last executing test programs: 1.386196076s ago: executing program 0 (id=974): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f0000000040)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x81, &(0x7f0000000380)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0xac, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 1.384899356s ago: executing program 3 (id=975): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x58, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800009e28cd6e00000000a4d817145cfc5cebcfa5000000000000000000bcf00000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000300)='percpu_alloc_percpu\x00', r2}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e01f3440cee51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cad32b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337602d3e5a815232f5e16c1b30c3a6abc85018e5ff2c91018afc9ffc2cc788bee1b47683db012469398685211dfbbae3e2ed0a50e7393bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d300006aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7af22e30d46a9d26d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977fb536a9caab37d9ac4cfc1c7b400000000000007ffc826b956ba859ac8e3c177b91bd7d5e41ff83ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d000069a16203a967c1bbe09315c29877a308bcc87dc3addb08142bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8240000e3428d2129369ee1b85af9ffffff0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92000000000f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb74d4ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905de328c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a978ee56c83a3466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342e0eaf6f330e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea95ec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf81700cd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be3827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f969369de47422604e2fc5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293b6c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b612272d40f522d8c98c879aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbe71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd46dbd61627a2e0a74b5e6aefb7eee403502734137ff47a57f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a125e3af1130d66a7b66837ae7e7123dde7404a067ad0a6a2d6bec9411b61cad4121be3c72ff3a04713042253d438e7becf8120de3895b8ce974958bde39cb8da3427a2e9e2de936431e67fed5ab5684db07de39083d8948cc4c8a2608100000000000000000000aecb8b0b7941088f971ce17427eec32a012295cc0cdd32955176b6ad5a4bb953e58ccfa9428f452cfb5a48a9fda26db3985c8be3c2f99827da074825b01c4a3a71fb59d5798100000000000000c76b05a45d2dd8c20d971e2f3e4369168f5cb83d6ff3a18733fec726034fbfa95624135bee374414b2c8c61f52357a520efd6a10aff244bc8a62ed367981fb4d5d77f7bc093958ff46527499957da4934cd4b370cf76f72dd05fa80cdfb68c836fd81be7a58532e041a87f9222f157610a4bcdc05b2a55308c8e7568b90f7a338557e816a16972aea79dff5becefa6f9c5ce6c58fb38da9e7532dc53cfdc2e789b76f7d32aca1bfea2aa62621b78dded30fc07171866bf3d552900000000a32dda61eeda1750e157c2d569b9d08f583c0ee28daec2e8bb85f3c8e91c4448096ee953def18dc73e55cb30f9cd069d8780b00eaba382f0c3ae391c30a5f1b0f36dd0c2193b791995d2890327a10d7abac76d1202f72e97f0105184d7aaaab8d3e29c9a8d263f076b55cf53c5bb9c0662a3d19a6722d7f83ae4331d3256f90af0857788b380ccc3b266c418e66d1d756d5df6423dd0cea67bc235d3776d22270fc19301ead09f156893e9"], &(0x7f0000000340)='syzkaller\x00'}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r5}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="8ff1cb79070098750010000086dd6317ce8102036c00fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xb, 0x4, &(0x7f0000000740)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x62}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xffffffffffffffda, 0x0, 0x0, 0x0, '\x00', r0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x90) 1.334457391s ago: executing program 0 (id=976): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1, 0x7, 0x10001, 0xb}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000000000000000000000000000730129000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8903, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x2, &(0x7f0000000040)=[{}, {0x6}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0xffffffffffffffff}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='freezer.parent_freezing\x00', 0x275a, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000140)='io.pressure\x00', 0x2, 0x0) write$cgroup_pressure(r3, &(0x7f0000000340)={'some', 0x20, 0x7, 0x20, 0xffffa}, 0x2f) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x18}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc4, 0x0, @perf_config_ext, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x70cb0}], 0xc}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000002500)=[{&(0x7f0000002440)="11", 0x1}], 0x1}, 0x0) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000100), 0x1001) 1.22034995s ago: executing program 1 (id=981): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x202802, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000380)={0x5, &(0x7f00000002c0)=[{0x0, 0x5, 0x9, 0x8001}, {0x3, 0x6, 0x3}, {0x800, 0x61, 0x7, 0xffff}, {0xffff, 0x1, 0xf6, 0x1}, {0x5aea, 0xe7, 0x3, 0x4}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$ppp(0xffffffffffffff9c, &(0x7f00000004c0), 0x8000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8f41c288d409ef0e169a340295f36d4b4", &(0x7f0000000380), 0x5, r5}, 0x38) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa33"], 0xfdef) openat$cgroup_subtree(r4, &(0x7f00000003c0), 0x2, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r7}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7d, '\x00', 0x0, r2, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0xf, 0x4, 0x3ff, 0x4, r8, 0x2, '\x00', 0x0, r4, 0x5, 0x1, 0x1, 0xe}, 0x48) 998.721898ms ago: executing program 4 (id=985): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x4, 0x4, 0x4, 0x12}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x1, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x86}]}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xd0, &(0x7f00000003c0)=""/208}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7968dd986c6a6700020006aa"], 0xfdef) write$cgroup_subtree(r7, &(0x7f0000000000), 0xfdef) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r8}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r9}, 0x10) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r11}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r12, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000001d4c0000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r13}, 0x10) 882.308637ms ago: executing program 4 (id=990): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='memory.stat\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000020000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_freezer_state(r0, &(0x7f00000001c0), 0x2, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r4, @ANYBLOB="657c6a6be0e6a167030012e25ecd506be75000"/32], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r9 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000000), 0x400000) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x3, 0x5, &(0x7f0000000180)=ANY=[@ANYRES8=r6], &(0x7f0000000080)='GPL\x00', 0x4, 0xca, &(0x7f0000000840)=""/202, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000540)=ANY=[@ANYRESDEC=r3, @ANYRES64=r5, @ANYRES32=r9, @ANYRES64=r7, @ANYRES32=r1], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r12}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r11, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18080000000000000000000000000002850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r13}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r14, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r15, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000004c0)={r8, &(0x7f0000000340)="c263b0259ad2d8382d1e9ce289241edeee597dafec8d9635bb8c2b33635e620662c83b8d96f30e6c8c5e02f562b09468fafbbbaafebb42a5b7ab34bc9854a43ebc3d6b4a695aeea3b581472e", &(0x7f00000003c0)=""/91}, 0x20) 830.651482ms ago: executing program 4 (id=991): write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000)='FROZEN\x00', 0x7) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000080), &(0x7f0000000280)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003a40)={0x0, &(0x7f0000002a40)=""/4096, 0x0, 0x1000, 0x1}, 0x20) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000280)={&(0x7f0000000880)="ee1bba7ba6cd05b364d35eaae0fabe6c3c3ecbf43778d3576a9eb289f95aebe0ed7064688d93bb7d3dfbe2085c983fcc3a2c7e8138ba4f6d5fc37d7fb6bc83466f1b52de9432fab226e0bf86d0997f2fc5f2b8b633905b4c28fb8dbd3542abe32016df32d2aa5557b14ac8ed9adafbacfdf7476e012b33ac03e89db5f8bd788d80f852", &(0x7f0000000080), &(0x7f0000000940)="70d0a48f42131d72563f658fafef6749848ee3acd42e48be310347746a418b4777f9b8387d00ffe2ac7744aecf7d14672b4b0bf00a3ad28e4a7df63cafdbc4bdbac4fedbedcc8194dd2379331043f91e145a6d8e9cb8e254e693addc95e7a696858bfe6f78d65eab27", &(0x7f0000000b00)="153011520ab76f97b95b5f416221ffcba16ef2c4258823bb51e039a6f92f06cbde3f753fffca6572ad116f820210c44ecfb1187ec6f924368e96b55a4ae29be9f7ca3f1a0de283f9f165788f0a72b01d50205cf26e9c9debe3d766838781b2d5ebb3db4e841144c989998f", 0x1, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x39, &(0x7f0000000440)=ANY=[@ANYRESHEX=r3, @ANYRES32, @ANYBLOB="0000000000000000ff00000000bfa20000000005020000f8ffffffb703000008000000b704000000000000850000000e000000950000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r6}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)=@generic={&(0x7f0000000180)='./cgroup\x00'}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) 823.853452ms ago: executing program 4 (id=993): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x37}, 0x90) socketpair(0x1, 0x3, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 823.489412ms ago: executing program 4 (id=994): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000008c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x66, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xd, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x5}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)=r5}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="18"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00'}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x23, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={r2, 