last executing test programs: 2.499127203s ago: executing program 0 (id=4089): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff0ff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000400000006a0a80fe000000008500000053000000b70000000000000095000010000000004e62011c3034fdb117168bd07ba08af339d1a1ee35fe163a255c33282044b32495ef8ab9adc67ccc945ff15d802f5132143c0a9fc7a84452569957c1002ed7d458e17f791f4798c8eb484de03312c69b3edff5be26765ba5f8f2879021c2ea53ac547a654bbd2db5356b971d83dd12742be9087a3e7b7c0efd3e38c794eb06b0b8c392904ae7dd5e4dee88518ddf12dddd4bfc6a4dd3b6beba51074229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff2357ef17f95a25780c3a057826ef4e912f01a201e694e3049b8c8fe8b65d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cff7f4d8b9d8eaf302f0b2e0c252b0000000000000000ee917bca4885bbf597a14ab6458e6272d88e0c8088f404f011289ebc5623faa1182632161e073af1d69a2e36be115be3b325ecd201d2ffb0a7fa4f5d1106560cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222674280f55e98107450c19b861299fcd9ed9d8679406419406bf0c5329bd5b4697336112b0b8756ce3574046bf611a108f8df4d1a88597840b702b6fa8edfff8faf8b8ec039bab385cac0535373bb8fab90539b1a65ddff841eb671f7faf39a43a66c5540b8762b42007c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ccd4b19b53b60322af0aa66e8f448e1bd96822e6b70b62912c926dbe417cccd4f696d528fa8a3ea847f10e9b1106f3bb506f1d7fbdf801000000000000006c028eb5b5a073d0de5538ab42e171b3baae34c35987b0dda497ac3f5e97e60eaeea15c6d55badf9b86b1c000100006e60cd06c9ed24313ce607d403bb6030f800000000690db0221b1705c501f802ff59b4e683efa4b6e77e042072ec9eb8166f6e28b49a7705a1befc4d315878f88a8fb1dd679fb4c5557abae6849917dc51a89d47b728502f7e621fc0e3ba04020000c149ee6601728c750930519339b44197c22da865059b475afd96187d881e93b42a5fdfd686d8900c44c67133eeb0109dcb60dddad58037fda65885a15a42560ee3027a5ebf95254744f10fd607bc3100b94932b8d9447c42f6e21ee0e54f8be386bdc09decece910a481e648e0cb074536a25ff581d92af08a06f857311a2f14326b0b290205e91a682e00c8762cbc6b904c980eef6e6ae00f0000000000006a8194479700a02b92bec8d05eae1f24fdd7b80d3dde04c22f689594de2ebb9687219de8d73ac83823feb402a2415a9850d5f0183ec67be96dc0e4acd7acf1dfe79d6771903b76e2ae47d972651390c22d641030e1ddac018dc3116e1803af10a5f2b5f7ba58aca5bcabbbab24414a3810788e5503e4be66d683daac5f00000000000000001000ba96edb95ede0e1957c2a2754258d9fd028096cc15a8b912b494d4bbe609031ea1ca65a548941d5d16297757310d9daebd5a3dabbced3b051129cd60a37d397643324e6f0aadf978d639650000000000000000570b0acbcaa196e6b46e213a34c1a550e7c2d8cee7a278cee591f360e345d37dc9f8991a16c08d72317e42d2ac9126acd76130ef1086016697e4d51c4b42b2efc8edab88d46bc3d5d6e5a634c912bc40513643bf44cb416b3149040220aa39035ae46d16d879fc815a5cb84b0d5c8ad970128adf8dec1171e860ca54ce5d6a5aa0327bca4f49a710bf8a8399071237fe5d764e2034873c94a4f21287f3bce3eeb69e94df2e14e4ab10cc7834b304bc879b80255991dd7aac2e92c9e7c411c019d229c1f1e563152f1c5ae9cda3e808000000a0c779d624c5a2b7491b8f73e767389ecd1dee951353bb22b7caf89468871520823715cfebd04189c6c6b34bd8a6541f6bc0630000000000f94e85f5111add3a3cb5bcace95f38465402c39df835754ef33056b0e1134187822c001a25304f3e00b44675d0a25a21dc4023c642cc6f5a75c45a29ab933600acf9a2d471b73a73178cdf309e5d53311996215b44295dfddc1dd6b81132e999366e460d15d366e84da02b8afc40c47e733f804460ed8300ec34eab2ed80097bd32ff1a6143ab1476037e474ca876187c85bed4391215cd77e6a1fd6399a498b96b9b0cca93255acb08c67e50004c5af6fd5b4ce7c1ebc9202bd7b329a4d2530486d5999dd7f90ebecca37f2869135438f05407b1fd7481daf9ec94b799c12e714d573e2a6331f496254f254a60c52b2026ed6a72c82cd191490fabe7b151f92e5d700f21830d613fbe490f305b3845a78817e59bf7ed36471dbca01d39e50ae2535460e1d2f2614940647233a02d5000000000000000000f70e52f0d56f6a4dcf7e57c03d4b4add0500000000000000320304d0d2b308c5ed3956eae263035d703f862224e9818a3d7ac270793a7bf2af87585293960a80ac63c54e55063bf8d24639e561253ef0caf6c58118120d8acecc0528f0d81d291009fc46401baf9c22d1c452a5b61b7a1b9adfcc17f5ad99dcdf935923185db7b14a7fa7babc1f53df70618bb73aa810b756696f26653b84cf842ae433fda59fbe312be11bb7dfecdc38c1c1f688d2724568cc396fca7c74984b7f7bd000000000000003ff3e5857fc6598c933610be374909dc8622b0722259e922f40d7862f7ea72f1754f07711de7600000000000000000000000000c4cb643e73ad8a45f0c7164484540e66e29943aa72297d831ce6c978866a55ed53130c6747f569c9c9abe724b4fc647b17401d2201e8c201e7d6ffa1fa122677f7393ed4fe8a93306f048b6703b04544e42a9cd937ef8d98ee8d878a12a627791c5c2d9fc6de65356be92fd98fdbe819686c7bd3be5bd0ce627c8357675f752c73a502d25c31c831078f098c34295bfe90e882843003841f4c0c65dc1810a50000000000000015911cb03e743c482199757d35df5b59fe0a0c5240c85498d818578e2d65c4ff4acbee037498222b1f81f3726a244da1fd6b8c195f1303bedb744045f31e1547d7bc3c3eae68b8da059a59c8c37e3639c2c4eb3d8229ac24d2ce12bc0e5db4a8202d72e64d5c5eacd0d0c0cd7a879ed967f5a2bd39ae4cf7daf7c9fa1777d54fb5920c8434163f75062c62455bf6e23817a85d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xfeffff, 0x113, 0x3f00f000, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0xffffff0c}, 0x40) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000140)="e6de661dc917b5b242f55c3ffb5855c870c7685f5fb0b3e21140179b94bf01df57d334118293cb209d2c74860879be", &(0x7f0000000240)=""/215}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2}}, @const]}}, &(0x7f0000000200)=""/147, 0x3e, 0x93, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x800005}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x11, 0x15, &(0x7f0000000780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1000}, {}, {}, [@map_idx_val={0x18, 0x6, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x10001}, @jmp={0x5, 0x1, 0xa, 0xb, 0x9, 0x4}, @jmp={0x5, 0x0, 0x5, 0x1, 0x1, 0x2, 0x8}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xb}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000440)='GPL\x00', 0x3a, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x6, 0x3, 0x29}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000900)=[{0x5, 0x0, 0x1, 0xa}, {0x3, 0x1, 0x7, 0x9}], 0x10, 0x5}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0], 0x0, 0x45, &(0x7f0000000240)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x7c, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0xd, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b7080000000000007b8af8ff00000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000008000000182300005cfb42b6d37178dabc9c397dd21723bd78f39c570cc8afcbb1a4bbf0ce82cd7756d77c4c5512211536c6a9756398c78ba2d200a7edd48a1034636afd82972502c1d9c7a3d890bb0b969e91a842", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000500)='GPL\x00', 0x100, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000540)=[0xffffffffffffffff], &(0x7f0000000580)=[{0x3, 0x3, 0xe, 0x4}, {0x2, 0x5, 0x8}, {0x0, 0x1, 0x0, 0x9}, {0x7, 0x4, 0x10, 0xb}, {0x2, 0x1, 0x3, 0xc}, {0x5, 0x3, 0xf, 0x4}, {0x0, 0x1, 0x4, 0x9}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x1}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000840)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8000000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x3}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000940)={{}, &(0x7f00000008c0), &(0x7f0000000900)='%pK \x00'}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x72}, [@ldst={0x7}]}, &(0x7f00000002c0)='GPL\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79}, 0x2a) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) 2.493389663s ago: executing program 0 (id=4091): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18010000000020000000000000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x1ff, 0xf}, 0x108044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 2.350084855s ago: executing program 0 (id=4093): bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xf, &(0x7f0000000300)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1000}}, @func], &(0x7f00000004c0)='GPL\x00', 0xa, 0x89, &(0x7f0000000500)=""/137, 0x40f00, 0x22, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x2, 0x9, 0x4, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f00000006c0)=[0xffffffffffffffff], &(0x7f0000000700)=[{0x2, 0x1, 0xb, 0x2}, {0x2, 0x1, 0xa, 0xe}, {0x4, 0x1, 0xf, 0x1}, {0x1, 0x5, 0x2, 0xc}], 0x10, 0x8}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xf, &(0x7f0000000300)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1000}}, @func], &(0x7f00000004c0)='GPL\x00', 0xa, 0x89, &(0x7f0000000500)=""/137, 0x40f00, 0x22, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x2, 0x9, 0x4, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f00000006c0)=[0xffffffffffffffff], &(0x7f0000000700)=[{0x2, 0x1, 0xb, 0x2}, {0x2, 0x1, 0xa, 0xe}, {0x4, 0x1, 0xf, 0x1}, {0x1, 0x5, 0x2, 0xc}], 0x10, 0x8}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='timer_start\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x3, 0x0, 0x1}, 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x3, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000280), 0x75, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{}, &(0x7f0000000980), &(0x7f0000000200)='%+9llu \x00'}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRESOCT, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) (async) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) (async) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x2000) (async) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x2000) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000280)={'wg2\x00'}) 2.264929482s ago: executing program 0 (id=4095): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000001cc0)=ANY=[@ANYBLOB="8fedcb7910031175f37538e486dd630080fc00082c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa3a200007"], 0xfdef) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, r1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}, {}, {0x85, 0x0, 0x0, 0x3d}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.408536883s ago: executing program 0 (id=4123): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x55, &(0x7f00000000c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x36, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=r2, 0x4) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x4, '\x00', r1, 0xffffffffffffffff, 0x5}, 0x48) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000400)=""/133, 0x85}, {&(0x7f00000004c0)=""/197, 0xc5}, {&(0x7f00000005c0)=""/35, 0x23}, {&(0x7f0000000600)=""/243, 0xf3}, {&(0x7f0000000700)=""/56, 0x38}, {&(0x7f0000000740)=""/10, 0xa}, {&(0x7f0000000780)=""/69, 0x45}, {&(0x7f0000000800)=""/235, 0xeb}, {&(0x7f0000000900)=""/49, 0x31}], 0x9}, 0x10001) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000cc0)={&(0x7f0000000a40)="09defca039d85e66463f4e20e8d735bcbeda6940b0e22aa21021f588df33feccac5d3728509be9dccda294", &(0x7f0000000a80)=""/82, &(0x7f0000000b00)="94c5eca7a8c5577e2c3964dfb61015f79fe9e55c80ac7f1f4d2e0821816066feda2eec3cbad70ab6640ab8cc9b3cebca5fb117378ea2153670b75708a63818d6e58586fb702c8a96bd509af9089c80d5fdc5ddba536e8fa9d585a4b2d1d6a6f472a432d76d37798e7a012bd10379df40fce8c6765c43ac52282ec182fe4b3b2ab837a6662fcbb96d7aa39d26954a07c71c3e2333f8ee05d865bfe39f626a7cf8a12a017d2dbf74a369b6", &(0x7f0000000bc0)="9294e3fb274d87f279122e63aaf99d9a73e4c012e9b1189f0c67479756264da8fd5d8cce69c8f644718cc63a3162358f340c6ed1e0be3894b0891e1746e1ef43665eb39f850f8150316de4835accdbae37cee7acc817f9b2bec69219b368144db47c7390c3678c667d8fcc13b41b5cdab7fb71c018d580bbb189314bcd5434d03346dc2fb79918bbb8672a023e4e46f0d335ae361866388929e512c5e4b5b157c1669b671ed6f465e62c1967ebb6859d24795cf1f5685dcc8b24b7559bf54d41b9ff6646c8cfb750e566eda8b34273709e7d9954c0791e2cb348fa493318d0ec", 0x3, r4}, 0x38) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000d00)='./cgroup.net/syz0\x00', 0x200002, 0x0) r7 = openat$cgroup_devices(r6, &(0x7f0000000d40)='devices.allow\x00', 0x2, 0x0) r8 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000dc0)={r0}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e40)={{0x1, 0xffffffffffffffff}, &(0x7f0000000d80), &(0x7f0000000e00)=r8}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000e80)={0x7}, 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001040)={0x6, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x20, 0x2, &(0x7f0000000ec0)=@raw=[@ldst={0x0, 0x0, 0x4, 0x3, 0x6, 0x1, 0x1}, @call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000f00)='syzkaller\x00', 0x401, 0x46, &(0x7f0000000f40)=""/70, 0x40f00, 0x22, '\x00', 0x0, 0x12, r3, 0x8, &(0x7f0000000fc0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000001000)={0x1, 0x5, 0x1, 0x9}, 0x10, r10, r8, 0x5, &(0x7f0000001080)=[r9, r9, 0xffffffffffffffff, r7], &(0x7f00000010c0)=[{0x2, 0x1, 0x0, 0x9}, {0x3, 0x4, 0xa, 0x9}, {0x5, 0x2, 0x8, 0x4}, {0x4, 0x3, 0xb, 0x6}, {0x3, 0x1, 0x6, 0x6}], 0x10, 0x536}, 0x90) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001200)={0x1b, 0x0, 0x0, 0xbc2, 0x0, r9, 0xfffffff8, '\x00', 0x0, r3, 0x3, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001440)={r4, 0x58, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000001500)={0xa, 0x14, &(0x7f0000001280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0xc7}}}, &(0x7f0000001340)='GPL\x00', 0x8, 0x0, &(0x7f0000001380), 0x40f00, 0x13, '\x00', r13, 0xb, r3, 0x8, &(0x7f0000001480)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000014c0)={0x5, 0x9, 0x1a70000, 0x7}, 0x10, r2, r8, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000015c0)=r10, 0x4) r16 = openat$tun(0xffffffffffffff9c, &(0x7f0000001600), 0x400100, 0x0) ioctl$TUNSETQUEUE(r16, 0x400454d9, &(0x7f0000001640)={'virt_wifi0\x00', 0x200}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000016c0)=@o_path={&(0x7f0000001680)='./file0\x00', r9, 0x4000, r11}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001700)={r4, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a40)={{r9, 0xffffffffffffffff}, &(0x7f00000019c0), &(0x7f0000001a00)=r14}, 0x20) r19 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001a80)={0x1b, 0x0, 0x0, 0x7, 0x0, r9, 0xffffffff, '\x00', 0x0, r15, 0x1, 0x2}, 0x48) r20 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001b00)={r12, 0x7a, 0x10}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c00)={0x18, 0x23, &(0x7f0000001740)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffff}, @map_val={0x18, 0x0, 0x2, 0x0, r11, 0x0, 0x0, 0x0, 0x8}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x20c}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @alu={0x4, 0x1, 0x4, 0x9, 0x9, 0xffffffffffffffe0, 0x10}, @map_fd={0x18, 0x0, 0x1, 0x0, r17}, @call={0x85, 0x0, 0x0, 0x3d}, @exit], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001880)='syzkaller\x00', 0x1b, 0x8d, &(0x7f00000018c0)=""/141, 0x41000, 0x4f, '\x00', r1, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001980)={0x2, 0x5, 0xfffff001, 0x8}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001b40)=[0x1, r4, r11, r18, r9, r19, r11, r20, r4], &(0x7f0000001b80)=[{0x4, 0x2, 0xb}, {0x3, 0x1, 0x0, 0x7}, {0x3, 0x2, 0x0, 0x8}, {0x2, 0x3, 0x7}, {0x3, 0x3, 0x4, 0xa}, {0x1, 0x5, 0x7}], 0x10, 0x1000}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r21, &(0x7f0000001e80)={&(0x7f0000001d00), 0x6e, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x88}, 0x40000001) r23 = bpf$ITER_CREATE(0x21, &(0x7f0000001ec0)={r22}, 0x8) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001f00)={0x3, 0x4, 0x4, 0xa, 0x0, r23, 0x2, '\x00', r13, r23, 0x3, 0x5, 0x1}, 0x48) unlink(&(0x7f0000001f80)='./file0\x00') 1.379902296s ago: executing program 1 (id=4126): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYRES8=r0, @ANYRES8=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x4, 0x7, 0x457b, 0x31, r0, 0xd, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18010000000020000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000004c0)='tlb_flush\x00'}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r0}, &(0x7f0000000540), 0x0}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r0}, &(0x7f0000000540), 0x0}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce2200182f00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa35f088be"], 0xfdef) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x7, r2, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x7, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r6}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x8001}, 0x48) 1.32953528s ago: executing program 2 (id=4128): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x7, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="18010000000020000000fffe0e3804563cb8008c", @ANYRES64, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc8}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@bloom_filter={0x1e, 0x7, 0x3, 0x8d, 0x18ca, 0xffffffffffffffff, 0x1, '\x00', 0x0, r0, 0x3, 0x0, 0x200002, 0xa}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000720000009500000000000000ae6a20bb074a2c78010500222cbb99b986d828ed093dd6700a1dcf98f6e1071e6be304194f485544fe1dac74ac336dddc37d9ccf55ae011f3e562541729638b8ca3851903695a541eadd6ca47d518af1"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='percpu_free_percpu\x00', r2}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000008c0)={r1, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000200000000000000000000090000000000000000000000010500000006aaff8474ed9c0000000000000000000003000000000200000002000000040029808618dbf98f29f11e00000000a290465c0ad46219f9855b9fbd10f5a8412bce1cf8f57890d09e39ec01000000a631646aeb87818947d11958afc3930789d1cac78e7af172bc005096d6dbc289110a4e775fc6bf91c84036829cdd946b969b99b5211bd13834ffd7ce24c433cd0c0300000065c30c6980d8e6c47518a81b35e964608b"], 0x0, 0x4e}, 0x20) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000004c0), 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x6510, 0x0, r1, 0x0, '\x00', r3, r4, 0x4, 0x1, 0x2}, 0x48) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000180)={0x2, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff02c}, {0x6}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000002a00)=""/4096, 0x1000}, {&(0x7f0000000940)=""/235, 0xeb}, {&(0x7f0000000a40)=""/129, 0x81}], 0x3, &(0x7f0000000b80)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x2102) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kmem_cache_free\x00', r7}, 0x10) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)) ioctl$TUNGETDEVNETNS(r8, 0x5460, 0x20000000) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r9, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r10, &(0x7f0000001000)={0x0, 0x0, 0x0}, 0x0) recvmsg(r9, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/188, 0xbc}], 0x1, &(0x7f0000001140)=""/4096, 0x1000}, 0x0) sendmsg$tipc(r9, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r12}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) 1.32875048s ago: executing program 1 (id=4129): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6}, 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x2, 0xc}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r3 = perf_event_open$cgroup(&(0x7f0000000340)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) getpid() bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, 0x0, 0xda00) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) sendmsg$unix(r6, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00"], 0xfdef) 1.32449123s ago: executing program 1 (id=4130): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800d}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x4, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000000400000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x7b6, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x20000000}, 0x20) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000004c0)=@id={0x1e, 0x3, 0x3, {0x4e24, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000500)="7f94db0bf5534c662626cb2cb759e3b785bf9bfff190a31339d78e9f3b7ab2b10aa2fd69614c7b8a3bde59542fc7dc2360258046a5d6f359eb046b3fdf", 0x3d}, {&(0x7f00000006c0)="c728b84b58f84f73236126d809c97afdd81f947bed88f883cc3b1ed308ae70c5fc58d7ec08fa1af2d665e53adf655ee32cf905eff65f3072ea17b5efba3c8db98690a7508724069353c797fa8dcf7dd44f6c2fc17339bf57bca47e6a67351a1192ad22c536e7bf843c4bea3f76545aee0bb3c290d3dda9b6e3df3c42c3aa987334d952343fb72c443f71d5f9eb7123a28ccbabec83c8", 0x96}], 0x2, 0x0, 0x0, 0x24000800}, 0x40000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0xc8, 0x0, 0x0, 0xffffffffffffffff, 0xba3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xd, 0xffffffff, 0x4, 0xff, 0x104, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, 0x0, &(0x7f00000002c0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000cc0)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000c80)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e443"], 0xfdef) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x42100, 0x0) ioctl$TUNSETSTEERINGEBPF(r9, 0x800454e0, &(0x7f00000002c0)=r8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX=r7, @ANYRES8=r7], 0x0, 0x7, 0x0, 0x0, 0x0, 0xbac4546b10abfef5, '\x00', 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000540)=@nfc, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000640)=""/55, 0x37}, 0x2003) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={&(0x7f00000007c0)="085ac2915edb129840eb8418de6f332fbe6e907b33e8b20b34467b3e13db73c194778454d535278b55518ae8f84cd6ee9aff74397b6384c1a02a7704f2a12a6cab408817b694c4e24a7e845e2b1a84de50ace6b909da3f43d26874b4ce22e28107c8a5f5b7916a613a299e320118d795c9607b62ce97bab458a5bdf5166f705133a6ea1e94886e40b2c204bead0aa9b267b13983e4aec3372d54dbaa52c0cd528ea7a523f7dc9b701ffa8e54d7775d33bfc5b2671f23ccdc8b22afddabd8bffef761a0e8a3e9029f071077359f1a5024affa816d49c13b3fedf59423760a73939bb5d54327de42783e1f1aee768a44ddea7647627a3fd7fd", &(0x7f0000000000)=""/17, &(0x7f00000008c0)="993e99707a63a7b25eb9e193e6cebdedaa5476adc8c575228e3b6cf2cb26fa8a73c4547e5bd61d54233cbab6abc5e3345832477701678b1ab7f8f6898201ab325e966647aa4255f5423ecbe295ee44d93acb5b9dc92cfd70c9d1bbf54da00588ba8d50a49d35a08ecc27fc374b85f64db10eca5edecf71b20c621f14e69583bdc4e0248bd6a170f45960f97a94075e5a083fa85dc94f9d48508e3cc35411816cf0febd9546d748f3ef00768cf456b812b4f57b7af2f9eb6af3ed628300e8dc04cf514ea50cd34c", &(0x7f0000000b00)="365667868d9593c2bab7167f6bc77b60cc9652b7b8fe92900bd7bce489676725b2b0716371c9a74a682489e3737b08b04cfa8b19789458f9de33a3dd782a10066ee96d81346f8c7c32eee7eabb12ed17dcea771d14f291be8a6185f1a2be2605c7aeaa770e8bd2221df77d82aab8c729e4de24b29f8a56077f2cd867475925ce80565642764ee63b50ebdac86cba38eacf0358dce3d0d242261d2f27080f0909bd3f0e2c0f38b878fbe11fd01d529a006e78755e606a0f46864fb2b404983d62b4a9fddee25aab5ee098c45104f5b5fa8b707f87a988c7b47f307480e4612b9b0cc1217f2c064b40aaa44e50b1", 