last executing test programs: 1.388391469s ago: executing program 1 (id=4820): getpid() gettid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x6308, 0x0}, 0x8) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r0, 0x9, 0x10}, 0xc) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x8001}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000180)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r3, &(0x7f00000001c0)={'b', ' *:* ', 'wm\x00'}, 0x9) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x4100, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000240)={'geneve1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000280)={'nr0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x43}}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={r1, &(0x7f00000002c0)="333b3eab5b51f905af4cef5d402629ae84ff3f946431c8ba8c5b5436070ecc7e861973844490f6a4b70330f55f7adc0147624d9ea9b2ab3f696c2d353c8bc6f277fbc77ccd6401ada92369f7838cc25af9bc226727271cde44c339c6e71b4a6300291f9b96920123414a4c6469e78b3340b487a3ab3c06a1a8bdf7323e547a5945bf545715fc6271748849638a8bc12d10cc6b18ccd628c8b25aed2373bd0aa2b115ac8850f9b5db85e47a5ff8a459a7de3f0cbc5e3a85bff4fc1b1f225e40534057", &(0x7f00000003c0)=""/214}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r1, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={r5, 0x8001, 0x10}, 0xc) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001780)={0x6, 0x11, &(0x7f0000000600)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0xa}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000006c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000700)=""/4096, 0x41000, 0x1, '\x00', r2, 0x25, r1, 0x8, &(0x7f0000001700)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=[r7, r7, r1], 0x0, 0x10, 0xfffffff8}, 0x90) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f0000001840)=r8) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000001880)={'team0\x00', 0x400}) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c00)={0x18, 0x1f, &(0x7f0000001900)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@exit, @initr0, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x41c}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_fd={0x18, 0x6, 0x1, 0x0, r1}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='GPL\x00', 0x0, 0x89, &(0x7f0000001a40)=""/137, 0x41100, 0x30, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001b00)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000001b40)={0x0, 0x0, 0x2, 0x80000001}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001b80)=[{0x0, 0x1, 0xe, 0xe}, {0x0, 0x5, 0x9, 0xb}, {0x4, 0x2, 0xc, 0x2}, {0x4, 0x4, 0xa, 0x8}, {0x4, 0x1, 0x10, 0xb}], 0x10, 0x7fffffff}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001cc0)={&(0x7f00000018c0)='cachefiles_mark_active\x00', r9}, 0x10) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000001d00)={'macvlan1\x00', @multicast}) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001d40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001f40)=@bpf_ext={0x1c, 0x1, &(0x7f0000001d80)=@raw=[@exit], &(0x7f0000001dc0)='syzkaller\x00', 0x4, 0x3a, &(0x7f0000001e00)=""/58, 0x0, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e40)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001e80)={0x1, 0xe, 0xe4, 0x100}, 0x10, 0xeb98, 0xffffffffffffffff, 0x4, &(0x7f0000001ec0)=[r1, r7], &(0x7f0000001f00)=[{0x3, 0x4, 0xd, 0x4}, {0x3, 0x4, 0x5, 0x1}, {0x5, 0x5, 0x7, 0x2}, {0x1, 0x2, 0x0, 0xb}], 0x10, 0x7}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002100)={@cgroup, 0x2, 0x0, 0x7, &(0x7f0000002000)=[0x0], 0x1, 0x0, &(0x7f0000002040)=[0x0, 0x0], &(0x7f0000002080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000020c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000002140)={@cgroup=r10, 0xffffffffffffffff, 0x2, 0x24, r11, @prog_fd=r9, r12}, 0x20) r13 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002540)={&(0x7f0000002380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x9, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x0, 0x43, 0x4}, @struct={0x1, 0x6, 0x0, 0x4, 0x0, 0x8, [{0xb, 0x0, 0xfffffff4}, {0x5, 0x2, 0xa0000000}, {0x9, 0x3, 0xffffffff}, {0xa, 0x4, 0xf57}, {0x1, 0x1, 0x4}, {0xd, 0x1, 0x28000000}]}, @struct={0x6, 0x8, 0x0, 0x4, 0x0, 0xfff, [{0xd, 0x5, 0xff}, {0xd, 0x5, 0x3}, {0x0, 0x5, 0x7}, {0x5, 0x4, 0xa6}, {0xc, 0x3, 0x5}, {0xb, 0x3, 0x6}, {0xd, 0x2, 0x8}, {0x9, 0x5, 0x4}]}, @ptr={0xa, 0x0, 0x0, 0x2, 0x2}]}, {0x0, [0x61, 0x2e, 0x2e, 0x2e, 0x61, 0x30, 0x2e]}}, &(0x7f0000002480)=""/134, 0xfd, 0x86, 0x0, 0xfffff000}, 0x20) r14 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000025c0)=@o_path={&(0x7f0000002580)='./file0\x00', 0x0, 0x8, r11}, 0x18) r15 = bpf$MAP_CREATE(0x0, &(0x7f0000002600)=@bloom_filter={0x1e, 0x10001, 0x1, 0x1, 0x30, r1, 0xee, '\x00', r6, 0xffffffffffffffff, 0x1, 0x5, 0x2, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000026c0)={0x0, 0x1d, &(0x7f0000002180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @exit, @jmp={0x5, 0x0, 0x3, 0xf, 0x4, 0xffffffffffffffe0, 0xffffffffffffffff}, @exit, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x96}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x4}, @func, @map_val={0x18, 0x6, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000002280)='syzkaller\x00', 0x4, 0x86, &(0x7f00000022c0)=""/134, 0x40f00, 0x20, '\x00', 0x0, 0x0, r13, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=[r7, r14, r15, r7, r1, r7, r1, r7, r7, r1], 0x0, 0x10, 0x7}, 0x90) openat$cgroup_procs(r10, &(0x7f0000002780)='tasks\x00', 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002980)={r13, 0x20, &(0x7f0000002940)={&(0x7f00000027c0)=""/167, 0xa7, 0x0, &(0x7f0000002880)=""/184, 0xb8}}, 0x10) 1.358515732s ago: executing program 1 (id=4822): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000031000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='timer_start\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x0, 0x4, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x3, 0x4, 0x0, 0x10001}, 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1}, 0x48) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYRESOCT=r3, @ANYBLOB], &(0x7f0000000540)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6, 0x2, 0x0, r9}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000580)=ANY=[@ANYRES8, @ANYRES32=r2, @ANYRESDEC=r4, @ANYRESDEC=r5, @ANYRESOCT=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2b, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000000000000701000003ffffffb702000008000000b7030000000000838500000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)=@generic={&(0x7f0000000200)='./file0\x00', r9}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0xa, 0x4, 0x1, 0x0, r10}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 1.281027878s ago: executing program 4 (id=4826): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="38000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='ext4_da_update_reserve_space\x00', r1}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x9, 0x4, &(0x7f00000002c0)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x1, 0x0, 0x10}]}, &(0x7f0000000100)='GPL\x00'}, 0x80) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r4}, 0x10) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x6}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000001240)=0x4) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r6}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0xf, &(0x7f0000001280)=@framed={{}, [@map_fd={0x18, 0x3, 0x1, 0x0, r0}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x701}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @alu={0x4, 0x0, 0x9, 0x6, 0x3, 0x20, 0x10}, @ldst={0x0, 0x0, 0x2, 0xa, 0x1, 0x80, 0x1}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x90) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000280)=ANY=[], 0x7) write$cgroup_int(r7, &(0x7f0000000200), 0x43400) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000001200)=ANY=[@ANYRESHEX=r3, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000980), 0x12) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r9}, 0x10) 1.265091339s ago: executing program 0 (id=4828): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{}, 0x0, &(0x7f0000000340)='%-010d \x00'}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@map, 0xffffffffffffffff, 0x0, 0x8, 0x0, @prog_id}, 0x20) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x6, 0x7, 0x8000, 0x40, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x0, 0x9, 0x1}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r3, &(0x7f00000013c0), 0xfffffdef) 1.176487986s ago: executing program 4 (id=4829): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x100002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200001400f400b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x7, 0x0, 0x0, 0x0, 0xe9c, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x6, '\x00', 0x0, r1, 0x1, 0x3, 0x3}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) recvmsg(0xffffffffffffffff, 0x0, 0x1f00) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x7) bpf$MAP_CREATE(0x0, &(0x7f00000009c0), 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000100000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008400000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) socketpair(0x1d, 0x803, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r6}, &(0x7f0000000280), &(0x7f0000000380)=r7}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESHEX=r5], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) 1.156114408s ago: executing program 3 (id=4830): bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async, rerun: 64) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0x1}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) unlink(0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16}, 0x48) (async) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) (async) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) (async) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0xfffffd26) (async, rerun: 64) perf_event_open$cgroup(&(0x7f0000000d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 1.119176941s ago: executing program 3 (id=4831): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0x1}) socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8924, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000730000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='fib6_table_lookup\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0x1}) (async) socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8924, &(0x7f0000000080)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000730000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='fib6_table_lookup\x00', r1}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="b0ff04c66b0d698cb89e2fe086dd1f74ffff06000000fe80000000000000ac14140746647b7954c4c06b580febc28eb143d0f6c0bad63c67a04402ba4125c7024f63fdb0b6c8ee826b4dfe6042a2f057c66cad677d850ea9928bcfcb47e585e427746ed3b27c40060cbd030a6d675c9926af53cd3085b24f9b7a486775c4f284f8c5a572ca115bce90c0ee9d4e7a07f5f1518092cb1f156694036f6618a59196631e6303fd5307d1112601d3641c9492f7dc3503416836b14590c53b1fc1ac149b70cc1142d6bc57fc3a76839fa2f96878b520fedfb9f64d81584a2e85ab4f6ec718b02d78f2ebf04e6b3b94610a21616181629a03c3dc0bf05e0a71f887833b81db7a10bc53259cb80716f6804934a411d424c1db98d454be1adb2776fdbb92b299d3b80af6987a871b4549fdb4c8297ee31ad925c8b0fb1a9d2589b08ed52602cbc26b56df71201bc4ea8621c56f33d251c1d4589af2dcd78fbb4e34bde02cb3920a30cee9489ee72c3e19304c16c2110e1839712d484b80abe77786a7e2ba834874a4e16b93dd07297554a06c2ad2c906f8ebb1db8730df096709184728d48f0a806696bd0d4b12d0064b933d9675353dae77fe8419451f85da63be78b70ca2a84a77f572d9f289d4313e6f6039fe756ac13a5d08838315dff44cda433cc7bc6b77449f8c", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) (async) 1.032745948s ago: executing program 4 (id=4832): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x2, 0x80, 0xc2, 0xc}}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r3, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000380)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], 0x0, 0xa3, &(0x7f0000000400)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0xc9, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r3, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000380)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], 0x0, 0xa3, &(0x7f0000000400)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0xc9, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x1e, 0x7a, 0x0, 0x5, 0x402, 0x1, 0x5, '\x00', r4, r3, 0x2}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x1e, 0x7a, 0x0, 0x5, 0x402, 0x1, 0x5, '\x00', r4, r3, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='jbd2_shrink_checkpoint_list\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bca900000000000035090100000000009500000000000000b7020000000000007b9af8ff00000000b5090b00000000007baaf0ff00000000bf8700000000000007080000fffdffffbca400000000000007040000f0ffffff740200001d00000018290000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7050000080000004608f0ff760000007f4404000000000056080000000000008500000005000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 858.462222ms ago: executing program 3 (id=4833): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x1b, 0x5, 0x2, 0x4, 0x3190, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008200000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x500, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40286608, &(0x7f0000000540)) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={0x0}, 0x10) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0x20, &(0x7f0000000580)={&(0x7f0000000680)=""/147, 0x93, 0x0, &(0x7f0000000740)=""/85, 0x55}}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000300), 0x9) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000f00)={0x6, 0x12, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x26c}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8}, @generic={0x68, 0x1, 0x9, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x6, 0xca, &(0x7f0000000b00)=""/202, 0x20780, 0x22, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000e40)={0x1, 0xd, 0x401, 0x9}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000e80)=[{0x3, 0x3, 0xf, 0xb}, {0x0, 0x4, 0x6, 0x1}, {0x4, 0x2, 0xe}, {0x1, 0x5, 0x10, 0xa}, {0x4, 0x5, 0x10, 0xc}], 0x10, 0xb}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='kfree\x00', r5}, 0x10) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000400)={0x1b, 0x0, 0x0, 0x10000}, 0x48) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000140)={r6, 0x0, 0x0}, 0x20) 506.52522ms ago: executing program 3 (id=4835): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x32}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kyber_latency\x00', r2}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.io_merged_recursive\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000ffff04850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x19, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r6, 0x0, 0xfffffffd, 0x8000000}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) close(r10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1282, 0x0) ioctl$TUNSETOFFLOAD(r10, 0xc004743e, 0x20001400) write$cgroup_subtree(r10, 0x0, 0x20000889) 462.226564ms ago: executing program 1 (id=4836): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000009c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0xfffffdf2}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1d, 0xc, &(0x7f0000000b00)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYBLOB="ce52e63200000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8, @ANYRES32=r1], 0x0, 0x9, 0xfffffffffffffe4a, 0x0, 0x0, 0x0, '\x00', 0x0, 0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = gettid() r6 = perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3, 0x8, 0x0, 0x7, 0x0, 0x6, 0x2020, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7d, 0x1, @perf_config_ext={0x8, 0x8}, 0x108004, 0x6, 0x278, 0x5, 0x80000000000, 0x1, 0x2, 0x0, 0x5, 0x0, 0x8}, r5, 0x5, 0xffffffffffffffff, 0x2) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000300)=r5, 0x12) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018002d00000000000c0000000c000040da28b2757ba7ae0000000004000000000000"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x3, 0x20008, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r8, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000004018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r10}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r12}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f00000002c0)=ANY=[@ANYRES64=r6, @ANYRES64=r0], &(0x7f0000000400)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000540)=""/183, 0x0, 0x0, '\x00', 0x0, 0x26, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x5}, 0x10}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000200), &(0x7f00000000c0)='syzkaller\x00'}, 0x90) 420.117987ms ago: executing program 0 (id=4837): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0, 0x8, &(0x7f00000001c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000007c0), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x9, 0x0, 0x0, 0x0, r1, 0x401, '\x00', r2, 0xffffffffffffffff, 0x0, 0x1, 0x3}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x13, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa4bc, 0x0, 0x0, 0x0, 0x101}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@alu={0x4, 0x0, 0x5, 0x7, 0xd, 0x0, 0x10}, @ldst={0x2, 0x0, 0x0, 0x7, 0x0, 0x18, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000180)='syzkaller\x00', 0x2e35, 0x0, &(0x7f00000001c0), 0x40f00, 0x0, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x5, 0x80000000, 0xff000000}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000400)=[r0, 0xffffffffffffffff, r0], &(0x7f0000000440)=[{0x1, 0x5, 0x0, 0x2}], 0x10, 0x10000}, 0x90) (async) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', r2, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bca900000000000035090100000000009500000000000000b7020000000000007b9af8ff00000000b5090b00000000007baaf0ff00000000bf8700000000000007080000fffdffffbca400000000000007040000f0ffffff740200001d00000018290000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7050000080000004608f0ff760000007f4404000000000056080000000000008500000005000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 346.492363ms ago: executing program 1 (id=4838): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xba74}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000012c0)={&(0x7f0000001300)=ANY=[@ANYBLOB="9feb01001800000000b9fea816000000000000000500000002000000000000080000000000002e5f1d67528d2e8d3604ff9df75198efda006b919dcc0e90331d93eb23ba8df5d4faf128ecdf330edde21671fda7da85e67c1cd073ed", @ANYRES8=0x0], &(0x7f00000002c0)=""/4085, 0x29, 0xff5, 0x2000007}, 0x20) (async) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001800)={0xffffffffffffffff, 0xe0, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f00000014c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001500)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x1f, &(0x7f0000001540)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001580), &(0x7f0000001680), 0x8, 0x20, 0x8, 0x8, &(0x7f00000016c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001900)={0x14, 0x12, &(0x7f0000001b40)=ANY=[@ANYBLOB="1800000040000000000000000d0000008510000007000000851000000600000018110000", @ANYRES32, @ANYRES16=r4, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000aed834a6f415a7181a4f6af20fe6acd49e97f45a8ea03b1fb63cdcbf479c3f1fc9689fe4c846dea2cfb6afc73c27d6ed000047778fdff9703b5d29b3a813543e32983813f5a7c638a668ace9a2feec22f69fc0c530e8ee51db8c8e7c1be76f35026a2418a1573441386c"], &(0x7f00000013c0)='syzkaller\x00', 0x80000001, 0x4d, &(0x7f0000001400)=""/77, 0x1e00, 0x3, '\x00', r6, 0x28, r3, 0x8, &(0x7f0000001840)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001880)={0x5, 0x3, 0x1, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000018c0)=[0xffffffffffffffff]}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000000420000000000000000008500000017000000850000007d0000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x46) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000001a40)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8148, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}, 0x1090, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) (async) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000001cc0)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630c80fc00082c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa2b200007"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r7, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) syz_clone(0x640c7000, 0x0, 0x11, 0x0, 0x0, 0x0) (async) syz_clone(0x24001100, 0x0, 0x0, 0x0, 0x0, 0x0) 345.823753ms ago: executing program 0 (id=4839): sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000"], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) (async) openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x31) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000440)={0x1b, 0x0, 0x0, 0xf137, 0x0, 0x1, 0xf7ac, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x1}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000940)={0xfffffffa}, 0x8) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000940)={0xfffffffa}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xc, 