0x58, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5c5c}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r10}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f00000005c0)='GPL\x00', 0x59, 0x35, &(0x7f0000000600)=""/53, 0x40f00, 0x0, '\x00', r11, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000007c0)={0x4, 0x9, 0x58e5, 0x5a6a}, 0x10, 0x1260e, r1, 0x6, &(0x7f0000000800)=[r0, r6, r6, r2, r4, r0, r0, r0, r4], &(0x7f0000000840)=[{0x5, 0x1, 0x9, 0x8}, {0x3, 0x3, 0xc, 0x1}, {0x5, 0x2, 0x4}, {0x1, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x5, 0xc}, {0x2, 0x2, 0xb, 0x8}], 0x10, 0x6}, 0x90) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r12, &(0x7f0000000380), 0x20000000}, 0x20) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r12}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r13}, 0x10) recvmsg(r9, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)}, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) close(r14) 696.605223ms ago: executing program 4 (id=996): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=0x0, @ANYRES32, @ANYRES16=r1], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r5}, &(0x7f0000000480), &(0x7f00000004c0)=r4}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x13, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x18, 0xc, &(0x7f00000002c0)=ANY=[@ANYRES32=r3, @ANYRES32=r2], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3e, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x9}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780), 0x37d3c035aeef212a}, 0x10210, 0x88, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r10, &(0x7f0000000140)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40305829, &(0x7f0000000040)) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000007d00000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xf, 0x4, 0x8000, 0x1, 0x1, 0x98, '\x00', 0x0, r10, 0x5, 0x2, 0x3, 0x7}, 0xfffffffffffffee1) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001540)={{r13}, &(0x7f00000014c0), &(0x7f0000001500)=r11}, 0x20) perf_event_open(&(0x7f0000002180)={0x2, 0x80, 0x4f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x11, 0x0, 0x0, 0x0) r14 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000003f0ffff95", @ANYRES32=r12, @ANYRESHEX=r6, @ANYRES32=r9, @ANYRES32=r4], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r14}, 0x10) 551.565005ms ago: executing program 3 (id=999): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63bf, 0x8, 0x100000000}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000800000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095000000000000002a53993ef43c94600501d5de405ff5911ebe065d2a54ddcac5c6a997a62735dd9b1cb479886e469c18946684a1980b6c70ff0d6c95e39614d6478f8190b3972be6cc3fd40ec182ef7638121b773bbe7492468e7a2afde25be3ab6beee237b14cbc8dc47708b70bdb2c10235b76a8179fa2f76f8b59c843841c5085645026fa2799c993549d9331fe81fe72fcf4555fdea1e4c3c3b74f5223ac6fc78da44c84cdbfa9c6f80e4c19f5", @ANYRES8=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000bc0)={{r2}, &(0x7f0000000b40), &(0x7f0000000b80)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x3, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) r7 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r7, 0x0, 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xb, 0x1b, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r8, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 513.888598ms ago: executing program 3 (id=1000): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000080000000000000000067000080200200009500000000000000bc94efa352961cc1f7db0a75fe693d255777b18239088bb689b4bd6bd3b87f3ce4e17455768c8d9d0561e265"], &(0x7f0000000040)='GPL\x00', 0x5, 0xd2, &(0x7f0000000080)=""/210}, 0x90) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2c0280, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000200)={'wlan1\x00', @remote}) (async) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000200)={'wlan1\x00', @remote}) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000001812"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000001812"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) syz_clone(0x100000, &(0x7f0000000240)="8914bbde8839e9c8c91e4458cd7a632e9b0fb9b8de61d9f9213de1f7d4013362b5ef95d97d0ef62822b87bfca3dc107384a2047db2c75c3e454012e7a11b5253b3768294095f87a95c527fbf723a7309f98ce748f4a62fdf2c6a08fe1b4f81ca83aaa2826af0e1f5ddfe098b33003bd1230c92c7d39688c83dc16f6fc6274ef3359305cebab5242ee1742156da38147b45702509f9151263ec7a5416033e7b4ba2203548bca367c812bf4839629029cc76b762055d75fda61d877aa559733fe1", 0xc0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="bb5ae544dcafb97e540b622433d466181ed6f8dd3556e1f7752e24c68f1fc7d43efe06fe1913fc565d94a8af46e0f4bdb7e2baf6ea27b8e3691fb1a002e7aa6b42d130d53f51c69e1efc57c17c3e32b2edb1e3ead4fcd0e8412360c4b018ed5b37c10a337a625c026c4b4243abfe623eeb5a0c6a4489b25012fedcc3cd3e171022abe769c1cffde2b930628f58d21f4866ef1841e57d5a53148145689e27504945cbc3a2") 513.654508ms ago: executing program 3 (id=1001): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7, 0x4, 0x8, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000280)}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="8100000000000000000008000000000018110000ae3475ea51927ed82828", @ANYRES32=r3, @ANYBLOB="0000000000000000b708000000000000798af8ff00000000bfa200000000000007020000f8ffffffb703feffffff0000b7040000000000008500000017"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b80)={0x6, 0x13, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000061000000000000000700000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000000000fff000000086000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000880)='GPL\x00', 0x8, 0x8f, &(0x7f00000008c0)=""/143, 0x41100, 0xb, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x6, 0x0, 0x5a0}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b40)=[0xffffffffffffffff, r2, r3, r3, r1, r2, r2, r2], 0x0, 0x10, 0xd}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='ext4_sync_file_exit\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000c80)='blkio.throttle.io_service_bytes_recursive\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)=""/200}, 0x20) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d00)={&(0x7f0000000cc0)='xen_cpu_set_ldt\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x8, 0x1}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000f82818110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='mm_page_alloc\x00', r9}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=@base={0x16, 0x0, 0xb161, 0x2}, 0xfffffffffffffdea) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r10, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r11, 0x0, &(0x7f0000001780)=""/4096}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0xd0a13900, 0x0, 0x59, 0x0, 0x0, 0x0) 512.783438ms ago: executing program 0 (id=1002): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800a2dc5ffa29bbbb081a840500"/32, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x5e5bc1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xd132}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000f2f40018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x10) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000380)="93702f29d15f8da9577028c22914d463fbcd4e72dcb218558e0be19109b36ef762d3c5d952d5a6049fda6f14833fbd9f51eb333e05055ceee8e1137442627cb6b0669379ec9ccfc5986541ba6ffb3d610ba10b30ec1f7c97576e00b50971ada538fd2611889aa0bde79712", 0x6b}, {&(0x7f0000000580)="b5f6a20a1d66a51927ee32462767f0234c95075c8be8c8347d8fbac87fa29e0c6690a5da28dad394d9bc122d22bd6e2bf7df924bd8061ba93d15c8f64e36e2d4d056dd762a5785670657fff836aa4f429a3cb0654f256a849dbf6575dbd063b552d7a5f1e2ce87ce9d66e77326da14decbfda5373fbe495219bd720a611b9fa555f3ea5da763c87f80f4bd684d7d32ec2cc655caa2a659b4fc5d1b6e37a13cbabebab2d56507a4adaee8a76c83ad808d83bddef3ab1facefe7bca18e02578d5fce685a39de45c5853410b2654d574c8bcbacb112", 0xd4}, {&(0x7f0000000680)="81331f6bb51dd157d16590c42bb82b415ff2f7d88fb1539a7f72b46b2bb337e2058381cc9c5835dce0f013ece0a25e511eec38f90f0304307d9c47bcee3fb0d2f93a3051acc5a0b945d0e7b34eda1cc9208c9a81235ac8357965be585f96ab3c851500f0dbf8e92771f04879dd031bdff12b43fce917a0464ce7b3", 0x7b}, {&(0x7f00000008c0)="01765a45ec7a7f02dc8a42ac231bd0ccf9b086dff953cdd060a6b3dce446a2b65e0fe735537a55563355f2a6dd232f4c98c843770c444096737be4a0623188b187f4b2c650b6e290db8c8ae542420935da8a309e01b4f33576f1e0b8403e8c56159680188f948bc55deea6232e8ab555f5fd15c65f4bb5ad32ba39ed010a71c211ad2f10ef46673ca15b848c7e9474fc4389bd7d36b276476904701536db4601cd7493e385da49ba4aa7a80296e156e4f5f938cb443212ee4d89566beb38a56ba6b6084ce032962b09468f294a0b2133c0950b31486e8926fef427405367800f2f0c32ffd2f1c7fd2dda39b59bedba56d7f6a6", 0xf3}, {&(0x7f0000000280)="2d3c817fe96af77a701c8ffd9d98c704de1b9ded8a4f1afe7f84e6ecd302a8b4fafff69af3902a5507fc924e7b28855308", 0x31}, {&(0x7f0000000780)="15eb7e2000607010e44c3df828033fdbc276535eb1b20a76bcef97b9342852140ae7f7ef90561ae12e910c153b17a08ef2d73d8eced5e18b9d924cf8352755e1a6fd899810f2e6dac13844d1f47ebc367d5776c90a280a6128c8fd4150392ffe579122ddea62d5fd8dd16f416554749b6a8891ae111144ff78fc2e09", 0x7c}, {&(0x7f0000000a40)="bab135b5ef2116e980c36eff4efad554cbcb02cacc5bbca24e59ce7780b727ef3e654e5412a995b31f930b68bf24c26f0630a6ca915808e62066188f68e85c50ecc41263099fed4686a943130facb4ddb0cd7cff18520fb47a60", 0x5a}], 0x7, &(0x7f0000000400)="c85bef2e00430bce9e4863c942fb036be5c07c8d09479ff0812051157ead8eabdc12c07983", 0x25, 0x11}, 0x40000) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000140)='mm_page_alloc\x00', r4}, 0x10) (rerun: 64) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0}, 0x90) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r9}, 0x10) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x1c, &(0x7f00000003c0)=ANY=[@ANYBLOB="181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b70500000800000085000000a500000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7", @ANYRESHEX=r6, @ANYRES32=r11, @ANYRES16=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r12}, 0x10) (async, rerun: 32) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) (async, rerun: 32) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[], 0x6e8a) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00', r13}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00'}, 0x10) 442.462953ms ago: executing program 2 (id=1003): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000680)={{r1}, &(0x7f0000000600), &(0x7f0000000640)='%ps \x00'}, 