0x4, r2}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) 1.237253148s ago: executing program 4 (id=4134): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x802, 0x400}, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xe2, 0x7fff, 0x9, 0x1018, r0, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x4, 0xa}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r3, &(0x7f0000000380), 0x20000000}, 0x20) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='scsi_dispatch_cmd_start\x00'}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="550a00000000000061117800001c0000180000000000ffe700000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000900)='F', 0x1}], 0x1}, 0x0) 1.187636072s ago: executing program 4 (id=4136): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) (async, rerun: 32) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x14, 0x4, 0x8, 0x6, 0x4, 0x1}, 0x48) (rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRESHEX=r1], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r2, 0x0, 0xa7, 0x15, &(0x7f0000000280)="102c3188a61367276581924965eb398f1dc474c6ca370935463d0c3cbfbed361c4708f462d9aa1a26553e1e2b11ca62ebe895e1b48a0fb4cd41f1079cd6b6d4a752915c7cc07cf24c9935666817a02570b1d5ce1eb865f69a3306de2a05694bf2a1fbbd3f36334d9ee31522ee5c6f3c01ba7849244fa11d9f262b7e214b7b800d56c71447a73e86b9a5dc1f360dcef276b74fdc7e16ef4eac453a57e6331d4243129d015509fd3", &(0x7f00000001c0)=""/21, 0x9, 0x0, 0x72, 0xfb, &(0x7f00000003c0)="97d826d8b28f311264728425d84f00cc9e0581c1ab2171b6242af550e61e98aed09f768fddc7b45e6cbaa5b7806435add1ee2b9285a4c4017aca4b62d18275d8e80b4b0c322fd560ae275c2c4a6d3e07feb67c219fe52d2ea779f0e9bfa7641554e68ae70ee28a12470c8f9d09b237355cf2", &(0x7f0000000740)="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", 0x3, 0x0, 0x401}, 0x50) (async) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) (async, rerun: 64) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xd, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) (async, rerun: 64) mkdir(&(0x7f0000000200)='./file0\x00', 0x87e4d3c19d9146ee) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x1001) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, 0x0, 0x0}, 0x90) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x40000004, 0xa, 0x60c, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000072"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000540)='task_rename\x00', r4}, 0x11) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000540)='task_rename\x00', r5}, 0x11) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r6}, &(0x7f0000000080), &(0x7f0000000240)=r5}, 0x20) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250}, 0x23) (async, rerun: 32) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) sendmsg$unix(r7, &(0x7f00000005c0)={&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r8, &(0x7f0000000f00)={&(0x7f0000000840)=@nl=@proc={0x10, 0x0, 0x25dfdbfc, 0x1000000}, 0x80, &(0x7f0000000d40)=[{&(0x7f00000008c0)="d58e52f231057d8bcad277e76c885908ca46693b5ffb17e45f0789743244c1916cbe120eebb9e5d818ad7c8658", 0x2d}, {&(0x7f0000000900)="912def6df0c6199b3ea497b51b16a27b1e9d0515044552edcc85149c9fe809e80f5e63aee726ee48caba3276cb3fcf9517a40683aacb465e4728bc724c4a4f82ad25ca7cfbedfeacce149f08f1", 0x4d}, {&(0x7f0000000980)="711f61412fd920afa33eac75db9fb0c9a00f9eca6a435360c8e134353723c880d9e8d0b0ad3881feb7cf6ce50f5f0a70be284d472015f77df80aeec6ff38017a7e872d28d9c05aea0c1565d44fa4e5a0f10e04e30d19ae630ec5a85d5a3edf1ff6e64cd5e5cef83caaa41cb4b71c171a7174d9dca79e15681aa55e875da3bb9955caddd3f3eda4bf09efaf43deeef4b413607660d4bb18c598596f8199a4bdb6fbc34664713e7db6845d475e4f5d58ee3208463eafb210749834f957fece00ece956bcbbf87af7c1f12bf9cd051bbaa827fd66e32d0e7c", 0xd7}, {&(0x7f0000000a80)}, {&(0x7f0000000ac0)="e33d8a8614b4297f8e79b91280191673eb1c477a8cee1c022f021129b1d91cdc107e6129791a44c2771b297618c26b3542f21e0f805582cb894f4041c5db3d74a5522c41c8985b1582a02bf2e818b3dbad7f9993f95ec208d92d7bd56328f619ea889cf6411260536a2c29084a42d63a6a38dd604cce9aae2aa2a637a501dd18a4472d5c4d835d731a3b11341228a6f5b147b29f07c07827ceb80f963181224c9002198e0605bdc1bf259b31095496bc391bc105d3832c78bacfc5d4f720bb7bae408c2919a7dab0cb1038b6755079b3e8ab786f4b04505b", 0xd8}, {&(0x7f0000000bc0)="706792ef9d81c381bcdc8010f368a558a5d5245e0b996c4ea91d657c31110bf687756384ac66488f377aef98e9ab9a47ad77af249532ec07d0ef5013259672d8c09bf54b5a347d88058d9bdad5e7071bbfa53731ac045d0f8f19e60a0adc125ace0dcedd82d8be11bb159659c71d771bc655617b257e8d628ba5767f8203ca6be5245ee3f3ab43973e997c088d4e3775a391d67541696d35c1c0be0d4e5216fa3ea75234c08242a9fdc28efd73cfd946e4e41bdc7dc96de73cfa18eda0c67a04f2694760c9be32219b6fb86db0a8cc6fde0316918156", 0xd6}, {&(0x7f0000000cc0)="db4d25d3b93c1ea51fd054cebeb39a4832fb5decd2a5dcdb39cc7060614f329a2dfdb4f35f2e1efd5ed3aab79207a15ebb21e91e5470c97b8d1c4a0bb59b35f696b9", 0x42}], 0x7, &(0x7f0000000dc0)=[{0x98, 0x0, 0xfffffffc, "f15969d6d114e636b94273a01a5cf0addac454017132a11cf848c853e9e7cb1654c252a24cf63608fa45a8b222af904ccb4a8ce55ca04fb9fd36ffacf147664cd4df85029d0386c8dbd3f93c80e60e22f8c36843f876e37e633a5e630814773fcef50efcbcdcecff3bd1cf0ff3be232cb67f37906061267daeb385bfca97afdb0480846a7c8c"}, {0x68, 0x116, 0x2, "445986c2101b0bc0218f82d0f6afb0d4562d6f40f26cec0a1d230e4958c61af932c147de23a2d306fa307c0af3f703543ca18fffe34468e8f60abe069b14e616cdaa878f79dc82dc17e515a88eab7f1e8a70"}, {0x10, 0x6, 0xcf7}], 0x110}, 0x800) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x2, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="611230000000000061134c0000000000bf2000000000000015000d00511b48013d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702000003000000360600000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a83683d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf5fe7030586162c17600674290ca9d8d6413b8199e34f67ceaaa78710f9f8aba4765c91382f497585ca39c595b21afa6bce62b5ab0d44e9c32ad6f0349d92962a58d39494a19a9183362382792ac85578d3de07b7e155cf4ee5e3dd51212d2831bd8e2655b2fbd88791e4c66c832a774919b28b8a62711f0f156e636804e1d3f44a5ff3d63a3a51f0c7ec0c8c25e072194ddd83aa155a537e15c0d91f502deef03f83e826718705c9aef9613ac4a325a428d147c1749196e94226671fd9573ab0d079d44b13b56f793e98ab571c58e98e022f18a3be3f318e0690fff93f44f22473dc8004fc758218349bd3f0516a72a7ea913bfa7603063ed3118b2d680cbc"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x90) 1.183953682s ago: executing program 4 (id=4138): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x6, 0x8, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xd}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) socketpair(0x1, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x3, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="660a00ffe000000061118900000000001800000000000000000000000000000095000000000000009fcf62aa7b6f6f25c18bcf72e002bb55ffb605ef43ae2f2308446e5fba1de452073a79cbf292badd1b9d09de4bf1914c1f719a784f279744b1fc4f5435dfa95a73469b55c2db0588d323b8b6f19ed3e47d9fc4bd7b221e837612782de8d572b0441bb18e878b20f7cfcceab7c023eaae415cbd18fa3bd00583fe095e2dd70ec52e484986b9cadea314ff"], &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2800000002000000, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x0, 0x4000000}, 0x28) 1.166109363s ago: executing program 4 (id=4141): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r3}, 0x3d) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={r6, 0xe0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000bc0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc4, &(0x7f0000000c80)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0xbc, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0xf6bb, 0x8, 0x4002, r4, 0x2, '\x00', r7, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x5}, 0x48) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0x9, 0x0, 0x0, 0x8, 0x1}]}, {0x0, [0x30, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/253, 0x29, 0xfd, 0x0, 0x5}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r3, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f0000000780)=[0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x68, &(0x7f0000000800)=[{}, {}], 0x10, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0x2a, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000940)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x1e, 0x19, &(0x7f0000000300)=@raw=[@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @exit, @cb_func={0x18, 0x9, 0x4, 0x0, 0x5}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x7}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x4}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}], &(0x7f0000000200)='syzkaller\x00', 0xd, 0x0, 0x0, 0x41100, 0x59, '\x00', r7, 0x29, r8, 0x8, &(0x7f00000006c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000700)={0x3, 0x0, 0x0, 0xffff}, 0x10, r9, r2, 0x0, &(0x7f0000000c00)=[r10, r0, r1, r0, r1], 0x0, 0x10, 0x3}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r11}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r12}, 0x10) syz_clone(0x40002200, 0x0, 0x0, 0x0, 0x0, 0x0) 1.064828152s ago: executing program 2 (id=4143): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r0}, &(0x7f0000000180), &(0x7f0000000600)}, 0x20) (async, rerun: 32) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = getpid() r3 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0, r6}, 0x10) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r2, 0x0, r3, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xe, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 1.053861713s ago: executing program 2 (id=4144): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x3, 0x2}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x3, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0xf, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x7fff}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x76}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0xb, 0xb, 0xfffffffffffffffc, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x668}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffff8}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x3, 0xffffffff, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000400)=[r0, r0], &(0x7f0000000440)=[{0x4, 0x2, 0x10, 0x3}, {0x3, 0x2, 0xe, 0xb}]}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0xf, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x7fff}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x76}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0xb, 0xb, 0xfffffffffffffffc, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x668}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffff8}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x3, 0xffffffff, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000400)=[r0, r0], &(0x7f0000000440)=[{0x4, 0x2, 0x10, 0x3}, {0x3, 0x2, 0xe, 0xb}]}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.time\x00', 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1b, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x24, r0}, 0x38) (async) bpf$MAP_UPDATE_BATCH(0x1b, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x24, r0}, 0x38) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000000fad413e550000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r2}, 0x10) (async) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r2}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r3}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x3, 0x2, 0x85}, 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x3, 0x2, 0x85}, 0x48) bpf$MAP_UPDATE_BATCH(0x1b, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x24, r4}, 0x38) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r5, &(0x7f0000000080), 0x11ffffce1) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10005}, 0x48) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10005}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r6, 0x58}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={r4, 0x58, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb2, &(0x7f0000000a00)=[{}, {}], 0x10, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0x74, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x10, 0x20, &(0x7f0000000700)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xd065, 0x0, 0x0, 0x0, 0xe2ba}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0xb5}, @exit, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000800)='syzkaller\x00', 0x8, 0x13, &(0x7f0000000840)=""/19, 0x40f00, 0x26, '\x00', r7, 0x2b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r8, r1, 0x4, 0x0, &(0x7f0000000c40)=[{0x5, 0x4, 0xd, 0x1a}, {0x5, 0x1, 0x4, 0x9}, {0x4, 0x2, 0xe, 0x3}, {0x4, 0x3, 0xc}], 0x10, 0x3}, 0x90) close(r3) (async) close(r3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000006c0)={&(0x7f0000000540)="09716945d72db378e6e684786364b7c2d9e0d758c889219b5bfb071d5ae471ce8af4cdbe54d9baf2023b454916c66b", &(0x7f0000000580)=""/25, &(0x7f00000005c0)="ee25ebd80e7aa7aaf58871abd89c9d2fd4c0", &(0x7f0000000600)="b9d39384e7da9297285cead4227767219b3597d386984e1b301f5441f70a29edbf33c51ccc208db3add5b12a2be528c6a7ce0f9f5f95932975d073942ddf737068e37f3c6f2f65ed657b05c42be667f0a7f14e7ccec210aec0340440485eaefc40445ded1ba9365d8b304090328ae83c128afeb8c8eebd3d990f5990fd194f66629da04c6856631271f838199a59ae937356b0f249f23021a39b45b70724c16b1def5069f7d0cb2f6d146fe304c0f93c655ef2c5c03e0f23477365c951", 0x0, r4, 0x4}, 0x38) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x3b}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x8}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000000fad413e550000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r9}, 0x10) (async) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r9}, 0x10) r11 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r10}, 0x8) write$cgroup_int(r11, &(0x7f00000001c0), 0xfffffdef) (async) write$cgroup_int(r11, &(0x7f00000001c0), 0xfffffdef) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x2, 0x4, 0x3fd, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r11}, 0x48) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x2, 0x4, 0x3fd, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r11}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000006e7a00000000000000000018200000", @ANYRES32=r12, @ANYBLOB="0000000000000000c3000c000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x6}, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa66, 0x0, 0x0, 0x1}, 0x0, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, @perf_config_ext={0x80}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 936.359443ms ago: executing program 3 (id=4145): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) close(r3) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) (async, rerun: 64) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) (async, rerun: 32) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) (async) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 935.080482ms ago: executing program 4 (id=4146): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x45}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='ext4_alloc_da_blocks\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000000)) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000700000005000000006800070000000000000000005f00"], 0x0, 0x2b}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r6, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r7, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1e, 0x800, 0x10001, 0x7, 0x8, r3, 0x9, '\x00', 0x0, r6, 0x1, 0x2, 0x1}, 0x48) write$cgroup_subtree(r2, 0x0, 0xda00) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000080)='cachefiles_rename\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x3, 0x4, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_discard_blocks\x00', r9}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='blkio.bfq.io_service_bytes_recursive\x00', 0x26e1, 0x0) 928.526663ms ago: executing program 3 (id=4147): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000ff85000000430000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x12, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x80, 0x0) ioctl$TUNGETVNETLE(r4, 0x800454dd, &(0x7f0000000440)) sendmsg$tipc(r3, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000170000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x3, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1802000010000000000000000000000085000000270000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe5, 0x0, &(0x7f00000006c0)="8f364defd7e57085f6f051fb49c2349eec8ca43edd965f7aeabdbdc980fba8e2d31a84d4f5bc404f6e052e1a84bfbd0b317bd6027ef0c82928d94f77003254233f1c996f4a823a58530b7a99546d381f0a4fd4078360f5a23e8ab29562fbb7cb6f41146266616a29c18a2348c8749b4fd27a288ec8c08d614bdeaea5761aeda8a25c3356107dc45b31b4e7f0aa6fd1b0c3b79ca4c900005426916948e12b9143df444e5ee0dcaf8897251686582e6c4701ebaf843a246071ce83e8ea4b3f0ae59eb6fb1d7215096a9ce7b018bbe2f1609bb688ec55a1a1a0ea08a69fdb67b5819c971d6894", 0x0, 0x0, 0xe8030000, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="1b2388a8"], 0xffdd) setsockopt$sock_attach_bpf(r2, 0x1, 0x21, &(0x7f0000000540), 0x4) sendmsg$tipc(r3, &(0x7f0000000500)={0x0, 0x0, 0x0, 0xfffffffffffffe10}, 0x20000080) sendmsg$tipc(r2, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000300)=ANY=[], &(0x7f0000000480)='GPL\x00'}, 0x90) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x8, 0xffffffffffffffff, 0x0) 912.560674ms ago: executing program 2 (id=4148): ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=@base={0x16, 0x0, 0xb161, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, 0x0, &(0x7f0000000040)}, 0x20) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={r0, 0xffffffffffffffff}, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x9, 0x11, &(0x7f0000000080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x103}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@call={0x85, 0x0, 0x0, 0x20}, @jmp={0x5, 0x0, 0x5, 0x9, 0x3, 0xfffffffffffffffc, 0xfffffffffffffff0}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000980)=""/4096, 0x40f00, 0x4, '\x00', 0x0, 0x2c, r3, 0x8, &(0x7f0000000180)={0x3, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x0, 0x12, 0x200}, 0x10, 0x0, 0xffffffffffffffff, 0x3, &(0x7f0000000240)=[r1, r0, r4, r1, r0, r5], &(0x7f0000000280)=[{0x4, 0x1, 0xb, 0x9}, {0x5, 0x4, 0x4, 0x9}, {0x5, 0x2, 0xf, 0x1}], 0x10, 0x4}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0x10, &(0x7f0000000740)=@framed={{}, [@snprintf={{0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x8, 0xfe00}, {0x7, 0x0, 0x8}, {}, {0x5}, {0x7, 0x0, 0x2, 0x0}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x49}}]}, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r6, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="7638300c000000002f00e9000000", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 812.292013ms ago: executing program 2 (id=4149): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000980), 0x12) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='fib6_table_lookup\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x106c4, 0x0, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) recvmsg(r2, &(0x7f0000000f40)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=@base={0x16, 0x0, 0xb161, 0x2}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='mm_page_alloc\x00', r7}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r5, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r8, 0x0, &(0x7f0000001780)=""/4096}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r10, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) r11 = getpid() ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x7f, 0x5, 0x8, 0x9}]}) sendmsg$unix(r10, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)=[@rights={{0x14, 0x1, 0x1, [r9]}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xee00, 0xee01}}}], 0x38}, 0x0) recvmsg(r9, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x40000062) 811.342753ms ago: executing program 4 (id=4150): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETLINK(r2, 0x400454cd, 0x5) (async) ioctl$TUNSETLINK(r2, 0x400454cd, 0x5) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xa3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000020000000000000000000000018110000", @ANYBLOB], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r3], 0x0}, 0x90) socketpair(0x1e, 0xa, 0x3, &(0x7f0000000240)={0x0, 0x0}) (async) socketpair(0x1e, 0xa, 0x3, &(0x7f0000000240)={0x0, 0x0}) close(r4) (async) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0xfffff801}, 0x48) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x99, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x99, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='tlb_flush\x00', r7}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'lo\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8922, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) 769.257756ms ago: executing program 3 (id=4151): bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x1}, 0x8) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x19, 