866] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.668126][ T866] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.675294][ T866] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.683978][ T866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.692183][ T866] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.700525][ T866] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.707380][ T866] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.720459][ T866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 65.729576][ T866] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 65.738065][ T866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 65.746336][ T866] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 65.761068][ T2032] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.791642][ T866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 65.813618][ T866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 65.833213][ T2896] device veth0_vlan entered promiscuous mode [ 65.858915][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 65.879142][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 65.889612][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 65.901404][ T390] device bridge_slave_1 left promiscuous mode [ 65.935687][ T390] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.947104][ T390] device bridge_slave_0 left promiscuous mode [ 65.956461][ T390] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.163916][ T866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 66.181326][ T3025] rose0: tun_chr_ioctl cmd 1074025677 [ 66.186650][ T3025] rose0: linktype set to 805 [ 66.193743][ T2896] device veth1_macvtap entered promiscuous mode [ 66.209231][ T866] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 66.217996][ T866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 66.239103][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 66.249321][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 66.273462][ T24] audit: type=1400 audit(1722242076.280:158): avc: denied { mounton } for pid=2896 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=357 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 66.343432][ T3032] device syzkaller0 entered promiscuous mode [ 66.489768][ T3049] device syzkaller0 entered promiscuous mode [ 66.574522][ T3058] device pim6reg1 entered promiscuous mode [ 67.140039][ T24] audit: type=1400 audit(1722242077.150:159): avc: denied { append } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 67.189955][ T3134] device veth0_vlan left promiscuous mode [ 67.253507][ T3134] device veth0_vlan entered promiscuous mode [ 67.342546][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.357338][ T24] audit: type=1400 audit(1722242077.160:160): avc: denied { open } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 67.392051][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.408741][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 67.426693][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 67.488026][ T24] audit: type=1400 audit(1722242077.160:161): avc: denied { getattr } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 67.744464][ T3150] device veth0_vlan left promiscuous mode [ 67.760569][ T3150] device veth0_vlan entered promiscuous mode [ 67.794671][ T3150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.828899][ T802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.859380][ T802] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 67.929929][ T802] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 67.941975][ T3165] cgroup: fork rejected by pids controller in /syz0 [ 68.308069][ T3200] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.317138][ T3200] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.409250][ T3201] device bridge_slave_1 left promiscuous mode [ 68.426101][ T3201] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.443396][ T3201] device bridge_slave_0 left promiscuous mode [ 68.529915][ T3201] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.936239][ T3245] syz.1.786[3245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.936297][ T3245] syz.1.786[3245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.947755][ T3244] syz.1.786[3244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.021167][ T3244] syz.1.786[3244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.736078][ T3332] -÷Š: renamed from syzkaller0 [ 70.756899][ T3337] cgroup: fork rejected by pids controller in /syz1 [ 71.449702][ T3364] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.456684][ T3364] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.464066][ T3364] device bridge_slave_0 entered promiscuous mode [ 71.492718][ T3364] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.521904][ T3364] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.554409][ T3364] device bridge_slave_1 entered promiscuous mode [ 71.676083][ T3364] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.683159][ T3364] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.690260][ T3364] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.697023][ T3364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.743804][ T3403] syz.0.828[3403] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.743861][ T3403] syz.0.828[3403] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.781095][ T459] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.839821][ T459] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.918417][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.934839][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.033365][ T802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.076495][ T802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.157040][ T802] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.163944][ T802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.191625][ T802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.200141][ T802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.208481][ T802] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.215365][ T802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.294161][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 72.350668][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 72.420529][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 72.429409][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.462311][ T802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 72.498185][ T802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 72.563687][ T3364] device veth0_vlan entered promiscuous mode [ 72.584865][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 72.593014][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.611955][ T3436] device pim6reg1 entered promiscuous mode [ 72.618885][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.627500][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 72.639614][ T3364] device veth1_macvtap entered promiscuous mode [ 72.669241][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 72.682786][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 72.693769][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 72.705829][ T9] device veth1_macvtap left promiscuous mode [ 72.727432][ T9] device veth0_vlan left promiscuous mode [ 73.101760][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 73.112147][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 73.151260][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 73.182387][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 73.516509][ T3497] device syzkaller0 entered promiscuous mode [ 73.966208][ T3536] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.973202][ T3536] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.252775][ T3546] device syzkaller0 entered promiscuous mode [ 74.546278][ T3564] syz.4.871[3564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.548822][ T3564] syz.4.871[3564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.733215][ T24] audit: type=1400 audit(1722242084.750:162): avc: denied { create } for pid=3584 comm="syz.4.877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 74.736854][ T3594] syz.1.879[3594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.517787][ T3639] device veth0_vlan left promiscuous mode [ 75.618644][ T3639] device veth0_vlan entered promiscuous mode [ 76.573672][ T3710] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.580708][ T3710] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.977726][ T3706] device syzkaller0 entered promiscuous mode [ 77.003320][ T3716] device syzkaller0 entered promiscuous mode [ 77.039045][ T3724] device veth1_virt_wifi entered promiscuous mode [ 77.378467][ T3741] device syzkaller0 entered promiscuous mode [ 77.414769][ T24] audit: type=1400 audit(1722242087.430:163): avc: denied { create } for pid=3751 comm="syz.3.925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 77.458328][ T3752] device macsec0 entered promiscuous mode [ 77.684750][ T3785] device syzkaller0 entered promiscuous mode [ 78.015064][ T3810] device sit0 entered promiscuous mode [ 78.878580][ T3912] device syzkaller0 entered promiscuous mode [ 79.639415][ T3970] device syzkaller0 entered promiscuous mode [ 80.708370][ T4021] device pim6reg1 entered promiscuous mode [ 81.011163][ T4054] device syzkaller0 entered promiscuous mode [ 82.062844][ T4103] bridge0: port 3(veth0_to_batadv) entered blocking state [ 82.071261][ T4103] bridge0: port 3(veth0_to_batadv) entered disabled state [ 82.090489][ T4103] device veth0_to_batadv entered promiscuous mode [ 82.097938][ T4103] device veth0_to_batadv left promiscuous mode [ 82.104588][ T4103] bridge0: port 3(veth0_to_batadv) entered disabled state [ 82.780687][ T4154] device sit0 entered promiscuous mode [ 83.274386][ T4183] syz.0.1040[4183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.274444][ T4183] syz.0.1040[4183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.336942][ T4189] device pim6reg1 entered promiscuous mode [ 83.370454][ T24] audit: type=1400 audit(1722242093.390:164): avc: denied { create } for pid=4188 comm="syz.0.1042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 83.428280][ T4202] device pim6reg1 entered promiscuous mode [ 83.462632][ T4207] device pim6reg1 entered promiscuous mode [ 84.116143][ T4245] device sit0 left promiscuous mode [ 84.838399][ T4279] device veth1_macvtap left promiscuous mode [ 84.914736][ T4284] device veth1_to_bond entered promiscuous mode [ 85.357012][ T4318] device syzkaller0 entered promiscuous mode [ 85.562241][ T4330] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.569433][ T4330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.578102][ T4330] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.585506][ T4330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 85.678264][ T4330] device bridge0 entered promiscuous mode [ 85.909995][ T868] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 87.830175][ T4478] device pim6reg1 entered promiscuous mode [ 88.614057][ T4545] device wg2 entered promiscuous mode [ 88.813987][ T4546] device veth0_to_team entered promiscuous mode [ 89.438366][ T4595] device syzkaller0 entered promiscuous mode [ 89.759969][ T4593] cgroup: fork rejected by pids controller in /syz3 [ 90.452686][ T4734] €Â0: renamed from pim6reg1 [ 90.785411][ T4748] device syzkaller0 entered promiscuous mode [ 90.805389][ T4741] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.812701][ T4741] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.829417][ T4741] device bridge_slave_0 entered promiscuous mode [ 90.852724][ T4741] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.859711][ T4741] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.868737][ T4741] device bridge_slave_1 entered promiscuous mode [ 91.060720][ T4741] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.067611][ T4741] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.074735][ T4741] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.081720][ T4741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.148860][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.158048][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.407548][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 91.428798][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 91.455644][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 91.489127][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 91.561042][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.567920][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.641576][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 91.711896][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 91.745798][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.752691][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.820559][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 91.829132][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.865694][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.876273][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.912404][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 91.920999][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 91.940879][ T4741] device veth0_vlan entered promiscuous mode [ 91.974030][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 91.985712][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 92.011942][ T4741] device veth1_macvtap entered promiscuous mode [ 92.032600][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 92.040934][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 92.048198][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 92.069166][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 92.080939][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 92.100442][ T4869] device team_slave_1 entered promiscuous mode [ 92.106835][ T4878] veth1_macvtap: mtu greater than device maximum [ 92.119456][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 92.128284][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 92.136797][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 92.145394][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 92.153932][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 92.162483][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 92.179934][ T270] device bridge_slave_1 left promiscuous mode [ 92.186834][ T270] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.194481][ T270] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.203099][ T270] device veth0_vlan left promiscuous mode [ 92.751088][ T4902] lo: mtu less than device minimum [ 94.337792][ T24] audit: type=1400 audit(1722242104.350:165): avc: denied { create } for pid=4990 comm="syz.3.1219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 94.467799][ T5004] device pim6reg1 entered promiscuous mode [ 94.889179][ T5017] device syzkaller0 entered promiscuous mode [ 95.122510][ T5027] device syzkaller0 entered promiscuous mode [ 95.751364][ T24] audit: type=1400 audit(1722242105.770:166): avc: denied { create } for pid=5057 comm="syz.2.1239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 96.072066][ T5074] syz.2.1244[5074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.072122][ T5074] syz.2.1244[5074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.809965][ T5120] device syzkaller0 entered promiscuous mode [ 96.979127][ T5168] device syzkaller0 entered promiscuous mode [ 97.015546][ T5189] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.022569][ T5189] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.521792][ T5237] device syzkaller0 entered promiscuous mode [ 98.217701][ T5294] device pim6reg1 entered promiscuous mode [ 98.592312][ T5317] device pim6reg1 entered promiscuous mode [ 98.770061][ T5358] device syzkaller0 entered promiscuous mode [ 99.635045][ T24] audit: type=1400 audit(1722242109.650:167): avc: denied { create } for pid=5421 comm="syz.4.1341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 100.475375][ T5478] device bridge_slave_0 entered promiscuous mode [ 101.172423][ T5522] device syzkaller0 entered promiscuous mode [ 102.814480][ T5625] device syzkaller0 entered promiscuous mode [ 103.175624][ T5665] syz.3.1411[5665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.175674][ T5665] syz.3.1411[5665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.448759][ T5691] device syzkaller0 entered promiscuous mode [ 103.546377][ T5702] device syzkaller0 entered promiscuous mode [ 104.307755][ T5760] device syzkaller0 entered promiscuous mode [ 104.415762][ T5764] device syzkaller0 entered promiscuous mode [ 105.184897][ T5847] device pim6reg1 entered promiscuous mode [ 105.279998][ T5858] device veth1_macvtap entered promiscuous mode [ 105.287689][ T5858] device macsec0 entered promiscuous mode [ 105.318991][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 105.818007][ T5890] syz.4.1471[5890] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.818063][ T5890] syz.4.1471[5890] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.832560][ T5894] syz.4.1471[5894] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.372751][ T5935] device sit0 entered promiscuous mode [ 107.083076][ T5964] device veth1_macvtap left promiscuous mode [ 107.089284][ T5964] device macsec0 left promiscuous mode [ 107.295191][ T5969] device veth1_macvtap entered promiscuous mode [ 107.307454][ T5969] device macsec0 entered promiscuous mode [ 109.151294][ T6124] device