0x20) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x6}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000800)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018140000", @ANYRES32=r3, @ANYBLOB="00000000000000001600000001000000180000000000000000000000000000009500000000000000360a000000000000180200002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000720afbff0000000485000000060000009500000000000000d582a27ce32b3947c7c45798672fcaf17e2b51e4404c630e959cc93ee9330cfe642b3f8ba76956f1fc3004640135562bf8621156cc6699e3075b151c08388c0ca3aeff2b52cdca7798f1354cf55fc4a3dcec3062ac8d686ad3dd8a4b4a7fda190a97bea718"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x78) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x4, &(0x7f0000000040)=[{0x2, 0x9, 0x9, 0x4}, {0x1000, 0x2, 0x7}, {0xc, 0x1, 0x8, 0x8}, {0xe, 0x4d, 0xff, 0x2}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000000140)=""/192}, 0x80) 442.185184ms ago: executing program 0 (id=1004): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000380000003800000003000000010000000000000e0300000000000000000000000000000105002d1a40b100000000000000000003000000000100000002000000000000000061"], 0x0, 0x53}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r4}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x6, 0x7, 0x10001, 0x8, 0x3f82, 0xffffffffffffffff, 0x0, '\x00', 0x0, r3, 0x0, 0x40000000}, 0x48) r7 = getpid() perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x3, 0x1, 0x8, 0x40, 0x0, 0x3, 0x241, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0xd}, 0x4048, 0x8000000000000001, 0x481115c, 0x6, 0x8, 0x5, 0x1, 0x0, 0x5, 0x0, 0xfff}, r7, 0xd, r5, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f0000002480)={0xfffffffffffffffd, 0x0, 0x0, 0xfffffeaa}, 0x0) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x2000, 0x0) ioctl$TUNSETQUEUE(r9, 0x400454d9, &(0x7f00000002c0)={'bond_slave_0\x00', 0x200}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000700)=0xfffffffffffffffa) bpf$PROG_LOAD(0x5, 0x0, 0x0) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r11 = openat$cgroup_int(r10, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r12, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r13 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r13, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r12, 0x400454d9, &(0x7f00000005c0)={'ip6gretap0\x00', 0x400}) ioctl$TUNSETQUEUE(r13, 0x400454d9, &(0x7f00000000c0)={'erspan0\x00', 0x400}) close(0x3) write$cgroup_subtree(r11, &(0x7f0000000280)=ANY=[], 0x31) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000440)={0x1b, 0x0, 0x0, 0xf137, 0x0, 0x1, 0xf7ac, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x1}, 0x48) 423.987665ms ago: executing program 1 (id=1005): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000004f852b3418110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r0, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000001240)='block_split\x00', r2}, 0x10) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0x1c, &(0x7f0000001840)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}, {}, {0x85, 0x0, 0x0, 0x69}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000e80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r2, 0xfffffffffffffec9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000340)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000240), &(0x7f00000002c0)=[0x0, 0x0], 0x0, 0x50, &(0x7f0000000300)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000080), &(0x7f0000000380), 0xfffffffffffffcb0, 0xa6, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x15, 0x9, 0xe000000, 0x9, 0x1081, r3, 0x3f, '\x00', r5, r6, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xb, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x0, 0x7, 0x6, 0x1, 0x8, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x3, 0x4, 0xa, 0x2, 0x2, 0x1}, @call={0x85, 0x0, 0x0, 0x63}, @exit, @ldst={0x0, 0x1, 0x3, 0x4, 0x4, 0x30, 0x10}]}, &(0x7f00000001c0)='GPL\x00', 0x1f9a4282, 0x21, &(0x7f0000000200)=""/33, 0x40f00, 0x2, '\x00', r1, 0x0, r6, 0x8, &(0x7f0000000300)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x5, 0xc, 0x10000, 0x5}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000500)=[r0], &(0x7f0000000540)=[{0x5, 0x4, 0xf, 0x2}, {0x0, 0x2, 0x3, 0x3}, {0x4, 0x1, 0x4, 0x9}, {0x4, 0x3, 0x4, 0xa}, {0x0, 0x5, 0x9, 0x6}, {0x1, 0x4, 0x1, 0x7}]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={0xffffffffffffffff, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0, 0x0, 0x0], 0x0, 0x3f, &(0x7f00000009c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000a00), &(0x7f0000000a40), 0x8, 0xce, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=@bloom_filter={0x1e, 0x2, 0x1a8, 0x3, 0x22, r0, 0x5, '\x00', r7, 0xffffffffffffffff, 0x5, 0x0, 0x5, 0x4}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights, @rights, @rights], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0x8}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000004f852b3418110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r0, 0x58, &(0x7f0000000440)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000001240)='block_split\x00', r2}, 0x10) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0x1c, &(0x7f0000001840)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}, {}, {0x85, 0x0, 0x0, 0x69}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000e80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r2, 0xfffffffffffffec9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000340)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000240), &(0x7f00000002c0)=[0x0, 0x0], 0x0, 0x50, &(0x7f0000000300)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000080), &(0x7f0000000380), 0xfffffffffffffcb0, 0xa6, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x15, 0x9, 0xe000000, 0x9, 0x1081, r3, 0x3f, '\x00', r5, r6, 0x4, 0x1, 0x4}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xb, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x0, 0x7, 0x6, 0x1, 0x8, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x3, 0x4, 0xa, 0x2, 0x2, 0x1}, @call={0x85, 0x0, 0x0, 0x63}, @exit, @ldst={0x0, 0x1, 0x3, 0x4, 0x4, 0x30, 0x10}]}, &(0x7f00000001c0)='GPL\x00', 0x1f9a4282, 0x21, &(0x7f0000000200)=""/33, 0x40f00, 0x2, '\x00', r1, 0x0, r6, 0x8, &(0x7f0000000300)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x5, 0xc, 0x10000, 0x5}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000500)=[r0], &(0x7f0000000540)=[{0x5, 0x4, 0xf, 0x2}, {0x0, 0x2, 0x3, 0x3}, {0x4, 0x1, 0x4, 0x9}, {0x4, 0x3, 0x4, 0xa}, {0x0, 0x5, 0x9, 0x6}, {0x1, 0x4, 0x1, 0x7}]}, 0x90) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={0xffffffffffffffff, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0, 0x0, 0x0], 0x0, 0x3f, &(0x7f00000009c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000a00), &(0x7f0000000a40), 0x8, 0xce, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=@bloom_filter={0x1e, 0x2, 0x1a8, 0x3, 0x22, r0, 0x5, '\x00', r7, 0xffffffffffffffff, 0x5, 0x0, 0x5, 0x4}, 0x48) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd"], 0xfdef) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) (async) close(r9) (async) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights, @rights, @rights], 0x18}, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) (async) 389.372638ms ago: executing program 1 (id=1006): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0xfffffffffffffff8}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) 326.541193ms ago: executing program 1 (id=1007): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x19, 0x4, 0x8, 0x3}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x6, 0x15, &(0x7f0000001480)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f900001ab703000008000000b704000000001500850000003300000095"], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 326.093533ms ago: executing program 3 (id=1008): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x93, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x90) 324.264033ms ago: executing program 1 (id=1009): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x2}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 311.864074ms ago: executing program 2 (id=1010): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000009000000000000000100001302000000030000000000000000000000000000695f2e"], 0x0, 0x39}, 0x20) 298.761975ms ago: executing program 1 (id=1011): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900), 0x48) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x0) write$cgroup_devices(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e030800dd5c98012c9e63"], 0xffdd) 246.62328ms ago: executing program 2 (id=1012): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000090000000500000000000013020000000000000000615f"], 0x0, 0x2d}, 0x20) 246.32158ms ago: executing program 3 (id=1013): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 244.30454ms ago: executing program 2 (id=1014): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000006b114900000000008510000002000000850000000000000095003300000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb8000000}, 0x70) 227.277221ms ago: executing program 2 (id=1015): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1, 0x7, 0x10001, 0xb}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000000000000000000000000000730129000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8903, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x2, &(0x7f0000000040)=[{}, {0x6}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0xffffffffffffffff}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='freezer.parent_freezing\x00', 0x275a, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000140)='io.pressure\x00', 0x2, 0x0) write$cgroup_pressure(r3, &(0x7f0000000340)={'some', 0x20, 0x7, 0x20, 0xffffa}, 0x2f) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x18}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc4, 0x0, @perf_config_ext, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x70cb0}], 0xc}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000002500)=[{&(0x7f0000002440)="11", 0x1}], 0x1}, 0x0) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000100), 0x1001) 170.824146ms ago: executing program 0 (id=1016): perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000407b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x2, 0x4, 0x10008, 0x1}, 0x48) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) close(0xffffffffffffffff) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, 0x0, 0x0}, 