0x7, &(0x7f0000000b00)=ANY=[@ANYBLOB="180000006fffff0301000400cac7000018470000f90702828e4c3fffffff0000000000000000182900003dd55515e4e1356cbd3394325861305b0a372af58cbd15ed551136a1ac37fbca9ffb3fe58746534a8ba4952499cc69b996c59b059b36f063e3d9e11d2cf1b7ba323b9c9bef0d027922e00becf6a1e1694b9be36b8dbb7c1fb185f6937605dd640b3e8308050e0f60eae1c12eb59ac2533758f019b96105bd801adfec9741e17cf19e36fb916dc3e0e16e02d9ca8a1439a7f8ac06ceb24613f44d5b2b9e92cebc6d37f8eff0e0fda25c50209417353b4d30e10c45a4a258ae10597736518ca2547a19952f257ef841f1bc8855f505b69eccfed5743fae3fba039bffe81b6395", @ANYRES32, @ANYBLOB="00000000050000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x3, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x3, 0x5, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x7f}, 0x90) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000300)={0x2, 0x4e24, @remote}, 0x10, &(0x7f00000005c0)=[{&(0x7f00000003c0)="e7aa2e438e1bcd9f052c94a7b5a6c371d31448e19ed4e7ea9b9e87a0435af91b137160f3d6e4309086e3de18fdb8380f6c7d61a6c0410046744aea83d41d1647e5b8bb1a608f8fadbe708c47b32cc855dd86f537edb52cf5425ca4d304fe8cc2b394ab273cb82d3fa3194529e39e758a404fcd2f003797f7c433", 0x7a}, {&(0x7f0000000540)="125e9bc7bfacd284e5b62b03ff108e2dc2523000bb1be590e020ab410132d3f38f43ea69e379a72c4061b79d54", 0x2d}, {&(0x7f0000000580)="3acf032c1f72809f4cba0115157cc839f62077cc1c743fcf56e73a88f0394308c965cb125a3bf9529a59f33e4cea7eeda4a6cac0c35e53755774a243a31d", 0x3e}, {&(0x7f0000000740)="163853cb406d1a6a8fc8fddd8fef5266bdbc3b04fa2c24856aaa0ee8711a2ac760096b9ccb749603329e713b519366b88977db17c7272ea8c2d6ac7b30a8895832af0ccb92dfdf6202a7f5e10fa60df63a8a4a4bec83c435504c5b9717d49b0a1a754de66b4972c473a469cc21e13880263c9298470dfad9d3cd9acdcb7f93d4c84aa70074d076ced48bf5344599e9f87bbcc0b75c7bcde2f511523ccb", 0x9d}], 0x4, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="ac1e0001e000000100000000140000000000000000000000020000000500000000000000"], 0x140}, 0x40004) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) (async) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) 311.918926ms ago: executing program 2 (id=4841): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0xf, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="000000000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7004000000000009500"/96], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r1}, 0x10) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001b80)={{r4}, &(0x7f0000001b00), &(0x7f0000001b40)=r5}, 0x20) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r6}, 0x10) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r7}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) close(r0) 303.098196ms ago: executing program 1 (id=4842): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x8000004, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)=@generic={&(0x7f0000000340)='./file0\x00', r4}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b000007020000f8ffffffb703000008000000b70400000000000085000000010000009500"/65], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='block_bio_remap\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x200, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000500)=[0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0x40, &(0x7f0000000540), 0x0, 0x10, &(0x7f00000004c0), &(0x7f0000000580), 0x8, 0x52, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x2, 0xf, &(0x7f0000000d80)=ANY=[@ANYBLOB="2b08000000000000000000000000000018180000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b70300002bb91a008500000008000000bc0900000000000045090100002000009500000000000000bf9800000000000056090000010000008500000000000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000020000000000000002000000000000000000000000000000000009050000000000"], 0x0, 0x42}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f1100db5b686158bbcfe8875a65969ff57b03000000000000000000000000ac1414aa"], 0xfdef) 300.953827ms ago: executing program 3 (id=4843): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7088000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8fff8ffb703000008000000b704000000000000850000000710190080bf9ab0f1b2eab668908bd9095b9b5512f59c441bd3a17c9d714c6870e095057a8a8fc497fb3059f44c6a04efbaf4c6b7f68a6fa77e21df3a", @ANYRES8=0x0, @ANYBLOB="83dc69497f0c7e054be54ad556ac7c52c9904b8078e3d7d0841965959c7f7dad8dd7e482e28aa52cb6a4c71e567da131bb1e045ada4cb6f0f0be2fb8689ddf63fb5998c1ec88fd99a4af16a61820e327aa885adbde51ebc6c1f0e97dd7ebababab15db111cce5c3d977cca00e2e78be59cecf30be6b3405d527626c45947584a905b646510701c15caf96ff6ae", @ANYRES32=r0, @ANYRES8=r1], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) write$cgroup_int(r2, 0x0, 0x0) (async) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xf19}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x25}, {}, {0x6}]}) (async) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x7fff, 0x8, 0x0, 0x84, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={0xffffffffffffffff, 0xe0, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000100), 0x0, 0x10, &(0x7f0000000140), 0x0, 0x0, 0xe, 0x8, 0x8, &(0x7f0000000c00)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000d80)=@base={0x20, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, '\x00', r5, 0xffffffffffffffff, 0x4, 0x5, 0x1}, 0x48) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 227.722502ms ago: executing program 3 (id=4844): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x19, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x1, 0x0, 0x20}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x1, 0x8008, 0x8, 0x11}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000080), &(0x7f0000000200)}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xdbf2, 0x7ff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x2000, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000480)) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 226.262432ms ago: executing program 2 (id=4845): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f0000000280)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x7, 0xa1, 0x81, 0xfa6, 0xffffffffffffffff, 0x8, '\x00', r1, 0xffffffffffffffff, 0x3, 0x1, 0x5, 0xd}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r2, 0x0, 0x0}, 0x20) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x834, 0x7, 0x8, 0x1014, 0xffffffffffffffff, 0x0, '\x00', 0x0, r3}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x1, r4}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) close(r2) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000300)={r5, &(0x7f0000000240), 0x0}, 0x20) socketpair(0x9, 0x1, 0x800, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={{0x3, @null}, [@default, @bcast, @null, @default, @null, @remote, @bcast, @bcast]}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000780)=""/206, 0xce}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000c80)=""/130, 0x82}, {&(0x7f0000000980)=""/119, 0x77}, {&(0x7f0000000880)=""/215, 0xd7}, {&(0x7f00000006c0)=""/170, 0xaa}, {&(0x7f0000000540)=""/70, 0x46}, {&(0x7f0000000b00)=""/193, 0xc1}], 0x8}, 0x122) 225.716962ms ago: executing program 2 (id=4846): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b6fffec850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.numa_stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0xdd, 0x8, 0x63, 0x6, 0x0, 0x183, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8ed, 0x2, @perf_config_ext={0x9}, 0x46, 0xffffffffffffffff, 0x800, 0x0, 0xffffffffffff7fff, 0x2, 0x9, 0x0, 0x7, 0x0, 0x6}, 0x0, 0x7, r2, 0x11) r3 = syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xd8, 0x5, 0x1e, 0x3, 0x0, 0xff, 0x10820, 0x4, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000000), 0xc}, 0x4020, 0x10, 0x7fffffff, 0xe, 0x0, 0x3, 0x3, 0x0, 0x4, 0x0, 0x7ff}, r3, 0x4, r1, 0xb) 220.014833ms ago: executing program 0 (id=4847): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000010000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e1a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080e71113610e10d858e8327edb1fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18c65ae1bd4f4390af9a9ceafd07ed00b0000002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a891588d818a0afc0b3116a130974cac0615232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72c7ead0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9624d37c10223fdae7ed04935c3c9068000000bc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b40000000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f3ca1664fe2f3ced8416dc180604b60c2499d16d7d9158ffffffff00000000ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d7676074a0bde4471414c99d4894ee7f8139dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8070000001fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7aded448859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b2042b8ff8c21ad702cca54728acad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd20785f653b621491d04aaee0d409731091f4fb94c06006e3c1be2f633c1d987591ec3db58a7bb3042ec3f84e4272d2cc72d4e771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e1590bab105b0cb578af7dc7d5e87d48d376444e2de02f47c61e8e84ff828de457f34c2b08660b080efc707e676e1fb4d5865c0ca177a4c7fbb4e829ab0894a1062b445c00f576b2b5cc7f819abd0f885cc4806f47ffb966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d3676329bb8cda690d192a070886df42b2708398773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169cdfaa4252d4ea6b8f6216ff202b5bfc182cb5e8380100632d03a7ca6f6d0339f9953c30930804fdc3690d10ecb65dc5b47481edbf1eee2e8893e903054d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026def743f1213bf817becd9e5a225d67521d1128eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979030000007081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f324661351df747aa6a65872dfdcfa68f65bd06b4082d43e121861b5cc09b986bf56c747d9a1cc5b506892c3a16ff10feea20bdac89bfb758cf3500000000000000000000000000000098e6db5a96055e764a3bfd4ccb20d2e800994f4b602d25b2c076f21c7102687e054bb93b2d013be6227fd99902b074c0de00733128c81c48c5e140b17d71ac48f137d10798c4272826d2ba55bbda0059636528c132ed06759d880d1bc291a76456cd7ee8bcb392fdf886dbc74879ec4b831904d7c101ebbaef3c0ae6d0cf0000000000000000000000000000000011cb735f66a559ef0cdb5163a15c0bb986474bf5d9542e3e48805ce53127e4c076d69d868df543717aaaa07d7aca056f7f036c2bcba0795d1a64868a29ac5321b3cd6ef5b1a741afc7124ee3df3a35e8014d6cb5fd6c054a10bb2146174c1d68b45fcfd7e531090ceae2f05536a4d5d6a4081e743827fb9c031d1fc9f195c2da189c49eaed6c30c71da0452e502ef393efeb02ebe82b1851cae5fa7c958ba23110b5e0e5b890803f28a356b2920e74564e0f8377b0ba5187fed2882b4780a1bcb583f1cb1470003ef9b592b9461328cfc01ebfce0ecdcea714a517dc40000000000000000000000000006bd0561e1cc72880cc3ec1bdf35eb670a9040e3b53cd826b94ad8aeb014e74787fe89fb3247a87d8bfb6d400142369f88964708d1d4db5a5df9d62ea6d805dfce568b885a50ed8e2eaf8a932287a1d3bfac17774e58875a63b77e07298e4b4f515189c6fcac3cd35dac9240e633219bb6a5a25865e6ed8e16caa5406b56702afe0befcabbc9a2a772a1a087f0d633d457bceb695b2cba3a1a2daa2dda796373cc0fe0a53236d028fc1076bb746b2717c8b6052f58c91bb8cc19474ab9d4d2160773829f078727f6c684ca749136a7f46ca28b00bb4237695b4"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2e0, 0xfe, 0x60000004, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x25, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000380)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f91731dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f627acb", 0x0, 0x3}, 0x2c) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000001800)=ANY=[@ANYBLOB="1800000000000000000000000000000073010d00000000009500000000000000f1be3631f6cdf4d7dfcd4dcc35dfd6d736146d9e6126c50a8876"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe0c, 0xffe0, &(0x7f0000000640)="b9ff03076844268cb89e14f088a847fe884700121100632f77fbac14141dac1414", 0x0, 0x71, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x5}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x11, 0x4, 0x4, 0x4}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e0ff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000500000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_ext_remove_space_done\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x4, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000002000000000500020000000000850003000000000085000000000000f30700feff000000009500000000000000"], &(0x7f00000003c0)='GPL\x00', 0x5, 0xff9, &(0x7f0000000a80)=""/4089}, 0x21) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) unlink(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000d62b0000611060"], 0x0}, 0x90) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)=""/200}, 0x20) 214.454724ms ago: executing program 4 (id=4848): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18040000000000000000000000400000850000000800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000300000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='freezer.self_freezing\x00', 0x26e1, 0x0) (async, rerun: 32) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(r2, &(0x7f0000000280)='cgroup.freeze\x00', 0x7a05, 0x1700) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2c, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffebb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='ext4_unlink_enter\x00', r4}, 0x10) (async) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gretap0\x00', 0x400}) (async, rerun: 64) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8922, &(0x7f0000000080)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x5, 0x2, 0x0, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000800b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x400}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 115.762341ms ago: executing program 0 (id=4849): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000020000000100000000000001e5ff0000400000000000000001000084060000000000000001"], 0x0, 0x42}, 0x20) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair(0xa, 0x2, 0x3, &(0x7f0000000600)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000180000003d030100000000009500f000000000007126000000000000bf67000000000000360602000fff07006706000020000000170200000ee60000bf250000000000002d350000000000006507000002080000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad03000000000000720400000000000014000000000000009500000000000000db13d5d8b741f2cdaabc8383c8f56b8c2b84a800ea6553f304000000815dcf00c3eebc52267b042d19"], &(0x7f0000000100)='GPL\x00'}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x1, 0x3, 0x81, 0x1000, 0x1, 0x70, '\x00', r3, r1, 0x1, 0x0, 0x1, 0x1}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000180)='GPL\x00'}, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r6, 0x0, 0x99, 0xd6, &(0x7f0000000300)="4e9ba9a8f0ceb575445eb74920f960bba828ccbfb7039a9923f08bba8eca63bcb78713057e673d832342045bcab19faeada6ed398746c769726d4bda08d8e97b62618b462b9406647165e81f9f4fd7acc3f21fbd84a2b89ea75b95066a6c79b140ce5362b834f8b19542047ee9e66411cefa88171629cac76f5cdd26889556cf2790704c65f5b7b52db5238a44ffb3b2d9181ec18205fa1107", &(0x7f00000003c0)=""/214, 0x7f, 0x0, 0x3e, 0xc, &(0x7f00000004c0)="65962d05efdc5ad57118eef1af4a9717d9447e9a834b5c14f448342b009118e0107de53f88cc5a6b623bdd22be10cc212d23a7cb683ba49ee183143bf1d6", &(0x7f0000000500)="43dfa9af11f3bfd0b9fcc87d", 0x1, 0x0, 0x23a3}, 0x50) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)=0x3ff, 0x12) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000700)={r4}, 0x8) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x12, 0x8, &(0x7f0000000c80)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7030000000000008500000040000000b70000000000000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x1a, 0xf, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000ff010000000000003872905418110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000070000000084000000b7000000000000009500000000000000"], &(0x7f00000005c0)='GPL\x00', 0x9, 0x3, &(0x7f00000006c0)=""/3, 0x41000, 0x30, '\x00', r3, 0x4, r7, 0x8, &(0x7f0000000800)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0x9, 0xfffffff8, 0x3}, 0x10, 0xffffffffffffffff, r6, 0x2, &(0x7f0000000880)=[r2, r2, r5, r4, r8, r5], &(0x7f00000008c0)=[{0x1, 0x5, 0xf, 0x7}, {0x4, 0x3, 0xa}], 0x10, 0x202}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850020000000000018100000", @ANYRES32, @ANYBLOB="1700000000000000950000000000000045"], 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r10}, 0x10) socketpair(0x18, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) 115.061912ms ago: executing program 0 (id=4850): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[@ANYBLOB='-0'], 0x9) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000040)={0x2, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000140)=r3, 0x4) 114.055792ms ago: executing program 2 (id=4851): bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000040)='syzkaller\x00'}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x5, &(0x7f0000002d40)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x90) close(0xffffffffffffffff) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000c80), 0x8) openat$cgroup_ro(r0, &(0x7f0000000cc0)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002e0000009500000000000000be2a15d81d0b7dc1c9d1626da52409381a95b026eda465ac11a917388599e6d7fcbc1633ca5313b05b27d6351061451a70c5f2abf45e8d7dcb67452f744a1ccc0c9c426ea0ed1a582364c232f38aefc16b67d7c3430ba4fdc516d3bdcffe9f3e063ff73b2373e7ec0a37dbdae2aaf84a33d9a7e9879665671c6d08fde5373e599890f3731468d9d400706a22ed6376f8be12604e1afebf87c6f95c2524fa810b"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x10, 0x10, &(0x7f0000000080)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x0, 0x4, 0x0, 0x44}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000840), 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180300002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x4, 0x0, 0x0, 0x0}, 0x90) 112.716102ms ago: executing program 1 (id=4852): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) close(0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffff7ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) ioctl$SIOCSIFHWADDR(r0, 0x8994, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xe) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, &(0x7f0000001340)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000340000000000e1ff95000000000000002ba7e1d30cb599e83f040000f300000000bd01212fb56f040026fbfffc41056bd8174b79ed317142fa9ea4158123751c5c652fbc1626cca2a2ad75806150ae0209e62f51ee988e6e06c8206ac6939fc404004900c788b277be1cb79b0a4dcf23d410f6accd3641110bec4e90a634199e07f8548e000000000000a665c45a3449abe802f5ab3e89cf6cfdffffffb8580218ce740068720000074e8b1715807ea0ca469e468eea3fd2f73902ebcfcf49822775985bf313405b367e81c700000040000000000200000000005335000000143ea70c2ab40c7cb70cc8943a6d60d7c4900282e147d08e0af4b29df814f5691db43a5c00000004000000000089faff01210cce39bf405f1e846c12423a164a330100846f26ad03dd65873d9f87463ad6f7c2e8ee1a39244960b318778f2a047f6d5bc24fef5d7d6155102b1ced1e8019e63c850af895abba14f6fbd7fb5e2a431ab914040000000000010092c9f4609646b6c5c29647d2f950a959cf9938d6dfcb8ed2cbdc2ba9d580609e31c3fa90812a533ce206e7e57a79d6fce424c2204dd418c005479ecab19bdfb15a32a4fd67ce446adb431d07db79240acaf091231b986e77d05d988d6efdffdf48dca02113a38300cabf2b5543ffc166955709009e000000000061629d1822f720ec23812770d72c700a44e113d17088fdd00600000f7889b8c7044f56ff030000000000006cd4970400cac6f45a6922ded2e29514af463f747c08f4010586903500000000000000000000be34cf0f9d640dd782ac0cbc46903243d0d0f4bc7f253d0500000032daaf281c450e64c33aac8ff7e7d1c94c4505a9839688b008c370494f6734b771546d9552d3bb2da0d000000000000000009125c97f0400f5e1671bc5eb7739daa7820a91cb0e732df2ae1d39c747e00a4fbfe8942fa859cd28bdaa1509309926c77fbcb15ec58b42b400005a6b649dd5f13cd776e6c7c4b5c4b0de20e033b378553ead4c8cc530b62c36364e6505992209bdbc6203da7a3797246a6adef071102f0aa2c40095ddd05176f5cb8bd99e1ba0f9568f3e3876bba7bf973334e7919a080000000000000004fb996ad919f7e9672ce107000000ad882f2aead166c94500be902ee7dabc768eb9ec13f334aae90981ecaf5f744f22f2e45afe2c9e8632276cffe5f1fc215c0797d0244cf1ce269d10525745caaa3f77d1b80116cb9a38400242010000000100000091a0116f4693133138583da5e10b434697b0443b7b4ddfb3ace29e16e5a881336aad0974269a1025e2a9a135c0508af1aec2926627b43bba1229a7466bdca64f514b7911458da083e8681916d408d753226a83ae2434ccd3fc508216aea86833030f569d61dc998620fcf4eeb92e7bc511df63c53b82514493b8f3c74f44ba184d40e87612024da1a1ebe316923865f037c01d71b5de81121046d84b18acb5cbea7eecad9b6dd46ed83515cd9f140e5f00019be25b5910a3193e90be231a05fd82e6003969c3f081ff1d0eb50a04d14644234828cbb5aaa0ece702abdd425fa25ae04a2315c89064df633700000000d9e5953ea67310993d01000000000000003ac753358791b1490273ca535e05b11d815237743a5b79ad45de2a3c91257f02c2f30f5513662809073710937ed0055b238f466e1442f8ec7a5b394228035039ceeb452dca75f9ff5332b4c4777a58a0aa9a821667c68549e9da89ad4274ce2d3d7619936768a84a1465fff4eedba55955434f132ab7b8840558b3f918d675a79907a7078252cd3fbaea5d3006a03507838231a335ae759ed25534f2e90a7def4b3d4af7fd47ab1a701e4b7a7dfc1d12775ed0a31bc7b5855880aa767e68196c7aa5ac115724b6cb8fcebb67719eccd87b06b38566cf61ad2f307a79d2ce9801837bf0bd3af0271de700eef2795d28cb0017000000000000000000e052d93194121b774d21a0317d0346078400004652c769fd3d3e661a2fb5ff0f000002ab2ac4eb3f19c042163e0bdb88b82de384a8055e8b1e24294b0546cce481ff5618b7b9585dbb64d66debf219fa479abf22f3d64fe82e466ea6f27859946e72f80bb1c9cfcde57b79625e2979fe689a5a246cbbdf6ad488f43f46b2536f175f46dfb27d5229467270246ab53616c46edf34c559d3de0c59ca3305e66825715e5e4cd5b54c1b05c09f04337a76a30373baac3ecec91fd546eb7c32dbecb18a308a0004be94dfab28c2a51dc856df0000000000c12254f041804f7f7074356789b1d4dd55f3e045a48241a4ce04d06acb2cf11eab759ba78da5da0f26126d4cf2c73e5f94030000040000000000000000c301985d603403592486204054be3fdda91f9e315886941928e5a8bc1a00e69a98c0a8f7192f6ee93cc4124cf4e7610915efc08c834a44e1d685d6835a40b5bc615949cbcd98d0e68d7eef5d32d5fcc7923d7544fa492aa38717481455e86dcd7816ad8940bd1995369d89ae6eadeb9117e8b94ab422c8d62f858875dccdbc89572231ef5d6df6a9c55f8df763c7c64da7cc017e1e3f5cd4cb9fe6d19b11d4d38239d318016e622b9683b7e46be64dc097982e23462392a0cd05afb2e060fd42ef00dfbd057311aab94f307d10c7a1af0d8e5a0fcb547475d13c0000000000000000f1cc97103d714d1abb901f866d9d629b4fb185f45790517c4a0f5c6a5024e3359e8d83e3f6edf9e2afb5ab59c7b2b45cfb0a3c1303a98e4ed531ac11cca1cd744b431de74c7cd6533adaa8ec749061b2959d53da626aa189781dc1be4d5c81aebc0cada819895b377d6cf0a7878ba99864ae84464744c605646caf2e06b13eba7ba10acf77d91b2297e9573abb0a4da534d735a223626402b308daf7835780fa6f4e410000000000fb00000000000000000000b14952139bd4bdbccc5e334c49584655c4fce8c5bb7c54664aef6d780100358aa54b4b49926c4be9ee4659153d9fa95d07cc4efdab2c5f4503148d0255d0b748366dafe042d78479c21d832e1431ed6d646d13e8e7230300920a5642bbed1dee9b46b6f02e572024ccf3c8edd82660e5d74c22e46af480c300000000000000000000000000000000000044ff72f96f084f4b6cdcb1b4a9d8e9f99f1b85497d0c3df704c8a0034c09caeeb0e34799b755649883539258a7b33dcef15d8fd1953ebaaa3cff81a0de7a05a440f20f6b273ceb8678f10378b670be7504dabd1471355d853292775d0366891f0bcf0a6087ed4f1f25ef52394db3e9d8318bbb9baff3db95bfd68a08ded502cc08a485c804e4fd107a7ca2a64ca081c6b2f7b895cdf98b763ebab9451c65eced6f5f97a541210806d885762ac3150225036c7eccd7a05593abd963f9a02df58085115e54f675e6a08d25b5722cabf989b4bbc562e073b81bae61f05c5e1f90e021340b60cc5fb8fdb09b6d20b0d87a6ed800000000000000000000000000000000006cc6f64f583a26a78f7f417f66c0af32f5194ddfce51e5aff28f621bb2fd2a5ab719823488d6e869b08d3d4ac7950c60144cf77437e29895a23282e3c65e015d1c334832a90ee77d93596e3f12e9ca8c67c7f3c9b66c9cb03edec184ad1d9544c7a3be250e471dca00000078544d79c0efe4094e561eeb26ee4c81106d03c004bc1589ef6e13648999c8735e2634e89aaa90c571fa3c07238697b1db783c52715055445e96995fe3273b0346b03fc742c06aa3947e0d9cf0c99b5e245ede85893112deea8bd3355a32ec15e1242f170a51f28cea4105541e96a52da4984d26bd29cb0623f00c6b0a4c00ad406d729babc9d1550a683c349017a340444000000000000000000000920ca49f7cc8194aaebdcae5a62bb7587b57f41f1c2034911f23e6bd0291b3319f03a0a15dea685a8ab75b3c60391afa5483231305402b52a8f98638009c142751518f73a847ca583e855d70c6a4a53f61ad753d5e740db44afd32b019d9e8b41361c2c1b9a8a14604fe52837a19dd6952fe2724c0105ab158a54a4a23ff0f4bc43c0e0e426e51258e40bb4b68ff4e3a8fe314a05677f7243a97e509d37794c1df6fc61a5b6488e738fb6ae587e068352f8e690fb9463498f79de93ce106e312b1ae457384939f13abbd346b6a869b956793ed1136827ff87c51b3ffcd824a9d238effb9fa1230dc0bcfafbf7cfc78525ea399bfff0fa92d7cd38ba9b4d735dcff98a8140af7acae003053e4b80baf16b9566566d299c0b1699eed"], &(0x7f0000000140)='GPL\x00'}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 