pim6reg1 entered promiscuous mode [ 109.656425][ T6193] device veth1_macvtap left promiscuous mode [ 109.670048][ T6193] device macsec0 left promiscuous mode [ 110.358087][ T6251] device pim6reg1 entered promiscuous mode [ 110.432008][ T6246] device pim6reg1 entered promiscuous mode [ 110.450600][ T6254] syz.3.1569[6254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.450658][ T6254] syz.3.1569[6254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.039690][ T6305] geneve1: tun_chr_ioctl cmd 1074025672 [ 111.056317][ T6305] geneve1: ignored: set checksum enabled [ 111.234569][ T6327] device pim6reg1 entered promiscuous mode [ 111.503421][ T6353] syz.2.1595[6353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.505326][ T6353] syz.2.1595[6353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.448044][ T6413] device sit0 left promiscuous mode [ 112.559069][ T6415] device sit0 entered promiscuous mode [ 112.633846][ T6418] syz.3.1612[6418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.633902][ T6418] syz.3.1612[6418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.269900][ T6428] device syzkaller0 entered promiscuous mode [ 114.903143][ T6507] ªªªªªª: renamed from vlan0 [ 116.914096][ T6598] device syzkaller0 entered promiscuous mode [ 117.672253][ T6629] device syzkaller0 entered promiscuous mode [ 117.888890][ T6666] device pim6reg1 entered promiscuous mode [ 118.683402][ T6750] device pim6reg1 entered promiscuous mode [ 118.803375][ T6774] device pim6reg1 entered promiscuous mode [ 120.971280][ T6918] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 121.382438][ T6920] device syzkaller0 entered promiscuous mode [ 121.822164][ T6952] device veth0_vlan left promiscuous mode [ 121.836394][ T6952] device veth0_vlan entered promiscuous mode [ 121.851273][ T6078] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 121.866055][ T6078] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 121.899171][ T6078] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 122.367735][ T6997] device syzkaller0 entered promiscuous mode [ 122.769101][ T7080] device pim6reg1 entered promiscuous mode [ 123.219180][ T7114] device pim6reg1 entered promiscuous mode [ 123.465494][ T7123] syz.1.1799[7123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.465549][ T7123] syz.1.1799[7123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.499187][ T7125] device lo entered promiscuous mode [ 123.549727][ T7124] device lo left promiscuous mode [ 123.628109][ T7132] tap0: tun_chr_ioctl cmd 1074025677 [ 123.634271][ T7132] tap0: linktype set to 818 [ 123.662227][ T7132] tap0: tun_chr_ioctl cmd 1074812117 [ 123.958248][ T7158] ÿÿÿÿÿÿ: renamed from vlan0 [ 124.054568][ T7174] device pim6reg1 entered promiscuous mode [ 125.636501][ T7235] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.643442][ T7235] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.652593][ T7235] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.659750][ T7235] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.671121][ T24] audit: type=1400 audit(1722242135.690:168): avc: denied { remove_name } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 125.671978][ T7235] device bridge0 entered promiscuous mode [ 125.713083][ T24] audit: type=1400 audit(1722242135.690:169): avc: denied { rename } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 125.735739][ T24] audit: type=1400 audit(1722242135.690:170): avc: denied { create } for pid=75 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 126.019867][ T6078] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 126.068884][ T7271] device syzkaller0 entered promiscuous mode [ 128.107013][ T7388] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.116119][ T7388] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.134967][ T7388] device bridge_slave_0 entered promiscuous mode [ 128.144214][ T7438] device pim6reg1 entered promiscuous mode [ 128.153407][ T7388] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.162774][ T7388] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.170695][ T7388] device bridge_slave_1 entered promiscuous mode [ 128.249358][ T7444] device veth1_macvtap left promiscuous mode [ 128.262362][ T7444] device veth1_macvtap entered promiscuous mode [ 128.273992][ T7444] device macsec0 entered promiscuous mode [ 128.286207][ T7444] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 128.304349][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 128.487128][ T7376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 128.504813][ T7376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 128.532854][ T7377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 128.541995][ T7377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 128.580099][ T7377] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.586959][ T7377] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.616306][ T7377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 128.652721][ T7377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 128.667417][ T7377] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.674303][ T7377] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.694387][ T7377] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 128.702276][ T7377] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 128.757764][ T7479] rose0: tun_chr_ioctl cmd 1074025677 [ 128.763284][ T7479] rose0: linktype set to 805 [ 128.767727][ T7377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 128.860374][ T7376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 128.873455][ T7388] device veth0_vlan entered promiscuous mode [ 128.880060][ T7377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 128.888350][ T7377] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 128.896875][ T7377] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 