0x90) (async) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) (async) close(0xffffffffffffffff) (async, rerun: 64) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async, rerun: 64) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) bpf$BPF_GET_PROG_INFO(0x1c, 0x0, 0x0) (async) bpf$PROG_LOAD(0x1c, &(0x7f00000003c0)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xb, 0x4, &(0x7f0000000500)=ANY=[@ANYBLOB="b400000000000000dd0a00000000000073013e00000000009500000000000000fa2d2ab198a490c94eacb36567704239e41d818590b16bf8e75e57325351151de0b9fb1210bd3b14c707d8e6af42d2d58a63343450329e35555f789dd235beeb4e4427042705d60fe8ba47e6264e5d513970a947be64015a773f4ffb0c530727587dedfdbded794759cead9f0f42c2148aaa6d881902c1efec3c8dc140de9075c33b249a8b7472d0299758cbb1e1601e919cd1f6cd34e0409808db2a4df61d764163fc9f2849c8ce824a98273820675ccd7439"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7, 0x0, 0xffffffffffffffff, 0x300}, 0x48) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000003c0)='mm_page_alloc\x00', r2}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 34.446457ms ago: executing program 0 (id=1017): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x37}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000017000012000000000000000071120500000000009500000200000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x80) r2 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000440)={0x1b, 0x0, 0x0, 0x8, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x19, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000400001f80000000003d0000c3399cb61600899c8dff8f8416d80018110021e9977763b5b836bff14353cb7dae35f2ffa7ee8aa2e7961bc11a6082a29307ae193f4682aa04d5261627e891090000000000", @ANYRES16=r1], &(0x7f0000000240)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x90) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = openat$cgroup_ro(r3, 0x0, 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000100), 0x12) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x8, &(0x7f0000001940)=ANY=[@ANYBLOB], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x15, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x6, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB='&'], 0x0}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETLINK(r7, 0x400454cd, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8946, &(0x7f00000000c0)={'bridge_slave_1\x00', @random='\x00\x00\x00 \x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r5}, 0x10) ioctl$SIOCSIFHWADDR(r4, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xe}}) socketpair(0x3, 0x6, 0x1, &(0x7f0000000400)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000880)={{}, &(0x7f0000000800), &(0x7f0000000840)='%pS \x00'}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0x5ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 0s ago: executing program 2 (id=1018): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffcad}, 0x90) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) unlink(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (async, rerun: 32) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) (async, rerun: 32) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000d62b0000611060"], 0x0}, 0x90) (async) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0x0, r0, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) (async, rerun: 32) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) (rerun: 32) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r3}, 0x0, &(0x7f0000000040)}, 0x20) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r4 = syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) (async) close(0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_remove_blocks\x00'}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async, rerun: 32) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xe, 0x0, 0x0, 0x8000}, 0x48) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006100000018110000", @ANYRES32=r6, @ANYRESHEX=r4], &(0x7f0000000200)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.168' (ED25519) to the list of known hosts. [ 21.090531][ T24] audit: type=1400 audit(1720354064.230:66): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.091751][ T273] cgroup: Unknown subsys name 'net' [ 21.112985][ T24] audit: type=1400 audit(1720354064.230:67): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.139862][ T24] audit: type=1400 audit(1720354064.260:68): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.140053][ T273] cgroup: Unknown subsys name 'devices' [ 21.279160][ T273] cgroup: Unknown subsys name 'hugetlb' [ 21.284669][ T273] cgroup: Unknown subsys name 'rlimit' [ 21.506951][ T24] audit: type=1400 audit(1720354064.640:69): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.530015][ T24] audit: type=1400 audit(1720354064.640:70): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.532582][ T276] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.554490][ T24] audit: type=1400 audit(1720354064.650:71): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 21.585768][ T24] audit: type=1400 audit(1720354064.710:72): avc: denied { relabelto } for pid=276 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.610981][ T24] audit: type=1400 audit(1720354064.710:73): avc: denied { write } for pid=276 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.639822][ T24] audit: type=1400 audit(1720354064.780:74): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.665128][ T24] audit: type=1400 audit(1720354064.780:75): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.665199][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.147920][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.154762][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.162208][ T284] device bridge_slave_0 entered promiscuous mode [ 22.169827][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.176660][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.183922][ T284] device bridge_slave_1 entered promiscuous mode [ 22.241856][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.248864][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.255946][ T283] device bridge_slave_0 entered promiscuous mode [ 22.274659][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.281535][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.288756][ T286] device bridge_slave_0 entered promiscuous mode [ 22.295236][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.302394][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.309552][ T283] device bridge_slave_1 entered promiscuous mode [ 22.323784][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.330685][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.337926][ T282] device bridge_slave_0 entered promiscuous mode [ 22.344366][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.351245][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.358352][ T286] device bridge_slave_1 entered promiscuous mode [ 22.374814][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.381768][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.389001][ T282] device bridge_slave_1 entered promiscuous mode [ 22.415116][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.422041][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.429197][ T285] device bridge_slave_0 entered promiscuous mode [ 22.437813][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.444642][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.451943][ T285] device bridge_slave_1 entered promiscuous mode [ 22.567784][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.574631][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.581751][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.588531][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.596834][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.603679][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.610762][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.617563][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.640438][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.647292][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.654352][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.661190][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.688920][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.695859][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.702960][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.710314][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.717416][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.724362][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.731360][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.758334][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.766287][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.773134][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.780731][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.788950][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.795766][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.827589][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.835427][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.843597][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.851927][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.859778][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.866924][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.874057][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.882064][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.890010][ T53] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.896837][ T53] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.904094][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.912151][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.920115][ T53] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.926958][ T53] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.934163][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.942125][ T53] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.948966][ T53] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.956091][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.963966][ T53] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.970797][ T53] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.978128][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.990172][ T286] device veth0_vlan entered promiscuous mode [ 