0x4, &(0x7f0000001200)=ANY=[@ANYBLOB="1800000000000000000000000000000061111c0000000000950000000000000081ebf0df5009e3bfa7a5815e32a186f99ca3a7753fa66ebff0a93261763f00a57df35f3161c97af107333124d5d2ca1dcddc758e006662acf0543fda23cf60ab5aa1b4c0b97f7bfc5b9fcf6618002005c1255c41740c016975b770d32e66d2fa58d102b966770412ccb30587d465c8412466bcafafc86901a426c5ceb0e9858d272a3027e6d37bcdf397ac81b7e6652130846c9fd2d67904c1496945dcf86ca5227d43d096361ca0c6d0fbfff3a7cdaa93ed09e72777731adf59acaa2d04ff7fec29770270dac8d11e7f651b9f8868c29c87dde04d359ff2d1c7300d2401a0a1288de96fb49863dcb2f6681a6a5409811484ca56e68ca095b8f6862df3eca8a2e8fd8aa5069d2013483297c0eaa3e9c2dd6542c37d9ee235a0b5deec3c366177ac8ba9d84cd2cfa180c1bed940a51cae53056a79b985abb1ac77d8ce5c240aecea67e5cd37befbdc42534a502c3fa1e45c56ca750ed570ff0343ff057e737d8b2b22486389ac853fee470c932b6a36316ff0b7459a82f69fd74ba75c97dc42b504162bf6fa7933d0a36d97090ed1b70d176b75b816667356030799897eedf1c7035d4b572c762c01b4f1869de8dcb1d558fa0300c506dc3e8dabdd8824ffbde06620a1a1bcef3eb73a7171859a85e29bc3940055719718184121ff4080d6551fbd195516e397d3689fbae9c27684ed61aa0781c53ebc6689ef1b25959b1f52f04cd6626e0300b88e2dd1b518070ec194d5b33f761fc91f07988098de9bbd931e47b8a389508924cf14e32aaca3710eb9915a200ed6452b2764447bd7a74edd015fdf2bd9658fb5f846be969fb8f71abf87395c48cedf9960f612c2e8bc8b96d003035702218f8c32c0bf8aa28157d37940861b83934f270ba263feac6347e35c1e4e0d967323964ff0e295db0226419a2a821d58c9c284fa827746dd2430dea41b86bb4e7f4a8c87b71c3356dde2be6805b00603ea915bf82884de32eea2f1a3a8b5c7fa9df4325be6c156c27e3b130c656faca2f777888bca1901a4517b1910d14d319d2dfa320796d1b256707e84ec09fa2dd6b4da53f312eefb999ce52aa26818c87a8c957fd36dffa5607d155ccc478cc798a6616f51b1374405001b9b92c5cc7b90ddb2fc9b841ce7b2970236c56204244201b757bf129cdc7f5bafc30c0e27d438184f84ed05db34cbf65bb09c7ca25a6171b77048dfdb939a59d66634e767e1557f190ce1afce1d6096f7f441a91e0b4b543a59d94724927a0c1610e292345200e5e10406e24c3acb02f7d31db8cd97f5897aaf5cabbdbfe6e60e48a4525716205f895e0faa5e976b1441394034046daa6c0bf7bd90893afedfbe858864deb2ba51dfbd78753bc3ad4da2fcc955bf28c0cbc7d9b18e1d1a1ebf2d759561fe432bc7b793dd3e9275c8a90a4d7a9dc056aafc9bc3ac3ed5b1d1993332cedd756c386edc1c19c616d063397f308a909f034a77081fdd00005930c2f0be770b0dfae60108f2da4733f09fcccca95888afa513c9dec8c0e6107c0e22c0644fc0a1dab02918d1c0add16b08442f361dce2008708222c27a8de1ee60ca435ce8168763768fc10bd269f70ccd57ebf0fc8e9d71ad852f1b70b78fac259c552c8cae8a30964c419168821ec5fa7dc98c948a82fb8c28f92a35744847477d5c47f3d9dcb09b2bce276ce6d33cb8c7cff1451eac0beebaef0e6f41087e1d63c8eda0a658242b3e29c29b0215cc8d3e3c4217d6cb1bfde10d984200000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x15}, 0x70) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000001700), 0x6e, &(0x7f0000002b40)=[{&(0x7f0000001780)=""/170, 0xaa}, {&(0x7f0000001840)=""/147, 0x93}, {&(0x7f0000001900)=""/129, 0x81}, {&(0x7f00000019c0)=""/89, 0x59}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000002a40)=""/212, 0xd4}], 0x6, &(0x7f0000002bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x128}, 0x141) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000000500000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r4}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={@map=r1, r0, 0x15, 0x6, r0, @prog_id}, 0x20) 722.53476ms ago: executing program 3 (id=4152): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000600000000000000000000181100006bb3b994388120c05addaffe1ba3696e9c571b057e3d393b1d0eda09c6", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='fib6_table_lookup\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000600000000000000000000181100006bb3b994388120c05addaffe1ba3696e9c571b057e3d393b1d0eda09c6", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='fib6_table_lookup\x00', r1}, 0x10) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4}, 0x48) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) (async) 616.251899ms ago: executing program 3 (id=4153): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000800)=ANY=[@ANYBLOB="0000000000f5f5cebe0000950000000500000007ce9cc77a14ac7b4c6784a53a0b862c455d04552aa0ca276c4c71f6e1d6042f9834bff1a96c7ec3a0cde7cc1a7aed9f5adbb961df2b2d1da2085ee530f189cef44a5dbc4ba731c82a0e6382c08c5bc793f23e89b37f73c903bf7b0a2a25a568a62db04ae6bd27dc2745a3fda99ff2a013f2bfad711b2e9dbffb0cb5c5b2ece9e06994c9f12801a965f2"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xc}, 0x10}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100000100000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x17, 0x4, 0x80000001, 0x80000ff, 0x1640, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='ext4_sync_file_exit\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x43400) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r8, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) close(r8) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000680)='!', &(0x7f0000000780), 0x6, r10}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008088100b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r11}, 0x10) sendmsg$inet(r9, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 568.524053ms ago: executing program 0 (id=4154): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYRES64=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b70400000800000085000000950000009500000000000000"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffe74) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x7f, 0x7f, 0x9, 0x0, 0x1, 0xedaf, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x0, 0x8}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x79, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffc47) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000180), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r2, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0), &(0x7f0000000340)=[0x0, 0x0, 0x0], 0x0, 0xb0, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}], 0x56, 0x10, &(0x7f00000003c0), &(0x7f00000004c0), 0x8, 0xdc, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000b00)=ANY=[@ANYBLOB="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"/401], &(0x7f0000000880)=""/230, 0xe2, 0xe6, 0x0, 0x1}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x9e0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@ifindex=r3, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="ffff000000000080b7080000000000007b8a0035ce5cab000000000007020000f8ffffd1d303000008000000b70400000000000085000100c30000009400000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r5, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0], 0x0, 0xac, 0x0, 0x0, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0xcf, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x8, &(0x7f0000000a40)=ANY=[@ANYRESOCT, @ANYRESDEC=r1, @ANYBLOB="000000000000850cb7030000000000008500000000000095000000000000000000000000000000000b98038655bb07beddca3311e1446d6e73d1bff25c153195962c814b7a07fc34b48d04d69c47719bae096a905b65f13d0b7b832c2d24f0440f007fe49a89249be63b3754"], &(0x7f00000001c0)='GPL\x00', 0x5, 0x30, &(0x7f0000000200)=""/48, 0x41100, 0x50, '\x00', r7, 0x25, r6, 0x8, &(0x7f0000000600)={0x7, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r4, r6], &(0x7f0000000680), 0x10, 0x6}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r9}, 0x10) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r11) 505.507658ms ago: executing program 3 (id=4155): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r3, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001b80)={{r2}, &(0x7f0000001b00), &(0x7f0000001b40)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) close(r0) 24.190898ms ago: executing program 1 (id=4156): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x2002, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0xfffffffe}, 0x48) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x10000}, 0x10}, 0x90) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r1, 0x40047451, 0x2000000a) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{}, 0x0, 0x0}, 0x20) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[], 0x9) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r2}, 0x38) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f00000003c0)=""/43, 0x2b, 0x0, &(0x7f00000005c0)=""/228, 0xe4}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r2, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x7, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r4}, 0x10) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x802, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r5, &(0x7f0000000a40)="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", &(0x7f0000001a40)=""/4096}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r6}, &(0x7f0000000040), &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 22.493719ms ago: executing program 1 (id=4157): r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0xf, &(0x7f0000000340)=@ringbuf={{}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x2655d2df, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='fib6_table_lookup\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000440)={r0, &(0x7f0000000000)="c22e232b4a295f5b25241fb52abcb1e7354467078138545b49e795", 0x0, 0xf0708b7b8063d74d}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000ffffffff000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r5}, 0x10) syz_clone(0x0, 0x0, 0x41, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x18, 0x209, 0xff, 0x1, 0x2703, r4, 0x1, '\x00', 0x0, r6, 0x3, 0x1, 0x4}, 0x61) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r7, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000004c0)=[0x0], 0x0, 0x0, 0x8a, &(0x7f0000000540)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000940), 0x0, 0x0, 0x99, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) 10.040819ms ago: executing program 2 (id=4158): bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0xd}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0], &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000240)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x41, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$tipc(r2, &(0x7f00000008c0)={&(0x7f0000000700)=@name={0x1e, 0x2, 0x3, {{0x41, 0x2}, 0x3}}, 0x10, &(0x7f0000000800)=[{0x0}, {&(0x7f0000000580)="8fd23d8fb2513c72c4703c667a227a7950c4aa9f7a1ba051b43cfe8db0fb82d4e14e719a2d2fcf95872e194f68165f06652241bcd51c8305bfd8e8b01d335dc0dbcc7cecdd49cbc36929264f18a253d901a9fd11a759223d8b4f0a2dbae8cc62a4d9aa089013389801905db19ce0e21fd363bfde4803b879ed06e97fccd0b347abdc0de2ed406d38e459c75823575244beb32c3a1b31851fd5de41d92a69acad1665b94f657f1612970079763642e7565a96cea952b7d23cd3bc4f64b821ab4896e0a9d39b5bf237f4c2b0b91677c91e9f39633e92c47af59565a923b4bd59245cda", 0xe2}, {&(0x7f0000000900)="7e644c57d0c58d678daec01803461f688c77b0d1ec1d3ee015a6735a4507c23c7c526c28647c9a756b4e9049db9afbb3f22e0d3303365bef811c30579392d9c32aed044409b0013e40be7d4af2d9fb7dcf47cde80271c74fbb780accae396d532294a90ab56b67d3e236aad7bef2cfcd379c9a12e1d46951ea13e9d47e9e94759bccd5d75f4099b27385f5f5a52d62b0bf730b3a1235c647a5036ed91f781ed0d593f2daebbbc9873c", 0xa9}], 0x3, 0x0, 0x0, 0x20040041}, 0x8041) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0x5452, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000dd0a000000000000630122000103000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', r0, 0x16, 0xffffffffffffffff, 0x19, &(0x7f0000000000)={0x8}, 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4367}, 0x90) close(r6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000340)='module_request\x00', r4}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r8 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff94, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(r8, 0x0, 0x0) 0s ago: executing program 1 (id=4159): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000f00)=@base={0x11, 0x4, 0x4, 0x6, 0x0, 0x1}, 0x48) gettid() bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000f00)=@base={0x11, 0x4, 0x4, 0x6, 0x0, 0x1}, 0x48) (async) gettid() (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) kernel console output (not intermixed with test programs): ject_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.587824][ T24] audit: type=1400 audit(1720392498.910:74): avc: denied { read } for pid=272 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.613133][ T24] audit: type=1400 audit(1720392498.910:75): avc: denied { open } for pid=272 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.638912][ T272] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.016663][ T280] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.023631][ T280] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.031279][ T280] device bridge_slave_0 entered promiscuous mode [ 20.039198][ T280] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.046038][ T280] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.053292][ T280] device bridge_slave_1 entered promiscuous mode [ 20.140227][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.147514][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.154609][ T285] device bridge_slave_0 entered promiscuous mode [ 20.162113][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.169080][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.176155][ T285] device bridge_slave_1 entered promiscuous mode [ 20.182715][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.189656][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.196711][ T281] device bridge_slave_0 entered promiscuous mode [ 20.203349][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.210358][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.217522][ T281] device bridge_slave_1 entered promiscuous mode [ 20.244799][ T280] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.251659][ T280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.258784][ T280] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.265528][ T280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.328306][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.335136][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.342277][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.349041][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.358517][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.365350][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.372605][ T288] device bridge_slave_0 entered promiscuous mode [ 20.379407][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.386232][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.393609][ T288] device bridge_slave_1 entered promiscuous mode [ 20.451137][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.459735][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.467883][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.475150][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.482824][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.490036][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.506845][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.514245][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.522022][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.549567][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.557903][ T15] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.564812][ T15] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.572350][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.580282][ T15] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.587192][ T15] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.594241][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.601906][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.617049][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.624154][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.631466][ T287] device bridge_slave_0 entered promiscuous mode [ 20.640107][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.647066][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.654125][ T287] device bridge_slave_1 entered promiscuous mode [ 20.662825][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.674468][ T280] device veth0_vlan entered promiscuous mode [ 20.684720][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.699764][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.708244][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.715401][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.729126][ T285] device veth0_vlan entered promiscuous mode [ 20.741901][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.749231][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.756718][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.764472][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.772349][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.779667][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.787807][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.795917][ T15] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.802767][ T15] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.812517][ T285] device veth1_macvtap entered promiscuous mode [ 20.826361][ T280] device veth1_macvtap entered promiscuous mode [ 20.833676][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.841447][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.849982][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.858017][ T15] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.864829][ T15] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.872348][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.889781][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.897708][ T15] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.904520][ T15] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.912165][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.920389][ T15] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.927231][ T15] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.936629][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.944800][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.967845][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.975547][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.983421][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.998243][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.006296][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.014655][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.022673][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.030618][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.038673][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.062080][ T288] device veth0_vlan entered promiscuous mode [ 21.070597][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.070615][ T280] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 21.079602][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.106095][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.114042][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.122034][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.129883][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.151759][ T281] device veth0_vlan entered promiscuous mode [ 21.171032][ T288] device veth1_macvtap entered promiscuous mode [ 21.178455][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.196806][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.204949][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.213242][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.221229][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.229728][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.237925][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.259668][ T281] device veth1_macvtap entered promiscuous mode [ 21.268574][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.275823][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.283530][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.291710][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.300120][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.309200][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.317693][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.325051][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.335701][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.344382][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.352790][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.368889][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 21.377145][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.385015][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.391806][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.399801][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.408058][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.415933][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.422735][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.430149][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.447103][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.455553][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.464065][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.472377][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.496495][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.506147][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.514851][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.522810][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.547065][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.558352][ T325] ------------[ cut here ]------------ [ 21.565022][ T325] trace type BPF program uses run-time allocation [ 21.571705][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.571845][ T325] WARNING: CPU: 1 PID: 325 at kernel/bpf/verifier.c:10480 check_map_prog_compatibility+0x65b/0x7c0 [ 21.591890][ T325] Modules linked in: [ 21.600008][ T287] device veth0_vlan entered promiscuous mode [ 21.600305][ T325] CPU: 1 PID: 325 Comm: syz.3.4 Not tainted 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 21.617418][ T325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 21.620873][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.630568][ T325] RIP: 0010:check_map_prog_compatibility+0x65b/0x7c0 [ 21.638436][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.660593][ T287] device veth1_macvtap entered promiscuous mode [ 21.672771][ T325] Code: c8 e9 84 fe ff ff e8 44 f5 ee ff 31 db e9 85 fe ff ff e8 38 f5 ee