128.914030][ T7376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 128.923731][ T7388] device veth1_macvtap entered promiscuous mode [ 128.939396][ T7376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 128.954553][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 129.251647][ T7511] device pim6reg1 entered promiscuous mode [ 129.262145][ T390] device bridge_slave_1 left promiscuous mode [ 129.268413][ T390] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.276079][ T390] device bridge_slave_0 left promiscuous mode [ 129.282340][ T390] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.353341][ T7544] syz.2.1900[7544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.353395][ T7544] syz.2.1900[7544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.471870][ T24] audit: type=1400 audit(1722242139.490:171): avc: denied { attach_queue } for pid=7510 comm="syz.4.1894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 130.276519][ T7605] device syzkaller0 entered promiscuous mode [ 131.519271][ T7666] bridge_slave_0: mtu greater than device maximum [ 131.969365][ T7700] device syzkaller0 entered promiscuous mode [ 132.130774][ T7702] device veth1_macvtap entered promiscuous mode [ 132.495065][ T7743] tap0: tun_chr_ioctl cmd 1074025673 [ 134.167353][ T7824] device sit0 left promiscuous mode [ 134.821283][ T7874] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 135.313968][ T7902] device syzkaller0 entered promiscuous mode [ 135.321570][ T7908] syz.4.2006[7908] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.321626][ T7908] syz.4.2006[7908] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.571643][ T7920] device syzkaller0 entered promiscuous mode [ 135.902990][ T7939] device syzkaller0 entered promiscuous mode [ 136.925165][ T7997] device veth0_vlan left promiscuous mode [ 136.996926][ T7997] device veth0_vlan entered promiscuous mode [ 137.044343][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 137.065106][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 137.119071][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 137.263152][ T8032] syz.1.2038[8032] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.263207][ T8032] syz.1.2038[8032] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.275572][ T8034] syz.1.2038[8034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.287391][ T8034] syz.1.2038[8034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.655142][ T8079] device syzkaller0 entered promiscuous mode [ 137.838758][ T8092] bridge_slave_0: mtu greater than device maximum [ 137.988812][ T8113] device sit0 entered promiscuous mode [ 138.562958][ T8147] device pim6reg1 entered promiscuous mode [ 138.908258][ T8171] device pim6reg1 entered promiscuous mode [ 138.937852][ T8174] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.944829][ T8174] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.960543][ T8174] device bridge0 left promiscuous mode [ 138.988104][ T8172] device syzkaller0 entered promiscuous mode [ 138.997023][ T8174] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.003922][ T8174] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.011012][ T8174] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.017775][ T8174] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.134954][ T8174] device bridge0 entered promiscuous mode [ 139.672446][ T8236] device sit0 left promiscuous mode [ 139.700137][ T8234] device sit0 entered promiscuous mode [ 139.785294][ T8249] device syzkaller0 entered promiscuous mode [ 139.864023][ T8268] device wg2 entered promiscuous mode [ 140.396523][ T8326] device sit0 entered promiscuous mode [ 140.520843][ T8329] device pim6reg1 entered promiscuous mode [ 140.587427][ T8334] device pim6reg1 entered promiscuous mode [ 140.597504][ T8337] device pim6reg1 entered promiscuous mode [ 141.792831][ T8385] device syzkaller0 entered promiscuous mode [ 142.163534][ T8404] device pim6reg1 entered promiscuous mode [ 142.260334][ T8411] device sit0 left promiscuous mode [ 142.344514][ T8411] device sit0 entered promiscuous mode [ 142.365192][ T8425] syz.3.2142[8425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.365245][ T8425] syz.3.2142[8425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.620340][ T8502] device pim6reg1 entered promiscuous mode [ 144.303919][ T8593] device macsec0 entered promiscuous mode [ 144.428048][ T8613] bridge_slave_0: mtu greater than device maximum [ 144.681004][ T8634] device pim6reg1 entered promiscuous mode [ 145.545590][ T8688] device syzkaller0 entered promiscuous mode [ 146.003511][ T8709] device pim6reg1 entered promiscuous mode [ 146.680437][ T8771] device syzkaller0 entered promiscuous mode [ 148.035281][ T8844] device syzkaller0 entered promiscuous mode [ 148.598104][ T8867] device sit0 left promiscuous mode [ 148.884628][ T8876] device macsec0 entered promiscuous mode [ 149.676455][ T8914] device bridge0 entered promiscuous mode [ 150.470317][ T24] audit: type=1400 audit(1722242160.490:172): avc: denied { create } for pid=8953 comm="syz.0.2276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 151.083318][ T9004] device veth0_vlan left promiscuous mode [ 151.118022][ T9004] device veth0_vlan entered promiscuous mode [ 152.193338][ T9041] syz.3.2299[9041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.193395][ T9041] syz.3.2299[9041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.245191][ T24] audit: type=1400 audit(1722242162.260:173): avc: denied { append } for pid=9037 comm="syz.3.2299" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 152.544141][ T9068] device pim6reg1 entered promiscuous mode [ 152.849783][ T9124] Â: renamed from pim6reg1 [ 153.042639][ T9142] device syzkaller0 entered promiscuous mode [ 153.053582][ T9149] device macsec0 left promiscuous mode [ 153.574062][ T9211] device pim6reg1 entered promiscuous mode [ 153.801031][ T9218] device syzkaller0 entered promiscuous mode [ 154.007117][ T9223] device wg2 entered promiscuous mode [ 155.106306][ T9264] bridge0: port 3(veth0_to_batadv) entered blocking state [ 155.116713][ T9264] bridge0: port 3(veth0_to_batadv) entered disabled state [ 155.124511][ T9264] device veth0_to_batadv entered promiscuous mode [ 155.131283][ T9264] bridge0: port 3(veth0_to_batadv) entered blocking state [ 155.138270][ T9264] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 156.072681][ T9361] device syzkaller0 entered promiscuous mode [ 157.833013][ T9442] device pim6reg1 entered promiscuous mode [ 158.242922][ T9490] device pim6reg1 entered promiscuous mode [ 158.311625][ T9494] syz.1.2424[9494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.251989][ T9550] device veth1_macvtap left promiscuous mode [ 159.428666][ T9550] device macsec0 left promiscuous mode [ 159.723221][ T9581] device syzkaller0 entered promiscuous mode [ 159.754383][ T9581] syz.4.2445[9581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.754451][ T9581] syz.4.2445[9581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.862739][ T9621] device sit0 left promiscuous mode [ 159.899484][ T9623] device sit0 left promiscuous mode [ 159.967378][ T9624] device sit0 entered promiscuous mode [ 160.279155][ T9621] device sit0 entered promiscuous mode [ 160.591909][ T9648] device syzkaller0 entered promiscuous mode [ 161.086063][ T9680] device veth0_vlan left promiscuous mode [ 161.119115][ T9680] device veth0_vlan entered promiscuous mode [ 161.156876][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 161.168705][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 161.176646][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 161.267306][ T9704] syz.3.2471[9704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.267313][ T9705] syz.3.2471[9705] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.267352][ T9705] syz.3.2471[9705] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.300386][ T9704] syz.3.2471[9704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.510589][ T9725] device veth0_vlan left promiscuous mode [ 161.540720][ T9725] device veth0_vlan entered promiscuous mode [ 161.564822][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 161.583570][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 161.619543][ T799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 161.966525][ T9738] device syzkaller0 entered promiscuous mode [ 162.320595][ T9746] device veth0_vlan left promiscuous mode [ 162.336372][ T9746] device veth0_vlan entered promiscuous mode [ 162.967694][ T9790] device sit0 left promiscuous mode [ 163.115624][ T9790] device sit0 entered promiscuous mode [ 163.636515][ T9827] syz.0.2504[9827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.636573][ T9827] syz.0.2504[9827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.229572][ T9872] device lo entered promiscuous mode [ 165.374173][ T9897] device sit0 left promiscuous mode [ 165.821557][ T9921] device syzkaller0 entered promiscuous mode [ 166.845543][ T9995] bridge_slave_0: mtu greater than device maximum [ 167.083634][T10027] device veth1_macvtap left promiscuous mode [ 167.090591][T10027] device macsec0 left promiscuous mode [ 168.296310][T10117] device sit0 left promiscuous mode [ 168.759875][T10145] syz.2.2594[10145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.759935][T10145] syz.2.2594[10145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.771849][T10147] syz.2.2594[10147] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.784896][T10147] syz.2.2594[10147] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.796551][T10145] syz.2.2594[10145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.808806][T10145] syz.2.2594[10145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.831616][T10147] syz.2.2594[10147] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.878390][T10231] device sit0 left promiscuous mode [ 170.642794][T10314] device sit0 entered promiscuous mode [ 170.728565][T10316] device veth1_macvtap left promiscuous mode [ 170.734612][T10316] device macsec0 entered promiscuous mode [ 171.468190][T10367] ªªªªªª: renamed from vlan0 [ 171.775560][T10413] syz.2.2662[10413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.775614][T10413] syz.2.2662[10413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.965724][T10440] device sit0 entered promiscuous mode [ 172.276372][T10453] device pim6reg1 entered promiscuous mode [ 172.740930][T10464] bridge0: port 3(veth0_to_batadv) entered disabled state [ 172.749881][T10464] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.759511][T10464] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.278999][T10497] device syzkaller0 entered promiscuous mode [ 173.351481][T10502] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.358616][T10502] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.366487][T10502] device bridge0 left promiscuous mode [ 173.374845][T10502] device bridge_slave_1 left promiscuous mode [ 173.381548][T10502] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.389349][T10502] device bridge_slave_0 left promiscuous mode [ 173.395737][T10502] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.456526][T10505] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.463473][T10505] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.471619][T10505] device bridge0 left promiscuous mode [ 173.516848][T10505] syz.1.2688[10505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.904563][T10507] device syzkaller0 entered promiscuous mode [ 174.622531][T10572] device syzkaller0 entered promiscuous mode [ 176.224664][T10630] device sit0 entered promiscuous mode [ 176.399445][T10633] device pim6reg1 entered promiscuous