22.997466][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.004962][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.012961][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.020600][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.027815][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.035714][ T15] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.042466][ T15] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.067575][ T287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.075252][ T287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.083369][ T287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.091185][ T287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.098862][ T287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.106731][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.113512][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.127577][ T287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.135271][ T287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.147771][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.156082][ T286] device veth1_macvtap entered promiscuous mode [ 23.167462][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.175575][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.196236][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.203764][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.211306][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.218945][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.226627][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.234649][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.242743][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.250842][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.258814][ T53] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.265621][ T53] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.272861][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.280932][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.289015][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.297056][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.305076][ T53] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.311907][ T53] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.320254][ T284] device veth0_vlan entered promiscuous mode [ 23.328424][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.335666][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.343111][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.350638][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.358877][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.375509][ T283] device veth0_vlan entered promiscuous mode [ 23.387280][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.395402][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.404159][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.413010][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.420931][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.428597][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.436595][ T282] device veth0_vlan entered promiscuous mode [ 23.446934][ T283] device veth1_macvtap entered promiscuous mode [ 23.455580][ T286] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 23.458362][ T284] device veth1_macvtap entered promiscuous mode [ 23.473306][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.486535][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.494941][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.502837][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.510231][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.518310][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.526200][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.533833][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.542014][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.550155][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.557681][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.565528][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.592205][ T282] device veth1_macvtap entered promiscuous mode [ 23.604992][ T287] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.614527][ T287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.623356][ T287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.632168][ T287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.640159][ T287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.648432][ T287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.656568][ T287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.664421][ T287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.672488][ T287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.680723][ T287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.689157][ T287] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.696540][ T287] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.704918][ T287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.716321][ T287] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.724665][ T287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.739881][ T285] device veth0_vlan entered promiscuous mode [ 23.758696][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.765948][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.767174][ C1] hrtimer: interrupt took 28759 ns [ 23.773617][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.786048][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.794417][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.802420][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.810530][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.818638][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.844886][ T285] device veth1_macvtap entered promiscuous mode [ 23.853354][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.861736][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.869927][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.976859][ T336] device veth0_vlan left promiscuous mode [ 23.989160][ T336] device veth0_vlan entered promiscuous mode [ 23.999621][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.050934][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.059888][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.068244][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.214049][ T347] device syzkaller0 entered promiscuous mode [ 24.260939][ T371] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.268010][ T371] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.279355][ T375] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.286468][ T375] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.300484][ T375] device bridge_slave_1 left promiscuous mode [ 24.306633][ T375] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.314478][ T375] device bridge_slave_0 left promiscuous mode [ 24.320733][ T375] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.062409][ T428] cgroup: syz.1.34 (428) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 25.162698][ T428] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 25.894579][ T543] device syzkaller0 entered promiscuous mode [ 26.243616][ T565] device pim6reg1 entered promiscuous mode [ 26.268943][ T567] device syzkaller0 entered promiscuous mode [ 26.288239][ T24] kauditd_printk_skb: 41 callbacks suppressed [ 26.288252][ T24] audit: type=1400 audit(1720354069.430:117): avc: denied { create } for pid=571 comm="syz.4.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 26.341018][ T24] audit: type=1400 audit(1720354069.460:118): avc: denied { create } for pid=573 comm="syz.1.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 27.177970][ T648] device pim6reg1 entered promiscuous mode [ 27.291224][ T24] audit: type=1400 audit(1720354070.430:119): avc: denied { create } for pid=653 comm="syz.1.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 28.557694][ T24] audit: type=1400 audit(1720354071.700:120): avc: denied { setopt } for pid=742 comm="syz.4.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.748274][ T808] device veth1_macvtap left promiscuous mode [ 28.842548][ T815] device batadv_slave_1 entered promiscuous mode [ 28.864079][ T816] device veth1_macvtap entered promiscuous mode [ 28.871092][ T816] device macsec0 entered promiscuous mode [ 28.965315][ T834] device syzkaller0 entered promiscuous mode [ 29.252544][ T848] syz.2.154[848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.252601][ T848] syz.2.154[848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.717494][ T869] device vxcan1 entered promiscuous mode [ 29.886881][ T892] device syzkaller0 entered promiscuous mode [ 30.178518][ T24] audit: type=1400 audit(1720354073.310:121): avc: denied { create } for pid=900 comm="syz.0.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 30.351639][ T24] audit: type=1400 audit(1720354073.440:122): avc: denied { create } for pid=912 comm="syz.4.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 30.379923][ T24] audit: type=1400 audit(1720354073.470:123): avc: denied { create } for pid=909 comm="syz.1.171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.410953][ T24] audit: type=1400 audit(1720354073.470:124): avc: denied { write } for pid=909 comm="syz.1.171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.440766][ T24] audit: type=1400 audit(1720354073.570:125): avc: denied { read } for pid=929 comm="syz.3.175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.542628][ T936] device syzkaller0 entered promiscuous mode [ 30.788403][ T978] device sit0 entered promiscuous mode [ 31.119246][ T24] audit: type=1400 audit(1720354074.260:126): avc: denied { create } for pid=989 comm="syz.2.194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 31.227722][ T997] device pim6reg1 entered promiscuous mode [ 31.864106][ T1050] device pim6reg1 entered promiscuous mode [ 32.008782][ T24] kauditd_printk_skb: 4 callbacks suppressed [ 32.008794][ T24] audit: type=1400 audit(1720354075.150:131): avc: denied { setopt } for pid=1101 comm="syz.4.220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 32.198467][ T1135] device syzkaller0 entered promiscuous mode [ 32.375997][ T1159] device syzkaller0 entered promiscuous mode [ 32.570742][ T24] audit: type=1400 audit(1720354075.710:132): avc: denied { create } for pid=1186 comm="syz.2.246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 32.780790][ T1200] ------------[ cut here ]------------ [ 32.786803][ T24] audit: type=1400 audit(1720354075.920:133): avc: denied { create } for pid=1204 comm="syz.0.