ff c6 05 8e ef 64 05 01 48 c7 c7 e0 71 45 85 e8 55 7f c2 ff <0f> 0b e9 42 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 17 fa ff [ 21.692585][ T325] RSP: 0018:ffffc900039e6f90 EFLAGS: 00010246 [ 21.703397][ T325] RAX: e80d4ddaa7f82800 RBX: ffff88810b316000 RCX: ffff88810b8e0000 [ 21.704317][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.716841][ T325] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 21.720188][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.727179][ T325] RBP: ffffc900039e6fd0 R08: ffffffff81521de8 R09: ffffed103ee2a5f8 [ 21.734464][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.742380][ T325] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 21.757462][ T325] R13: 1ffff92000017604 R14: ffff88810c138000 R15: ffffc900000bb020 [ 21.765797][ T325] FS: 00007fc289a1d6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 21.775965][ T325] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 21.777002][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.782437][ T325] CR2: 0000000020003000 CR3: 00000001217a0000 CR4: 00000000003506a0 [ 21.790515][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.807008][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.808286][ T325] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 21.815286][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.831571][ T325] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 21.840318][ T325] Call Trace: [ 21.846376][ T325] ? show_regs+0x58/0x60 [ 21.879813][ T325] ? __warn+0x160/0x2f0 [ 21.905338][ T325] ? check_map_prog_compatibility+0x65b/0x7c0 [ 21.913259][ T325] ? report_bug+0x3d9/0x5b0 [ 21.918019][ T325] ? check_map_prog_compatibility+0x65b/0x7c0 [ 21.923937][ T325] ? handle_bug+0x41/0x70 [ 21.928970][ T325] ? exc_invalid_op+0x1b/0x50 [ 21.933545][ T325] ? asm_exc_invalid_op+0x12/0x20 [ 21.938796][ T325] ? wake_up_klogd+0xb8/0xf0 [ 21.943507][ T325] ? check_map_prog_compatibility+0x65b/0x7c0 [ 21.962766][ T325] ? __fdget+0x1bc/0x240 [ 21.967417][ T325] resolve_pseudo_ldimm64+0x586/0x1020 [ 21.972862][ T325] ? bpf_check+0xf2b0/0xf2b0 [ 21.978054][ T325] ? kvmalloc_node+0x82/0x130 [ 21.982629][ T325] bpf_check+0xaf21/0xf2b0 [ 21.988198][ T325] ? stack_depot_save+0xe/0x10 [ 22.076467][ C0] hrtimer: interrupt took 27383 ns [ 22.090987][ T325] ? __se_sys_bpf+0x9856/0x11cb0 [ 22.098436][ T325] ? sched_clock+0x3a/0x40 [ 22.102777][ T325] ? bpf_get_btf_vmlinux+0x60/0x60 [ 22.107882][ T325] ? __kernel_text_address+0x9b/0x110 [ 22.113135][ T325] ? unwind_get_return_address+0x4d/0x90 [ 22.119556][ T325] ? arch_stack_walk+0xf3/0x140 [ 22.129305][ T325] ? stack_trace_save+0x113/0x1c0 [ 22.134180][ T325] ? stack_trace_snprint+0xf0/0xf0 [ 22.139397][ T325] ? stack_trace_snprint+0xf0/0xf0 [ 22.144397][ T325] ? selinux_bpf_prog_alloc+0x51/0x140 [ 22.150612][ T325] ? selinux_bpf_prog_alloc+0x51/0x140 [ 22.156094][ T325] ? ____kasan_kmalloc+0xed/0x110 [ 22.163048][ T325] ? ____kasan_kmalloc+0xdb/0x110 [ 22.172527][ T325] ? __kasan_kmalloc+0x9/0x10 [ 22.224510][ T325] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 22.236064][ T325] ? selinux_bpf_prog_alloc+0x51/0x140 [ 22.273674][ T325] ? security_bpf_prog_alloc+0x62/0x90 [ 22.304258][ T325] ? __se_sys_bpf+0x9f8c/0x11cb0 [ 22.337583][ T325] ? __x64_sys_bpf+0x7b/0x90 [ 22.342020][ T325] ? do_syscall_64+0x34/0x70 [ 22.350386][ T325] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 22.356379][ T325] ? __kasan_kmalloc+0x9/0x10 [ 22.361268][ T325] __se_sys_bpf+0x107a2/0x11cb0 [ 22.365962][ T325] ? futex_wait+0x6a0/0x7c0 [ 22.370528][ T325] ? __x64_sys_bpf+0x90/0x90 [ 22.374975][ T325] ? do_futex+0x17b0/0x17b0 [ 22.379302][ T325] ? do_futex+0x139a/0x17b0 [ 22.383739][ T325] ? __kasan_check_write+0x14/0x20 [ 22.389268][ T325] ? put_vma+0x8f/0xb0 [ 22.393154][ T325] ? __handle_speculative_fault+0x102e/0x1ec0 [ 22.399408][ T325] ? futex_exit_release+0x1e0/0x1e0 [ 22.404428][ T325] ? finish_fault+0xaf0/0xaf0 [ 22.418784][ T382] cgroup: fork rejected by pids controller in /syz2 [ 22.426074][ T325] ? set_current_blocked+0x40/0x40 [ 22.431230][ T325] ? __se_sys_futex+0x355/0x470 [ 22.487957][ T325] ? fpu__clear_all+0x20/0x20 [ 22.553162][ T325] ? __kasan_check_read+0x11/0x20 [ 22.558336][ T325] __x64_sys_bpf+0x7b/0x90 [ 22.562563][ T325] do_syscall_64+0x34/0x70 [ 22.609653][ T325] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 22.626979][ T325] RIP: 0033:0x7fc28a7bcbd9 [ 22.632415][ T325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 22.655867][ T467] device syzkaller0 entered promiscuous mode [ 22.666538][ T325] RSP: 002b:00007fc289a1d048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 22.683179][ T325] RAX: ffffffffffffffda RBX: 00007fc28a94b038 RCX: 00007fc28a7bcbd9 [ 22.728585][ T325] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 22.754594][ T325] RBP: 00007fc28a82baa1 R08: 0000000000000000 R09: 0000000000000000 [ 22.769114][ T325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 22.799864][ T325] R13: 000000000000000b R14: 00007fc28a94b038 R15: 00007ffe93d19a58 [ 22.820031][ T325] ---[ end trace f23dd8333c510db2 ]--- [ 22.836700][ T493] device syzkaller0 entered promiscuous mode [ 22.934611][ T511] cgroup: syz.2.38 (511) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 23.003123][ T511] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 23.554985][ T590] tap0: tun_chr_ioctl cmd 1074025677 [ 23.561562][ T590] tap0: linktype set to 778 [ 23.620226][ T595] sock: sock_set_timeout: `syz.4.62' (pid 595) tries to set negative timeout [ 23.709272][ T600] device syzkaller0 entered promiscuous mode [ 24.736250][ T729] device pim6reg1 entered promiscuous mode [ 24.921255][ T24] kauditd_printk_skb: 43 callbacks suppressed [ 24.921264][ T24] audit: type=1400 audit(1720392504.240:119): avc: denied { relabelfrom } for pid=762 comm="syz.0.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 24.947132][ T24] audit: type=1400 audit(1720392504.240:120): avc: denied { relabelto } for pid=762 comm="syz.0.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 25.078780][ T24] audit: type=1400 audit(1720392504.400:121): avc: denied { create } for pid=792 comm="syz.4.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 25.579298][ T826] geneve1: tun_chr_ioctl cmd 1074025681 [ 26.062240][ T863] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.069931][ T863] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.077469][ T863] device bridge_slave_0 entered promiscuous mode [ 26.084784][ T863] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.091791][ T863] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.099232][ T863] device bridge_slave_1 entered promiscuous mode [ 26.201647][ T925] device veth1_macvtap left promiscuous mode [ 26.235532][ T863] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.242401][ T863] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.249482][ T863] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.256265][ T863] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.276341][ T709] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.284026][ T709] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.292167][ T709] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.317879][ T709] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.378440][ T709] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.385300][ T709] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.506970][ T709] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.546028][ T709] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.552925][ T709] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.567340][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.575126][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.613994][ T709] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.622188][ T709] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.635378][ T863] device veth0_vlan entered promiscuous mode [ 26.641967][ T708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.703203][ T708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.712171][ T709] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.719641][ T709] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.741417][ T948] device pim6reg1 entered promiscuous mode [ 26.752418][ T708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.760802][ T708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.771464][ T863] device veth1_macvtap entered promiscuous mode [ 26.780548][ T708] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.788337][ T708] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.798804][ T708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.811316][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.819579][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.079999][ T984] device syzkaller0 entered promiscuous mode [ 27.109583][ T982] device syzkaller0 entered promiscuous mode [ 27.308817][ T1003] cgroup: fork rejected by pids controller in /syz0 [ 27.402694][ T1010] device syzkaller0 entered promiscuous mode [ 27.442721][ T392] device bridge_slave_1 left promiscuous mode [ 27.449003][ T392] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.456887][ T392] device bridge_slave_0 left promiscuous mode [ 27.462897][ T392] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.470927][ T392] device veth1_macvtap left promiscuous mode [ 27.476998][ T392] device veth0_vlan left promiscuous mode [ 27.569677][ T1011] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.584585][ T1011] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.617208][ T1011] device bridge_slave_0 entered promiscuous mode [ 27.692389][ T1011] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.759227][ T1011] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.766425][ T1011] device bridge_slave_1 entered promiscuous mode [ 27.839815][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.867338][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.953868][ T24] audit: type=1400 audit(1720392507.270:122): avc: denied { create } for pid=1043 comm="syz.2.181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.973411][ T596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.076916][ T596] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.084908][ T596] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.091766][ T596] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.209427][ T596] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.226579][ T596] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.234546][ T596] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.241398][ T596] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.248672][ T596] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.256373][ T596] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.264454][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 28.382232][ T24] audit: type=1400 audit(1720392507.700:123): avc: denied { write } for pid=1123 comm="syz.4.186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.460936][ T24] audit: type=1400 audit(1720392507.700:124): avc: denied { setopt } for pid=1123 comm="syz.4.186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.494004][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.507033][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.522231][ T1011] device veth0_vlan entered promiscuous mode [ 28.528419][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.535870][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.612870][ T1148] device syzkaller0 entered promiscuous mode [ 28.621845][ T1011] device veth1_macvtap entered promiscuous mode [ 28.635249][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.651241][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.667852][ T1121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.677641][ T24] audit: type=1400 audit(1720392508.000:125): avc: denied { read } for pid=76 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 28.726939][ T24] audit: type=1400 audit(1720392508.050:126): avc: denied { mounton } for pid=1011 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=357 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 29.121212][ T24] audit: type=1400 audit(1720392508.440:127): avc: denied { create } for pid=1178 comm="syz.4.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 29.285304][ T1187] syz.4.203[1187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.285351][ T1187] syz.4.203[1187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.515462][ T1207] device pim6reg1 entered promiscuous mode [ 29.722458][ T24] audit: type=1400 audit(1720392509.040:128): avc: denied { ioctl } for pid=1222 comm="syz.0.213" path="socket:[17933]" dev="sockfs" ino=17933 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 29.815331][ T1223] device syzkaller0 entered promiscuous mode [ 30.030304][ T392] device bridge_slave_1 left promiscuous mode [ 30.036274][ T392] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.070827][ T392] device bridge_slave_0 left promiscuous mode [ 30.076885][ T392] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.084564][ T392] device veth1_macvtap left promiscuous mode [ 30.090907][ T392] device veth0_vlan left promiscuous mode [ 30.111201][ T24] audit: type=1400 audit(1720392509.430:129): avc: denied { write } for pid=1239 comm="syz.4.217" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.178824][ T24] audit: type=1400 audit(1720392509.470:130): avc: denied { read } for pid=1236 comm="syz.1.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.203458][ T1256] syz.1.220[1256] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.203519][ T1256] syz.1.220[1256] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.724579][ T1269] device syzkaller0 entered promiscuous mode [ 30.784237][ T24] audit: type=1400 audit(1720392510.100:131): avc: denied { create } for pid=1272 comm="syz.0.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 30.937883][ T1286] syz.2.232[1286] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.937927][ T1286] syz.2.232[1286] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.007961][ T1295] syz.2.232[1295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.034005][ T1295] syz.2.232[1295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.090389][ T1297] device syzkaller0 entered promiscuous mode [ 31.278651][ T1332] device pim6reg1 entered promiscuous mode [ 31.892710][ T1364] device syzkaller0 entered promiscuous mode [ 32.734262][ T1418] device syzkaller0 entered promiscuous mode [ 34.400365][ T1451] device syzkaller0 entered promiscuous mode [ 34.829533][ T1485] device syzkaller0 entered promiscuous mode [ 34.919914][ T24] audit: type=1400 audit(1720392514.240:132): avc: denied { create } for pid=1494 comm="syz.3.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 35.594427][ T24] audit: type=1400 audit(1720392514.910:133): avc: denied { ioctl } for pid=1570 comm="syz.0.308" path="net:[4026532360]" dev="nsfs" ino=4026532360 ioctlcmd=0x5828 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 35.667469][ T1577] syz.4.310[1577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.667513][ T1577] syz.4.310[1577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.668141][ T1576] syz.4.310[1576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.738590][ T1576] syz.4.310[1576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.677204][ T1635] device syzkaller0 entered promiscuous mode [ 36.752415][ T24] audit: type=1400 audit(1720392516.070:134): avc: denied { create } for pid=1641 comm="syz.2.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 36.899291][ T1667] device sit0 entered promiscuous mode [ 37.008646][ T1665] tun0: tun_chr_ioctl cmd 2148553947 [ 37.014309][ T1673] device syzkaller0 entered promiscuous mode [ 37.633587][ T1686] device pim6reg1 entered promiscuous mode [ 37.791608][ T24] audit: type=1400 audit(1720392517.110:135): avc: denied { create } for pid=1705 comm="syz.0.348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 38.137289][ T1730] device pim6reg1 entered promiscuous mode [ 38.424337][ T1736] device syzkaller0 entered promiscuous mode [ 38.936956][ T1824] device syzkaller0 entered promiscuous mode [ 39.269673][ T1854] device veth1_macvtap left promiscuous mode [ 39.286509][ T1854] device macsec0 entered promiscuous mode [ 39.315845][ T1854] device veth1_macvtap entered promiscuous mode [ 39.463641][ T1872] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 39.818712][ T24] audit: type=1400 audit(1720392519.130:136): avc: denied { create } for pid=1912 comm="syz.3.402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 39.930324][ T1932] device syzkaller0 entered promiscuous mode [ 40.097135][ T1962] device syzkaller0 entered promiscuous mode [ 40.592922][ T2001] : renamed from vlan0 [ 41.093612][ T2066] device pim6reg1 entered promiscuous mode [ 41.493466][ T2094] device pim6reg1 entered promiscuous mode [ 41.631682][ T24] audit: type=1400 audit(1720392520.950:137): avc: denied { create } for pid=2104 comm="syz.3.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 41.856873][ T24] audit: type=1400 audit(1720392521.180:138): avc: denied { create } for pid=2125 comm="syz.2.465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 41.899222][ T2140] device pim6reg1 entered promiscuous mode [ 41.928131][ T2147] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.939013][ T2147] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.945901][ T2147] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.974257][ T2147] device syzkaller0 entered promiscuous mode [ 41.986207][ T2158] device pim6reg1 entered promiscuous mode [ 42.059948][ T24] audit: type=1400 audit(1720392521.380:139): avc: denied { create } for pid=2163 comm="syz.1.475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 42.382193][ T24] audit: type=1400 audit(1720392521.700:140): avc: denied { create } for pid=2216 comm="syz.2.496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 42.430524][ T24] audit: type=1400 audit(1720392521.750:141): avc: denied { tracepoint } for pid=2219 comm="syz.0.497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 42.602840][ T2254] syz.4.505[2254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.602888][ T2254] syz.4.505[2254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.552848][ T2327] device pim6reg1 entered promiscuous mode [ 44.488445][ T2376] device syzkaller0 entered promiscuous mode [ 44.784094][ T2404] device pim6reg1 entered promiscuous mode [ 45.649511][ T2427] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.656505][ T2427] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.666811][ T2427] device bridge_slave_0 entered promiscuous mode [ 45.673685][ T2427] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.680659][ T2427] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.694101][ T2427] device bridge_slave_1 entered promiscuous mode [ 45.877410][ T2427] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.884310][ T2427] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.891412][ T2427] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.898258][ T2427] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.007545][ T1082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.051544][ T1082] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.102770][ T1082] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.188927][ T2476] device pim6reg1 entered promiscuous mode [ 46.244968][ T1085] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.261437][ T1085] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.268370][ T1085] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.277960][ T1085] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.287592][ T1085] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.294484][ T1085] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.311975][ T1082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 46.332818][ T1082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.398947][ T1085] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 46.409195][ T1085] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.467546][ T1085] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 46.506803][ T1085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.537242][ T2427] device veth0_vlan entered promiscuous mode [ 46.621994][ T1082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 46.644270][ T1082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.673247][ T1082] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.688133][ T1082] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.735468][ T2427] device veth1_macvtap entered promiscuous mode [ 46.856277][ T2378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 46.865189][ T2378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.916778][ T2378] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 46.924744][ T392] device bridge_slave_1 left promiscuous mode [ 46.934395][ T392] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.957521][ T392] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.191772][ T676] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 47.206770][ T676] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.235214][ T676] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 47.265504][ T676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.438417][ T2509] device pim6reg1 entered promiscuous mode [ 48.400501][ T2568] syz.1.586[2568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.400555][ T2568] syz.1.586[2568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.522913][ T2582] device macsec0 entered promiscuous mode [ 48.958495][ T24] audit: type=1400 audit(1720392528.260:142): avc: denied { create } for pid=2594 comm="syz.1.596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 49.544671][ T24] audit: type=1400 audit(1720392528.860:143): avc: denied { create } for pid=2629 comm="syz.4.605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 49.726491][ T24] audit: type=1400 audit(1720392529.040:144): avc: denied { create } for pid=2646 comm="syz.3.610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 50.052985][ T2669] device sit0 entered promiscuous mode [ 50.115217][ T2677] syz.0.615[2677] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.115268][ T2677] syz.0.615[2677] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.390268][ T2717] device pim6reg1 entered promiscuous mode [ 50.811361][ T2742] device syzkaller0 entered promiscuous mode [ 51.021863][ T2793] device pim6reg1 entered promiscuous mode [ 51.053893][ T2799] device pim6reg1 entered promiscuous mode [ 51.102991][ T2803] device syzkaller0 entered promiscuous mode [ 51.120797][ T2805] bridge_slave_0: mtu greater than device maximum [ 51.237593][ T2827] device veth0_to_bond entered promiscuous mode [ 51.249745][ T2827] device macsec0 entered promiscuous mode [ 51.265605][ T2831] device pim6reg1 entered promiscuous mode [ 51.271321][ T24] audit: type=1400 audit(1720392530.580:145): avc: denied { create } for pid=2832 comm="syz.1.666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 51.570156][ T2852] device wg2 entered promiscuous mode [ 51.800250][ T2869] device pim6reg1 entered promiscuous mode [ 52.665649][ T2973] syz.3.709[2973] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.665698][ T2973] syz.3.709[2973] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.791883][ T2987] device syzkaller0 entered promiscuous mode [ 52.816760][ T2989] device pim6reg1 entered promiscuous mode [ 52.900398][ T2997] device pim6reg1 entered promiscuous mode [ 52.990216][ T3016] device sit0 entered promiscuous mode [ 53.194601][ T3049] device syzkaller0 entered promiscuous mode [ 54.022291][ T3187] device veth0_vlan left promiscuous mode [ 54.111173][ T3187] device veth0_vlan entered promiscuous mode [ 54.206834][ T3199] device wg2 left promiscuous mode [ 55.104533][ T3279] device syzkaller0 entered promiscuous mode [ 55.913042][ T3373] device pim6reg1 entered promiscuous mode [ 56.197768][ T3391] device syzkaller0 entered promiscuous mode [ 56.340958][ T3416] syz.4.833[3416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.341010][ T3416] syz.4.833[3416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.484854][ T3435] device syzkaller0 entered promiscuous mode [ 56.543604][ T3435] device syzkaller0 left promiscuous mode [ 56.667983][ T3469] bridge0: port 3(veth0_vlan) entered blocking state [ 56.675115][ T3469] bridge0: port 3(veth0_vlan) entered disabled state [ 56.682500][ T3469] bridge0: port 3(veth0_vlan) entered blocking state [ 56.689034][ T3469] bridge0: port 3(veth0_vlan) entered forwarding state [ 56.696863][ T3468] bridge0: port 3(veth0_to_batadv) entered blocking state [ 56.737918][ T3468] bridge0: port 3(veth0_to_batadv) entered disabled state [ 56.785012][ T3468] device veth0_to_batadv entered promiscuous mode [ 56.842143][ T3468] bridge0: port 3(veth0_to_batadv) entered blocking state [ 56.849123][ T3468] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 57.194557][ T3480] device syzkaller0 entered promiscuous mode [ 58.209111][ T3575] bridge0: port 3(veth0_vlan) entered disabled state [ 58.266914][ T24] audit: type=1400 audit(1720392537.590:146): avc: denied { create } for pid=3585 comm="syz.3.882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 58.844251][ T3606] syz.2.891[3606] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.844295][ T3606] syz.2.891[3606] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.848849][ T3604] device syzkaller0 entered promiscuous mode [ 59.066638][ T3623] device pim6reg1 entered promiscuous mode [ 59.134106][ T3610] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.141176][ T3610] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.148456][ T3610] device bridge_slave_0 entered promiscuous mode [ 59.162484][ T3610] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.173310][ T3610] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.187105][ T3610] device bridge_slave_1 entered promiscuous mode [ 59.250992][ T3610] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.257959][ T3610] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.265026][ T3610] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.271936][ T3610] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.347810][ T1088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.355485][ T1088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.367075][ T1088] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.438714][ T1088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.556683][ T1088] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.563532][ T1088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.673810][ T1088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.745624][ T1088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.821738][ T3610] device veth0_vlan entered promiscuous mode [ 59.838814][ T3610] device veth1_macvtap entered promiscuous mode [ 60.045283][ T1093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 60.088998][ T1093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 60.100998][ T1093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 60.108522][ T1093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 60.115926][ T1093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 60.156553][ T1089] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 60.164765][ T1089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 60.175321][ T1089] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 60.183404][ T1089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 60.221242][ T3671] device syzkaller0 entered promiscuous mode [ 60.452166][ T3691] device syzkaller0 entered promiscuous mode [ 60.472082][ T3695] device pim6reg1 entered promiscuous mode [ 60.575823][ T3726] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.582851][ T3726] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.189356][ T3792] device syzkaller0 entered promiscuous mode [ 62.210249][ T3791] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 62.219369][ T3791] device syzkaller0 entered promiscuous mode [ 62.388459][ T3798] device syzkaller0 entered promiscuous mode [ 63.097838][ T392] device veth0_to_batadv left promiscuous mode [ 63.106779][ T392] bridge0: port 3(veth0_to_batadv) entered disabled state [ 63.127547][ T392] device bridge_slave_1 left promiscuous mode [ 63.133895][ T392] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.141639][ T392] device bridge_slave_0 left promiscuous mode [ 63.148048][ T392] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.156036][ T392] device veth1_macvtap left promiscuous mode [ 63.952825][ T3862] device pim6reg1 entered promiscuous mode [ 66.092720][ T24] audit: type=1400 audit(1720392545.410:147): avc: denied { create } for pid=3913 comm="syz.4.973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 67.208654][ T3959] tun0: tun_chr_ioctl cmd 1074025676 [ 67.213774][ T3959] tun0: owner set to 0 [ 67.252606][ T3954] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.259897][ T3954] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.267461][ T3954] device bridge_slave_0 entered promiscuous mode [ 67.274292][ T3954] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.289221][ T3954] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.301131][ T3954] device bridge_slave_1 entered promiscuous mode [ 67.830535][ T3982] device pim6reg1 entered promiscuous mode [ 68.656722][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.664080][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.691605][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.700220][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.708499][ T15] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.715320][ T15] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.722926][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.731242][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.739377][ T15] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.746409][ T15] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.753628][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 68.761629][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.800566][ T3954] device veth0_vlan entered promiscuous mode [ 68.813199][ T3954] device veth1_macvtap entered promiscuous mode [ 68.821092][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.828605][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 68.836758][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.844801][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 68.853725][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 68.863109][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 68.871110][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.879159][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 68.887402][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 68.895397][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 68.917861][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 68.925202][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 68.932465][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 68.940916][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 68.949264][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 68.957884][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 69.175726][ T4016] device pim6reg1 entered promiscuous mode [ 69.371594][ T392] device bridge_slave_1 left promiscuous mode [ 69.386613][ T392] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.407531][ T392] device bridge_slave_0 left promiscuous mode [ 69.416052][ T392] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.471156][ T392] device veth1_macvtap left promiscuous mode [ 69.537848][ T392] device veth0_vlan left promiscuous mode [ 69.971410][ T4151] device sit0 entered promiscuous mode [ 70.253880][ T670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 70.263384][ T670] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 70.272025][ T670] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 70.301245][ T4198] geneve1: tun_chr_ioctl cmd 1074025698 [ 70.424847][ T4226] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.431854][ T4226] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.467070][ T4226] device bridge_slave_1 left promiscuous mode [ 70.473139][ T4226] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.491268][ T4226] device bridge_slave_0 left promiscuous mode [ 70.497500][ T4226] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.690208][ T4261] bridge0: port 3(veth0_to_batadv) entered blocking state [ 70.697505][ T4261] bridge0: port 3(veth0_to_batadv) entered disabled state [ 70.723400][ T4261] device veth0_to_batadv entered promiscuous mode [ 70.749177][ T4261] bridge0: port 3(veth0_to_batadv) entered blocking state [ 70.756147][ T4261] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 70.876196][ T4279] device syzkaller0 entered promiscuous mode [ 71.211859][ T4340] syz.3.1085[4340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.211917][ T4340] syz.3.1085[4340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.219826][ T4339] syz.3.1085[4339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.252516][ T4339] syz.3.1085[4339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.953167][ T4385] syz.2.1098[4385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.970497][ T24] audit: type=1400 audit(1720392551.290:148): avc: denied { create } for pid=4384 comm="syz.0.1099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 72.013722][ T4385] syz.2.1098[4385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.212468][ T4407] bridge0: port 3(veth0_to_batadv) entered blocking state [ 72.255746][ T4407] bridge0: port 3(veth0_to_batadv) entered disabled state [ 72.273648][ T4407] device veth0_to_batadv entered promiscuous mode [ 72.288837][ T4407] bridge0: port 3(veth0_to_batadv) entered blocking state [ 72.295864][ T4407] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 72.432680][ T4409] device syzkaller0 entered promiscuous mode [ 72.599017][ T24] audit: type=1400 audit(1720392551.920:149): avc: denied { create } for pid=4421 comm="syz.1.1112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 73.048099][ T4444] device pim6reg1 entered promiscuous mode [ 73.104519][ T4446] device syzkaller0 entered promiscuous mode [ 73.165998][ T4450] device veth0_to_team entered promiscuous mode [ 73.392989][ T4470] device pim6reg1 entered promiscuous mode [ 73.482025][ T4480] syz.3.1132[4480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.482077][ T4480] syz.3.1132[4480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.443315][ T4570] syz.4.1157[4570] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.497241][ T4571] syz.4.1157[4571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.513382][ T4559] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 75.256539][ T4629] device veth0_vlan left promiscuous mode [ 75.368943][ T4629] device veth0_vlan entered promiscuous mode [ 76.136311][ T4672] device syzkaller0 entered promiscuous mode [ 76.890654][ T4722] device syzkaller0 entered promiscuous mode [ 77.642346][ T4786] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 77.772765][ T4786] pim6reg0: linktype set to 769 [ 77.809125][ T4797] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 77.814819][ T4797] pim6reg0: linktype set to 769 [ 78.034576][ T24] audit: type=1400 audit(1720392557.350:150): avc: denied { create } for pid=4843 comm="syz.2.1230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 78.249316][ T4877] device syzkaller0 entered promiscuous mode [ 79.071375][ T4929] device syzkaller0 entered promiscuous mode [ 79.230937][ T4940] device pim6reg1 entered promiscuous mode [ 79.338937][ T4948] device pim6reg1 entered promiscuous mode [ 79.405319][ T4946] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.413022][ T4946] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.420500][ T4946] device bridge_slave_0 entered promiscuous mode [ 79.458208][ T4946] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.465128][ T4946] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.473447][ T4946] device bridge_slave_1 entered promiscuous mode [ 79.720881][ T4946] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.727753][ T4946] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.734835][ T4946] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.741665][ T4946] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.807664][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.815584][ T1120] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.829769][ T1120] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.856910][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 79.865369][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 79.873528][ T1120] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.880416][ T1120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.888339][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 79.897573][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 79.906145][ T1120] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.913023][ T1120] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.944958][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 79.953132][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.961609][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 79.969721][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.977652][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 79.985705][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 79.993968][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 80.001724][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 80.009725][ T5051] syz.3.1289[5051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.009761][ T5051] syz.3.1289[5051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.027135][ T4946] device veth0_vlan entered promiscuous mode [ 80.047886][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 80.055119][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 80.071627][ T4946] device veth1_macvtap entered promiscuous mode [ 80.081540][ T1092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 80.092218][ T1092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 80.100634][ T1092] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 80.168061][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 80.227392][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 80.317284][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 80.340001][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 80.953047][ T5093] device pim6reg1 entered promiscuous mode [ 81.332423][ T5150] syz.0.1318[5150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.332478][ T5150] syz.0.1318[5150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.367815][ T5150] syz.0.1318[5150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.392542][ T5150] syz.0.1318[5150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.441957][ T5158] device syzkaller0 entered promiscuous mode [ 81.468783][ T5162] device pim6reg1 entered promiscuous mode [ 81.778907][ T7] device bridge_slave_1 left promiscuous mode [ 81.784861][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.828603][ T7] device bridge_slave_0 left promiscuous mode [ 81.868380][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.902516][ T7] device veth1_macvtap left promiscuous mode [ 81.940804][ T7] device veth0_vlan left promiscuous mode [ 82.266770][ T5234] device syzkaller0 entered promiscuous mode [ 82.539242][ T5264] tap0: tun_chr_ioctl cmd 1074025675 [ 82.584641][ T5264] tap0: persist enabled [ 82.599017][ T5267] tap0: tun_chr_ioctl cmd 1074025675 [ 82.605084][ T5267] tap0: persist enabled [ 82.709761][ T5289] device pim6reg1 entered promiscuous mode [ 82.875418][ T5313] tap0: tun_chr_ioctl cmd 1074025675 [ 82.891658][ T5313] tap0: persist enabled [ 82.902595][ T5313] tap0: tun_chr_ioctl cmd 1074025675 [ 82.908014][ T5313] tap0: persist enabled [ 83.061921][ T5336] device syzkaller0 entered promiscuous mode [ 83.147512][ T5348] device syzkaller0 entered promiscuous mode [ 83.181822][ T5356] tap1: tun_chr_ioctl cmd 1074025675 [ 83.187428][ T5356] tap1: persist enabled [ 83.199622][ T5356] tap1: tun_chr_ioctl cmd 1074025675 [ 83.204948][ T5356] tap1: persist enabled [ 84.129217][ T5407] device veth1_macvtap left promiscuous mode [ 84.240537][ T5412] tap0: tun_chr_ioctl cmd 1074025675 [ 84.246302][ T5412] tap0: persist enabled [ 84.297006][ T5412] tap0: tun_chr_ioctl cmd 1074025675 [ 84.302507][ T5412] tap0: persist enabled [ 84.489491][ T5462] device pim6reg1 entered promiscuous mode [ 84.871060][ T5502] syz.3.1422[5502] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.871114][ T5502] syz.3.1422[5502] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.368343][ T5550] device syzkaller0 entered promiscuous mode [ 85.747015][ T5570] device syzkaller0 entered promiscuous mode [ 87.948249][ T5808] device veth0_vlan left promiscuous mode [ 88.078947][ T5808] device veth0_vlan entered promiscuous mode [ 88.330175][ T5818] device wg2 entered promiscuous mode [ 88.343752][ T24] audit: type=1400 audit(1720392567.660:151): avc: denied { create } for pid=5822 comm="syz.3.1516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 88.496783][ T5835] device pim6reg1 entered promiscuous mode [ 88.749784][ T5881] geneve1: tun_chr_ioctl cmd 19271 [ 88.845549][ T5891] device syzkaller0 entered promiscuous mode [ 89.068408][ T24] audit: type=1400 audit(1720392568.390:152): avc: denied { create } for pid=5919 comm="syz.3.1545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 89.121858][ T5924] device syzkaller0 entered promiscuous mode [ 89.279768][ T5933] device pim6reg1 entered promiscuous mode [ 89.807751][ T6048] device syzkaller0 entered promiscuous mode [ 90.147472][ T6050] device pim6reg1 entered promiscuous mode [ 90.222636][ T6069] syz.2.1584[6069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.222879][ T6069] syz.2.1584[6069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.267750][ T6069] syz.2.1584[6069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.294524][ T6069] syz.2.1584[6069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.397057][ T6069] syz.2.1584[6069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.497210][ T6069] syz.2.1584[6069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.774867][ T6069] syz.2.1584[6069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.824414][ T6116] device pim6reg1 entered promiscuous mode [ 91.442600][ T6155] device syzkaller0 entered promiscuous mode [ 92.092751][ T6226] device syzkaller0 entered promiscuous mode [ 92.223442][ T6247] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 92.266603][ T6247] pim6reg0: linktype set to 773 [ 92.321860][ T6257] device syzkaller0 entered promiscuous mode [ 93.379214][ T6325] device veth1_macvtap left promiscuous mode [ 93.615942][ T6325] device veth1_macvtap entered promiscuous mode [ 93.656541][ T6325] device macsec0 entered promiscuous mode [ 94.066039][ T6376] device vxcan1 entered promiscuous mode [ 94.207445][ T6392] device veth0_vlan left promiscuous mode [ 94.216293][ T6392] device veth0_vlan entered promiscuous mode [ 94.248916][ T1089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.259226][ T1089] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 94.284296][ T1089] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 94.303193][ T24] audit: type=1400 audit(1720392573.620:153): avc: denied { create } for pid=6409 comm="syz.4.1679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 94.338279][ T6413] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 94.347347][ T6413] device syzkaller0 entered promiscuous mode [ 94.402944][ T6419] device pim6reg1 entered promiscuous mode [ 94.628362][ T6455] syz.1.1693[6455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.628412][ T6455] syz.1.1693[6455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.081974][ T6501] device syzkaller0 entered promiscuous mode [ 95.114037][ T24] audit: type=1400 audit(1720392574.430:154): avc: denied { remove_name } for pid=76 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 95.205420][ T24] audit: type=1400 audit(1720392574.430:155): avc: denied { rename } for pid=76 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 95.376053][ T6533] device veth0_vlan left promiscuous mode [ 95.382018][ T6533] device veth0_vlan entered promiscuous mode [ 95.390299][ T1068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 95.400473][ T1068] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 95.418671][ T1068] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 95.461474][ T6541] device pim6reg1 entered promiscuous mode [ 95.506643][ T6545] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 95.512423][ T6545] pim6reg0: linktype set to 769 [ 95.522671][ T6546] device sit0 left promiscuous mode [ 95.553801][ T6546] device sit0 entered promiscuous mode [ 95.823027][ T6562] geneve1: tun_chr_ioctl cmd 1074025672 [ 95.830935][ T6562] geneve1: ignored: set checksum enabled [ 96.091697][ T6595] device syzkaller0 entered promiscuous mode [ 96.973148][ T6655] device syzkaller0 entered promiscuous mode [ 97.060554][ T6683] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.070829][ T6686] device sit0 left promiscuous mode [ 97.082558][ T6683] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.089453][ T6683] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.100307][ T6686] device sit0 entered promiscuous mode [ 98.119753][ T6817] device pim6reg1 entered promiscuous mode [ 98.529570][ T6826] syz.2.1809[6826] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.529611][ T6826] syz.2.1809[6826] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.677076][ T6828] device syzkaller0 entered promiscuous mode [ 98.740267][ T6839] device syzkaller0 entered promiscuous mode [ 98.783847][ T6843] bridge0: port 3(veth0_to_batadv) entered disabled state [ 98.790878][ T6843] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.797856][ T6843] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.861850][ T6843] bridge0: port 3(veth0_to_batadv) entered blocking state [ 98.868849][ T6843] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 98.876028][ T6843] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.882910][ T6843] bridge0: port 2(bridge_slave_1) entered forwarding state [ 98.890000][ T6843] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.896778][ T6843] bridge0: port 1(bridge_slave_0) entered forwarding state [ 98.906561][ T6843] device bridge0 entered promiscuous mode [ 99.868131][ T6958] device pim6reg1 entered promiscuous mode [ 99.907041][ T6962] syz.3.1852[6962] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.907088][ T6962] syz.3.1852[6962] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.930768][ T6962] syz.3.1852[6962] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.951366][ T6962] syz.3.1852[6962] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.097302][ T6993] ip6_tunnel: non-ECT from db5b:6861:58bb:cfc8:875a:6596:9ff5:7b00 with DS=0x31 [ 100.098174][ T6974] device syzkaller0 entered promiscuous mode [ 100.229385][ T6994] device syzkaller0 entered promiscuous mode [ 100.481459][ T24] audit: type=1400 audit(1720392579.800:156): avc: denied { write } for pid=7096 comm="syz.2.1872" name="net" dev="proc" ino=35284 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 100.606515][ T24] audit: type=1400 audit(1720392579.800:157): avc: denied { add_name } for pid=7096 comm="syz.2.1872" name="cgroup.freeze" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 100.832330][ T24] audit: type=1400 audit(1720392579.840:158): avc: denied { create } for pid=7096 comm="syz.2.1872" name="cgroup.freeze" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 100.877916][ T24] audit: type=1400 audit(1720392579.840:159): avc: denied { associate } for pid=7096 comm="syz.2.1872" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 100.905366][ T24] audit: type=1400 audit(1720392580.170:160): avc: denied { append } for pid=76 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 100.927337][ T24] audit: type=1400 audit(1720392580.170:161): avc: denied { open } for pid=76 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 101.011895][ T24] audit: type=1400 audit(1720392580.170:162): avc: denied { getattr } for pid=76 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 101.170134][ T24] audit: type=1400 audit(1720392580.490:163): avc: denied { create } for pid=7144 comm="syz.0.1886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 101.181171][ T7145] syz.4.1885[7145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.190735][ T7145] syz.4.1885[7145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.267664][ T7145] syz.4.1885[7145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.286812][ T7145] syz.4.1885[7145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.394307][ T7162] device syzkaller0 entered promiscuous mode [ 101.748426][ T7196] device syzkaller0 entered promiscuous mode [ 101.988241][ T24] audit: type=1400 audit(1720392581.310:164): avc: denied { create } for pid=7234 comm="syz.4.1913" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 102.035711][ T7267] device syzkaller0 entered promiscuous mode [ 102.237118][ T7297] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 103.510266][ T7388] device pim6reg1 entered promiscuous mode [ 103.765810][ T7402] device vxcan1 entered promiscuous mode [ 103.852449][ T24] audit: type=1400 audit(1720392583.170:165): avc: denied { create } for pid=7412 comm="syz.4.1958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 104.090501][ T7445] bpf_get_probe_write_proto: 8 callbacks suppressed [ 104.090510][ T7445] syz.4.1967[7445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.176892][ T7445] syz.4.1967[7445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.612479][ T7560] device syzkaller0 entered promiscuous mode [ 105.661379][ T7564] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 105.670273][ T7564] device syzkaller0 entered promiscuous mode [ 106.610363][ T7633] syz.2.2016[7633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.610412][ T7633] syz.2.2016[7633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.611744][ T7606] : renamed from vlan0 [ 106.641326][ T7631] device vlan1 entered promiscuous mode [ 106.866067][ T7699] device veth1_macvtap entered promiscuous mode [ 106.872893][ T7699] device macsec0 entered promiscuous mode [ 106.879324][ T1093] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 107.004451][ T7715] device veth0_vlan left promiscuous mode [ 107.020395][ T7715] device veth0_vlan entered promiscuous mode [ 107.049612][ T7720] device vxcan1 entered promiscuous mode [ 107.654246][ T7769] device syzkaller0 entered promiscuous mode [ 108.037555][ T7788] syz.1.2061[7788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.037605][ T7788] syz.1.2061[7788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.065262][ T7788] syz.1.2061[7788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.084106][ T7788] syz.1.2061[7788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.141701][ T7788] syz.1.2061[7788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.159708][ T7788] syz.1.2061[7788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.210097][ T7811] device syzkaller0 entered promiscuous mode [ 108.270901][ T7815] device syzkaller0 entered promiscuous mode [ 109.601917][ T7897] bpf_get_probe_write_proto: 33 callbacks suppressed [ 109.601926][ T7897] syz.0.2093[7897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.625913][ T7897] syz.0.2093[7897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.788370][ T7898] device pim6reg1 entered promiscuous mode [ 110.192212][ T7938] syz.2.2108[7938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.192291][ T7938] syz.2.2108[7938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.262115][ T7948] syz.0.2110[7948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.277067][ T7948] syz.0.2110[7948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.432763][ T8001] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.451028][ T8001] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.458249][ T8001] device bridge_slave_0 entered promiscuous mode [ 111.464948][ T8001] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.472043][ T8001] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.479427][ T8001] device bridge_slave_1 entered promiscuous mode [ 111.554281][ T8001] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.561167][ T8001] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.568249][ T8001] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.575013][ T8001] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.796518][ T700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.812156][ T700] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.820194][ T700] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.838355][ T679] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.846496][ T679] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.853358][ T679] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.871264][ T679] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 111.879620][ T679] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.886470][ T679] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.908877][ T1091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 111.918936][ T1091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 111.937889][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 111.945737][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 111.953750][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 111.963866][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 111.973937][ T8001] device veth0_vlan entered promiscuous mode [ 111.980511][ T679] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 111.988453][ T679] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.010652][ T8001] device veth1_macvtap entered promiscuous mode [ 112.025427][ T2373] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 112.035290][ T2373] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.043245][ T2373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 112.054449][ T8037] syz.3.2132[8037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.054493][ T8037] syz.3.2132[8037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.066588][ T2373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 112.105477][ T2373] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 112.135210][ T679] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 112.144657][ T679] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 112.184864][ T679] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 112.193136][ T679] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 112.201086][ T24] audit: type=1400 audit(1720392591.510:166): avc: denied { append } for pid=8043 comm="syz.3.2133" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 112.475680][ T8062] : renamed from vlan0 [ 112.824786][ T392] device veth1_macvtap left promiscuous mode [ 112.831793][ T392] device veth0_vlan left promiscuous mode [ 113.141065][ T8119] device vxcan1 entered promiscuous mode [ 113.317179][ T8147] device syzkaller0 entered promiscuous mode [ 113.586033][ T8196] device syzkaller0 entered promiscuous mode [ 113.696372][ T8221] lo: mtu less than device minimum [ 114.835683][ T8300] gretap0: refused to change device tx_queue_len [ 114.861612][ T8304] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.868490][ T8304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.877004][ T8304] device bridge0 entered promiscuous mode [ 115.013845][ T8343] device pim6reg1 entered promiscuous mode [ 115.086920][ T699] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 115.303835][ T8421] bridge0: port 3(ip6gretap0) entered blocking state [ 115.310796][ T8421] bridge0: port 3(ip6gretap0) entered disabled state [ 115.319219][ T8421] device ip6gretap0 entered promiscuous mode [ 115.330425][ T8421] bridge0: port 3(ip6gretap0) entered blocking state [ 115.336993][ T8421] bridge0: port 3(ip6gretap0) entered forwarding state [ 115.407811][ T8437] device syzkaller0 entered promiscuous mode [ 115.514534][ T8465] device veth0_vlan left promiscuous mode [ 115.524371][ T8465] device veth0_vlan entered promiscuous mode [ 115.725310][ T8514] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.732397][ T8514] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.884175][ T8534] device syzkaller0 entered promiscuous mode [ 116.980244][ T8634] device syzkaller0 entered promiscuous mode [ 117.047730][ T8638] syz.2.2302[8638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.047762][ T8638] syz.2.2302[8638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.137088][ T8751] device syzkaller0 entered promiscuous mode [ 118.169324][ T8771] bridge_slave_0: mtu greater than device maximum [ 118.184354][ T8773] device syzkaller0 entered promiscuous mode [ 118.288357][ T8792] device pim6reg1 entered promiscuous mode [ 119.004265][ T8858] device pim6reg1 entered promiscuous mode [ 119.175751][ T8863] device veth1_macvtap left promiscuous mode [ 119.181722][ T8863] device macsec0 left promiscuous mode [ 120.130199][ T8936] device sit0 entered promiscuous mode [ 120.148514][ T8938] veth0_vlan: mtu less than device minimum [ 120.212249][ T24] audit: type=1400 audit(1720392599.530:167): avc: denied { create } for pid=8957 comm="syz.4.2392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 120.249673][ T8960] device syzkaller0 entered promiscuous mode [ 120.453565][ T8988] syz.3.2402[8988] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.990575][ T9001] device syzkaller0 entered promiscuous mode [ 122.054664][ T9056] device pim6reg1 entered promiscuous mode [ 122.069374][ T9053] device pim6reg1 entered promiscuous mode [ 122.306135][ T9051] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.314637][ T9051] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.322875][ T9051] device bridge_slave_0 entered promiscuous mode [ 122.612477][ T9051] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.623124][ T9051] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.630555][ T9051] device bridge_slave_1 entered promiscuous mode [ 122.956684][ T9087] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 122.963025][ T9087] syzkaller0: linktype set to 65535 [ 122.983896][ T9081] device wg2 entered promiscuous mode [ 123.044114][ T9093] syz.1.2437[9093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.044164][ T9093] syz.1.2437[9093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.287128][ T9102] device pim6reg1 entered promiscuous mode [ 123.326985][ T1097] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 123.334855][ T1097] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 123.345029][ T1097] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 123.353651][ T1097] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 123.362470][ T1097] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 123.370836][ T1097] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 123.381376][ T1097] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.388253][ T1097] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.395703][ T1097] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 123.403927][ T1097] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 123.412231][ T1097] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.419108][ T1097] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.428477][ T1082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 123.664370][ T9051] device veth0_vlan entered promiscuous mode [ 123.671540][ T700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 123.680040][ T700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 123.688347][ T700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 123.696133][ T700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 123.721555][ T9051] device veth1_macvtap entered promiscuous mode [ 123.735938][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 123.743310][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 123.750592][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 123.758933][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 123.767523][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 123.782539][ T700] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 123.790878][ T700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 123.809369][ T699] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 123.820651][ T699] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 124.549710][ T9162] syz.1.2456[9162] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.718354][ T392] bridge0: port 3(veth0_vlan) entered disabled state [ 124.747273][ T392] device bridge_slave_1 left promiscuous mode [ 124.753234][ T392] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.816314][ T392] device bridge_slave_0 left promiscuous mode [ 124.824596][ T392] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.093121][ T9181] device veth0_vlan left promiscuous mode [ 125.099174][ T9181] device veth0_vlan entered promiscuous mode [ 125.155741][ T1097] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.185958][ T1097] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 125.232740][ T1097] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 126.783913][ T9259] device syzkaller0 entered promiscuous mode [ 127.188652][ T9293] bridge0: port 3(veth0_to_batadv) entered disabled state [ 127.195671][ T9293] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.202515][ T9293] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.209422][ T9293] device bridge0 left promiscuous mode [ 127.293217][ T9320] device pim6reg1 entered promiscuous mode [ 127.314282][ T9322] device syzkaller0 entered promiscuous mode [ 128.105493][ T9405] geneve1: tun_chr_ioctl cmd 1074025673 [ 130.543802][ T9499] device wg2 left promiscuous mode [ 131.211912][ T9562] device wg2 entered promiscuous mode [ 131.685246][ T9589] device syzkaller0 entered promiscuous mode [ 131.720420][ T9593] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.729118][ T9593] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.735982][ T9593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.802564][ T9603] IPv6: : Disabled Multicast RS [ 132.772866][ T9677] device pim6reg1 entered promiscuous mode [ 132.950471][ T9695] device syzkaller0 entered promiscuous mode [ 133.722876][ T9713] bridge_slave_0: mtu greater than device maximum [ 133.754295][ T24] audit: type=1400 audit(1720392613.070:168): avc: denied { setattr } for pid=9719 comm="syz.3.2621" path="/dev/ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 133.897848][ T9757] tap0: tun_chr_ioctl cmd 1074025677 [ 133.903041][ T9757] tap0: linktype set to 776 [ 133.916882][ T9757] bridge0: port 4(veth0_vlan) entered blocking state [ 133.923692][ T9757] bridge0: port 4(veth0_vlan) entered disabled state [ 134.092955][ T9793] device syzkaller0 entered promiscuous mode [ 134.274610][ T9852] device syzkaller0 entered promiscuous mode [ 134.386084][ T9859] device syzkaller0 entered promiscuous mode [ 134.739114][ T9866] device macsec0 entered promiscuous mode [ 135.374669][ T9941] device syzkaller0 entered promiscuous mode [ 136.976433][T10020] device syzkaller0 entered promiscuous mode [ 137.157313][T10035] device syzkaller0 entered promiscuous mode [ 137.359167][T10052] device syzkaller0 entered promiscuous mode [ 137.513381][T10067] syz.1.2720[10067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.513436][T10067] syz.1.2720[10067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.106667][T10122] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.145661][T10122] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.153711][T10122] device bridge_slave_0 entered promiscuous mode [ 138.170848][T10122] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.181262][T10122] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.195877][T10122] device bridge_slave_1 entered promiscuous mode [ 138.576796][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 138.584361][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.593251][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.601878][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.609948][ T657] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.616807][ T657] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.623978][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.632431][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.640720][ T657] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.647585][ T657] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.655059][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 138.663704][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.671961][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 138.680492][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.689471][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 138.714949][T10122] device veth0_vlan entered promiscuous mode [ 138.721661][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 138.730253][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 138.741991][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 138.750493][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 138.766803][T10122] device veth1_macvtap entered promiscuous mode [ 