mode [ 176.774503][T10663] device syzkaller0 entered promiscuous mode [ 176.860577][T10673] device pim6reg1 entered promiscuous mode [ 177.859831][T10702] device pim6reg1 entered promiscuous mode [ 177.994156][T10706] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.001109][T10706] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.008365][T10706] device bridge_slave_0 entered promiscuous mode [ 178.023997][T10706] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.031170][T10706] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.038771][T10706] device bridge_slave_1 entered promiscuous mode [ 178.092052][T10721] device sit0 left promiscuous mode [ 178.214476][T10706] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.221370][T10706] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.228468][T10706] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.235266][T10706] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.284629][T10729] device pim6reg1 entered promiscuous mode [ 178.303035][ T863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.311410][ T863] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.320150][ T863] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.338030][ T863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.346285][ T863] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.353266][ T863] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.360644][ T863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.368848][ T863] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.375843][ T863] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.398460][ T863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 178.421449][ T863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 178.493907][T10706] device veth0_vlan entered promiscuous mode [ 178.612590][ T9110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 178.655506][ T9110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 178.698377][ T9110] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 178.705975][ T9110] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 178.813533][ T9110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 178.837093][ T9110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 178.900686][T10706] device veth1_macvtap entered promiscuous mode [ 178.948212][ T9110] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 178.969175][ T9110] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 178.981274][ T9110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 178.996549][ T9110] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 179.005212][ T9110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 179.374005][T10770] device syzkaller0 entered promiscuous mode [ 179.833820][T10786] device syzkaller0 entered promiscuous mode [ 180.103568][T10792] bpf_get_probe_write_proto: 1 callbacks suppressed [ 180.103580][T10792] syz.3.2769[10792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.123769][T10792] syz.3.2769[10792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.754472][T10817] device pim6reg1 entered promiscuous mode [ 181.023023][T10840] device wg2 entered promiscuous mode [ 181.669919][T10933] device syzkaller0 entered promiscuous mode [ 181.676671][T10940] device macsec0 entered promiscuous mode [ 182.387799][T11022] device pim6reg1 entered promiscuous mode [ 182.792823][ T24] audit: type=1400 audit(1722242192.810:174): avc: denied { create } for pid=11056 comm="syz.4.2835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 183.791808][T11108] device pim6reg1 entered promiscuous mode [ 185.094329][T11191] syz.3.2874[11191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.094409][T11191] syz.3.2874[11191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.457371][T11213] device syzkaller0 entered promiscuous mode [ 186.514850][T11299] syz.1.2906[11299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.514913][T11299] syz.1.2906[11299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.414120][T11343] device syzkaller0 entered promiscuous mode [ 187.883929][T11380] device syzkaller0 entered promiscuous mode [ 187.955838][T11390] device veth0_vlan left promiscuous mode [ 187.990379][T11390] device veth0_vlan entered promiscuous mode [ 188.034285][ T7026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.055060][ T7026] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.065115][ T7026] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 188.645820][T11458] syz.4.2944[11458] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.645877][T11458] syz.4.2944[11458] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.693640][T11462] syz.0.2946[11462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.710384][T11464] syz.0.2946[11464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.714072][T11465] syz.4.2944[11465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.885448][T11465] syz.4.2944[11465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.926937][T11479] device veth1_macvtap left promiscuous mode [ 188.966637][T11479] device macsec0 entered promiscuous mode [ 188.984847][T11492] device veth1_macvtap entered promiscuous mode [ 189.258225][T11509] device syzkaller0 entered promiscuous mode [ 189.526189][T11532] device vxcan1 entered promiscuous mode [ 189.830136][T11549] device sit0 entered promiscuous mode [ 190.357078][T11569] device pim6reg1 entered promiscuous mode [ 190.960878][T11607] device syzkaller0 entered promiscuous mode [ 191.633031][T11643] device pim6reg1 entered promiscuous mode [ 191.846136][T11654] device syzkaller0 entered promiscuous mode [ 192.415489][T11696] device syzkaller0 entered promiscuous mode [ 193.015660][T11732] device pim6reg1 entered promiscuous mode [ 193.195811][T11744] device syzkaller0 entered promiscuous mode [ 194.244593][T11823] device