46.640867ms ago: executing program 2 (id=4853): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2e6405000000000065060400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7956244cef7baf48e6d2885a09a87507ebfc75b5b0f4e4309ebcdac5f7a860c008cbdd3b4c3b7f28754860c9c781f6410457253e89ad528d985636a86ec0f68f59cd1159a2c2e85d726859a919cc9548a349980d1ccdce27f94bc074c27f81078545c146a0857153b7b8f00034debae58a4ab415b0d7ff0575cc272cd3d7e8d974927676468ff2d86e0ffac94792ed9cf6b40b3cf252a47c05ae8a70d57cc3e067d1867b54d24e20000000000000020009ebf84d3b042d6e432cd080e3b57239f0127473e6ba922aff649609d40b47ec331ccba3cf96f9483ff19a6471bf5abc742d9cbcfb964b11b31034694a6aad86cf08a6c7b2235dc99de9aa3e6b77c7a2877261ed32da90864987f30926c9013eec3b86836ae50447aa5a79f40c235000000453302712c3d8fc4e2b61adb0695e800000000d4f4e91f0000002c33df424d1bafe5725c8a404724f8a4f1cda7997b65954f74097579b91da309b887af2485c2d9ab09b506000000000000000bf7b2ff4602aec1eea200000064881c5630521a08e051374cf05c921a06fb7818000000009dc8d95e0e5b365d10e1004dae58b3b5b89709b0ff47b200000000004000cbef88811dc8c1b27ac7d9a6bb70f60eb9c01dd2fc79b85e4d961498f3a80131d21d856177a2189f45d011ef1da5c6d57bb8fd387ccea9c3899a914e47e82f040000009d81003f927355408f87264797d3fa970949793b94329d580500d1f91c0d22587e05a61e3d8576ca168e88d7a9af95b04a37c27bfffab9abbb31fa8c0080258cfa6d3f166e695f3c56490aeef464d9965d70a50f1282619344f223548e75fa39643adac1322c87ca253ff2fb1882760d6feab16bacdf83c11816dbe959ebc5ec479c8319f73e2249eab0486b110702a481d3b51976a52303056e800b4ae5acc2df636a65eb1d672bf2000000cda8462cc9b16624998be65683321e970000000009b8e20762c1bf4a3eb6769f2b23e842bacd9c685edea0ffa3e975424f8ede49e61a4de808a38ba3512d64dc71867df4eee3f1ff791cf7c9862f98b45852e4b2f78721b978a2df2f2a29a387c6f0576b36038f819286eca99a6a434811cf2a117d775fe986a49fb82cf5f15972d5ab18f1045384501adabb20f7b0e15ff47f1744e2341b59034959a1289ba6e243668e6735305707e3de7652bfc5b60c76deff43a1d6fd6a4180ab723735abbeffe7f2ec3a0bb86f9eddfc0f3d1d503d7a54b49e1ae6c5aa620d27e91aa0aa0ed6fcacfc91fbb4c256409e54daefbb107c381fa729ff5f3907d93430da178d685d7730f5e129438a5214f722096d29863301b0b811f69145d3fbd78a9059e454474f92e65828b018174a9f4738b8c71fbdeac26ab95e02f9a847182766964976b1fccdb9f35721e43e33883cf16ed1343fb7429eb395123b0a4262b7023c22039b9002589a378ed4c6267965af78b861bd025312538cec97966b8973d4e299d9802264d06e40ae118e1d242d1128dcedeb44030df12ef68f78215d65f96eb55db8cbcb060008000d988374f85451a694ffe38a1d03916ff1eec72b31c98d42e1a1bda1290de1a499a5a385b31112a48ba3e6d6849914c1788a7aca37177cc341fff44fec5c5e0abae01c439a1b0311e074e81ae9993b5b3459553e4ece78d4c1501c70f5d81e0725d5b273755c0000000000000000aa4234ff82182952a76233d18e7d49638aeb04e7a9e9e7eafb7c255372795d2d192a0a33cab0f5bf2e93e0544fcdf2df2bc6ce96e5a11993d54f97a23754ac828674dbb93c0ad345715be4a13678b01edf76d8a923655800a2c88cce004505ab45d8f5f88aa887bbce5c18970428516f6099bdbb2cd7a2356397f1a0a23e662e2a6c4834400cbaa41c3c574e6e6aefb7a68da5ec1ae49f968bbe0e0bf9878516f553639f5b4828e92019b61f5874be1c7cdd9482df50bc24a8a1fa10d291390eb84e26a2e8dbeaa45604b05a116c1210a7540bf81005044273f5a8ffc538db289350eb248e483bd8920efcf30a798c2b636243e0a37262ca47dfeefa753ba528f7ba77e825051ce69b4475d7d714ba0c636e6ae9f710411d30ef424aeaabe057c7df6ff8f767bcd9012e1047c686f5ccb76ab3a5df53cbc22ba7ea8f6a8e220bb4d83de1e4dc19d6c1be841503850803bc2c2d5e0e34270a7f1cca0c6c53a8e5f891f7a793a70da62d6d88fbb90d220acc687931b42d6be83ab870da3c0a567f5e65ec0457f4ad2a4ec0b671b36388afd5520a8483a4b11f7d02a41b315f0f9e59f47668d68a74838d6976e12fd45200014041dffacbf60892ec8bd7560686f137a806d3dfaba900b47cac62f828342fff009adb5b2251461a1b9d6ba625b8fe04e69a1a4be2696f0000000086e172932e03000000000000005942e1b9d6dc28ab8e19e1111dd893e801015642faf21eef40d6e7de3ef62c4bc5ff17e7aeb2841098f845d1cc9ec4eee79c298fb0ba939b13707044e2e9cc0d350438c1c8c6bb9a38c6ac5ca0d9cf1f3d6915f25cb26edfc28b3079b97df32601240e454db103fb0c4a14c16837394d2b3673a3f160d3a7b83ecd0509ce9eba0c7bf7843799b1b56a234f9eaab8a3f14f1472bb6aaeb8ac9ee4054605558ab31f339f6a4caf2ee2fd01f34dca3300000000000000000000000000000000f59f8e6e00000000c44130098d833a24000000000095e6f945ba9a941cef5e70b8c152321e24b5b29bcf374dcf5a29a35d76e6e2bf8df95462690a4fc9ec8129e92b6ebb4b40a992a75d3c5954d0bfc87db24d856359079b29b3c374d081c300b2cfaa596d24e800ef8e2201f2fb7a9946f89f9f31f7cbd603fd7f8898c70b5c65f2e28f22e1a79a6af3a54861b07f124642e98389557affbdede09b5566a4a1ee73b20846810030a754acddcdafe3ceeeebc0b5f2fedfe7d198e3067f3dbac9441a9ab8409cbbb7e15b9ae3944097de34de2001c8533a3766e6e4c4c4702ccb932a27a3962814cd6aa8fc684beeaa3932efae3a9052be8eec1e95f6ad8d41dd34829503ba4b66e27154cb6e34aa13450522df1723130b6fb9bec59ae347c93f00e40e293c98d849a33f773c743728992f40faccd5c23130a1c6bfd6fc661bca1598137ddd1090ded672f5a48a40cab3f640c8241a364cbde0f188eec7da7bccafbd5bf28a46f0eecc6b550471b0b0770c6a5a411c0e0b19e15a461e7c6833ba936e214b013f2819ec6572a43b5cd32b11d7e4f8dcf8f7820a17b7b2ee6178a03351dd25091e46bfd82a3979b9cad109fd6217cd52aa81bdabd50826a674bd16b8f7e6aed12a305366599f5f029a7b24558c02750500002f1c19d16a6f391906000000cc0bbbfb8c698ecc137d96711100e0108d3bd2afed0b279ebf0527552a9331e646c424b14ffbb815622bfd2f635855bed1b164d0a56bd104be069854111c5b26ec3c652b5f0a6b9676dae987ec23456ba05a4dfb15321ef6b76e7e547a688c67ab531cfc784c9f940d9fb0464a6cce635e14b80dc5c1c64e75e6bd5355d84f8df272f18f58c570e7afd83ee77f157c146aa747b728969aeb4aba1d8f9de14275bf4a53e95235ae13768ab3fb8ab6ea50e884c2ea98e6400bf0c5ae2887cd1da0e57ccfdf5eca2b455247efcc13102846c0a85f20c80007c0ce6efce627b95b8ad3003385de97101678fb2163ecea6e70a77a6fbc089e31a5ccece932229b8f79faa6863d6857c3d9a9710f9f8ad16eeb8342278f311cbc226498028234d21466892983378fe64acbb44f694cd78e43c74aa75505cb1c91b189f8f89f233a05f5cd4e173a373178557843dd705268f74a9e5429945503195aefd6706b584d8408c9652b3fe68500747f7ee8375fa559c3ad195d3795df1a8364cd13acc3256ee4634c73eeb6954d0fcf09ab84df0b8900e0c6fea2ccb600ae7a4b128cae19df160e7c207b89132d1d5bdc9ffc79f0549b82df521817651d5fead5128205b92ccdccc69407ab556217af277af911dbd456dfc43dd061b6c91485dcc208cf0b3d0bf851de413f5de5ec015e296914afab6411109355e027ce04990d9aae251b9deb11b7db45b9f15b7b55d8fdbedd9e6cf891205694f02be8b9ea8ecd41308a0e1b93ae3435bfa88b440b1f701b4d0fc49c82193f27f8023b630ea97edbf3bf421a0a1a2b4ac7bb30bcd1cdd172c0df37408fd6827bb03e8742fc1c7a2befd1299928c5f79e846a8dc7ca648d960a759e6711b69776896a9656d59af6d44bc5348229fa84ae78af8421a22c4b4c17a3d24a4a0104000000000000d77cc4eef51c2b417c8c7458ddd7dd9d1a863bf0a9e1a30a19020490038017a5c7e474c83302a2c2b5c976dacf3dda7191c757f208000000000000005f7ed983f65723fbb36b9b51abb0dbcd33570000000000000000251aa4f139d0485ffcf89f01639fd1579a3802f720a0215c720a97071f5065a23642a58275dbca444b00e2e5835185d5d5b2796eb0fe32cf3b0633f58ecc7648c3c6efe82f93a3008052416512eea30ea9472e0b456a652883c0907323cf03be193ad0438cdef7a98a1671a1918df310dc4bfd61c3db4819ab1c57b348a8ff1ed36364a20fe846f11d045de81f069bac8425b31c5d08b433562ffb318c1285011f9b78b2401989384311101e452f54661ecdb2514a6ae50dbdd422de0f0f8c670000000000390be79688f80c4c314cb1b14afcaa5d23f9032e0ec51f45f447d6a7c798fcf7e60e2180e289410801e4f03a0e140f388f25b92da1025d8409e171a2336ed71cca86eb4658fe06df286e0e20276b0618eeffd05774f15686cd9d3182ca2fec863875f305fed6baf48a594db12582a38cfdffffffffffffff0cf8d920517835fe7d09cfcb624f6931f1cc6f6b71f58de9ddc38e0c43992f6bc57a718d0cfd197b5324b4e05ef1caa96db3ae1f2f2e5791faba2ebbe1a6faf21f2748fb1fb6743c3ca8af4e6b02518c9b7fdc1b5721eb1c3ed98db25536f74ac7861afc94544e52dcb5c60460a05802e3b437ac977bfa26b887a2443e8d559c58187f004eb82b07937df6e96f77ed551926bec4e0188fae10a35d1c5f1768ac6be829be1827f9df303160df18597efba46f1babc3d74adc31ca71bdab9079e4288881b434484eadde9da6b81802842abd462d546c59d87acc014f81d3414759bda12d2a2c6bc1bfa807bd3101eb227184a61107b6d0618e2a3b842671e084ac3f0ff94dc48b51601247318ab4d1c5106458000000000008000000000000cfee0107e6c2fe8639d926829fdbbd86bf591a8c3c235d8939af9d923f648165881a6c29997234406200b3b1c321cc158dbe17123eace3000000000000000000000000000000000000796de6ae4ae40bdf9a6e8c5dc29562262af9cd54e8e3ecc7e3c8cba0ecc791683496c4e5c1a5729714d9f9031f49b400cd2667b4ea6df54809615a4f973f93e6ccec72f16ff998e29ed99df733680a9d5cea57f99cc139b6ea9014f3000000000000000000000000000000000000feeab45a4046a622b0dceb413e4e39b7317e92cbed46b41ab5115bfb542c933783d750852dfdc6656aaf15e10615a88821f2f1bc53969b52d6852755e7681ad5beda80b38ccd34116b99f50b4fdd967b3f20f260455412b675639a26c76840cce40e323bde9d673fceda0ad6981565c8a183d928903b4f4472dde41b6dcd75314c31e704dfcb222c8359fe88944f852242270c932abfaeece0843d708f5cd25b2a63ae1e79723c1c3c013836b47da0a35d0f34c0705caae54024cf8ade6396ff44482284f415e5769d9ae8688a8d5516690aae9ce1c785262734723519b042a161e6efabf263a46ba92254a51ff6502470f3038cf6d8d991931cfd82ea97e1b596133e7754908d912d1054d174f5a731c019f152a5ca2e48599b6d563bfcd8c0950f4292769217a6e309452b14e64ae64ad58ced33582a1b3d2e0c300059fb1ee78cdddb827293de267d64bf47c3c8c419683c948e46de8cea0b232da00ff39ebef3b73b3d6fbeecd3f9ff06b7e08ed8ce2b9b9cf2e08975f5959fa7028f68c525ab173c0c553d21bd1e9176abdf799e7a08d2f3c14e1ca99d525bc3af0ca0f48f145c65b10dfc67803aab67f6b631d3d7e237fec4bc6eacc364b7cdd925973705d40c5a614e354d9b92357845d15ea41ad3e3a98396131f835e17f0cbfbdc59453991e689f9ce19bd4a3b4121e5a8b5dbb519b5556cb70603ceac0b7ca02cb05a01afa3164ca428add947673cdba49a0e6e8aeeddf52c0f0ef224c69a3c96c2fddf56d74c4ae7"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x20e, 0xe40, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x26e1, 0x0) close(r3) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r3, &(0x7f0000000080), 0x11ffffce1) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) close(r4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x29}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 45.560717ms ago: executing program 4 (id=4854): r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x80, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x3, 0x4, 0x4, 0x10001}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000a40)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r1, @ANYBLOB="00000000008000004e000000000000aaf0778732240bca8289e2bae7fce82c001800000000000000000000009500000000000000935246138547d975774ec9bc8541ecc6f74fd0ee879b373bef8ca8130fc80cdc117dd26d8ce77ab7376b677cc2987babfe5a4612b1333edcb0011bcfe9d3115dfa39042c35a04c81b80d9e9f9b3258a4a3d311bf2bda63caba428ad249c1416362ed8559219a061c549ddecc605b598f345a4425822fd93bd2e657b702fc50314c1232def0b25afad6a92688a83c88f05b8ebe27388d7d11"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000000000000000000000000180100000800000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000032ce8500000004000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000ecff850000000400000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xc, 0x8, &(0x7f0000000740)=@framed={{0x18, 0x8}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x70}, {0x85, 0x0, 0x0, 0x87}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0xf, &(0x7f0000000d80)=ANY=[@ANYBLOB="180800000000000008000000416797729ad73e8b", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000005f000000bca900000000000035090100000000009500000000000000bf9800000000000056080000000000008500000000000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='net_dev_xmit\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1}, 0x48) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x6, 0x4, &(0x7f0000000300)=@raw=[@cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffd}, @ldst={0x1, 0x1, 0x4, 0x0, 0x1, 0xc, 0x1}, @jmp={0x5, 0x0, 0x6, 0xb, 0x2, 0x40, 0x1}], &(0x7f0000001000)='syzkaller\x00', 0x8, 0x83, &(0x7f0000001040)=""/131, 0x41000, 0x0, '\x00', 0x0, 0x10, r11, 0x8, &(0x7f0000001400)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000001440)={0x1, 0xb, 0x4c, 0x2}, 0x10, 0x0, r9, 0x2, &(0x7f00000014c0)=[r1, r11, 0xffffffffffffffff, r2, r11, r2, r10, r10, r10], &(0x7f0000001500)=[{0x1, 0x3, 0xc, 0x8}, {0x4, 0x4, 0x2, 0x4}], 0x10, 0x1ff}, 0x90) r12 = openat$cgroup_ro(r6, &(0x7f00000000c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r12, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r12, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) r15 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, r10, 0xa61, '\x00', 0x0, r6, 0x5, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x2, 0x24, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x3, 0xa1, &(0x7f0000000400)=""/161, 0x1f00, 0x22, '\x00', r13, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000540)={0x0, 0x4, 0xcb22}, 0x10, r14, r11, 0x2, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r11, r10, r11, r11, r15, r12, r10], &(0x7f0000000940)=[{0x5, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xc, 0xb}]}, 0x90) bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r0}, 0x8) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x9, 0x42, 0x40}, 0x48) 9.68292ms ago: executing program 2 (id=4855): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811ffff", @ANYRES32, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r9}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) sendmsg$tipc(r1, &(0x7f00000042c0)={0x0, 0x0, 0x0}, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r11}, 0x10) 0s ago: executing program 4 (id=4856): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x5, 0x2, 0x35b, 0xc, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000000)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYRESOCT], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000003000000000039000000000b040000000500da185ec95ba3519abe2a400000"], &(0x7f00000003c0)=""/149, 0x33, 0x95, 0x0, 0x3}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x20, &(0x7f0000000300)={&(0x7f0000000580)=""/174, 0xae, 0x0, &(0x7f0000000640)=""/155, 0x9b}}, 0x10) r4 = syz_clone(0x80000, &(0x7f0000000a80)="6e1426c871a344b316793164069359d4f4ac8c37379eba00ffc89e03c7e6f40438206ec202b770915fe9cddde1b95b75e50a590ae24bafe19651edd479ae0884e392e823a029f306273a4bb8bc0d3801c13bf1d4f58a4c06f333c55e537e974c05ac3ea5d02341e51efb575012217b0983418d9d8a7f9257063b115c5d3920fd60fc51bca97c8517c8e9b96b0f1dc7052e28f05f7a74fe5c134b4605fb461aeea599ff55a28539088c6da8ffdbcd809481b1caaa54f35eb4ee5e87d38389c28ab008c6e353d29cbbe90fc2b43846098be764d44c72b8a3b041be1972a9", 0xdd, &(0x7f0000000940), &(0x7f0000000b80), &(0x7f0000000bc0)="9e6dfcba24d3dca28bf7c1b7ef8c7a001d3155185545e4667fff9e744da924ea857180de69616dddac8fa922e2801b108abb6f5e6b54a01d82b12c80cd8b8e6590") syz_open_procfs$namespace(r4, &(0x7f0000000c40)='ns/user\x00') r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000100000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r6}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r5}, &(0x7f0000000000), &(0x7f0000000040)=r6}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{r0, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f00000004c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x17, 0x6, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0x2, 0x5, 0xa, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x8}, @ldst={0x2, 0x1, 0x0, 0x4, 0x3, 0x6, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}], &(0x7f0000000080)='GPL\x00', 0x3, 0x1b, &(0x7f0000000200)=""/27, 0x40f00, 0x10, '\x00', 0x0, 0x6, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3, r1, 0x6, &(0x7f0000000740)=[r0, r0, r0, r0, r5, r0, r0, r7, r0, r0], &(0x7f0000000800)=[{0x0, 0x1, 0x3, 0x6}, {0x4, 0x1, 0xd, 0xb}, {0x2, 0x1}, {0x0, 0x5, 0x9, 0xc}, {0x3, 0x1, 0x5, 0x1}, {0x2, 0x5, 0xf, 0xc}], 0x10, 0x2}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000003c0)='workqueue_activate_work\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) close(r11) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz1\x00', 0x200002, 0x0) r13 = openat$cgroup_procs(r12, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_int(r13, &(0x7f0000001d40)=0x8, 0x12) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r0}, &(0x7f00000002c0), &(0x7f0000000500)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x8000, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r14 = openat$cgroup_ro(r12, &(0x7f0000000c80)='blkio.throttle.io_serviced\x00', 0x0, 0x0) write$cgroup_type(r14, &(0x7f0000000cc0), 0x9) kernel console output (not intermixed with test programs): T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.641960][ T54] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.648795][ T54] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.655955][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 19.674061][ T282] device veth1_macvtap entered promiscuous mode [ 19.680816][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.688228][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 19.696340][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 19.705684][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 19.716423][ T279] device veth0_vlan entered promiscuous mode [ 19.731078][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 19.739910][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 19.749038][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 19.756628][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 19.763947][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 19.771207][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 19.779539][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.787566][ T54] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.794373][ T54] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.801647][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.809624][ T54] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.816430][ T54] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.830943][ T281] device veth0_vlan entered promiscuous mode [ 19.838957][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 19.846790][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 19.854782][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 19.863307][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 19.871676][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 19.879459][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 19.887253][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 19.894803][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 19.907091][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 19.914285][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 19.924523][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 19.932458][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 19.941422][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 19.948709][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 19.955952][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 19.964206][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 19.976192][ T282] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 19.978056][ T279] device veth1_macvtap entered promiscuous mode [ 20.000410][ T283] device veth0_vlan entered promiscuous mode [ 20.006773][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.015528][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.024009][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.032081][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.040170][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.047754][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.055401][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.063266][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.070548][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.078052][ T280] device veth0_vlan entered promiscuous mode [ 20.088039][ T281] device veth1_macvtap entered promiscuous mode [ 20.095406][ T280] device veth1_macvtap entered promiscuous mode [ 20.111446][ T283] device veth1_macvtap entered promiscuous mode [ 20.121702][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.129601][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.137928][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.145891][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.153726][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.162070][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.170501][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.178171][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.186236][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.195251][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.205199][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.235810][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.246646][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.255630][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.264165][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.272387][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.280370][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.288569][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.296464][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.309400][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.325201][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.361538][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.370695][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.419857][ T339] cgroup: syz.4.8 (339) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 20.479163][ T339] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 20.489678][ T351] device pim6reg1 entered promiscuous mode [ 20.523925][ T347] device syzkaller0 entered promiscuous mode [ 20.563499][ T339] device syzkaller0 entered promiscuous mode [ 20.742882][ T401] syz.1.29[401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 20.742936][ T401] syz.1.29[401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 20.766857][ C1] hrtimer: interrupt took 27912 ns [ 20.914449][ T401] syz.1.29[401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 20.914493][ T401] syz.1.29[401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 20.951614][ T409] device pim6reg1 entered promiscuous mode [ 20.992005][ T411] device pim6reg1 entered promiscuous mode [ 21.044661][ T415] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.108126][ T411] device pim6reg1 entered promiscuous mode [ 21.601137][ T450] device pim6reg1 entered promiscuous mode [ 21.772600][ T478] geneve1: tun_chr_ioctl cmd 1074025672 [ 21.781731][ T478] geneve1: ignored: set checksum enabled [ 21.885922][ T488] device pim6reg1 entered promiscuous mode [ 22.219980][ T540] device pim6reg1 entered promiscuous mode [ 23.082815][ T608] device veth1_macvtap left promiscuous mode [ 23.436409][ T24] kauditd_printk_skb: 45 callbacks suppressed [ 23.436419][ T24] audit: type=1400 audit(1720168145.769:121): avc: denied { create } for pid=627 comm="syz.1.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 24.681288][ T24] audit: type=1400 audit(1720168147.029:122): avc: denied { ioctl } for pid=780 comm="syz.4.131" path="net:[4026532533]" dev="nsfs" ino=4026532533 ioctlcmd=0x5828 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 25.116183][ T24] audit: type=1400 audit(1720168147.459:123): avc: denied { create } for pid=799 comm="syz.2.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 25.137704][ T800] bridge0: port 3(veth0_to_batadv) entered blocking state [ 25.144628][ T800] bridge0: port 3(veth0_to_batadv) entered disabled state [ 25.158346][ T800] device veth0_to_batadv entered promiscuous mode [ 25.164673][ T800] bridge0: port 3(veth0_to_batadv) entered blocking state [ 25.171558][ T800] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 25.263893][ T24] audit: type=1400 audit(1720168147.609:124): avc: denied { create } for pid=811 comm="syz.3.141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 26.743770][ T24] audit: type=1400 audit(1720168149.089:125): avc: denied { create } for pid=902 comm="syz.0.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 26.807329][ T24] audit: type=1400 audit(1720168149.159:126): avc: denied { read } for pid=76 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 26.878782][ T24] audit: type=1400 audit(1720168149.209:127): avc: denied { create } for pid=913 comm="syz.4.170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 26.905488][ T24] audit: type=1400 audit(1720168149.249:128): avc: denied { read } for pid=925 comm="syz.4.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 26.928661][ T977] device pim6reg1 entered promiscuous mode [ 26.956197][ T24] audit: type=1400 audit(1720168149.299:129): avc: denied { write } for pid=925 comm="syz.4.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.089220][ T24] audit: type=1400 audit(1720168149.439:130): avc: denied { create } for pid=1015 comm="syz.1.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 27.179122][ T1037] gretap0: refused to change device tx_queue_len [ 27.669490][ T1046] device veth0_vlan left promiscuous mode [ 27.759616][ T1046] device veth0_vlan entered promiscuous mode [ 28.170822][ T1075] syz.0.201[1075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.170861][ T1075] syz.0.201[1075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.201727][ T1080] syz.3.204[1080] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.215520][ T1081] syz.3.204[1081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.226717][ T1081] syz.3.204[1081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.238408][ T1082] syz.3.204[1082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.250011][ T1075] device pim6reg1 entered promiscuous mode [ 28.346920][ T1078] device veth0_vlan left promiscuous mode [ 28.463547][ T1078] device veth0_vlan entered promiscuous mode [ 28.799709][ T24] audit: type=1400 audit(1720168151.149:131): avc: denied { create } for pid=1152 comm="syz.4.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 28.892919][ T24] audit: type=1400 audit(1720168151.239:132): avc: denied { setopt } for pid=1162 comm="syz.0.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 29.063906][ T1182] syz.0.227[1182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.064803][ T1182] syz.0.227[1182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.145629][ T1183] syz.0.227[1183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.223476][ T1196] device pim6reg1 entered promiscuous mode [ 29.354307][ T1213] syz.0.235[1213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.752557][ T1216] device syzkaller0 entered promiscuous mode [ 29.827203][ T1227] device bridge0 entered promiscuous mode [ 30.475127][ T1304] device syzkaller0 entered promiscuous mode [ 30.519860][ T1307] device wg0 entered promiscuous mode [ 30.858222][ T24] audit: type=1400 audit(1720168153.209:133): avc: denied { create } for pid=1417 comm="syz.2.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 30.934623][ T1425] device syzkaller0 entered promiscuous mode [ 31.459640][ T24] audit: type=1400 audit(1720168153.809:134): avc: denied { create } for pid=1453 comm="syz.3.287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 32.923236][ T24] audit: type=1400 audit(1720168155.269:135): avc: denied { create } for pid=1582 comm="syz.1.328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 33.203763][ T1612] bpf_get_probe_write_proto: 1 callbacks suppressed [ 33.203784][ T1612] syz.1.337[1612] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.214131][ T1612] syz.1.337[1612] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.672060][ T1657] device veth0_vlan left promiscuous mode [ 33.824050][ T1657] device veth0_vlan entered promiscuous mode [ 34.134061][ T1699] device syzkaller0 entered promiscuous mode [ 34.336992][ T1712] device pim6reg1 entered promiscuous mode [ 35.213263][ T1789] device veth1_macvtap left promiscuous mode [ 35.320371][ T24] audit: type=1400 audit(1720168157.669:136): avc: denied { create } for pid=1798 comm="syz.4.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 36.435428][ T1873] device syzkaller0 entered promiscuous mode [ 37.134318][ T1927] syz.1.428[1927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.134366][ T1927] syz.1.428[1927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.228504][ T1937] device syzkaller0 entered promiscuous mode [ 37.309864][ T1927] device pim6reg1 entered promiscuous mode [ 37.366101][ T1961] syz.4.439[1961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.366141][ T1961] syz.4.439[1961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.400456][ T1970] syz.0.441[1970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.422741][ T1956] device syzkaller0 entered promiscuous mode [ 37.446937][ T1970] syz.0.441[1970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.654689][ T24] audit: type=1400 audit(1720168159.999:137): avc: denied { create } for pid=2007 comm="syz.0.452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 37.730771][ T2016] device syzkaller0 entered promiscuous mode [ 37.816252][ T2020] device syzkaller0 entered promiscuous mode [ 37.863420][ T24] audit: type=1400 audit(1720168160.209:138): avc: denied { ioctl } for pid=2027 comm="syz.1.459" path="socket:[18582]" dev="sockfs" ino=18582 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 37.977078][ T2028] device syzkaller0 entered promiscuous mode [ 38.231889][ T2052] device sit0 entered promiscuous mode [ 38.292042][ T2061] device pim6reg1 entered promiscuous mode [ 38.299051][ T2063] syz.2.472 uses obsolete (PF_INET,SOCK_PACKET) [ 39.029313][ T2150] device bridge0 entered promiscuous mode [ 39.235608][ T2189] device syzkaller0 entered promiscuous mode [ 40.057713][ T2235] device syzkaller0 entered promiscuous mode [ 40.103369][ T2239] device syzkaller0 entered promiscuous mode [ 40.212306][ T2245] device pim6reg1 entered promiscuous mode [ 40.355033][ T2258] cgroup: fork rejected by pids controller in /syz2 [ 40.473081][ T24] audit: type=1400 audit(1720168162.819:139): avc: denied { create } for pid=2280 comm="syz.4.529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 40.557933][ T2285] device pim6reg1 entered promiscuous mode [ 40.652954][ T2289] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.660313][ T2289] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.669435][ T2289] device bridge_slave_0 entered promiscuous mode [ 40.676480][ T2289] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.683943][ T2289] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.691653][ T2289] device bridge_slave_1 entered promiscuous mode [ 40.735618][ T2289] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.736981][ T24] audit: type=1400 audit(1720168163.079:140): avc: denied { create } for pid=2289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.742484][ T2289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.769894][ T2289] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.776656][ T2289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.919887][ T24] audit: type=1400 audit(1720168163.079:141): avc: denied { write } for pid=2289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.940164][ T24] audit: type=1400 audit(1720168163.079:142): avc: denied { read } for pid=2289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 41.030000][ T1414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 41.042192][ T1414] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.070063][ T1414] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.088200][ T1414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 41.096313][ T1414] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.103188][ T1414] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.111652][ T1414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.124223][ T1414] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.131086][ T1414] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.139532][ T1414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.147477][ T1414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.183737][ T2289] device veth0_vlan entered promiscuous mode [ 41.203055][ T951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.211528][ T951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.220108][ T951] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.227764][ T951] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.242602][ T2289] device veth1_macvtap entered promiscuous mode [ 41.255328][ T953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.275778][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.298726][ T946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.339288][ T24] audit: type=1400 audit(1720168163.689:143): avc: denied { mounton } for pid=2289 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=357 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 41.777760][ T2389] tap0: tun_chr_ioctl cmd 1074025677 [ 41.836521][ T2389] tap0: linktype set to 270 [ 41.858116][ T2390] tap0: tun_chr_ioctl cmd 1074025677 [ 41.863221][ T2390] tap0: linktype set to 270 [ 41.869363][ T2388] bridge0: port 3(veth0_to_batadv) entered blocking state [ 41.919790][ T2388] bridge0: port 3(veth0_to_batadv) entered disabled state [ 42.004511][ T2388] device veth0_to_batadv entered promiscuous mode [ 42.058093][ T2388] bridge0: port 3(veth0_to_batadv) entered blocking state [ 42.065040][ T2388] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 43.458794][ T24] audit: type=1400 audit(1720168165.809:144): avc: denied { create } for pid=2426 comm="syz.2.579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 43.618012][ T2441] device pim6reg1 entered promiscuous mode [ 43.635098][ T7] device veth0_to_batadv left promiscuous mode [ 43.642766][ T7] bridge0: port 3(veth0_to_batadv) entered disabled state [ 43.670999][ T7] device bridge_slave_1 left promiscuous mode [ 43.692376][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.702696][ T7] device bridge_slave_0 left promiscuous mode [ 43.708879][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.727227][ T7] device veth0_vlan left promiscuous mode [ 44.393318][ T24] audit: type=1400 audit(1720168166.739:145): avc: denied { attach_queue } for pid=2478 comm="syz.1.594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 44.715838][ T2493] ------------[ cut here ]------------ [ 44.721233][ T2493] trace type BPF program uses run-time allocation [ 44.727879][ T2493] WARNING: CPU: 1 PID: 2493 at kernel/bpf/verifier.c:10480 check_map_prog_compatibility+0x65b/0x7c0 [ 44.738711][ T2493] Modules linked in: [ 44.742444][ T2493] CPU: 1 PID: 2493 Comm: syz.1.598 Not tainted 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 44.752414][ T2493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 44.764262][ T2493] RIP: 0010:check_map_prog_compatibility+0x65b/0x7c0 [ 44.771290][ T2493] Code: c8 e9 84 fe ff ff e8 44 f5 ee ff 31 db e9 85 fe ff ff e8 38 f5 ee ff c6 05 8e ef 64 05 01 48 c7 c7 e0 71 45 85 e8 55 7f c2 ff <0f> 0b e9 42 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 17 fa ff [ 44.791283][ T2493] RSP: 0018:ffffc900021eef90 EFLAGS: 00010246 [ 44.797402][ T2493] RAX: 8cf02b6e95fba900 RBX: ffff8881111b4800 RCX: 0000000000040000 [ 44.805276][ T2493] RDX: ffffc9000135c000 RSI: 000000000000086b RDI: 000000000000086c [ 44.828182][ T2493] RBP: ffffc900021eefd0 R08: ffffffff81521de8 R09: ffffed103ee2a5f8 [ 44.836074][ T2493] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 44.845970][ T2493] R13: 1ffff9200001ba04 R14: ffff8881171bc000 R15: ffffc900000dd020 [ 44.854137][ T2493] FS: 00007fb0b71c86c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 44.857120][ T2496] device veth1_macvtap left promiscuous mode [ 44.863112][ T2493] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 44.873881][ T2496] device macsec0 entered promiscuous mode [ 44.876334][ T2493] CR2: 0000000000000000 CR3: 00000001177bb000 CR4: 00000000003506b0 [ 44.893362][ T2493] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 44.901611][ T2493] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 44.909666][ T2493] Call Trace: [ 44.912859][ T2493] ? show_regs+0x58/0x60 [ 44.917057][ T2493] ? __warn+0x160/0x2f0 [ 44.921064][ T2493] ? check_map_prog_compatibility+0x65b/0x7c0 [ 44.943667][ T2493] ? report_bug+0x3d9/0x5b0 [ 44.970790][ T2493] ? check_map_prog_compatibility+0x65b/0x7c0 [ 44.977214][ T2493] ? handle_bug+0x41/0x70 [ 44.981668][ T2493] ? exc_invalid_op+0x1b/0x50 [ 44.986185][ T2493] ? asm_exc_invalid_op+0x12/0x20 [ 44.996957][ T2493] ? wake_up_klogd+0xb8/0xf0 [ 45.001548][ T2493] ? check_map_prog_compatibility+0x65b/0x7c0 [ 45.007832][ T2493] ? __fdget+0x1bc/0x240 [ 45.011939][ T2493] resolve_pseudo_ldimm64+0x586/0x1020 [ 45.017583][ T2493] ? bpf_check+0xf2b0/0xf2b0 [ 45.023674][ T2493] ? kvmalloc_node+0x82/0x130 [ 45.028431][ T2493] bpf_check+0xaf21/0xf2b0 [ 45.032755][ T2493] ? stack_depot_save+0xe/0x10 [ 45.037982][ T2493] ? __bad_area_nosemaphore+0xcd/0x440 [ 45.043987][ T2493] ? bpf_get_btf_vmlinux+0x60/0x60 [ 45.049126][ T2496] device veth1_macvtap entered promiscuous mode [ 45.049209][ T2493] ? __kernel_text_address+0x9b/0x110 [ 45.060689][ T2493] ? unwind_get_return_address+0x4d/0x90 [ 45.066553][ T2493] ? arch_stack_walk+0xf3/0x140 [ 45.071262][ T2493] ? stack_trace_save+0x113/0x1c0 [ 45.076254][ T2493] ? stack_trace_snprint+0xf0/0xf0 [ 45.081382][ T2493] ? stack_trace_snprint+0xf0/0xf0 [ 45.089815][ T2493] ? selinux_bpf_prog_alloc+0x51/0x140 [ 45.107363][ T2493] ? selinux_bpf_prog_alloc+0x51/0x140 [ 45.112648][ T2493] ? ____kasan_kmalloc+0xed/0x110 [ 45.117650][ T2493] ? ____kasan_kmalloc+0xdb/0x110 [ 45.122485][ T2493] ? __kasan_kmalloc+0x9/0x10 [ 45.217320][ T2493] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 45.247592][ T2493] ? selinux_bpf_prog_alloc+0x51/0x140 [ 45.252988][ T2493] ? security_bpf_prog_alloc+0x62/0x90 [ 45.258221][ T2493] ? __se_sys_bpf+0x9f8c/0x11cb0 [ 45.296673][ T2493] ? __x64_sys_bpf+0x7b/0x90 [ 45.301143][ T2493] ? do_syscall_64+0x34/0x70 [ 45.305563][ T2493] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 45.367006][ T2493] ? __kasan_kmalloc+0x9/0x10 [ 45.371506][ T2493] __se_sys_bpf+0x107a2/0x11cb0 [ 45.376191][ T2493] ? __kasan_check_write+0x14/0x20 [ 45.459287][ T2493] ? __x64_sys_bpf+0x90/0x90 [ 45.478900][ T2493] ? futex_wake+0x630/0x790 [ 45.490115][ T2493] ? slab_post_alloc_hook+0x80/0x2f0 [ 45.571291][ T2493] ? do_futex+0x13c5/0x17b0 [ 45.575637][ T2493] ? percpu_counter_add_batch+0x13d/0x160 [ 45.649688][ T2493] ? alloc_file+0x83/0x4e0 [ 45.666994][ T2493] ? memcpy+0x56/0x70 [ 45.670840][ T2493] ? errseq_sample+0x44/0x70 [ 45.684013][ T2493] ? futex_exit_release+0x1e0/0x1e0 [ 45.722293][ T2493] ? alloc_file_pseudo+0x280/0x2f0 [ 45.745757][ T2493] ? local_bh_enable+0x1f/0x30 [ 45.763493][ T2493] ? alloc_empty_file_noaccount+0x80/0x80 [ 45.788312][ T2493] ? put_pid+0xc3/0x110 [ 45.804319][ T2493] ? __se_sys_futex+0x355/0x470 [ 45.826169][ T2493] ? fpu__clear_all+0x20/0x20 [ 45.831013][ T2493] ? __kasan_check_read+0x11/0x20 [ 45.836024][ T2493] __x64_sys_bpf+0x7b/0x90 [ 45.840358][ T2493] do_syscall_64+0x34/0x70 [ 45.844863][ T2493] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 45.850869][ T2493] RIP: 0033:0x7fb0b7f46bd9 [ 45.855139][ T2493] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 45.874729][ T2493] RSP: 002b:00007fb0b71c8048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 45.883063][ T2493] RAX: ffffffffffffffda RBX: 00007fb0b80d4f60 RCX: 00007fb0b7f46bd9 [ 45.891253][ T2493] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 45.899272][ T2493] RBP: 00007fb0b7fb5aa1 R08: 0000000000000000 R09: 0000000000000000 [ 45.999004][ T2493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 46.070675][ T2493] R13: 000000000000000b R14: 00007fb0b80d4f60 R15: 00007ffc99ff0f08 [ 46.086896][ T2493] ---[ end trace 8c993c24746092a4 ]--- [ 46.106653][ T2573] device pim6reg1 entered promiscuous mode [ 46.248541][ T2590] syz.1.625[2590] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.248594][ T2590] syz.1.625[2590] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.486169][ T2602] device pim6reg1 entered promiscuous mode [ 47.569941][ T2654] bridge_slave_0: mtu greater than device maximum [ 47.895806][ T2686] device pim6reg1 entered promiscuous mode [ 48.115615][ T2731] device vxcan1 entered promiscuous mode [ 48.294852][ T2776] device wg2 entered promiscuous mode [ 48.450462][ T2806] bridge0: port 3(veth0_to_batadv) entered disabled state [ 48.457500][ T2806] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.464399][ T2806] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.473857][ T2806] device bridge0 left promiscuous mode [ 48.575720][ T24] audit: type=1400 audit(1720168170.919:146): avc: denied { create } for pid=2815 comm="syz.4.694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 48.612037][ T2819] device syzkaller0 entered promiscuous mode [ 48.734706][ T24] audit: type=1400 audit(1720168171.079:147): avc: denied { create } for pid=2849 comm="syz.1.702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 48.913779][ T24] audit: type=1400 audit(1720168171.259:148): avc: denied { create } for pid=2908 comm="syz.2.715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 