138.774147][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 138.782904][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 138.790808][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 138.813208][ T704] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 138.822104][ T704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 138.830693][ T704] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 138.839313][ T704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 139.303582][T10235] bridge0: port 3(ip6gretap0) entered disabled state [ 139.310143][T10235] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.317041][T10235] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.326219][T10236] bridge0: port 3(ip6gretap0) entered blocking state [ 139.332737][T10236] bridge0: port 3(ip6gretap0) entered forwarding state [ 139.339679][T10236] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.346465][T10236] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.353497][T10236] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.360345][T10236] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.367874][T10236] device bridge0 entered promiscuous mode [ 139.429290][T10250] device syzkaller0 entered promiscuous mode [ 139.553958][T10262] device syzkaller0 entered promiscuous mode [ 140.859501][T10320] device syzkaller0 entered promiscuous mode [ 141.681433][T10381] device syzkaller0 entered promiscuous mode [ 141.835779][T10418] syz.4.2825[10418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.835826][T10418] syz.4.2825[10418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.851968][T10414] bridge0: port 3(veth0_to_batadv) entered blocking state [ 141.871126][T10414] bridge0: port 3(veth0_to_batadv) entered disabled state [ 141.878499][T10414] device veth0_to_batadv entered promiscuous mode [ 141.885152][T10414] bridge0: port 3(veth0_to_batadv) entered blocking state [ 141.892109][T10414] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 141.952682][T10444] device syzkaller0 entered promiscuous mode [ 142.397698][T10500] syz.1.2848[10500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.548616][T10503] device pim6reg1 entered promiscuous mode [ 142.772058][T10517] device syzkaller0 entered promiscuous mode [ 143.046144][T10537] device pim6reg1 entered promiscuous mode [ 143.080399][T10542] device wg2 left promiscuous mode [ 143.797409][T10560] device pim6reg1 entered promiscuous mode [ 143.839194][T10575] device pim6reg1 entered promiscuous mode [ 143.918480][T10590] device pim6reg1 entered promiscuous mode [ 143.963308][T10608] gretap0: refused to change device tx_queue_len [ 144.047362][T10626] syz.3.2889[10626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.047413][T10626] syz.3.2889[10626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.135235][T10644] device pim6reg1 entered promiscuous mode [ 144.190006][T10658] device pim6reg1 entered promiscuous mode [ 144.223208][T10654] device syzkaller0 entered promiscuous mode [ 144.315012][T10677] device syzkaller0 entered promiscuous mode [ 144.624782][T10711] device syzkaller0 entered promiscuous mode [ 144.889058][T10725] : renamed from vlan0 [ 146.367806][T10920] : renamed from veth0_vlan [ 147.338375][T11025] device pim6reg1 entered promiscuous mode [ 148.489408][T11138] device pim6reg1 entered promiscuous mode [ 148.948563][T11200] device pim6reg1 entered promiscuous mode [ 149.222232][T11238] device pim6reg1 entered promiscuous mode [ 149.355774][T11245] syz.0.3074[11245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.355825][T11245] syz.0.3074[11245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.397093][T11242] ʮ}p: renamed from pim6reg1 [ 149.639068][T11256] device syzkaller0 entered promiscuous mode [ 149.645811][ T7077] syzkaller0: tun_net_xmit 48 [ 149.751057][T11262] syz.2.3083[11262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.751103][T11262] syz.2.3083[11262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.763023][T11262] device pim6reg1 entered promiscuous mode [ 150.133727][T11316] device sit0 entered promiscuous mode [ 150.559768][T11346] device pim6reg1 entered promiscuous mode [ 150.864169][T11367] syz.2.3114[11367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.864213][T11367] syz.2.3114[11367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.962553][T11370] device syzkaller0 entered promiscuous mode [ 150.991437][T10993] syzkaller0: tun_net_xmit 48 [ 151.259974][T11392] bridge0: port 3(veth0_to_batadv) entered blocking state [ 151.268405][T11392] bridge0: port 3(veth0_to_batadv) entered disabled state [ 151.279280][T11392] device veth0_to_batadv entered promiscuous mode [ 151.287175][T11392] bridge0: port 3(veth0_to_batadv) entered blocking state [ 151.294138][T11392] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 151.953272][T11443] device syzkaller0 entered promiscuous mode [ 152.098768][T11468] device syzkaller0 entered promiscuous mode [ 152.700379][T11519] device pim6reg1 entered promiscuous mode [ 152.846514][T11543] device pim6reg1 entered promiscuous mode [ 153.733983][T11589] device syzkaller0 entered promiscuous mode [ 153.924121][T11596] device syzkaller0 entered promiscuous mode [ 154.340326][T11621] device pim6reg1 entered promiscuous mode [ 154.397401][T11624] device veth0_vlan left promiscuous mode [ 154.413790][T11624] device veth0_vlan entered promiscuous mode [ 154.424107][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 154.432430][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 154.442441][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 154.520077][T11635] device syzkaller0 entered promiscuous mode [ 155.325338][T11677] device pim6reg1 entered promiscuous mode [ 155.497219][T11699] device syzkaller0 entered promiscuous mode [ 155.558805][T11707] device syzkaller0 entered promiscuous mode [ 155.702252][T11716] device syzkaller0 entered promiscuous mode [ 155.914507][T11751] device syzkaller0 entered promiscuous mode [ 155.921178][T11751] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 156.659329][T11798] device pim6reg1 entered promiscuous mode [ 157.233651][T11844] device syzkaller0 entered promiscuous mode [ 160.681256][T12044] device syzkaller0 entered promiscuous mode [ 161.143972][T12057] device pim6reg1 entered promiscuous mode [ 161.727079][T12195] device pim6reg1 entered promiscuous mode [ 161.852660][ T4946] cgroup: fork rejected by pids controller in /syz4 [ 161.912604][T12224] device pim6reg1 entered promiscuous mode [ 161.972426][T12233] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.979361][T12233] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.986701][T12233] device bridge_slave_0 entered promiscuous mode [ 161.993704][T12233] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.000594][T12233] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.007993][T12233] device bridge_slave_1 entered promiscuous mode [ 162.084041][T12233] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.091018][T12233] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.098118][T12233] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.104868][T12233] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.133911][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.142618][ T303] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.150351][ T303] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.163086][ T7074] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.171538][ T7074] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.178391][ T7074] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.208651][ T1087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.220403][ T1087] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.227273][ T1087] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.234858][ T1087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.243134][ T1087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.259204][ T1074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 162.275106][T12233] device veth0_vlan entered promiscuous mode [ 162.282689][ T1087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 162.290628][ T1087] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 162.298821][ T1087] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 162.318905][ T698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 162.335275][T12233] device veth1_macvtap entered promiscuous mode [ 162.352041][ T1087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 162.367972][ T1074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 162.429528][T12306] syz.3.3374[12306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.429581][T12306] syz.3.3374[12306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.449729][ T509] bridge0: port 3(ip6gretap0) entered disabled state [ 162.470776][T12306] syz.3.3374[12306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.470837][T12306] syz.3.3374[12306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.486145][ T509] device ip6gretap0 left promiscuous mode [ 162.528412][ T509] bridge0: port 3(ip6gretap0) entered disabled state [ 162.574610][T12311] syzkaller0: refused to change device tx_queue_len [ 162.601709][T12311] device pim6reg1 entered promiscuous mode [ 163.067333][T12333] syz.1.3382[12333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.068078][T12333] syz.1.3382[12333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.123861][T12333] syz.1.3382[12333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.142493][T12333] syz.1.3382[12333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.420865][T12344] device syzkaller0 entered promiscuous mode [ 163.441541][ T509] device bridge_slave_1 left promiscuous mode [ 163.453159][ T509] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.486873][ T509] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.503392][ T509] device veth1_macvtap left promiscuous mode [ 163.621327][T12355] device sit0 entered promiscuous mode [ 163.667904][T12354] device syzkaller0 entered promiscuous mode [ 163.679146][T12358] device pim6reg1 entered promiscuous mode [ 163.699630][T12360] device syzkaller0 entered promiscuous mode [ 163.733060][T12349] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.740162][T12349] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.749387][T12349] device bridge_slave_0 entered promiscuous mode [ 163.756949][T12349] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.764047][T12349] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.772061][T12349] device bridge_slave_1 entered promiscuous mode [ 163.845790][T12349] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.852654][T12349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.859757][T12349] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.866545][T12349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.891973][ T698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.900828][ T698] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.909546][ T698] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.935665][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.944323][ T303] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.951188][ T303] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.983145][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.992064][ T303] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.998919][ T303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.027466][ T698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.035296][ T698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.049851][T12349] device veth0_vlan entered promiscuous mode [ 164.057505][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 164.066114][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 164.075108][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 164.084643][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 164.104120][T12349] device veth1_macvtap entered promiscuous mode [ 164.114737][ T698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 164.123836][T12380] device sit0 left promiscuous mode [ 164.141296][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 164.159277][T12380] device sit0 entered promiscuous mode [ 164.208244][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 164.250929][T12382] device syzkaller0 entered promiscuous mode [ 165.022685][T12443] device syzkaller0 entered promiscuous mode [ 165.685823][T12559] device wlan0 entered promiscuous mode [ 165.956184][ T24] audit: type=1400 audit(1720392645.270:169): avc: denied { create } for pid=12599 comm="syz.0.3465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 166.010339][T12598] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.027382][T12598] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.036668][T12598] device bridge_slave_0 entered promiscuous mode [ 166.045305][T12598] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.052255][T12598] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.059780][T12598] device bridge_slave_1 entered promiscuous mode [ 166.112740][T12615] syz.1.3467[12615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.112791][T12615] syz.1.3467[12615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.113331][T12598] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.142050][T12598] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.149157][T12598] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.155914][T12598] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.230664][ T657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.268036][ T657] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.330902][ T657] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.597601][ T698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 166.605805][ T698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.637674][ T698] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.645053][ T698] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.652589][ T698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.660784][ T698] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.667640][ T698] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.675037][ T698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.683076][ T698] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.689938][ T698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.698017][ T698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.706156][ T698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.778249][T12598] device veth0_vlan entered promiscuous mode [ 166.792300][T12598] device veth1_macvtap entered promiscuous mode [ 166.799025][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 166.807804][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 166.816030][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 166.904642][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 166.913839][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 166.922472][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 166.932233][ T282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 167.155318][T12696] device pim6reg1 entered promiscuous mode [ 167.527920][T12762] device syzkaller0 entered promiscuous mode [ 167.715059][ T509] bridge0: port 4(veth0_vlan) entered disabled state [ 167.724129][ T509] device veth0_to_batadv left promiscuous mode [ 167.732573][ T509] bridge0: port 3(veth0_to_batadv) entered disabled state [ 167.742533][ T509] device bridge_slave_1 left promiscuous mode [ 167.749386][ T509] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.759446][ T509] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.829423][T12795] syz.0.3514[12795] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.829462][T12795] syz.0.3514[12795] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.901145][T12786] bridge0: port 3(veth0_to_batadv) entered disabled state [ 167.919508][T12786] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.926485][T12786] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.991477][T12799] gretap0: refused to change device tx_queue_len [ 168.071346][T12814] device syzkaller0 entered promiscuous mode [ 168.266783][T12830] device veth1_macvtap left promiscuous mode [ 168.272589][T12830] device macsec0 left promiscuous mode [ 168.638350][T12844] syz.3.3533[12844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.638576][T12844] syz.3.3533[12844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.214569][T12869] device syzkaller0 entered promiscuous mode [ 170.270998][T12981] syz.4.3576[12981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.271082][T12981] syz.4.3576[12981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.587298][T13052] device pim6reg1 entered promiscuous mode [ 172.262105][T13095] device syzkaller0 entered promiscuous mode [ 172.744496][T13103] device pim6reg1 entered promiscuous mode [ 172.956157][T13117] device veth0_vlan left promiscuous mode [ 173.033773][T13117] device veth0_vlan entered promiscuous mode [ 173.048481][T13126] Q6\bY4: renamed from lo [ 173.294685][T13150] device pim6reg1 entered promiscuous mode [ 173.328840][T13152] geneve1: tun_chr_ioctl cmd 1074025681 [ 173.429606][T13173] device pim6reg1 entered promiscuous mode [ 173.606597][T13193] geneve1: tun_chr_ioctl cmd 2148553947 [ 174.269740][T13261] bridge0: port 3(veth0_to_batadv) entered blocking state [ 174.276746][T13261] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 174.283991][T13261] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.290855][T13261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.297954][T13261] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.304733][T13261] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.315634][T13261] device bridge0 entered promiscuous mode [ 174.396027][T13269] syz.3.3664[13269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.396108][T13269] syz.3.3664[13269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.482417][T13269] device syzkaller0 entered promiscuous mode [ 174.500826][ T1101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 174.913024][T13305] device pim6reg1 entered promiscuous mode [ 175.245937][T13329] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.267820][T13329] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.441181][T13339] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.448142][T13339] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.455251][T13339] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.462149][T13339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.469450][T13339] device bridge0 entered promiscuous mode [ 176.239428][T13403] device syzkaller0 entered promiscuous mode [ 176.579942][T13417] syz.3.3705[13417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.579993][T13417] syz.3.3705[13417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.698876][T13431] device sit0 entered promiscuous mode [ 177.493727][T13490] device veth0_vlan left promiscuous mode [ 177.500205][T13490] device veth0_vlan entered promiscuous mode [ 177.626637][T13523] device wg2 entered promiscuous mode [ 177.693777][T13530] device syzkaller0 entered promiscuous mode [ 178.055756][T13638] device syzkaller0 entered promiscuous mode [ 178.140017][T13643] device pim6reg1 entered promiscuous mode [ 178.181143][T13647] syz.3.3763[13647] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.181196][T13647] syz.3.3763[13647] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.193299][T13647] device pim6reg1 entered promiscuous mode [ 178.279383][T13662] tap0: tun_chr_ioctl cmd 1074025677 [ 178.284548][T13662] tap0: linktype set to 805 [ 178.369010][T13683] device pim6reg1 entered promiscuous mode [ 178.385620][T13678] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 178.414124][T13683] device syzkaller0 entered promiscuous mode [ 178.596703][T13733] device pim6reg1 entered promiscuous mode [ 178.758208][T13770] device syzkaller0 entered promiscuous mode [ 178.858625][T13801] device pim6reg1 entered promiscuous mode [ 179.087054][T13824] syz.1.3809[13824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.087105][T13824] syz.1.3809[13824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.290628][T13832] IPv6: : Disabled Multicast RS [ 180.302055][T13875] device syzkaller0 entered promiscuous mode [ 180.595694][T13887] syz.2.3826[13887] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.595743][T13887] syz.2.3826[13887] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.727385][T13892] device pim6reg1 entered promiscuous mode [ 183.261729][T14090] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 183.270628][T14090] device syzkaller0 entered promiscuous mode [ 183.300602][T14087] device pim6reg1 entered promiscuous mode [ 183.361622][T14102] syz.4.3882[14102] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.361679][T14102] syz.4.3882[14102] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.613753][T14140] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.632238][T14140] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.095364][T14198] device syzkaller0 entered promiscuous mode [ 184.182973][T14200] device syzkaller0 entered promiscuous mode [ 184.245617][T14205] device pim6reg1 entered promiscuous mode [ 184.891033][T14297] device syzkaller0 entered promiscuous mode [ 184.900448][T14298] syz.2.3935[14298] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.900501][T14298] syz.2.3935[14298] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.912810][T14297] syz.2.3935[14297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.924554][T14297] syz.2.3935[14297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.999770][T14308] device pim6reg1 entered promiscuous mode [ 185.227054][T14350] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.236682][T14350] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.244072][T14350] device bridge_slave_0 