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 32.856993][ T1200] trace type BPF program uses run-time allocation [ 32.897485][ T1200] WARNING: CPU: 1 PID: 1200 at kernel/bpf/verifier.c:10480 check_map_prog_compatibility+0x65b/0x7c0 [ 32.978075][ T1200] Modules linked in: [ 32.981809][ T1200] CPU: 1 PID: 1200 Comm: syz.3.250 Not tainted 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 33.067306][ T1200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 33.094029][ T1215] syz.0.253[1215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.094088][ T1215] syz.0.253[1215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.183260][ T1200] RIP: 0010:check_map_prog_compatibility+0x65b/0x7c0 [ 33.204203][ T1200] Code: c8 e9 84 fe ff ff e8 44 f5 ee ff 31 db e9 85 fe ff ff e8 38 f5 ee ff c6 05 8e ef 64 05 01 48 c7 c7 e0 71 45 85 e8 55 7f c2 ff <0f> 0b e9 42 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 17 fa ff [ 33.225419][ T1200] RSP: 0018:ffffc90000e66f90 EFLAGS: 00010246 [ 33.234446][ T1200] RAX: 35367ede4e137500 RBX: ffff888115c3d800 RCX: ffff888115ba3b40 [ 33.242470][ T1200] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 33.251867][ T1200] RBP: ffffc90000e66fd0 R08: ffffffff81521de8 R09: ffffed103ee2a5f8 [ 33.259932][ T1200] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 33.270972][ T1200] R13: 1ffff92000017204 R14: ffff888112e6c000 R15: ffffc900000b9020 [ 33.282245][ T1215] device pim6reg1 entered promiscuous mode [ 33.288178][ T1200] FS: 00007f58e198a6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 33.298085][ T1200] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 33.304552][ T1200] CR2: 000000110c2d1b1b CR3: 00000001105aa000 CR4: 00000000003506a0 [ 33.337095][ T1200] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 33.351504][ T1200] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 33.368222][ T1200] Call Trace: [ 33.374657][ T1200] ? show_regs+0x58/0x60 [ 33.382216][ T1200] ? __warn+0x160/0x2f0 [ 33.397365][ T1200] ? check_map_prog_compatibility+0x65b/0x7c0 [ 33.432700][ T1200] ? report_bug+0x3d9/0x5b0 [ 33.452721][ T1200] ? check_map_prog_compatibility+0x65b/0x7c0 [ 33.495404][ T1200] ? handle_bug+0x41/0x70 [ 33.540053][ T1200] ? exc_invalid_op+0x1b/0x50 [ 33.628831][ T1200] ? asm_exc_invalid_op+0x12/0x20 [ 33.633703][ T1200] ? wake_up_klogd+0xb8/0xf0 [ 33.708888][ T1200] ? check_map_prog_compatibility+0x65b/0x7c0 [ 33.717317][ T1200] ? __fdget+0x1bc/0x240 [ 33.721385][ T1200] resolve_pseudo_ldimm64+0x586/0x1020 [ 33.726677][ T1200] ? bpf_check+0xf2b0/0xf2b0 [ 33.771552][ T24] audit: type=1400 audit(1720354076.910:134): avc: denied { create } for pid=1252 comm="syz.1.263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 33.895469][ T1200] ? kvmalloc_node+0x82/0x130 [ 33.905459][ T1200] bpf_check+0xaf21/0xf2b0 [ 33.934689][ T1200] ? stack_depot_save+0xe/0x10 [ 33.943424][ T24] audit: type=1400 audit(1720354076.940:135): avc: denied { ioctl } for pid=1245 comm="syz.0.260" path="socket:[16325]" dev="sockfs" ino=16325 ioctlcmd=0x8907 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.978330][ T1200] ? __se_sys_bpf+0x9856/0x11cb0 [ 33.993834][ T1200] ? sched_clock+0x3a/0x40 [ 34.055888][ T1200] ? 0xffffffffa002c000 [ 34.067958][ T1200] ? bpf_get_btf_vmlinux+0x60/0x60 [ 34.076252][ T1200] ? __kernel_text_address+0x9b/0x110 [ 34.081784][ T1200] ? unwind_get_return_address+0x4d/0x90 [ 34.087579][ T1200] ? arch_stack_walk+0xf3/0x140 [ 34.092264][ T1200] ? stack_trace_save+0x113/0x1c0 [ 34.103676][ T1200] ? stack_trace_snprint+0xf0/0xf0 [ 34.109374][ T1200] ? stack_trace_snprint+0xf0/0xf0 [ 34.114313][ T1200] ? selinux_bpf_prog_alloc+0x51/0x140 [ 34.131199][ T1200] ? selinux_bpf_prog_alloc+0x51/0x140 [ 34.139771][ T1200] ? ____kasan_kmalloc+0xed/0x110 [ 34.144612][ T1200] ? ____kasan_kmalloc+0xdb/0x110 [ 34.146099][ T1275] device syzkaller0 entered promiscuous mode [ 34.156357][ T1200] ? __kasan_kmalloc+0x9/0x10 [ 34.161185][ T1200] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 34.169310][ T1200] ? selinux_bpf_prog_alloc+0x51/0x140 [ 34.174632][ T1200] ? security_bpf_prog_alloc+0x62/0x90 [ 34.202893][ T1200] ? __se_sys_bpf+0x9f8c/0x11cb0 [ 34.207922][ T1200] ? __x64_sys_bpf+0x7b/0x90 [ 34.212323][ T1200] ? do_syscall_64+0x34/0x70 [ 34.223352][ T1200] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 34.229905][ T1200] ? __kasan_kmalloc+0x9/0x10 [ 34.268028][ T1200] __se_sys_bpf+0x107a2/0x11cb0 [ 34.298466][ T1200] ? futex_wait+0x6a0/0x7c0 [ 34.302797][ T1200] ? __x64_sys_bpf+0x90/0x90 [ 34.437500][ T1200] ? do_futex+0x17b0/0x17b0 [ 34.467357][ T1200] ? do_futex+0x139a/0x17b0 [ 34.471749][ T1200] ? futex_exit_release+0x1e0/0x1e0 [ 34.476720][ T1200] ? __kasan_check_read+0x11/0x20 [ 34.548505][ T1200] ? __se_sys_futex+0x355/0x470 [ 34.603682][ T1200] ? fpu__clear_all+0x20/0x20 [ 34.657280][ T1200] ? __kasan_check_read+0x11/0x20 [ 34.662152][ T1200] __x64_sys_bpf+0x7b/0x90 [ 34.666383][ T1200] do_syscall_64+0x34/0x70 [ 34.735468][ T1200] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 34.813143][ T1200] RIP: 0033:0x7f58e2729bd9 [ 34.877191][ T1200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.906382][ T1200] RSP: 002b:00007f58e198a048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 34.916465][ T1304] device macsec0 entered promiscuous mode [ 34.922208][ T1200] RAX: ffffffffffffffda RBX: 00007f58e28b8038 RCX: 00007f58e2729bd9 [ 34.930052][ T1200] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 34.945400][ T1200] RBP: 00007f58e2798aa1 R08: 0000000000000000 R09: 0000000000000000 [ 34.959487][ T1200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 34.986165][ T1200] R13: 000000000000000b R14: 00007f58e28b8038 R15: 00007ffeb817b168 [ 34.998940][ T1200] ---[ end trace c90a8016bfbbf791 ]--- [ 35.049441][ T1317] device vxcan1 entered promiscuous mode [ 35.087675][ T1319] device syzkaller0 entered promiscuous mode [ 35.249343][ T1355] device syzkaller0 entered promiscuous mode [ 35.256362][ T1363] syz.4.297[1363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.256415][ T1363] syz.4.297[1363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.293899][ T24] audit: type=1400 audit(1720354078.430:136): avc: denied { append } for pid=1360 comm="syz.2.296" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 35.352568][ T1365] device syzkaller0 entered promiscuous mode [ 35.928646][ T24] audit: type=1400 audit(1720354079.070:137): avc: denied { create } for pid=1393 comm="syz.0.306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 35.969995][ T1407] syz.3.310[1407] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.970051][ T1407] syz.3.310[1407] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.087467][ T24] audit: type=1400 audit(1720354079.220:138): avc: denied { tracepoint } for pid=1408 comm="syz.4.311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 36.157744][ T1407] syz.3.310[1407] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.157792][ T1407] syz.3.310[1407] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.331229][ T1416] syz.4.314[1416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.343519][ T1416] syz.4.314[1416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.867275][ T1434] cgroup: fork rejected by pids controller in /syz0 [ 37.305060][ T1456] device syzkaller0 entered promiscuous mode [ 37.404855][ T1439] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.414339][ T1439] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.421879][ T1439] device bridge_slave_0 entered promiscuous mode [ 37.428756][ T1439] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.435585][ T1439] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.442896][ T1439] device bridge_slave_1 entered promiscuous mode [ 37.647111][ T1439] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.653982][ T1439] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.661079][ T1439] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.667872][ T1439] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.871390][ T1553] device veth0_vlan left promiscuous mode [ 37.884085][ T1553] device veth0_vlan entered promiscuous mode [ 37.895425][ T660] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.902723][ T660] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.018784][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.026028][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.051425][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 38.060312][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.077625][ T660] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.084474][ T660] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.112089][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 38.130049][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.147512][ T660] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.154370][ T660] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.177292][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 38.195365][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.225612][ T1439] device veth0_vlan entered promiscuous mode [ 38.270476][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 38.279495][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.288340][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 38.296541][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.305966][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 38.314007][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.341775][ T1439] device veth1_macvtap entered promiscuous mode [ 38.400199][ T1554] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 38.409394][ T1554] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 38.427006][ T1554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 38.435732][ T1554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.444158][ T1554] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 38.465457][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 38.489925][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.501181][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 38.510604][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.561705][ T24] audit: type=1400 audit(1720354081.700:139): avc: denied { mounton } for pid=1439 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=357 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 38.604847][ T1581] device pim6reg1 entered