48.960605][ T2919] syz.2.719[2919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.960649][ T2919] syz.2.719[2919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.289990][ T2945] geneve1: tun_chr_ioctl cmd 1074025672 [ 49.315930][ T2945] geneve1: ignored: set checksum enabled [ 49.357674][ T2949] device syzkaller0 entered promiscuous mode [ 49.390388][ T2945] device syzkaller0 entered promiscuous mode [ 49.541438][ T2955] device veth0_vlan left promiscuous mode [ 49.657397][ T2955] device veth0_vlan entered promiscuous mode [ 49.935680][ T2966] syz.0.732[2966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.938103][ T2966] syz.0.732[2966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.138231][ T24] audit: type=1400 audit(1720168172.489:149): avc: denied { create } for pid=3020 comm="syz.2.750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 50.213767][ T3027] device vxcan1 entered promiscuous mode [ 50.228713][ T24] audit: type=1400 audit(1720168172.579:150): avc: denied { create } for pid=3035 comm="syz.2.754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 50.284759][ T24] audit: type=1400 audit(1720168172.619:151): avc: denied { create } for pid=3045 comm="syz.4.757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 50.372679][ T3071] device veth0_vlan left promiscuous mode [ 50.378655][ T3071] device veth0_vlan entered promiscuous mode [ 50.385304][ T1386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 50.395802][ T1386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 50.403819][ T1386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 50.461594][ T3090] device pim6reg1 entered promiscuous mode [ 50.681824][ T3108] syz.1.778[3108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.681874][ T3108] syz.1.778[3108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.704373][ T3110] syz.1.778[3110] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.736078][ T3110] syz.1.778[3110] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.832964][ T3120] device syzkaller0 entered promiscuous mode [ 51.307203][ T3141] device pim6reg1 entered promiscuous mode [ 51.370274][ T3145] device pim6reg1 entered promiscuous mode [ 52.981463][ T3284] device sit0 entered promiscuous mode [ 53.177590][ T3320] geneve1: tun_chr_ioctl cmd 1074025698 [ 53.285748][ T3336] device lo entered promiscuous mode [ 53.435652][ T3351] device syzkaller0 entered promiscuous mode [ 53.782223][ T24] audit: type=1400 audit(1720168176.129:152): avc: denied { create } for pid=3385 comm="syz.2.855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 54.405882][ T3434] device syzkaller0 entered promiscuous mode [ 54.519354][ T3445] team_slave_1: mtu less than device minimum [ 54.603194][ T3454] syz.1.879[3454] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.603242][ T3454] syz.1.879[3454] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.646206][ T3469] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.664153][ T3469] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.777167][ T3489] device pim6reg1 entered promiscuous mode [ 54.788287][ T3483] device veth0_vlan left promiscuous mode [ 54.883793][ T3483] device veth0_vlan entered promiscuous mode [ 55.636317][ T3510] bridge0: port 3(vlan1) entered blocking state [ 55.647531][ T3510] bridge0: port 3(vlan1) entered disabled state [ 55.653949][ T3510] device vlan1 entered promiscuous mode [ 55.660515][ T3510] bridge0: port 3(vlan1) entered blocking state [ 55.666561][ T3510] bridge0: port 3(vlan1) entered forwarding state [ 55.894118][ T3536] syz.3.904[3536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.894168][ T3536] syz.3.904[3536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.907239][ T3537] syz.3.904[3537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.920944][ T3533] device syzkaller0 entered promiscuous mode [ 55.941382][ T3537] syz.3.904[3537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.945571][ T3534] tun0: tun_chr_ioctl cmd 2148553947 [ 56.911695][ T3678] syz.1.940[3678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.911740][ T3678] syz.1.940[3678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.879529][ T3710] device pim6reg1 entered promiscuous mode [ 58.491029][ T3749] device syzkaller0 entered promiscuous mode [ 58.824356][ T3769] cgroup: fork rejected by pids controller in /syz1 [ 58.940296][ T3766] device syzkaller0 entered promiscuous mode [ 59.249446][ T3774] tap0: tun_chr_ioctl cmd 1074025677 [ 59.254547][ T3774] tap0: linktype set to 270 [ 59.441727][ T3790] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.448732][ T3790] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.459691][ T3790] device bridge_slave_0 entered promiscuous mode [ 59.466376][ T3790] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.497469][ T3790] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.519955][ T3790] device bridge_slave_1 entered promiscuous mode [ 60.008254][ T3838] device syzkaller0 entered promiscuous mode [ 60.333495][ T3790] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.340370][ T3790] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.347464][ T3790] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.354226][ T3790] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.386165][ T517] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.407115][ T517] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.572813][ T1236] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.580224][ T1236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.838848][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.847405][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.856148][ T1398] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.863016][ T1398] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.871995][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.880587][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.888858][ T1398] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.895728][ T1398] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.912609][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.927272][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.943697][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 61.962920][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.978846][ T3894] syz.0.998[3894] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.978900][ T3894] syz.0.998[3894] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.981447][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 62.040887][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 62.260937][ T3790] device veth0_vlan entered promiscuous mode [ 62.278309][ T954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 62.286025][ T954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 62.294911][ T954] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 62.329250][ T954] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 62.347336][ T3790] device veth1_macvtap entered promiscuous mode [ 62.371597][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 62.387580][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 62.407507][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 62.590228][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 62.599614][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 62.608052][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 62.616244][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 63.503134][ T345] device veth0_to_batadv left promiscuous mode [ 63.511470][ T345] bridge0: port 3(veth0_to_batadv) entered disabled state [ 63.527051][ T345] device bridge_slave_1 left promiscuous mode [ 63.533003][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.547197][ T345] device bridge_slave_0 left promiscuous mode [ 63.560690][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.568582][ T345] device veth1_macvtap left promiscuous mode [ 64.291946][ T4034] device veth0_vlan left promiscuous mode [ 64.302629][ T4034] device veth0_vlan entered promiscuous mode [ 64.613512][ T4075] device syzkaller0 entered promiscuous mode [ 65.451141][ T4151] device syzkaller0 entered promiscuous mode [ 65.582320][ T4209] device pim6reg1 entered promiscuous mode [ 66.614837][ T4291] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.906487][ T4327] tap0: tun_chr_ioctl cmd 1074025677 [ 66.911666][ T4327] tap0: linktype set to 776 [ 67.051863][ T4341] syz.0.1122[4341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.051917][ T4341] syz.0.1122[4341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.265762][ T4377] device wg2 entered promiscuous mode [ 69.943721][ T4395] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 69.974171][ T4395] pim6reg0: linktype set to 773 [ 71.558194][ T4430] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 71.563653][ T4430] pim6reg0: linktype set to 773 [ 72.272724][ T4452] device pim6reg1 entered promiscuous mode [ 72.401926][ T4457] device syzkaller0 entered promiscuous mode [ 72.679657][ T4496] device syzkaller0 entered promiscuous mode [ 72.702045][ T4500] device syzkaller0 entered promiscuous mode [ 72.956689][ T4539] device lo left promiscuous mode [ 73.130419][ T4571] device syzkaller0 entered promiscuous mode [ 73.255601][ T4577] syz.1.1206[4577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.255657][ T4577] syz.1.1206[4577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.969089][ T4611] device syzkaller0 entered promiscuous mode [ 74.589094][ T4679] device macsec0 entered promiscuous mode [ 75.326402][ T4760] device pim6reg1 entered promiscuous mode [ 75.474056][ T4779] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 75.479695][ T4779] pim6reg0: linktype set to 773 [ 75.484735][ T4779] Y4`Ҙ: renamed from lo [ 75.706814][ T4808] syzkaller0: refused to change device tx_queue_len [ 75.724652][ T4808] device syzkaller0 entered promiscuous mode [ 76.004580][ T4855] : renamed from pim6reg1 [ 76.409425][ T4915] device pim6reg1 entered promiscuous mode [ 76.723020][ T4964] device vxcan1 entered promiscuous mode [ 77.140497][ T5022] device wg2 entered promiscuous mode [ 77.165721][ T5026] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.173046][ T5026] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.189803][ T5026] : renamed from bridge0 [ 77.755204][ T5127] syz.4.1359[5127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.755255][ T5127] syz.4.1359[5127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.966872][ T5128] syz.4.1359[5128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.978915][ T5128] syz.4.1359[5128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.987333][ T5125] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.042041][ T5125] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.049885][ T5125] device bridge_slave_0 entered promiscuous mode [ 78.058037][ T5125] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.074498][ T5125] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.087124][ T5125] device bridge_slave_1 entered promiscuous mode [ 78.191530][ T5125] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.198418][ T5125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.205457][ T5125] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.212279][ T5125] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.457606][ T5080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.465328][ T5080] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.473408][ T5080] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.492551][ T5166] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.499619][ T5166] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.508873][ T5166] device bridge_slave_1 left promiscuous mode [ 78.514855][ T5166] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.522290][ T5166] device bridge_slave_0 left promiscuous mode [ 78.528239][ T5166] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.579585][ T5080] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 78.587942][ T5080] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.594884][ T5080] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.632078][ T5080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 78.681159][ T5080] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 78.691444][ T5080] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.698301][ T5080] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.706342][ T5080] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 78.714219][ T5080] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 78.723372][ T5180] device wg2 entered promiscuous mode [ 78.737328][ T5125] device veth0_vlan entered promiscuous mode [ 78.744345][ T952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 78.759840][ T5125] device veth1_macvtap entered promiscuous mode [ 78.766657][ T952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 78.775302][ T952] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 78.782796][ T952] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 78.805933][ T953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 78.819139][ T953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 79.066555][ T5229] device pim6reg1 entered promiscuous mode [ 79.106771][ T5237] device pim6reg1 entered promiscuous mode [ 79.118735][ T5241] device wg2 left promiscuous mode [ 79.125096][ T5241] device wg2 entered promiscuous mode [ 79.385120][ T345] device vlan1 left promiscuous mode [ 79.390451][ T345] bridge0: port 3(vlan1) entered disabled state [ 79.453343][ T345] device bridge_slave_1 left promiscuous mode [ 79.513737][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.589673][ T345] device bridge_slave_0 left promiscuous mode [ 79.647201][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.697683][ T345] device veth1_macvtap left promiscuous mode [ 79.743267][ T345] device veth0_vlan left promiscuous mode [ 80.443399][ T5280] device syzkaller0 entered promiscuous mode [ 80.615255][ T5312] device syzkaller0 entered promiscuous mode [ 81.484827][ T5356] device syzkaller0 entered promiscuous mode [ 81.974386][ T5398] device syzkaller0 entered promiscuous mode [ 84.144029][ T5453] device veth0_vlan left promiscuous mode [ 84.153891][ T5453] device veth0_vlan entered promiscuous mode [ 84.533803][ T5480] device pim6reg1 entered promiscuous mode [ 85.263056][ T5513] device pim6reg1 entered promiscuous mode [ 85.277940][ T5510] device syzkaller0 entered promiscuous mode [ 85.911957][ T24] audit: type=1400 audit(1720168208.259:153): avc: denied { create } for pid=5567 comm="syz.1.1496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 86.817820][ T24] audit: type=1400 audit(1720168209.169:154): avc: denied { create } for pid=5623 comm="syz.3.1514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 87.054051][ T24] audit: type=1400 audit(1720168209.399:155): avc: denied { create } for pid=5631 comm="syz.4.1517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 87.402865][ T5663] device syzkaller0 entered promiscuous mode [ 88.303879][ T5717] device syzkaller0 entered promiscuous mode [ 88.435364][ T5732] device pim6reg1 entered promiscuous mode [ 88.482565][ T5735] device syzkaller0 entered promiscuous mode [ 88.494144][ T953] syzkaller0: tun_net_xmit 48 [ 88.516043][ T5735] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 88.538951][ T5735] syzkaller0: Linktype set failed because interface is up [ 88.560413][ T5735] syzkaller0: tun_net_xmit 1280 [ 88.565506][ T5735] syzkaller0: create flow: hash 661628962 index 2 [ 88.573842][ T5734] syzkaller0: delete flow: hash 661628962 index 2 [ 88.618885][ T5744] device pim6reg1 entered promiscuous mode [ 88.916365][ T5769] device syzkaller0 entered promiscuous mode [ 88.931234][ T5770] device veth1_macvtap left promiscuous mode [ 88.938097][ T5770] device macsec0 left promiscuous mode [ 89.099491][ T5783] geneve1: tun_chr_ioctl cmd 1074025698 [ 89.168925][ T24] audit: type=1400 audit(1720168211.519:156): avc: denied { append } for pid=5787 comm="syz.4.1567" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 90.569160][ T5892] device sit0 entered promiscuous mode [ 91.027596][ T5917] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 91.232426][ T5931] device syzkaller0 entered promiscuous mode [ 92.648658][ T6012] device syzkaller0 entered promiscuous mode [ 92.853798][ T6048] device wg2 left promiscuous mode [ 92.880748][ T6048] device wg2 entered promiscuous mode [ 93.148956][ T6062] device pim6reg1 entered promiscuous mode [ 93.257465][ T6069] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.265371][ T6069] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.273318][ T6069] device bridge_slave_0 entered promiscuous mode [ 93.280506][ T6069] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.298432][ T6069] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.306314][ T6069] device bridge_slave_1 entered promiscuous mode [ 93.374296][ T6069] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.381161][ T6069] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.388254][ T6069] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.395027][ T6069] bridge0: port 1(bridge_slave_0) entered forwarding state [ 93.617102][ T965] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.624792][ T965] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.697978][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 93.705307][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 93.712881][ T6101] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.719844][ T6101] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.727168][ T6101] device bridge_slave_0 entered promiscuous mode [ 93.734101][ T6101] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.741296][ T6101] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.748621][ T6101] device bridge_slave_1 entered promiscuous mode [ 93.868906][ T965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 93.877162][ T965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 93.885066][ T965] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.891839][ T965] bridge0: port 1(bridge_slave_0) entered forwarding state [ 93.898998][ T965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 93.907175][ T965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 93.915120][ T965] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.921970][ T965] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.929240][ T965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 93.937156][ T965] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 93.946810][ T965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 93.954743][ T965] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 94.003305][ T965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 94.014851][ T965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 94.041450][ T6117] device syzkaller0 entered promiscuous mode [ 94.085891][ T6069] device veth0_vlan entered promiscuous mode [ 94.100365][ T965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 94.108057][ T965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.115691][ T965] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 94.124406][ T965] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 94.153873][ T6101] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.160724][ T6101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.167832][ T6101] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.174596][ T6101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.200316][ T6069] device veth1_macvtap entered promiscuous mode [ 94.234573][ T965] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.243734][ T965] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.276155][ T965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 94.284232][ T965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 94.292283][ T965] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 94.299695][ T965] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 94.307744][ T965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 94.315779][ T965] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 94.324081][ T965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 94.376723][ T1408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 94.384621][ T1408] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 94.392831][ T1408] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.399700][ T1408] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.407260][ T1408] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 94.415255][ T1408] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.422119][ T1408] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.429580][ T1408] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 94.437624][ T1408] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 94.475548][ T6101] device veth0_vlan entered promiscuous mode [ 94.486551][ T966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.494150][ T24] audit: type=1400 audit(1720168216.839:157): avc: denied { write } for pid=6146 comm="syz.0.1646" name="net" dev="proc" ino=31695 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 94.516345][ T966] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 94.524835][ T966] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 94.536157][ T24] audit: type=1400 audit(1720168216.839:158): avc: denied { add_name } for pid=6146 comm="syz.0.1646" name="cgroup.freeze" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 94.557140][ T966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 