pim6reg1 entered promiscuous mode [ 194.425962][T11844] syz.3.3049[11844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.426021][T11844] syz.3.3049[11844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.449423][T11846] syz.2.3050[11846] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.476459][T11846] syz.2.3050[11846] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.992565][T11877] device syzkaller0 entered promiscuous mode [ 195.624493][T11932] device syzkaller0 entered promiscuous mode [ 195.626116][ T24] audit: type=1400 audit(1722242205.640:175): avc: denied { setattr } for pid=11936 comm="syz.4.3075" path="/dev/ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 195.924443][T11965] device veth1_macvtap left promiscuous mode [ 195.967661][T11965] device macsec0 left promiscuous mode [ 196.021946][T11967] device veth1_macvtap entered promiscuous mode [ 196.051304][T11967] device macsec0 entered promiscuous mode [ 196.096123][ T7028] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 196.910530][T12002] device syzkaller0 entered promiscuous mode [ 197.760422][T12043] device syzkaller0 entered promiscuous mode [ 197.834868][T12043] device syzkaller0 left promiscuous mode [ 198.357484][T12088] syz.3.3118[12088] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.357542][T12088] syz.3.3118[12088] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.235791][T12110] device wg2 left promiscuous mode [ 200.711365][T12204] device syzkaller0 entered promiscuous mode [ 200.840399][T12202] device syzkaller0 entered promiscuous mode [ 201.032784][T12228] device wg2 left promiscuous mode [ 201.206417][T12247] device veth0_to_team entered promiscuous mode [ 202.734259][T12311] device bond_slave_0 entered promiscuous mode [ 202.770303][ T7025] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 202.786667][ T7025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 203.155349][T12327] device veth0_vlan left promiscuous mode [ 203.173130][T12327] device veth0_vlan entered promiscuous mode [ 203.364179][ T7028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 203.402772][ T7028] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 203.442052][ T7028] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.790335][T12361] device veth0_vlan left promiscuous mode [ 203.846620][T12361] device veth0_vlan entered promiscuous mode [ 203.944712][T11652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 203.959399][T11652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 203.967371][T11652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 204.464512][T12391] device pim6reg1 entered promiscuous mode [ 204.840218][T12408] ¯Ê®¸}p: renamed from pim6reg1 [ 206.368984][T12491] device syzkaller0 entered promiscuous mode [ 206.472381][T12493] device veth0_vlan left promiscuous mode [ 206.528566][T12493] device veth0_vlan entered promiscuous mode [ 206.655075][ T7024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.690925][ T7024] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.701135][ T7024] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 207.885783][T12574] device syzkaller0 entered promiscuous mode [ 208.447815][T12612] device pim6reg1 entered promiscuous mode [ 208.896784][T12638] device syzkaller0 entered promiscuous mode [ 209.387456][T12680] syz.1.3267[12680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.387509][T12680] syz.1.3267[12680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.662221][T12706] device pim6reg1 entered promiscuous mode [ 210.584256][T12737] device pim6reg1 entered promiscuous mode [ 211.435021][T12771] device veth0_vlan left promiscuous mode [ 211.474468][T12771] device veth0_vlan entered promiscuous mode [ 211.946837][T12780] device veth0_to_batadv left promiscuous mode [ 211.996794][T12780] bridge0: port 3(veth0_to_batadv) entered disabled state [ 212.114085][T12780] device bridge_slave_1 left promiscuous mode [ 212.175850][T12780] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.189233][T12780] device bridge_slave_0 left promiscuous mode [ 212.198282][T12780] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.680364][T12802] syz.1.3299[12802] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.680426][T12802] syz.1.3299[12802] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.349378][T12868] syz.2.3318[12868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.485624][T12868] syz.2.3318[12868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.799011][T12890] device team_slave_1 entered promiscuous mode [ 215.831316][T10889] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.851766][T10889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.134698][T12898] device syzkaller0 entered promiscuous mode [ 218.685231][T13060] syz.2.3369[13060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.685289][T13060] syz.2.3369[13060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.300585][ T569] device veth0_vlan left promiscuous mode [ 225.872370][T13365] cgroup: fork rejected by pids controller in /syz4 [ 226.982015][T13482] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.988964][T13482] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.996113][T13482] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.002986][T13482] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.012721][T13482] device bridge0 entered promiscuous mode [ 228.039950][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=2 req=3373 state=3 status=67 (errno 32: Broken pipe) [ 231.361906][ T569] device bridge_slave_1 left promiscuous mode [ 231.367846][ T569] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.375114][ T569] device bridge_slave_0 left promiscuous mode [ 231.381310][ T569] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.389107][ T569] device veth0_vlan left promiscuous mode