entered promiscuous mode [ 185.251331][T14350] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.258716][T14350] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.266095][T14350] device bridge_slave_1 entered promiscuous mode [ 185.320696][T14360] syz.3.3952[14360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.320754][T14360] syz.3.3952[14360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.332792][ T1092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.352798][ T1092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.377218][ T1092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 185.385365][ T1092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.393458][ T1092] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.400745][ T1092] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 185.408495][ T1092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.416670][ T1092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.424587][ T1092] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.431457][ T1092] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.438610][ T1092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.446746][ T1092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.454692][ T1092] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.461602][ T1092] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.468763][ T1092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.476583][ T1092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.484465][ T1092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 185.494480][T14350] device veth0_vlan entered promiscuous mode [ 185.518434][T10989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 185.528926][T14350] device veth1_macvtap entered promiscuous mode [ 185.541373][T10989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 185.559038][T10989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 185.580413][T14375] device syzkaller0 entered promiscuous mode [ 185.592459][T14380] device pim6reg1 entered promiscuous mode [ 185.689903][T14384] device syzkaller0 entered promiscuous mode [ 185.785833][T14386] syz.1.3959[14386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.786588][T14386] syz.1.3959[14386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.813869][T14396] syz.0.3962[14396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.825168][T14396] syz.0.3962[14396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.940000][T14406] device syzkaller0 entered promiscuous mode [ 186.172539][T14421] device syzkaller0 entered promiscuous mode [ 186.680995][T14449] device syzkaller0 entered promiscuous mode [ 186.745352][T14460] device pim6reg1 entered promiscuous mode [ 186.789404][T14463] device macsec0 entered promiscuous mode [ 186.985375][T14490] device syzkaller0 entered promiscuous mode [ 187.051387][T14496] device pim6reg1 entered promiscuous mode [ 187.210333][T14522] device pim6reg1 entered promiscuous mode [ 187.359432][T14552] device pim6reg1 entered promiscuous mode [ 187.441032][T14568] device pim6reg1 entered promiscuous mode [ 187.577185][T14576] device syzkaller0 entered promiscuous mode [ 187.619266][T14591] device syzkaller0 entered promiscuous mode [ 187.854456][T14603] device veth0_vlan left promiscuous mode [ 187.877489][T14603] device veth0_vlan entered promiscuous mode [ 188.702208][T14707] device syzkaller0 entered promiscuous mode [ 189.087050][T14722] syz.2.4061[14722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.087106][T14722] syz.2.4061[14722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.474796][T14774] device syzkaller0 entered promiscuous mode [ 189.584115][T14778] tap0: tun_chr_ioctl cmd 1074025675 [ 189.599840][T14778] tap0: persist enabled [ 189.616055][T14778] tap0: tun_chr_ioctl cmd 1074025675 [ 189.633807][T14778] tap0: persist disabled [ 190.878092][T14860] device syzkaller0 entered promiscuous mode [ 191.041956][T14896] device macsec0 entered promiscuous mode [ 191.108437][T14897] device veth1_macvtap entered promiscuous mode [ 191.147290][T14891] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 191.291867][T14928] syz.4.4111[14928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.343778][T14940] device pim6reg1 entered promiscuous mode [ 191.528533][T14970] bridge0: port 3(veth0_to_batadv) entered disabled state [ 191.535569][T14970] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.542444][T14970] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.550657][T14970] device bridge0 left promiscuous mode [ 192.014334][T15053] device syzkaller0 entered promiscuous mode [ 293.056314][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 293.063087][ C1] rcu: 0-...!: (1 GPs behind) idle=d36/1/0x4000000000000000 softirq=43798/43799 fqs=0 last_accelerate: d562/fcfb dyntick_enabled: 1 [ 293.076519][ C1] (detected by 1, t=10005 jiffies, g=37861, q=537) [ 293.082960][ C1] Sending NMI from CPU 1 to CPUs 0: [ 293.088984][ C1] NMI backtrace for cpu 0 [ 293.088989][ C1] CPU: 0 PID: 15112 Comm: syz.1.4161 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 293.088994][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 293.088996][ C1] RIP: 0010:kvm_wait+0xec/0x150 [ 293.089003][ C1] Code: 03 42 0f b6 04 20 84 c0 75 6a 41 0f b6 45 00 44 38 f0 75 26 41 f7 c7 00 02 00 00 75 0f 0f 1f 44 00 00 0f 00 2d 95 52 d5 03 f4 0e 0f 1f 44 00 00 0f 00 2d 86 52 d5 03 fb f4 4c 89 7c 24 18 ff [ 293.089006][ C1] RSP: 0018:ffffc900011c7040 EFLAGS: 00000046 [ 293.089013][ C1] RAX: 0000000000000003 RBX: 1ffff92000238e0c RCX: ffffffff8150b5a4 [ 293.089016][ C1] RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffffc900011c7080 [ 293.089020][ C1] RBP: ffffc900011c70f0 R08: dffffc0000000000 R09: ffffed1021c78ba5 [ 293.089023][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 293.089026][ C1] R13: ffff88810e3c5d20 R14: 0000000000000003 R15: 0000000000000046 [ 293.089030][ C1] FS: 00007fcf86d8c6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 293.089033][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 293.089036][ C1] CR2: 0000000000000000 CR3: 00000001248e4000 CR4: 00000000003506b0 [ 293.089039][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 293.089043][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 293.089044][ C1] Call Trace: [ 293.089046][ C1] [ 293.089048][ C1] ? show_regs+0x58/0x60 [ 293.089051][ C1] ? nmi_cpu_backtrace+0x133/0x160 [ 293.089053][ C1] ? kvm_wait+0xec/0x150 [ 293.089055][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 293.089058][ C1] ? nmi_handle+0xa8/0x280 [ 293.089060][ C1] ? kvm_wait+0xec/0x150 [ 293.089062][ C1] ? default_do_nmi+0x69/0x160 [ 293.089064][ C1] ? exc_nmi+0xad/0x100 [ 293.089067][ C1] ? end_repeat_nmi+0x16/0x31 [ 293.089069][ C1] ? __pv_queued_spin_lock_slowpath+0x6d4/0xc70 [ 293.089071][ C1] ? kvm_wait+0xec/0x150 [ 293.089073][ C1] ? kvm_wait+0xec/0x150 [ 293.089076][ C1] ? kvm_wait+0xec/0x150 [ 293.089077][ C1] [ 293.089080][ C1] ? __set_page_owner+0x3b/0x2d0 [ 293.089082][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 293.089084][ C1] ? save_stack+0x1c3/0x240 [ 293.089087][ C1] __pv_queued_spin_lock_slowpath+0x72f/0xc70 [ 293.089090][ C1] ? __pv_queued_spin_unlock_slowpath+0x280/0x280 [ 293.089092][ C1] _raw_spin_lock_irqsave+0x1a0/0x210 [ 293.089094][ C1] ? prep_new_page+0xf9/0x180 [ 293.089097][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 293.089099][ C1] ? get_page_from_freelist+0x2d8c/0x2f30 [ 293.089102][ C1] ? sched_clock_cpu+0x1b/0x3b0 [ 293.089104][ C1] ? __kasan_check_write+0x14/0x20 [ 293.089106][ C1] trie_delete_elem+0x94/0x760 [ 293.089109][ C1] ? __kasan_check_write+0x14/0x20 [ 293.089111][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0x45c [ 293.089114][ C1] bpf_trace_run4+0x13e/0x2e0 [ 293.089116][ C1] ? bpf_trace_run3+0x2c0/0x2c0 [ 293.089119][ C1] ? __alloc_pages_nodemask+0xaf0/0xaf0 [ 293.089122][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 293.089124][ C1] __alloc_pages_nodemask+0xa8e/0xaf0 [ 293.089127][ C1] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 293.089129][ C1] kmalloc_order+0x4c/0x170 [ 293.089131][ C1] kmalloc_order_trace+0x18/0x90 [ 293.089133][ C1] __kmalloc+0x1f1/0x330 [ 293.089136][ C1] trie_update_elem+0x1b5/0xb30 [ 293.089138][ C1] ? kasan_poison+0x5d/0x70 [ 293.089140][ C1] ? __kasan_kmalloc_large+0xad/0xc0 [ 293.089143][ C1] bpf_map_update_value+0x230/0x420 [ 293.089145][ C1] __se_sys_bpf+0x7687/0x11cb0 [ 293.089148][ C1] ? futex_wait+0x6a0/0x7c0 [ 293.089150][ C1] ? __x64_sys_bpf+0x90/0x90 [ 293.089152][ C1] ? do_futex+0x17b0/0x17b0 [ 293.089155][ C1] ? do_futex+0x139a/0x17b0 [ 293.089157][ C1] ? __kasan_check_write+0x14/0x20 [ 293.089159][ C1] ? put_vma+0x8f/0xb0 [ 293.089162][ C1] ? __handle_speculative_fault+0x102e/0x1ec0 [ 293.089164][ C1] ? futex_exit_release+0x1e0/0x1e0 [ 293.089167][ C1] ? set_current_blocked+0x40/0x40 [ 293.089169][ C1] ? __se_sys_futex+0x355/0x470 [ 293.089171][ C1] ? fpu__clear_all+0x20/0x20 [ 293.089174][ C1] ? __kasan_check_read+0x11/0x20 [ 293.089176][ C1] __x64_sys_bpf+0x7b/0x90 [ 293.089178][ C1] do_syscall_64+0x34/0x70 [ 293.089181][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 293.089183][ C1] RIP: 0033:0x7fcf87b0abd9 [ 293.089190][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 293.089197][ C1] RSP: 002b:00007fcf86d8c048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 293.089203][ C1] RAX: ffffffffffffffda RBX: 00007fcf87c98f60 RCX: 00007fcf87b0abd9 [ 293.089207][ C1] RDX: 0000000000000020 RSI: 0000000020000400 RDI: 0000000000000002 [ 293.089210][ C1] RBP: 00007fcf87b79aa1 R08: 0000000000000000 R09: 0000000000000000 [ 293.089214][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 293.089217][ C1] R13: 000000000000000b R14: 00007fcf87c98f60 R15: 00007fff1f48a6d8 [ 293.089229][ C1] rcu: rcu_preempt kthread starved for 10005 jiffies! g37861 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 293.580706][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 293.590513][ C1] rcu: RCU grace-period kthread stack dump: [ 293.596321][ C1] task:rcu_preempt state:R running task stack: 0 pid: 13 ppid: 2 flags:0x00004000 [ 293.606933][ C1] Call Trace: [ 293.610053][ C1] __schedule+0xbe6/0x1330 [ 293.614381][ C1] ? release_firmware_map_entry+0x192/0x192 [ 293.620105][ C1] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 293.625400][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 293.630087][ C1] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 293.635036][ C1] schedule+0x13d/0x1d0 [ 293.639028][ C1] schedule_timeout+0x18c/0x360 [ 293.643714][ C1] ? prepare_to_swait_event+0x39f/0x3e0 [ 293.649093][ C1] ? console_conditional_schedule+0x10/0x10 [ 293.654824][ C1] ? run_local_timers+0x160/0x160 [ 293.659685][ C1] ? __note_gp_changes+0x2d8/0x6f0 [ 293.664663][ C1] rcu_gp_kthread+0xefc/0x23a0 [ 293.669254][ C1] ? dump_blkd_tasks+0x7e0/0x7e0 [ 293.674007][ C1] ? rcu_barrier_callback+0x50/0x50 [ 293.679046][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 293.683748][ C1] ? __kasan_check_read+0x11/0x20 [ 293.688603][ C1] ? __kthread_parkme+0xb9/0x1c0 [ 293.693378][ C1] kthread+0x34b/0x3d0 [ 293.697394][ C1] ? rcu_barrier_callback+0x50/0x50 [ 293.702450][ C1] ? kthread_blkcg+0xd0/0xd0 [ 293.706815][ C1] ret_from_fork+0x1f/0x30 [ 440.933394][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 123s! [syz.4.4150:15062] [ 440.941616][ C1] Modules linked in: [ 440.945352][ C1] CPU: 1 PID: 15062 Comm: syz.4.4150 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 440.956544][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 440.966454][ C1] RIP: 0010:smp_call_function_single+0x278/0x510 [ 440.972815][ C1] Code: 0f 85 18 02 00 00 44 8b 6c 24 48 44 89 ee 83 e6 01 31 ff e8 7a f0 0a 00 41 83 e5 01 75 0a e8 bf ec 0a 00 e9 eb 00 00 00 f3 90 <42> 0f b6 04 23 84 c0 75 15 f7 44 24 48 01 00 00 00 0f 84 cd 00 00 [ 440.992953][ C1] RSP: 0018:ffffc900011ef320 EFLAGS: 00000293 [ 440.998851][ C1] RAX: ffffffff815fbde4 RBX: 1ffff9200023de6d RCX: ffff888113e1a780 [ 441.006659][ C1] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 441.014470][ C1] RBP: ffffc900011ef410 R08: ffffffff815fbdb6 R09: ffffed103ee0aec9 [ 441.022286][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 441.030092][ C1] R13: 0000000000000001 R14: ffffc900011ef368 R15: 0000000000000000 [ 441.037908][ C1] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 441.046670][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 441.053095][ C1] CR2: 00007fcf86d8bfa8 CR3: 000000000660f000 CR4: 00000000003506a0 [ 441.060911][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 441.068721][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 441.076525][ C1] Call Trace: [ 441.079653][ C1] [ 441.082357][ C1] ? show_regs+0x58/0x60 [ 441.086425][ C1] ? watchdog_timer_fn+0x471/0x590 [ 441.091370][ C1] ? proc_watchdog_cpumask+0xd0/0xd0 [ 441.096498][ C1] ? __hrtimer_run_queues+0x3d7/0xa50 [ 441.101701][ C1] ? hrtimer_interrupt+0x8b0/0x8b0 [ 441.106648][ C1] ? clockevents_program_event+0x214/0x2c0 [ 441.112289][ C1] ? ktime_get_update_offsets_now+0x266/0x280 [ 441.118191][ C1] ? hrtimer_interrupt+0x39a/0x8b0 [ 441.123140][ C1] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 441.129042][ C1] ? asm_call_irq_on_stack+0xf/0x20 [ 441.134069][ C1] [ 441.136852][ C1] ? sysvec_apic_timer_interrupt+0x85/0xe0 [ 441.142494][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 441.148482][ C1] ? smp_call_function_single+0x266/0x510 [ 441.154036][ C1] ? smp_call_function_single+0x294/0x510 [ 441.159594][ C1] ? smp_call_function_single+0x278/0x510 [ 441.165145][ C1] ? text_poke_sync+0x20/0x20 [ 441.169665][ C1] ? flush_smp_call_function_from_idle+0x1b0/0x1b0 [ 441.176000][ C1] ? text_poke_sync+0x20/0x20 [ 441.180510][ C1] ? __text_poke+0x751/0x7d0 [ 441.185047][ C1] smp_call_function_many_cond+0x94e/0xa30 [ 441.190772][ C1] ? flush_tlb_func_common+0x3a2/0x520 [ 441.196063][ C1] ? text_poke_sync+0x20/0x20 [ 441.200574][ C1] ? smp_call_function_many+0x40/0x40 [ 441.205778][ C1] ? text_poke+0x20/0x20 [ 441.209858][ C1] ? insn_decode+0x308/0x490 [ 441.214283][ C1] ? text_poke_sync+0x20/0x20 [ 441.218797][ C1] on_each_cpu+0xa8/0x1a0 [ 441.222965][ C1] ? text_poke_loc_init+0x2e1/0x580 [ 441.227999][ C1] ? smp_call_function+0x90/0x90 [ 441.232774][ C1] ? text_poke_finish+0x30/0x30 [ 441.237460][ C1] text_poke_bp_batch+0x1d4/0x600 [ 441.242323][ C1] ? __kasan_check_write+0x14/0x20 [ 441.247269][ C1] ? text_poke_loc_init+0x580/0x580 [ 441.252303][ C1] ? mutex_lock+0xa5/0x110 [ 441.256555][ C1] ? mutex_trylock+0xa0/0xa0 [ 441.260981][ C1] ? flush_tlb_func_common+0x3a2/0x520 [ 441.266275][ C1] ? __kasan_check_write+0x14/0x20 [ 441.271223][ C1] ? mutex_unlock+0x1c/0x40 [ 441.275562][ C1] text_poke_finish+0x1a/0x30 [ 441.280079][ C1] arch_jump_label_transform_apply+0x15/0x30 [ 441.285893][ C1] __jump_label_update+0x36a/0x380 [ 441.290839][ C1] jump_label_update+0x379/0x400 [ 441.295613][ C1] static_key_disable_cpuslocked+0xcd/0x1b0 [ 441.301340][ C1] static_key_disable+0x1a/0x30 [ 441.306035][ C1] tracepoint_probe_unregister+0x6e0/0x9e0 [ 441.311670][ C1] ? perf_trace_tlb_flush+0x3e0/0x3e0 [ 441.316884][ C1] bpf_probe_unregister+0x61/0x70 [ 441.321738][ C1] bpf_raw_tp_link_release+0x63/0x90 [ 441.326855][ C1] bpf_link_put+0x1fd/0x280 [ 441.331196][ C1] bpf_link_release+0x3b/0x40 [ 441.335709][ C1] ? __bpf_prog_put_rcu+0x170/0x170 [ 441.340747][ C1] __fput+0x309/0x760 [ 441.344574][ C1] ____fput+0x15/0x20 [ 441.348423][ C1] task_work_run+0x129/0x190 [ 441.352816][ C1] do_exit+0xc83/0x2a50 [ 441.356811][ C1] ? put_task_struct+0x80/0x80 [ 441.361412][ C1] ? __irq_exit_rcu+0x40/0x150 [ 441.366016][ C1] ? cgroup_freezing+0x88/0xb0 [ 441.370821][ C1] do_group_exit+0x141/0x310 [ 441.375224][ C1] get_signal+0x10a0/0x1410 [ 441.379567][ C1] arch_do_signal_or_restart+0xbd/0x17c0 [ 441.385036][ C1] ? __switch_to_asm+0x34/0x60 [ 441.389727][ C1] ? __schedule+0xbee/0x1330 [ 441.394154][ C1] ? release_firmware_map_entry+0x192/0x192 [ 441.399877][ C1] ? __do_sys_rt_sigreturn+0x1e0/0x1e0 [ 441.405172][ C1] ? __kasan_check_read+0x11/0x20 [ 441.410029][ C1] ? preempt_schedule_notrace+0x11b/0x140 [ 441.415587][ C1] ? preempt_schedule_notrace_thunk+0x16/0x18 [ 441.421499][ C1] exit_to_user_mode_loop+0x9b/0xd0 [ 441.426521][ C1] syscall_exit_to_user_mode+0xa2/0x1a0 [ 441.432349][ C1] do_syscall_64+0x40/0x70 [ 441.436599][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 441.442501][ C1] RIP: 0033:0x7f009e513bd9 [ 441.446735][ C1] Code: Unable to access opcode bytes at RIP 0x7f009e513baf. [ 441.453939][ C1] RSP: 002b:00007f009d795048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 441.462185][ C1] RAX: 0000000000000000 RBX: 00007f009e6a1f60 RCX: 00007f009e513bd9 [ 441.469995][ C1] RDX: 0000000020000080 RSI: 0000000000008922 RDI: 000000000000000d [ 441.477809][ C1] RBP: 00007f009e582aa1 R08: 0000000000000000 R09: 0000000000000000 [ 441.485619][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 441.493438][ C1] R13: 000000000000000b R14: 00007f009e6a1f60 R15: 00007ffd206ada08 [ 441.501256][ C1] Sending NMI from CPU 1 to CPUs 0: [ 441.507286][ C1] NMI backtrace for cpu 0 [ 441.507292][ C1] CPU: 0 PID: 15112 Comm: syz.1.4161 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 441.507297][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 441.507299][ C1] RIP: 0010:kvm_wait+0xec/0x150 [ 441.507307][ C1] Code: 03 42 0f b6 04 20 84 c0 75 6a 41 0f b6 45 00 44 38 f0 75 26 41 f7 c7 00 02 00 00 75 0f 0f 1f 44 00 00 0f 00 2d 95 52 d5 03 f4 0e 0f 1f 44 00 00 0f 00 2d 86 52 d5 03 fb f4 4c 89 7c 24 18 ff [ 441.507310][ C1] RSP: 0018:ffffc900011c7040 EFLAGS: 00000046 [ 441.507316][ C1] RAX: 0000000000000003 RBX: 1ffff92000238e0c RCX: ffffffff8150b5a4 [ 441.507320][ C1] RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffffc900011c7080 [ 441.507323][ C1] RBP: ffffc900011c70f0 R08: dffffc0000000000 R09: ffffed1021c78ba5 [ 441.507327][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 441.507330][ C1] R13: ffff88810e3c5d20 R14: 0000000000000003 R15: 0000000000000046 [ 441.507333][ C1] FS: 00007fcf86d8c6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 441.507336][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 441.507340][ C1] CR2: 0000000000000000 CR3: 00000001248e4000 CR4: 00000000003506b0 [ 441.507344][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 441.507347][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 441.507349][ C1] Call Trace: [ 441.507351][ C1] [ 441.507353][ C1] ? show_regs+0x58/0x60 [ 441.507355][ C1] ? nmi_cpu_backtrace+0x133/0x160 [ 441.507358][ C1] ? kvm_wait+0xec/0x150 [ 441.507360][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 441.507362][ C1] ? nmi_handle+0xa8/0x280 [ 441.507365][ C1] ? kvm_wait+0xec/0x150 [ 441.507367][ C1] ? kvm_wait+0xec/0x150 [ 441.507369][ C1] ? default_do_nmi+0x69/0x160 [ 441.507371][ C1] ? exc_nmi+0xad/0x100 [ 441.507373][ C1] ? end_repeat_nmi+0x16/0x31 [ 441.507376][ C1] ? __pv_queued_spin_lock_slowpath+0x6d4/0xc70 [ 441.507378][ C1] ? kvm_wait+0xec/0x150 [ 441.507380][ C1] ? kvm_wait+0xec/0x150 [ 441.507382][ C1] ? kvm_wait+0xec/0x150 [ 441.507384][ C1] [ 441.507386][ C1] ? __set_page_owner+0x3b/0x2d0 [ 441.507389][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 441.507391][ C1] ? save_stack+0x1c3/0x240 [ 441.507393][ C1] __pv_queued_spin_lock_slowpath+0x72f/0xc70 [ 441.507396][ C1] ? __pv_queued_spin_unlock_slowpath+0x280/0x280 [ 441.507399][ C1] _raw_spin_lock_irqsave+0x1a0/0x210 [ 441.507401][ C1] ? prep_new_page+0xf9/0x180 [ 441.507403][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 441.507406][ C1] ? get_page_from_freelist+0x2d8c/0x2f30 [ 441.507408][ C1] ? sched_clock_cpu+0x1b/0x3b0 [ 441.507410][ C1] ? __kasan_check_write+0x14/0x20 [ 441.507412][ C1] trie_delete_elem+0x94/0x760 [ 441.507415][ C1] ? __kasan_check_write+0x14/0x20 [ 441.507417][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0x45c [ 441.507419][ C1] bpf_trace_run4+0x13e/0x2e0 [ 441.507422][ C1] ? bpf_trace_run3+0x2c0/0x2c0 [ 441.507424][ C1] ? __alloc_pages_nodemask+0xaf0/0xaf0 [ 441.507427][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 441.507429][ C1] __alloc_pages_nodemask+0xa8e/0xaf0 [ 441.507432][ C1] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 441.507434][ C1] kmalloc_order+0x4c/0x170 [ 441.507436][ C1] kmalloc_order_trace+0x18/0x90 [ 441.507438][ C1] __kmalloc+0x1f1/0x330 [ 441.507441][ C1] trie_update_elem+0x1b5/0xb30 [ 441.507443][ C1] ? kasan_poison+0x5d/0x70 [ 441.507445][ C1] ? __kasan_kmalloc_large+0xad/0xc0 [ 441.507448][ C1] bpf_map_update_value+0x230/0x420 [ 441.507450][ C1] __se_sys_bpf+0x7687/0x11cb0 [ 441.507452][ C1] ? futex_wait+0x6a0/0x7c0 [ 441.507454][ C1] ? __x64_sys_bpf+0x90/0x90 [ 441.507457][ C1] ? do_futex+0x17b0/0x17b0 [ 441.507459][ C1] ? do_futex+0x139a/0x17b0 [ 441.507461][ C1] ? __kasan_check_write+0x14/0x20 [ 441.507463][ C1] ? put_vma+0x8f/0xb0 [ 441.507466][ C1] ? __handle_speculative_fault+0x102e/0x1ec0 [ 441.507469][ C1] ? futex_exit_release+0x1e0/0x1e0 [ 441.507471][ C1] ? set_current_blocked+0x40/0x40 [ 441.507473][ C1] ? __se_sys_futex+0x355/0x470 [ 441.507476][ C1] ? fpu__clear_all+0x20/0x20 [ 441.507478][ C1] ? __kasan_check_read+0x11/0x20 [ 441.507480][ C1] __x64_sys_bpf+0x7b/0x90 [ 441.507482][ C1] do_syscall_64+0x34/0x70 [ 441.507485][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 441.507487][ C1] RIP: 0033:0x7fcf87b0abd9 [ 441.507494][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 441.507497][ C1] RSP: 002b:00007fcf86d8c048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 441.507502][ C1] RAX: ffffffffffffffda RBX: 00007fcf87c98f60 RCX: 00007fcf87b0abd9 [ 441.507506][ C1] RDX: 0000000000000020 RSI: 0000000020000400 RDI: 0000000000000002 [ 441.507509][ C1] RBP: 00007fcf87b79aa1 R08: 0000000000000000 R09: 0000000000000000 [ 441.507512][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 441.507516][ C1] R13: 000000000000000b R14: 00007fcf87c98f60 R15: 00007fff1f48a6d8