94.565559][ T24] audit: type=1400 audit(1720168216.839:159): avc: denied { create } for pid=6146 comm="syz.0.1646" name="cgroup.freeze" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 94.587112][ T24] audit: type=1400 audit(1720168216.839:160): avc: denied { associate } for pid=6146 comm="syz.0.1646" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 94.617058][ T966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 94.625891][ T6101] device veth1_macvtap entered promiscuous mode [ 94.636253][ T966] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 94.645162][ T966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 94.669342][ T963] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 94.682067][ T963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 94.694494][ T24] audit: type=1400 audit(1720168217.049:161): avc: denied { append } for pid=76 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 94.722301][ T24] audit: type=1400 audit(1720168217.049:162): avc: denied { open } for pid=76 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 94.744915][ T24] audit: type=1400 audit(1720168217.049:163): avc: denied { getattr } for pid=76 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 94.933262][ T48] device bridge_slave_1 left promiscuous mode [ 94.950059][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.980651][ T48] device bridge_slave_0 left promiscuous mode [ 95.005372][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.029876][ T48] device veth1_macvtap left promiscuous mode [ 95.049925][ T48] device veth0_vlan left promiscuous mode [ 95.227957][ T6215] device pim6reg1 entered promiscuous mode [ 95.430636][ T6230] device syzkaller0 entered promiscuous mode [ 95.450158][ T6234] bridge0: port 3(veth0_to_batadv) entered blocking state [ 95.466909][ T6234] bridge0: port 3(veth0_to_batadv) entered disabled state [ 95.484327][ T6234] device veth0_to_batadv entered promiscuous mode [ 95.494437][ T6234] bridge0: port 3(veth0_to_batadv) entered blocking state [ 95.501492][ T6234] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 95.530348][ T6236] device veth0_to_batadv left promiscuous mode [ 95.536405][ T6236] bridge0: port 3(veth0_to_batadv) entered disabled state [ 95.610090][ T6238] syz.2.1696[6238] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.610137][ T6238] syz.2.1696[6238] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.624029][ T24] audit: type=1400 audit(1720168217.979:164): avc: denied { remove_name } for pid=76 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 95.715853][ T24] audit: type=1400 audit(1720168217.979:165): avc: denied { rename } for pid=76 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 95.804550][ T24] audit: type=1400 audit(1720168217.979:166): avc: denied { create } for pid=76 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 96.824767][ T6323] device syzkaller0 entered promiscuous mode [ 97.051572][ T48] device bridge_slave_1 left promiscuous mode [ 97.058532][ T48] : port 2(bridge_slave_1) entered disabled state [ 97.065484][ T48] device bridge_slave_0 left promiscuous mode [ 97.071678][ T48] : port 1(bridge_slave_0) entered disabled state [ 97.080067][ T48] device veth0_vlan left promiscuous mode [ 97.201554][ T6341] device syzkaller0 entered promiscuous mode [ 97.308448][ T6343] device wg2 entered promiscuous mode [ 98.388454][ T6428] syz.4.1744[6428] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.388503][ T6428] syz.4.1744[6428] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.411631][ T6433] device veth0_vlan left promiscuous mode [ 98.430661][ T6433] device veth0_vlan entered promiscuous mode [ 98.446488][ T6436] device veth0_vlan left promiscuous mode [ 98.452901][ T6436] device veth0_vlan entered promiscuous mode [ 98.732639][ T6460] device pim6reg1 entered promiscuous mode [ 98.860316][ T6475] device syzkaller0 entered promiscuous mode [ 99.531584][ T6542] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.538661][ T6542] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.666590][ T6547] device bridge_slave_1 left promiscuous mode [ 99.728795][ T6547] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.833606][ T6547] device bridge_slave_0 left promiscuous mode [ 99.937008][ T6547] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.103836][ T6558] device syz_tun entered promiscuous mode [ 100.237072][ T6594] device syzkaller0 entered promiscuous mode [ 100.399318][ T6658] device pim6reg1 entered promiscuous mode [ 100.568231][ T6689] device bridge_slave_1 left promiscuous mode [ 100.574524][ T6689] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.584964][ T6689] device bridge_slave_0 left promiscuous mode [ 100.602166][ T6689] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.830255][ T6710] device syzkaller0 entered promiscuous mode [ 100.970984][ T6730] device pim6reg1 entered promiscuous mode [ 101.062742][ T6740] syz.0.1832[6740] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.062795][ T6740] syz.0.1832[6740] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.816251][ T6771] device pim6reg1 entered promiscuous mode [ 101.987348][ T6772] device veth0_vlan left promiscuous mode [ 102.007759][ T6772] device veth0_vlan entered promiscuous mode [ 102.173355][ T6789] device syzkaller0 entered promiscuous mode [ 102.192010][ T6792] ʮ}p: renamed from pim6reg1 [ 102.343263][ T6813] device pim6reg1 entered promiscuous mode [ 102.885172][ T6878] device syzkaller0 entered promiscuous mode [ 103.020041][ T24] kauditd_printk_skb: 1 callbacks suppressed [ 103.020050][ T24] audit: type=1400 audit(1720168225.369:168): avc: denied { create } for pid=6891 comm="syz.4.1882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 104.981070][ T7065] device syzkaller0 entered promiscuous mode [ 104.997802][ T7072] device pim6reg1 entered promiscuous mode [ 105.205638][ T7092] device syzkaller0 entered promiscuous mode [ 105.272960][ T7090] device syzkaller0 entered promiscuous mode [ 105.611027][ T7149] syz.1.1952[7149] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.611076][ T7149] syz.1.1952[7149] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.021091][ T7186] device syzkaller0 entered promiscuous mode [ 108.241166][ T7265] syz.3.1983[7265] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.241208][ T7265] syz.3.1983[7265] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.114043][ T7281] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.132300][ T7281] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.370279][ T7294] device veth0_vlan left promiscuous mode [ 109.383685][ T7294] device veth0_vlan entered promiscuous mode [ 109.438267][ T7301] device syzkaller0 entered promiscuous mode [ 109.780198][ T7354] device sit0 entered promiscuous mode [ 110.007589][ T7371] syz.3.2011[7371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.007640][ T7371] syz.3.2011[7371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.049939][ T7370] device syzkaller0 entered promiscuous mode [ 110.189524][ T7392] device veth0_vlan left promiscuous mode [ 110.331506][ T7398] syz.1.2018[7398] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.331592][ T7398] syz.1.2018[7398] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.352580][ T7392] device veth0_vlan entered promiscuous mode [ 110.374673][ T7398] syz.1.2018[7398] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.374723][ T7398] syz.1.2018[7398] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.835037][ T7520] device pim6reg1 entered promiscuous mode [ 113.846765][ T7542] device veth0_vlan left promiscuous mode [ 113.853966][ T7542] device veth0_vlan entered promiscuous mode [ 114.579659][ T7591] device veth1_macvtap left promiscuous mode [ 114.820060][ T7597] device pim6reg1 entered promiscuous mode [ 115.358359][ T7644] syz.2.2091[7644] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.358410][ T7644] syz.2.2091[7644] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.538535][ T7656] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 116.174903][ T7680] device pim6reg1 entered promiscuous mode [ 116.609064][ T7726] device syzkaller0 entered promiscuous mode [ 117.094958][ T7804] device sit0 left promiscuous mode [ 117.470120][ T7868] syz.1.2154[7868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.470171][ T7868] syz.1.2154[7868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.523267][ T7874] syz.0.2156[7874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.539896][ T7874] syz.0.2156[7874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.553077][ T7874] syz.0.2156[7874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.566129][ T7874] syz.0.2156[7874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.586300][ T7874] syz.0.2156[7874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.586782][ T7878] device syzkaller0 entered promiscuous mode [ 117.630380][ T7879] syz.0.2156[7879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.696721][ T7880] device syzkaller0 entered promiscuous mode [ 117.866505][ T7898] device pim6reg1 entered promiscuous mode [ 118.156347][ T7957] device syzkaller0 entered promiscuous mode [ 118.644140][ T7998] device syzkaller0 entered promiscuous mode [ 119.646529][ T8127] device syzkaller0 entered promiscuous mode [ 120.322249][ T8174] device syzkaller0 entered promiscuous mode [ 120.815550][ T8240] bpf_get_probe_write_proto: 65 callbacks suppressed [ 120.815559][ T8240] syz.1.2272[8240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.822263][ T8240] syz.1.2272[8240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.838335][ T8240] syz.1.2272[8240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.850262][ T8240] syz.1.2272[8240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.929861][ T8268] device pim6reg1 entered promiscuous mode [ 121.117501][ T8285] device syzkaller0 entered promiscuous mode [ 121.225748][ T8296] device syzkaller0 entered promiscuous mode [ 121.830477][ T8326] device veth0_vlan left promiscuous mode [ 121.860018][ T8326] device veth0_vlan entered promiscuous mode [ 122.000704][ T941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 122.018288][ T941] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 122.025844][ T941] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 122.168740][ T24] audit: type=1400 audit(1720168244.519:169): avc: denied { create } for pid=8356 comm="syz.0.2309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 122.234545][ T8365] device wg2 left promiscuous mode [ 122.343341][ T8386] device veth0_vlan left promiscuous mode [ 122.371303][ T8386] device veth0_vlan entered promiscuous mode [ 122.478147][ T1394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 122.492228][ T1394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 122.512932][ T1394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 122.573480][ T8401] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.581658][ T8401] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.589251][ T8401] device bridge_slave_0 entered promiscuous mode [ 122.596038][ T8401] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.602962][ T8401] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.610266][ T8401] device bridge_slave_1 entered promiscuous mode [ 122.654010][ T8401] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.660868][ T8401] bridge0: port 2(bridge_slave_1) entered forwarding state [ 122.668110][ T8401] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.674852][ T8401] bridge0: port 1(bridge_slave_0) entered forwarding state [ 122.702284][ T943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.712043][ T943] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.719470][ T943] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.748295][ T8401] device veth0_vlan entered promiscuous mode [ 122.758219][ T941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 122.766422][ T941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 122.774480][ T941] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 122.782065][ T941] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 122.789480][ T941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.797529][ T941] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.804347][ T941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 122.811630][ T941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 122.819687][ T941] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.826505][ T941] bridge0: port 2(bridge_slave_1) entered forwarding state [ 122.833809][ T941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 122.841787][ T941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 122.852812][ T8421] Y4`Ҙ: renamed from lo [ 122.868241][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 122.876267][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 122.885493][ T8401] device veth1_macvtap entered promiscuous mode [ 122.904216][ T968] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 122.912090][ T968] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 122.920541][ T968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 122.958220][ T1394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 122.967377][ T1394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 122.997472][ T8430] device pim6reg1 entered promiscuous mode [ 123.457787][ T345] device bridge_slave_1 left promiscuous mode [ 123.463756][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.565257][ T345] device bridge_slave_0 left promiscuous mode [ 123.632811][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.977581][ T8479] device syzkaller0 entered promiscuous mode [ 124.246957][ T8490] device pim6reg1 entered promiscuous mode [ 126.136685][ T8606] device pim6reg1 entered promiscuous mode [ 126.417375][ T8621] device pim6reg1 entered promiscuous mode [ 126.632936][ T8647] device syzkaller0 entered promiscuous mode [ 126.649036][ T1394] syzkaller0: tun_net_xmit 48 [ 126.706361][ T8660] syzkaller0: create flow: hash 79994290 index 2 [ 126.807400][ T8670] syzkaller0: delete flow: hash 79994290 index 2 [ 128.122889][ T8845] syz.4.2449[8845] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.122943][ T8845] syz.4.2449[8845] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.133200][ T8893] device pim6reg1 entered promiscuous mode [ 129.481895][ T8911] device pim6reg1 entered promiscuous mode [ 129.682875][ T8934] device syzkaller0 entered promiscuous mode [ 130.360545][ T8994] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.368248][ T8994] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.375479][ T8994] device bridge_slave_0 entered promiscuous mode [ 130.384534][ T8994] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.391705][ T8994] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.398990][ T8994] device bridge_slave_1 entered promiscuous mode [ 130.432668][ T9005] device wlan0 entered promiscuous mode [ 130.524688][ T8994] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.531666][ T8994] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.538750][ T8994] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.545592][ T8994] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.559033][ T965] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.583897][ T965] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.636324][ T9050] cgroup: fork rejected by pids controller in /syz4 [ 130.647803][ T963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 130.678144][ T963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 130.715980][ T1408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 130.725484][ T1408] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 130.733593][ T1408] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.740451][ T1408] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.747760][ T1408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 130.755964][ T1408] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 130.764364][ T1408] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.771237][ T1408] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.807331][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 130.815486][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 130.823297][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 130.831221][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 130.840702][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 130.867282][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 130.889301][ T8994] device veth0_vlan entered promiscuous mode [ 130.903189][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 130.911570][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.926492][ T8994] device veth1_macvtap entered promiscuous mode [ 130.937346][ T345] device veth1_macvtap left promiscuous mode [ 131.022938][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 131.030259][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 131.037563][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 131.045859][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 131.053872][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 131.067922][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 131.075989][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 131.084200][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 131.092578][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 131.194498][ T9061] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.201482][ T9061] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.209053][ T9061] device bridge_slave_0 entered promiscuous mode [ 131.219704][ T9061] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.226548][ T9061] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.233806][ T9061] device bridge_slave_1 entered promiscuous mode [ 131.272509][ T9061] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.279393][ T9061] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.286448][ T9061] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.293298][ T9061] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.324892][ T9093] geneve1: tun_chr_ioctl cmd 1074025672 [ 131.330470][ T9093] geneve1: ignored: set checksum enabled [ 131.343533][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.352301][ T970] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.359827][ T970] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.394108][ T1408] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 131.402397][ T1408] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.409370][ T1408] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.437401][ T1408] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 131.456086][ T1408] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.462974][ T1408] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.490634][ T1408] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 131.508650][ T1408] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 131.599018][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 131.620675][ T9061] device veth0_vlan entered promiscuous mode [ 131.647158][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 131.694195][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 131.707420][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 131.746178][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 131.822699][ T9061] device veth1_macvtap entered promiscuous mode [ 131.871189][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 131.896464][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 131.977526][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 132.045066][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 132.076257][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 132.141771][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 132.187219][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 132.831369][ T9170] syz.0.2535[9170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.831418][ T9170] syz.0.2535[9170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.991037][ T9191] syz.3.2541[9191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.020802][ T9191] syz.3.2541[9191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.191811][ T345] device veth0_vlan left promiscuous mode [ 133.724478][ T9267] device pim6reg1 entered promiscuous mode [ 133.758543][ T9268] syz.1.2563[9268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.758588][ T9268] syz.1.2563[9268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.673130][ T9381] device syzkaller0 entered promiscuous mode [ 134.707789][ T9381] syzkaller0: create flow: hash 3342247595 index 0 [ 134.720002][ T9387] device wg2 entered promiscuous mode [ 134.728443][ T1230] syzkaller0: tun_net_xmit 48 [ 134.797968][ T9381] syzkaller0 (unregistered): delete flow: hash 3342247595 index 0 [ 135.481009][ T9442] device syzkaller0 entered promiscuous mode [ 136.788052][ T9514] device veth0_vlan left promiscuous mode [ 136.825040][ T9514] device veth0_vlan entered promiscuous mode [ 136.860557][ T972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 136.878797][ T972] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 136.886403][ T972] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 137.057523][ T9545] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 137.063041][ T9545] pim6reg0: linktype set to 773 [ 138.127199][ T94] udevd[94]: worker [2181] terminated by signal 33 (Unknown signal 33) [ 138.158472][ T94] udevd[94]: worker [2181] failed while handling '/devices/virtual/block/loop2' [ 138.878241][ T9695] device pim6reg1 entered promiscuous mode [ 139.054198][ T9701] device syzkaller0 entered promiscuous mode [ 140.087560][ T9747] syz.0.2700[9747] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.087615][ T9747] syz.0.2700[9747] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.358411][ T9779] device syzkaller0 entered promiscuous mode [ 140.618623][ T9803] device pim6reg1 entered promiscuous mode [ 140.750877][ T9822] device pim6reg1 entered promiscuous mode [ 141.187748][ T9843] device syzkaller0 entered promiscuous mode [ 141.931641][ T9902] device pim6reg1 entered promiscuous mode [ 142.591791][ T9907] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.643533][T10009] device syzkaller0 entered promiscuous mode [ 145.283509][T10013] device syzkaller0 entered promiscuous mode [ 145.406471][T10056] device veth0_to_hsr entered promiscuous mode [ 145.737918][T10084] device syzkaller0 entered promiscuous mode [ 146.029893][T10107] device syzkaller0 entered promiscuous mode [ 146.146246][T10109] device sit0 entered promiscuous mode [ 146.467552][T10148] device syzkaller0 entered promiscuous mode [ 146.605282][T10166] device wg2 entered promiscuous mode [ 146.870018][ T24] audit: type=1400 audit(1720168269.219:170): avc: denied { create } for pid=10193 comm="syz.1.2834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 146.893725][T10191] device veth1_macvtap left promiscuous mode [ 147.765474][T10281] device pim6reg1 entered promiscuous mode [ 148.079944][T10295] gretap0: refused to change device tx_queue_len [ 148.374873][T10332] device syzkaller0 entered promiscuous mode [ 148.591753][T10379] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.598777][T10379] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.609335][T10379] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.616177][T10379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.623340][T10379] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.630198][T10379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.637454][T10379] device bridge0 entered promiscuous mode [ 148.921168][T10393] syz.3.2891[10393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.921196][T10393] syz.3.2891[10393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.004689][T10402] geneve1: tun_chr_ioctl cmd 2147767521 [ 149.562140][T10486] device wlan0 entered promiscuous mode [ 149.628377][T10493] device syzkaller0 entered promiscuous mode [ 150.272695][T10543] device syzkaller0 entered promiscuous mode [ 150.288084][T10557] syz.0.2933[10557] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.288143][T10557] syz.0.2933[10557] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.355264][T10562] syz.1.2938[10562] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.355885][T10560] device syzkaller0 entered promiscuous mode [ 150.367430][T10562] syz.1.2938[10562] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.513986][T10588] device syzkaller0 entered promiscuous mode [ 150.534821][T10613] device wg2 entered promiscuous mode [ 150.559181][T10616] device wg2 left promiscuous mode [ 150.776500][T10685] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.783868][T10685] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.798283][T10685] device bridge_slave_0 entered promiscuous mode [ 150.806751][T10685] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.814465][T10685] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.822461][T10685] device bridge_slave_1 entered promiscuous mode [ 150.894356][T10685] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.901232][T10685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.908332][T10685] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.915099][T10685] bridge0: port 1(bridge_slave_0) entered forwarding state [ 150.928084][ T5088] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.942090][ T5088] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.991079][T10736] device syzkaller0 entered promiscuous mode [ 151.003858][T10736] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 151.009746][T10736] syzkaller0: Linktype set failed because interface is up [ 151.017732][ T5088] syzkaller0: tun_net_xmit 48 [ 151.024226][T10736] syzkaller0: tun_net_xmit 1280 [ 151.029657][T10736] syzkaller0: create flow: hash 661628962 index 2 [ 151.052762][T10748] device syzkaller0 entered promiscuous mode [ 151.062669][T10735] syzkaller0: delete flow: hash 661628962 index 2 [ 151.108203][ T957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 151.116030][ T957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 151.123979][ T957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 151.134637][ T957] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 151.143014][ T957] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.149883][ T957] bridge0: port 1(bridge_slave_0) entered forwarding state [ 151.157470][ T957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 151.165618][ T957] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 151.173812][ T957] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.180670][ T957] bridge0: port 2(bridge_slave_1) entered forwarding state [ 151.196277][ T946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 151.204240][ T946] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 151.212245][ T946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 151.220811][ T946] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 151.243782][T10685] device veth0_vlan entered promiscuous mode [ 151.288075][ T955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 151.296547][ T955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 151.307367][ T955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 151.315888][ T955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 151.337469][T10779] device pim6reg1 entered promiscuous mode [ 151.347202][ T946] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 151.354503][ T946] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 151.375889][ T1411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 151.386097][ T1411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 151.400648][T10685] device veth1_macvtap entered promiscuous mode [ 151.422361][ T1411] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 151.432799][ T1411] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 151.442403][ T1411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 151.463734][ T1236] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 151.472023][ T1236] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 151.742600][T10835] device pim6reg1 entered promiscuous mode [ 151.870355][T10854] device syzkaller0 entered promiscuous mode [ 151.886167][T10869] device vlan1 entered promiscuous mode [ 151.947148][T10874] device syzkaller0 entered promiscuous mode [ 153.682353][T11075] device pim6reg1 entered promiscuous mode [ 153.701008][T11078] device syzkaller0 entered promiscuous mode [ 153.789100][T11086] device pim6reg1 entered promiscuous mode [ 154.125788][T11149] device pim6reg1 entered promiscuous mode [ 154.501705][T11188] device syzkaller0 entered promiscuous mode [ 154.763982][T11212] device pim6reg1 entered promiscuous mode [ 157.043349][T11317] device vxcan1 entered promiscuous mode [ 157.539555][T11349] device syzkaller0 entered promiscuous mode [ 157.572863][T11355] device wlan0 entered promiscuous mode [ 157.715083][T11373] syz.4.3149[11373] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.715135][T11373] syz.4.3149[11373] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.769594][ T24] audit: type=1400 audit(1720168280.119:171): avc: denied { getattr } for pid=11384 comm="syz.0.3154" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 158.398210][T11481] syz.4.3172[11481] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.398262][T11481] syz.4.3172[11481] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.462675][T11483] syz.4.3172[11483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.467794][T11482] syz.4.3172[11482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.474579][T11483] syz.4.3172[11483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.903692][T11551] device syzkaller0 entered promiscuous mode [ 159.115303][T11587] device syzkaller0 entered promiscuous mode [ 159.141842][T11591] device wg2 left promiscuous mode [ 160.344150][T11681] device pim6reg1 entered promiscuous mode [ 161.623093][T11758] device macsec0 entered promiscuous mode [ 162.580552][T11813] device syzkaller0 entered promiscuous mode [ 162.983506][T11874] device syzkaller0 entered promiscuous mode [ 163.731990][ T24] audit: type=1400 audit(1720168286.079:172): avc: denied { create } for pid=11898 comm="syz.2.3287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 164.060248][T11948] syz.2.3297[11948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.060299][T11948] syz.2.3297[11948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.162940][T11951] device syzkaller0 entered promiscuous mode [ 164.197540][T11956] syz.2.3297[11956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.197592][T11956] syz.2.3297[11956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.475720][T11958] device syzkaller0 entered promiscuous mode [ 164.682557][T11982] device wg2 entered promiscuous mode [ 165.079557][T12021] syz.1.3319[12021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.079612][T12021] syz.1.3319[12021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.846375][T12068] device pim6reg1 entered promiscuous mode [ 166.312760][T12138] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.319824][T12138] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.327522][T12138] device bridge_slave_0 entered promiscuous mode [ 166.334632][T12138] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.341729][T12138] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.349177][T12138] device bridge_slave_1 entered promiscuous mode [ 166.415551][T12138] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.422503][T12138] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.429626][T12138] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.436463][T12138] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.457532][T12152] IPv6: : Disabled Multicast RS [ 166.495017][ T953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.517769][ T953] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.528286][ T953] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.556613][ T955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.565927][ T955] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.572786][ T955] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.585724][ T955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.594014][ T955] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.600860][ T955] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.632245][ T955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 166.641285][ T955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.650184][ T955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.690518][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.705601][T12138] device veth0_vlan entered promiscuous mode [ 166.824995][ T955] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.833101][ T955] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.846690][T12138] device veth1_macvtap entered promiscuous mode [ 166.947722][ T5087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 166.955807][ T5087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 166.974033][ T5087] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 167.008488][ T5079] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 167.016668][ T5079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 167.059361][ T5079] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 167.067779][ T5079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 167.614849][T12225] device syzkaller0 entered promiscuous mode [ 167.898237][ T345] device bridge_slave_1 left promiscuous mode [ 167.904545][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.955795][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.967325][ T345] device veth1_macvtap left promiscuous mode [ 169.141375][T12363] device veth0_vlan left promiscuous mode [ 169.147559][T12363] device veth0_vlan entered promiscuous mode [ 169.157697][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 169.618207][T12399] syz.4.3427[12399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.618263][T12399] syz.4.3427[12399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.640522][T12399] syz.4.3427[12399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.652935][T12399] syz.4.3427[12399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.729392][T12414] device syzkaller0 entered promiscuous mode [ 169.846144][T12437] device syzkaller0 entered promiscuous mode [ 170.343756][T12442] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.350785][T12442] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.358428][T12442] device bridge_slave_0 entered promiscuous mode [ 170.381297][T12472] bridge0: port 3(veth0_vlan) entered blocking state [ 170.388176][T12472] bridge0: port 3(veth0_vlan) entered disabled state [ 170.403084][T12442] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.409984][T12442] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.417233][T12442] device bridge_slave_1 entered promiscuous mode [ 170.458218][T12480] syz.0.3446[12480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.458271][T12480] syz.0.3446[12480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.584880][T12480] syz.0.3446[12480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.596519][T12480] syz.0.3446[12480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.610839][T12480] syz.0.3446[12480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.622403][T12480] syz.0.3446[12480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.628440][T12442] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.651643][T12442] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.658740][T12442] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.665535][T12442] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.694170][ T697] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.778132][ T697] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.818994][ T697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.826184][ T697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.850816][ T952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.859219][ T952] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.866057][ T952] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.874014][ T952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.882248][ T952] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.889108][ T952] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.909590][T12442] device veth0_vlan entered promiscuous mode [ 170.918688][ T952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 170.928575][ T952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 170.936578][ T952] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 170.945010][ T952] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 170.966016][ T952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.979194][ T952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.003614][T12442] device veth1_macvtap entered promiscuous mode [ 171.011578][ T697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 171.037337][ T697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 171.100306][ T5090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 171.117546][T12529] device syzkaller0 entered promiscuous mode [ 171.154779][T12537] device pim6reg1 entered promiscuous mode [ 171.927104][T12678] syzkaller0: refused to change device tx_queue_len [ 172.490950][ T345] device bridge_slave_1 left promiscuous mode [ 172.496936][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.504280][ T345] device bridge_slave_0 left promiscuous mode [ 172.510589][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.518679][ T345] device veth1_macvtap left promiscuous mode [ 172.524486][ T345] device veth0_vlan left promiscuous mode [ 172.745171][T12729] : renamed from pim6reg1 [ 172.820612][T12737] device pim6reg1 entered promiscuous mode [ 174.072820][T12814] device pim6reg1 entered promiscuous mode [ 174.157136][T12822] device syzkaller0 entered promiscuous mode [ 174.366260][T12850] device syzkaller0 entered promiscuous mode [ 174.442959][T12850] device syzkaller0 left promiscuous mode [ 174.460666][T12857] device syz_tun entered promiscuous mode [ 175.429471][T12915] device syzkaller0 entered promiscuous mode [ 175.637896][T12927] device syzkaller0 entered promiscuous mode [ 177.782807][T13002] device syzkaller0 entered promiscuous mode [ 177.798752][T13019] device syzkaller0 entered promiscuous mode [ 178.007543][T13065] device veth0_vlan left promiscuous mode [ 178.013642][T13065] device veth0_vlan entered promiscuous mode [ 178.138088][T13076] tap0: tun_chr_ioctl cmd 1074025675 [ 178.143385][T13076] tap0: persist enabled [ 178.147516][T13083] tap0: tun_chr_ioctl cmd 1074025675 [ 178.152664][T13083] tap0: persist disabled [ 178.161425][T13076] bpf_get_probe_write_proto: 2 callbacks suppressed [ 178.161434][T13076] syz.0.3603[13076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.168027][T13076] syz.0.3603[13076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.171331][T13085] device syzkaller0 entered promiscuous mode [ 178.295227][T13106] device syzkaller0 entered promiscuous mode [ 179.076345][T13195] device syzkaller0 entered promiscuous mode [ 179.260944][T13212] device syzkaller0 entered promiscuous mode [ 179.395102][T13235] device macsec0 entered promiscuous mode [ 179.474280][T13235] device veth1_macvtap entered promiscuous mode [ 179.487392][T13238] tap0: tun_chr_ioctl cmd 1074025677 [ 179.492595][T13238] tap0: linktype set to 778 [ 179.521547][ T953] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 180.332347][T13294] device veth1_macvtap left promiscuous mode [ 180.338496][T13294] device macsec0 left promiscuous mode [ 180.783271][T13365] syz.1.3697[13365] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.783416][T13365] syz.1.3697[13365] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.928710][ T24] audit: type=1400 audit(1720168303.279:173): avc: denied { create } for pid=13367 comm="syz.3.3698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 180.975491][T13381] device syzkaller0 entered promiscuous mode [ 180.987273][T13381] device pim6reg1 entered promiscuous mode [ 181.647875][T13431] device pim6reg1 entered promiscuous mode [ 182.205011][T13464] device sit0 entered promiscuous mode [ 182.468232][T13503] device pim6reg1 entered promiscuous mode [ 182.709606][T13512] device syzkaller0 entered promiscuous mode [ 183.333302][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! [ 183.384334][T13559] device veth0_vlan left promiscuous mode [ 183.395533][T13559] device veth0_vlan entered promiscuous mode [ 183.811035][T13611] device pim6reg1 entered promiscuous mode [ 183.862112][T13614] device pim6reg1 entered promiscuous mode [ 183.941838][T13621] syz.2.3777[13621] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.941885][T13621] syz.2.3777[13621] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.390002][T13637] device pim6reg1 entered promiscuous mode [ 184.749651][T13642] tun0: tun_chr_ioctl cmd 1074025692 [ 184.866738][T13671] device pim6reg1 entered promiscuous mode [ 184.981611][T13690] device pim6reg1 entered promiscuous mode [ 184.992077][T13694] device pim6reg1 entered promiscuous mode [ 185.221110][T13708] syz.0.3806[13708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.231769][T13708] syz.0.3806[13708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.323276][T13738] device pim6reg1 entered promiscuous mode [ 185.974340][T13784] device syzkaller0 entered promiscuous mode [ 186.208753][T13793] device vxcan1 entered promiscuous mode [ 186.778301][T13812] device veth1_macvtap left promiscuous mode [ 188.053399][T13875] device syzkaller0 entered promiscuous mode [ 188.240595][T13893] device pim6reg1 entered promiscuous mode [ 189.124312][T13958] device pim6reg1 entered promiscuous mode [ 189.417973][T13996] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.424924][T13996] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.432404][T13996] device bridge_slave_0 entered promiscuous mode [ 189.440467][T13996] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.447622][T13996] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.454986][T13996] device bridge_slave_1 entered promiscuous mode [ 189.513419][T13996] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.520298][T13996] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.527411][T13996] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.534151][T13996] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.561685][ T481] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.576298][ T481] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.591316][T14014] device pim6reg1 entered promiscuous mode [ 189.610855][ T962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.629468][ T974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.639835][ T974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.647955][ T974] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.654773][ T974] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.685296][ T962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.693480][ T962] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.701893][ T962] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.708748][ T962] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.716290][ T962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.724672][ T962] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.740274][T14019] device veth0_vlan left promiscuous mode [ 189.842045][T14019] device veth0_vlan entered promiscuous mode [ 190.072908][T13996] device veth0_vlan entered promiscuous mode [ 190.082214][ T976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.095270][ T976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.103795][ T976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 190.112321][ T976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 190.128317][ T976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 190.141239][ T976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 190.181681][T13996] device veth1_macvtap entered promiscuous mode [ 190.190515][ T967] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 190.198167][ T967] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 190.205344][ T967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 190.213542][ T967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 190.221775][ T967] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 190.332175][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 190.340290][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 190.351968][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 190.365560][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 190.763165][T14127] syz.2.3926[14127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.763230][T14127] syz.2.3926[14127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.787014][T14128] syz.2.3926[14128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.798945][T14128] syz.2.3926[14128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.408547][ T423] device bridge_slave_1 left promiscuous mode [ 191.425970][ T423] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.433101][ T423] device bridge_slave_0 left promiscuous mode [ 191.439105][ T423] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.447325][ T423] device veth0_vlan left promiscuous mode [ 191.629664][T14245] device syzkaller0 entered promiscuous mode [ 191.675558][T14253] device syzkaller0 entered promiscuous mode [ 191.718932][T14258] device pim6reg1 entered promiscuous mode [ 192.724824][T14338] device syzkaller0 entered promiscuous mode [ 192.735873][T14348] device veth1_macvtap left promiscuous mode [ 192.741813][T14348] device macsec0 entered promiscuous mode [ 192.748786][T14349] device veth1_macvtap entered promiscuous mode [ 192.878982][T14387] device syzkaller0 entered promiscuous mode [ 192.930485][T14409] device syzkaller0 entered promiscuous mode [ 193.012184][T14432] device pim6reg1 entered promiscuous mode [ 193.555402][T14461] device syzkaller0 entered promiscuous mode [ 193.568490][ T1400] syzkaller0: tun_net_xmit 48 [ 193.599643][T14461] syzkaller0: create flow: hash 93819033 index 2 [ 193.649749][T14461] syzkaller0: delete flow: hash 93819033 index 2 [ 193.880186][T14481] device pim6reg1 entered promiscuous mode [ 193.955934][T14492] device syzkaller0 entered promiscuous mode [ 194.480601][T14539] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.490264][T14539] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.497776][T14539] device bridge_slave_0 entered promiscuous mode [ 194.514458][T14539] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.521354][T14539] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.528748][T14539] device bridge_slave_1 entered promiscuous mode [ 194.693299][T14539] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.700177][T14539] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.707263][T14539] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.714041][T14539] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.738054][ T963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.755413][ T963] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.762861][ T963] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.791500][ T976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.802987][ T976] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.809851][ T976] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.822994][ T976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.831875][ T976] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.838913][ T976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.846273][ T976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.869189][ T963] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.898457][T14574] device vxcan1 entered promiscuous mode [ 194.916608][ T963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 194.928224][ T963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 194.941578][T14539] device veth0_vlan entered promiscuous mode [ 194.951999][ T942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 194.960244][ T942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 194.976387][ T963] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 194.983961][ T963] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 194.996336][T14539] device veth1_macvtap entered promiscuous mode [ 195.003784][ T942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 195.012387][ T942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 195.022389][ T942] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 195.037911][ T943] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 195.050640][ T943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 195.070205][ T976] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 195.083492][ T976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 195.180763][T14628] device syzkaller0 entered promiscuous mode [ 195.270052][T14635] syz.0.4067[14635] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.270095][T14635] syz.0.4067[14635] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.287103][T14638] bridge0: port 3(veth0_to_batadv) entered blocking state [ 195.305408][T14638] bridge0: port 3(veth0_to_batadv) entered disabled state [ 195.312966][T14638] device veth0_to_batadv entered promiscuous mode [ 195.319616][T14638] bridge0: port 3(veth0_to_batadv) entered blocking state [ 195.326553][T14638] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 195.731096][T14643] device syzkaller0 entered promiscuous mode [ 196.311797][T14698] device syzkaller0 entered promiscuous mode [ 196.575201][T14713] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.582220][T14713] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.826185][ T24] audit: type=1400 audit(1720168319.169:174): avc: denied { create } for pid=14772 comm="syz.0.4110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 196.868229][ T423] device bridge_slave_1 left promiscuous mode [ 196.875293][ T423] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.913405][ T423] device bridge_slave_0 left promiscuous mode [ 196.935675][ T423] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.983217][ T423] device veth1_macvtap left promiscuous mode [ 197.003199][ T423] device veth0_vlan left promiscuous mode [ 197.837796][T14856] device wg2 entered promiscuous mode [ 197.994005][T14889] syz.3.4140[14889] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.994059][T14889] syz.3.4140[14889] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.029494][T14891] device pim6reg1 entered promiscuous mode [ 199.425840][T14955] syz.4.4154[14955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.425894][T14955] syz.4.4154[14955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.639183][T14954] device veth1_macvtap left promiscuous mode [ 199.657796][T14953] device veth1_macvtap entered promiscuous mode [ 199.663936][T14953] device macsec0 entered promiscuous mode [ 199.687738][T14957] device syzkaller0 entered promiscuous mode [ 199.983706][T14935] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.990620][T14935] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.999282][T14935] device bridge_slave_0 entered promiscuous mode [ 199.999780][T14984] syz.1.4164[14984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.104438][T14935] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.125217][T14935] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.133512][T14935] device bridge_slave_1 entered promiscuous mode [ 200.410573][T14935] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.417528][T14935] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.424773][T14935] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.431542][T14935] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.876946][ T1400] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.884564][ T1400] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.044620][ T5090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 201.052052][ T5090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.067056][T15043] device sit0 left promiscuous mode [ 201.176902][ T966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.185040][ T966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.193176][ T966] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.200031][ T966] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.207291][ T966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.215370][ T966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.223413][ T966] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.230246][ T966] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.238020][T15043] device sit0 entered promiscuous mode [ 201.266530][T15040] device syz_tun left promiscuous mode [ 201.416935][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 201.424838][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.445883][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 201.465953][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 201.485063][ T962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 201.493608][ T962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 201.502122][ T962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 201.510073][ T962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 201.518298][T14935] device veth0_vlan entered promiscuous mode [ 201.524729][ T962] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 201.533096][ T962] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 201.554016][T14935] device veth1_macvtap entered promiscuous mode [ 201.581728][ T967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 201.674330][ T967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 201.703420][ T967] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 201.726223][ T5079] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 201.734372][ T5079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 201.742679][ T5079] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 201.751116][ T5079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 202.994660][T15138] device pim6reg1 entered promiscuous mode [ 203.170983][T15152] syz.2.4210[15152] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.171037][T15152] syz.2.4210[15152] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.006620][T15188] device syzkaller0 entered promiscuous mode [ 204.159865][T15227] device syzkaller0 entered promiscuous mode [ 204.297856][ T423] device bridge_slave_1 left promiscuous mode [ 204.303863][ T423] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.311228][ T423] device bridge_slave_0 left promiscuous mode [ 204.317400][ T423] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.328826][ T423] device veth1_macvtap left promiscuous mode [ 204.334745][ T423] device veth0_vlan left promiscuous mode [ 204.407785][T15273] device syzkaller0 entered promiscuous mode [ 204.715202][T15308] syz.2.4250[15308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.715255][T15308] syz.2.4250[15308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.910621][T15310] device syzkaller0 entered promiscuous mode [ 205.075725][T15333] device wlan0 entered promiscuous mode [ 205.186730][T15344] device syzkaller0 entered promiscuous mode [ 205.949438][T15409] device syzkaller0 entered promiscuous mode [ 206.261415][T15425] device syzkaller0 entered promiscuous mode [ 206.362101][T15434] bridge_slave_0: mtu greater than device maximum [ 206.447615][T15452] device syzkaller0 entered promiscuous mode [ 206.655054][T15518] syz.0.4309[15518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.655087][T15518] syz.0.4309[15518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.910569][T15550] device syzkaller0 entered promiscuous mode [ 207.584331][T15612] bridge_slave_0: mtu greater than device maximum [ 207.648137][T15615] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.741474][T15616] bridge0: port 3(veth0_vlan) entered disabled state [ 207.796650][T15616] device bridge_slave_1 left promiscuous mode [ 207.872637][T15616] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.932648][T15616] device bridge_slave_0 left promiscuous mode [ 207.967767][T15616] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.169965][T15683] syz.4.4359[15683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.170494][T15683] syz.4.4359[15683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.099977][T15725] device pim6reg1 entered promiscuous mode [ 211.370108][T15927] device syzkaller0 entered promiscuous mode [ 211.502432][T15954] device veth1_macvtap left promiscuous mode [ 211.508521][T15954] device macsec0 entered promiscuous mode [ 211.515724][T15954] device veth1_macvtap entered promiscuous mode [ 211.592798][T15976] device syzkaller0 entered promiscuous mode [ 211.732886][T15982] syz.3.4445[15982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.732940][T15982] syz.3.4445[15982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.803375][T15985] device pim6reg1 entered promiscuous mode [ 211.849958][T15987] device syzkaller0 entered promiscuous mode [ 211.883067][T16005] 0: renamed from pim6reg1 [ 211.986051][T16018] syz.3.4455[16018] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.986415][T16018] syz.3.4455[16018] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.997999][T16018] syz.3.4455[16018] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.211802][T16081] device pim6reg1 entered promiscuous mode [ 214.191228][T16104] device syzkaller0 entered promiscuous mode [ 214.254615][T16118] device vxcan1 entered promiscuous mode [ 214.396182][T16126] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.408339][T16126] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.420022][T16126] device bridge_slave_0 entered promiscuous mode [ 214.457132][T16126] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.463973][T16126] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.495959][T16126] device bridge_slave_1 entered promiscuous mode [ 214.618324][T16126] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.625174][T16126] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.632423][T16126] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.639270][T16126] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.670120][ T1388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.678064][ T1388] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.685325][ T1388] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.725107][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.733343][ T1398] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.740292][ T1398] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.749645][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.762055][ T1398] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.768925][ T1398] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.776688][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.785964][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.808421][ T1388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 214.816605][ T1388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 214.829893][ T1388] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 214.839117][ T1388] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 214.849922][T16126] device veth0_vlan entered promiscuous mode [ 214.869275][T16126] device veth1_macvtap entered promiscuous mode [ 214.884139][ T1398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 214.908081][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 214.919822][ T517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 215.779285][ T423] device bridge_slave_1 left promiscuous mode [ 215.796306][ T423] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.856258][ T423] device bridge_slave_0 left promiscuous mode [ 215.908899][ T423] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.993924][ T423] device veth1_macvtap left promiscuous mode [ 216.043977][ T423] device veth0_vlan left promiscuous mode [ 216.869704][T16282] device syzkaller0 entered promiscuous mode [ 217.377792][T16338] geneve1: tun_chr_ioctl cmd 1074025681 [ 217.578340][T16362] device syzkaller0 entered promiscuous mode [ 218.662391][T16454] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.669386][T16454] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.040844][T16481] device syzkaller0 entered promiscuous mode [ 219.917938][T16535] syz.3.4599[16535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.917985][T16535] syz.3.4599[16535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.057657][T16536] syz.3.4599[16536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.235125][T16554] device pim6reg1 entered promiscuous mode [ 220.310875][T16565] device syzkaller0 entered promiscuous mode [ 220.541193][T16603] syz.3.4619[16603] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.541242][T16603] syz.3.4619[16603] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.581434][T16608] syz.1.4621[16608] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.595043][T16608] syz.1.4621[16608] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.635901][T16611] device syzkaller0 entered promiscuous mode [ 220.670843][T16613] device vxcan1 entered promiscuous mode [ 220.714280][T16629] device syzkaller0 entered promiscuous mode [ 220.723915][T16629] syzkaller0: create flow: hash 3302531005 index 1 [ 220.732061][T16627] syzkaller0: delete flow: hash 3302531005 index 1 [ 221.392716][T16680] device veth0_vlan left promiscuous mode [ 221.531296][T16680] device veth0_vlan entered promiscuous mode [ 222.343018][T16684] device syzkaller0 entered promiscuous mode [ 222.484541][T16711] device macsec0 entered promiscuous mode [ 223.928839][T16803] device sit0 entered promiscuous mode [ 224.570290][T16820] device syzkaller0 entered promiscuous mode [ 224.745942][T16834] device sit0 left promiscuous mode [ 224.767829][T16838] device syzkaller0 entered promiscuous mode [ 224.774578][T16834] device sit0 entered promiscuous mode [ 225.343260][T16865] device syzkaller0 entered promiscuous mode [ 225.399957][T16871] device syzkaller0 entered promiscuous mode [ 230.314434][T17096] device wg2 left promiscuous mode [ 230.419221][T17112] device syzkaller0 entered promiscuous mode [ 230.533108][T17122] device lo entered promiscuous mode [ 230.662133][T17156] syz.4.4776[17156] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.662184][T17156] syz.4.4776[17156] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.697409][T17156] syz.4.4776[17156] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.709373][T17156] syz.4.4776[17156] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.970477][T17200] : renamed from pim6reg1 [ 231.558986][T17242] syz.1.4801[17242] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.559032][T17242] syz.1.4801[17242] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.615251][T17362] device sit0 entered promiscuous mode [ 233.038348][T17402] syz.1.4842[17402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.038399][T17402] syz.1.4842[17402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.094264][T17414] device sit0 entered promiscuous mode [ 233.220209][T17426] cgroup: fork rejected by pids controller in /syz0 SYZFAIL: proc resp pipe read failed n=-1 (errno 11: Resource temporarily unavailable) [ 234.407877][ T423] device bridge_slave_1 left promiscuous mode [ 234.413785][ T423] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.421054][ T423] device bridge_slave_0 left promiscuous mode [ 234.427072][ T423] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.435372][ T423] device veth0_to_batadv left promiscuous mode [ 234.441564][ T423] bridge0: port 3(veth0_to_batadv) entered disabled state [ 234.448796][ T423] device bridge_slave_1 left promiscuous mode [ 234.454680][ T423] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.461914][ T423] device bridge_slave_0 left promiscuous mode [ 234.468008][ T423] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.475421][ T423] device bridge_slave_1 left promiscuous mode [ 234.481431][ T423] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.488513][ T423] device bridge_slave_0 left promiscuous mode [ 234.494489][ T423] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.502605][ T423] device veth1_macvtap left promiscuous mode [ 234.508637][ T423] device veth1_macvtap left promiscuous mode [ 234.514562][ T423] device veth1_macvtap left promiscuous mode [ 234.520528][ T423] device veth0_vlan left promiscuous mode