promiscuous mode [ 38.669938][ T1580] device pim6reg1 entered promiscuous mode [ 38.990109][ T7] device bridge_slave_1 left promiscuous mode [ 38.996073][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.052192][ T7] device bridge_slave_0 left promiscuous mode [ 39.062871][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.074823][ T7] device veth1_macvtap left promiscuous mode [ 39.080772][ T7] device veth0_vlan left promiscuous mode [ 39.221168][ T24] audit: type=1400 audit(1720354082.360:140): avc: denied { create } for pid=1628 comm="syz.3.363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 39.250192][ T1631] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.338590][ T1638] device veth1_macvtap left promiscuous mode [ 39.370445][ T1638] device macsec0 left promiscuous mode [ 39.809059][ T1684] device veth0_vlan left promiscuous mode [ 39.852077][ T1684] device veth0_vlan entered promiscuous mode [ 40.101525][ T24] audit: type=1400 audit(1720354083.240:141): avc: denied { ioctl } for pid=1689 comm="syz.0.375" path="mnt:[4026532875]" dev="nsfs" ino=4026532875 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 40.262793][ T1697] syz.4.377[1697] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.262850][ T1697] syz.4.377[1697] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.338300][ T1707] syz.3.380[1707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.372252][ T1707] syz.3.380[1707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.401738][ T1715] syz.3.380[1715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.415782][ T1716] syz.4.377[1716] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.427265][ T1715] syz.3.380[1715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.438465][ T1716] syz.4.377[1716] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.511263][ T1720] device pim6reg1 entered promiscuous mode [ 41.032832][ T24] audit: type=1400 audit(1720354084.170:142): avc: denied { create } for pid=1754 comm="syz.0.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 41.771191][ T1793] device pim6reg1 entered promiscuous mode [ 41.904287][ T1796] device veth0_vlan left promiscuous mode [ 41.933961][ T1796] device veth0_vlan entered promiscuous mode [ 41.978250][ T1796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 42.016372][ T1078] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 42.034017][ T1078] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 42.049801][ T1078] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 42.230469][ T24] audit: type=1400 audit(1720354085.370:143): avc: denied { create } for pid=1814 comm="syz.1.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 42.531231][ T24] audit: type=1400 audit(1720354085.670:144): avc: denied { create } for pid=1843 comm="syz.2.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 42.895037][ T1885] device syzkaller0 entered promiscuous mode [ 43.112197][ T1903] device wg2 entered promiscuous mode [ 43.562683][ T1936] device syzkaller0 entered promiscuous mode [ 43.819225][ T1969] syz.3.457[1969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.819286][ T1969] syz.3.457[1969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.850897][ T1973] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 44.145451][ T2022] device syzkaller0 entered promiscuous mode [ 44.216904][ T2038] device syzkaller0 entered promiscuous mode [ 44.295421][ T2040] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.303830][ T2040] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.373094][ T2047] device syzkaller0 entered promiscuous mode [ 44.402753][ T2040] device bridge_slave_1 left promiscuous mode [ 44.411037][ T2040] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.429729][ T2040] device bridge_slave_0 left promiscuous mode [ 44.437084][ T2040] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.702958][ T2089] device syzkaller0 entered promiscuous mode [ 44.744630][ T2095] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.772878][ T2095] device bridge_slave_1 left promiscuous mode [ 44.779893][ T2095] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.788500][ T2095] device bridge_slave_0 left promiscuous mode [ 44.794613][ T2095] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.956805][ T2113] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.964321][ T2113] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.971596][ T2113] device bridge_slave_0 entered promiscuous mode [ 44.995543][ T2113] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.009308][ T2113] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.018752][ T2113] device bridge_slave_1 entered promiscuous mode [ 45.354361][ T2126] device syzkaller0 entered promiscuous mode [ 45.647949][ T2152] device syzkaller0 entered promiscuous mode [ 45.700849][ T1550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 45.708382][ T1550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.733740][ T1554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 45.742681][ T1554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.750997][ T1554] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.757864][ T1554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.767969][ T1554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 45.776211][ T1554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.784548][ T1554] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.791431][ T1554] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.822313][ T1550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 45.837629][ T1550] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 45.854756][ T1550] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 45.879693][ T2113] device veth0_vlan entered promiscuous mode [ 45.894486][ T1546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.902783][ T1546] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 45.910891][ T1546] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 45.923280][ T1546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 45.940736][ T2113] device veth1_macvtap entered promiscuous mode [ 45.952772][ T2164] device pim6reg1 entered promiscuous mode [ 45.969366][ T1554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 45.989370][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 45.997652][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 46.135345][ T2193] device pim6reg1 entered promiscuous mode [ 46.555453][ T2255] device syzkaller0 entered promiscuous mode [ 46.668188][ T2278] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.784189][ T2296] syz.4.539[2296] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.924265][ T2301] device syzkaller0 entered promiscuous mode [ 47.996065][ T326] device veth1_macvtap left promiscuous mode [ 48.007386][ T326] device veth0_vlan left promiscuous mode [ 48.311962][ T2338] device syzkaller0 entered promiscuous mode [ 49.974706][ T2424] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 50.045400][ T2424] device syzkaller0 entered promiscuous mode [ 50.224835][ T2426] device veth0_vlan left promiscuous mode [ 50.268329][ T2426] device veth0_vlan entered promiscuous mode [ 50.979077][ T2461] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.986077][ T2461] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.160841][ T2499] ªªªªªªþ€: renamed from vlan0 [ 52.541628][ T2514] device pim6reg1 entered promiscuous mode [ 53.929092][ T24] audit: type=1400 audit(1720354097.070:145): avc: denied { create } for pid=2595 comm="syz.2.624" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 54.401999][ T2619] macvlan0: tun_chr_ioctl cmd 1074025681 [ 54.482659][ T2652] syz.2.640[2652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.482708][ T2652] syz.2.640[2652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.493414][ T2731] device sit0 entered promiscuous mode [ 57.439039][ T2778] device syzkaller0 entered promiscuous mode [ 58.498324][ T2901] device veth1_macvtap left promiscuous mode [ 58.560045][ T2901] device veth1_macvtap entered promiscuous mode [ 58.566131][ T2901] device macsec0 entered promiscuous mode [ 59.503528][ T2932] device pim6reg1 entered promiscuous mode [ 60.153154][ T2246] syz.0.526 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 60.232599][ T2246] CPU: 1 PID: 2246 Comm: syz.0.526 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 60.243614][ T2246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 60.253496][ T2246] Call Trace: [ 60.256632][ T2246] dump_stack_lvl+0x1e2/0x24b [ 60.261147][ T2246] ? panic+0x812/0x812 [ 60.265049][ T2246] ? bfq_pos_tree_add_move+0x43b/0x43b [ 60.270341][ T2246] ? ___ratelimit+0x3f7/0x580 [ 60.274859][ T2246] ? _raw_spin_lock+0xa4/0x1b0 [ 60.279453][ T2246] dump_stack+0x15/0x17 [ 60.283446][ T2246] dump_header+0xd8/0x6d0 [ 60.287614][ T2246] oom_kill_process+0xef/0x2d0 [ 60.292216][ T2246] out_of_memory+0x9bd/0xe10 [ 60.296645][ T2246] ? unregister_oom_notifier+0x20/0x20 [ 60.301931][ T2246] ? mutex_lock_killable+0xa5/0x110 [ 60.306973][ T2246] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 60.313305][ T2246] ? sched_clock_cpu+0x1b/0x3b0 [ 60.317998][ T2246] mem_cgroup_out_of_memory+0x2a8/0x380 [ 60.323377][ T2246] ? mem_cgroup_oom_trylock+0x3a0/0x3a0 [ 60.328758][ T2246] ? _raw_spin_trylock_bh+0x190/0x190 [ 60.333963][ T2246] ? mem_cgroup_oom_trylock+0x22d/0x3a0 [ 60.339345][ T2246] try_charge+0xff2/0x15f0 [ 60.343607][ T2246] ? __memcg_kmem_charge+0x180/0x180 [ 60.348725][ T2246] ? __kasan_check_write+0x14/0x20 [ 60.353663][ T2246] ? get_mem_cgroup_from_mm+0x186/0x1a0 [ 60.359047][ T2246] __mem_cgroup_charge+0x147/0x6e0 [ 60.363994][ T2246] shmem_add_to_page_cache+0x6a9/0x10c0 [ 60.369379][ T2246] ? shmem_alloc_page+0x420/0x420 [ 60.374240][ T2246] ? __irq_exit_rcu+0x40/0x150 [ 60.378834][ T2246] ? find_lock_entry+0x1df/0x200 [ 60.383607][ T2246] shmem_getpage_gfp+0xa65/0x2480 [ 60.388476][ T2246] ? schedule_preempt_disabled+0x20/0x20 [ 60.393951][ T2246] ? iov_iter_advance+0x827/0xb20 [ 60.398795][ T2246] ? shmem_getpage+0xa0/0xa0 [ 60.403220][ T2246] ? iov_iter_fault_in_readable+0x258/0x4f0 [ 60.409041][ T2246] ? __kasan_check_write+0x14/0x20 [ 60.413985][ T2246] ? _raw_spin_lock+0xa4/0x1b0 [ 60.418591][ T2246] ? _raw_spin_trylock_bh+0x190/0x190 [ 60.423793][ T2246] shmem_write_begin+0xca/0x1b0 [ 60.428498][ T2246] generic_perform_write+0x2cd/0x570 [ 60.433601][ T2246] ? file_remove_privs+0x2af/0x570 [ 60.438901][ T2246] ? grab_cache_page_write_begin+0xa0/0xa0 [ 60.444534][ T2246] ? file_remove_privs+0x570/0x570 [ 60.449487][ T2246] ? __kasan_check_write+0x14/0x20 [ 60.454435][ T2246] __generic_file_write_iter+0x23c/0x560 [ 60.459898][ T2246] ? generic_write_checks+0x3b9/0x470 [ 60.465123][ T2246] generic_file_write_iter+0xaf/0x1c0 [ 60.470311][ T2246] __kernel_write+0x5ab/0x9d0 [ 60.474828][ T2246] ? vfs_read+0xbb0/0xbb0 [ 60.478998][ T2246] ? __kasan_check_write+0x14/0x20 [ 60.483939][ T2246] dump_emit+0x261/0x3a0 [ 60.488019][ T2246] ? wait_for_dump_helpers+0x3b0/0x3b0 [ 60.493308][ T2246] ? dump_skip+0x23d/0x300 [ 60.497568][ T2246] dump_user_range+0x71/0x1a0 [ 60.502080][ T2246] elf_core_dump+0x33bd/0x3c10 [ 60.506681][ T2246] ? exit_to_user_mode_loop+0x9b/0xd0 [ 60.511883][ T2246] ? irqentry_exit_to_user_mode+0x4e/0x80 [ 60.517438][ T2246] ? irqentry_exit+0x12/0x60 [ 60.521877][ T2246] ? load_elf_binary+0x2750/0x2750 [ 60.526820][ T2246] ? __kasan_check_write+0x14/0x20 [ 60.531766][ T2246] ? _raw_spin_unlock+0x4d/0x70 [ 60.536445][ T2246] ? unshare_files+0x1b1/0x2c0 [ 60.541050][ T2246] ? __kasan_check_write+0x14/0x20 [ 60.545993][ T2246] do_coredump+0x1eb8/0x2d60 [ 60.550424][ T2246] ? simple_acl_create+0x2c0/0x2c0 [ 60.555366][ T2246] ? bpf_trace_run1+0x210/0x210 [ 60.560050][ T2246] ? ____kasan_slab_free+0x12c/0x160 [ 60.565169][ T2246] ? __bpf_trace_kmem_free+0x6f/0x90 [ 60.570290][ T2246] ? kmem_cache_free+0x1c0/0x1e0 [ 60.575066][ T2246] get_signal+0x102c/0x1410 [ 60.579407][ T2246] arch_do_signal_or_restart+0xbd/0x17c0 [ 60.584876][ T2246] ? __do_sys_rt_sigreturn+0x1e0/0x1e0 [ 60.590165][ T2246] ? force_sig_info_to_task+0x297/0x320 [ 60.595548][ T2246] ? force_sig+0x112/0x1d0 [ 60.599797][ T2246] ? send_sig+0x60/0x60 [ 60.603793][ T2246] exit_to_user_mode_loop+0x9b/0xd0 [ 60.608826][ T2246] irqentry_exit_to_user_mode+0x4e/0x80 [ 60.614204][ T2246] irqentry_exit+0x12/0x60 [ 60.618459][ T2246] exc_general_protection+0x415/0x490 [ 60.623670][ T2246] ? debug_smp_processor_id+0x17/0x20 [ 60.628876][ T2246] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 60.634806][ T2246] ? asm_exc_general_protection+0x8/0x30 [ 60.640245][ T2246] asm_exc_general_protection+0x1e/0x30 [ 60.645624][ T2246] RIP: 0033:0x7f19975bfbe1 [ 60.649965][ T2246] Code: 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 60.669403][ T2246] RSP: 002b:0000000020000460 EFLAGS: 00010217 [ 60.675306][ T2246] RAX: 0000000000000000 RBX: 00007f199774e110 RCX: 00007f19975bfbd9 [ 60.683115][ T2246] RDX: 0000000020000480 RSI: 0000000020000460 RDI: 0000000000000400 [ 60.690926][ T2246] RBP: 00007f199762eaa1 R08: 00000000200005c0 R09: 00000000200005c0 [ 60.698738][ T2246] R10: 00000000200004c0 R11: 0000000000000206 R12: 0000000000000000 [ 60.706653][ T2246] R13: 000000000000000b R14: 00007f199774e110 R15: 00007ffe53d36e88 [ 60.729123][ T2246] memory: usage 307200kB, limit 307200kB, failcnt 14798 [ 60.738723][ T2246] memory+swap: usage 429172kB, limit 9007199254740988kB, failcnt 0 [ 60.758842][ T2246] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 60.765588][ T2246] Memory cgroup stats for /syz0: [ 60.765712][ T2246] anon 270336 [ 60.765712][ T2246] file 311021568 [ 60.765712][ T2246] kernel_stack 0 [ 60.765712][ T2246] percpu 0 [ 60.765712][ T2246] sock 0 [ 60.765712][ T2246] shmem 311021568 [ 60.765712][ T2246] file_mapped 135168 [ 60.765712][ T2246] file_dirty 0 [ 60.765712][ T2246] file_writeback 0 [ 60.765712][ T2246] anon_thp 0 [ 60.765712][ T2246] inactive_anon 314015744 [ 60.765712][ T2246] active_anon 270336 [ 60.765712][ T2246] inactive_file 0 [ 60.765712][ T2246] active_file 4096 [ 60.765712][ T2246] unevictable 0 [ 60.765712][ T2246] slab_reclaimable 0 [ 60.765712][ T2246] slab_unreclaimable 0 [ 60.765712][ T2246] slab 0 [ 60.765712][ T2246] workingset_refault_anon 33 [ 60.765712][ T2246] workingset_refault_file 2640 [ 60.765712][ T2246] workingset_activate_anon 0 [ 60.765712][ T2246] workingset_activate_file 2211 [ 60.765712][ T2246] workingset_restore_anon 0 [ 60.765712][ T2246] workingset_restore_file 1683 [ 60.914478][ T2989] device veth0_vlan left promiscuous mode [ 60.926890][ T2246] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz.0.526,pid=2263,uid=0 [ 60.934953][ T2989] device veth0_vlan entered promiscuous mode [ 60.944064][ T24] audit: type=1400 audit(1720354104.090:146): avc: denied { create } for pid=2998 comm="syz.2.736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 60.969442][ T1547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 60.972589][ T2246] Memory cgroup out of memory: Killed process 2263 (syz.0.526) total-vm:77568kB, anon-rss:492kB, file-rss:9068kB, shmem-rss:0kB, UID:0 pgtables:160kB oom_score_adj:1000 [ 60.994284][ T1547] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªªþ€: link becomes ready [ 61.044736][ T1547] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 61.055396][ T27] oom_reaper: reaped process 2263 (syz.0.526), now anon-rss:0kB, file-rss:9004kB, shmem-rss:0kB [ 61.110286][ T2241] syz.0.526 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 61.141800][ T3023] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 61.377799][ T2241] CPU: 1 PID: 2241 Comm: syz.0.526 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 61.388833][ T2241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 61.398733][ T2241] Call Trace: [ 61.401857][ T2241] dump_stack_lvl+0x1e2/0x24b [ 61.406363][ T2241] ? panic+0x812/0x812 [ 61.410274][ T2241] ? bfq_pos_tree_add_move+0x43b/0x43b [ 61.415574][ T2241] ? ___ratelimit+0x3f7/0x580 [ 61.420092][ T2241] ? _raw_spin_lock+0xa4/0x1b0 [ 61.424685][ T2241] dump_stack+0x15/0x17 [ 61.428677][ T2241] dump_header+0xd8/0x6d0 [ 61.432840][ T2241] oom_kill_process+0xef/0x2d0 [ 61.437442][ T2241] out_of_memory+0x9bd/0xe10 [ 61.441870][ T2241] ? unregister_oom_notifier+0x20/0x20 [ 61.447170][ T2241] ? mutex_lock_killable+0xd8/0x110 [ 61.452193][ T2241] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 61.458532][ T2241] ? sched_clock_cpu+0x1b/0x3b0 [ 61.463223][ T2241] mem_cgroup_out_of_memory+0x2a8/0x380 [ 61.468602][ T2241] ? mem_cgroup_oom_trylock+0x3a0/0x3a0 [ 61.473979][ T2241] ? _raw_spin_trylock_bh+0x190/0x190 [ 61.479188][ T2241] ? mem_cgroup_oom_trylock+0x22d/0x3a0 [ 61.484576][ T2241] try_charge+0xff2/0x15f0 [ 61.488834][ T2241] ? __memcg_kmem_charge+0x180/0x180 [ 61.493946][ T2241] ? __kasan_check_write+0x14/0x20 [ 61.498892][ T2241] ? get_mem_cgroup_from_mm+0x186/0x1a0 [ 61.504273][ T2241] __mem_cgroup_charge+0x147/0x6e0 [ 61.509225][ T2241] shmem_add_to_page_cache+0x6a9/0x10c0 [ 61.514604][ T2241] ? shmem_alloc_page+0x420/0x420 [ 61.519461][ T2241] ? _raw_spin_lock_irqsave+0x210/0x210 [ 61.524841][ T2241] ? find_lock_entry+0x1df/0x200 [ 61.529615][ T2241] shmem_getpage_gfp+0xa65/0x2480 [ 61.534494][ T2241] ? schedule_preempt_disabled+0x20/0x20 [ 61.539963][ T2241] ? iov_iter_advance+0x827/0xb20 [ 61.544802][ T2241] ? shmem_getpage+0xa0/0xa0 [ 61.549229][ T2241] ? iov_iter_fault_in_readable+0x258/0x4f0 [ 61.554959][ T2241] ? __kasan_check_write+0x14/0x20 [ 61.559907][ T2241] ? _raw_spin_lock+0xa4/0x1b0 [ 61.564513][ T2241] ? _raw_spin_trylock_bh+0x190/0x190 [ 61.569798][ T2241] shmem_write_begin+0xca/0x1b0 [ 61.574497][ T2241] generic_perform_write+0x2cd/0x570 [ 61.579607][ T2241] ? file_remove_privs+0x2af/0x570 [ 61.584557][ T2241] ? grab_cache_page_write_begin+0xa0/0xa0 [ 61.590195][ T2241] ? file_remove_privs+0x570/0x570 [ 61.595149][ T2241] ? __kasan_check_write+0x14/0x20 [ 61.600090][ T2241] __generic_file_write_iter+0x23c/0x560 [ 61.605560][ T2241] ? generic_write_checks+0x3b9/0x470 [ 61.610780][ T2241] generic_file_write_iter+0xaf/0x1c0 [ 61.615978][ T2241] __kernel_write+0x5ab/0x9d0 [ 61.620488][ T2241] ? vfs_read+0xbb0/0xbb0 [ 61.624659][ T2241] ? __kasan_check_write+0x14/0x20 [ 61.629603][ T2241] dump_emit+0x261/0x3a0 [ 61.633680][ T2241] ? wait_for_dump_helpers+0x3b0/0x3b0 [ 61.638972][ T2241] ? dump_user_range+0xdb/0x1a0 [ 61.643659][ T2241] ? dump_user_range+0xe5/0x1a0 [ 61.648347][ T2241] dump_user_range+0x71/0x1a0 [ 61.652861][ T2241] elf_core_dump+0x33bd/0x3c10 [ 61.657463][ T2241] ? exit_to_user_mode_loop+0x9b/0xd0 [ 61.662667][ T2241] ? irqentry_exit_to_user_mode+0x4e/0x80 [ 61.668225][ T2241] ? irqentry_exit+0x12/0x60 [ 61.672656][ T2241] ? load_elf_binary+0x2750/0x2750 [ 61.677602][ T2241] ? __kasan_check_write+0x14/0x20 [ 61.682553][ T2241] ? _raw_spin_unlock+0x4d/0x70 [ 61.687226][ T2241] ? unshare_files+0x1b1/0x2c0 [ 61.691832][ T2241] ? __kasan_check_write+0x14/0x20 [ 61.696789][ T2241] do_coredump+0x1eb8/0x2d60 [ 61.701212][ T2241] ? simple_acl_create+0x2c0/0x2c0 [ 61.706156][ T2241] ? bpf_trace_run1+0x210/0x210 [ 61.710835][ T2241] ? ____kasan_slab_free+0x12c/0x160 [ 61.715958][ T2241] ? __bpf_trace_kmem_free+0x6f/0x90 [ 61.721081][ T2241] ? kmem_cache_free+0x1c0/0x1e0 [ 61.725857][ T2241] get_signal+0x102c/0x1410 [ 61.730197][ T2241] arch_do_signal_or_restart+0xbd/0x17c0 [ 61.735667][ T2241] ? __do_sys_rt_sigreturn+0x1e0/0x1e0 [ 61.740953][ T2241] ? force_sig_info_to_task+0x297/0x320 [ 61.746328][ T2241] ? force_sig+0x112/0x1d0 [ 61.750580][ T2241] ? send_sig+0x60/0x60 [ 61.754595][ T2241] exit_to_user_mode_loop+0x9b/0xd0 [ 61.759606][ T2241] irqentry_exit_to_user_mode+0x4e/0x80 [ 61.765017][ T2241] irqentry_exit+0x12/0x60 [ 61.769252][ T2241] exc_general_protection+0x415/0x490 [ 61.774462][ T2241] ? debug_smp_processor_id+0x17/0x20 [ 61.779664][ T2241] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 61.785564][ T2241] ? asm_exc_general_protection+0x8/0x30 [ 61.791027][ T2241] asm_exc_general_protection+0x1e/0x30 [ 61.796407][ T2241] RIP: 0033:0x7f19975bfbe1 [ 61.800662][ T2241] Code: 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 61.820107][ T2241] RSP: 002b:0000000020000460 EFLAGS: 00010217 [ 61.826000][ T2241] RAX: 0000000000000000 RBX: 00007f199774e110 RCX: 00007f19975bfbd9 [ 61.833809][ T2241] RDX: 0000000020000480 RSI: 0000000020000460 RDI: 0000000000000400 [ 61.841624][ T2241] RBP: 00007f199762eaa1 R08: 00000000200005c0 R09: 00000000200005c0 [ 61.849442][ T2241] R10: 00000000200004c0 R11: 0000000000000206 R12: 0000000000000000 [ 61.857247][ T2241] R13: 000000000000000b R14: 00007f199774e110 R15: 00007ffe53d36e88 [ 62.048033][ T2241] memory: usage 294500kB, limit 307200kB, failcnt 15166 [ 62.054865][ T2241] memory+swap: usage 411412kB, limit 9007199254740988kB, failcnt 0 [ 62.107261][ T2241] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 62.127557][ T2241] Memory cgroup stats for /syz0: [ 62.128044][ T2241] anon 270336 [ 62.128044][ T2241] file 298450944 [ 62.128044][ T2241] kernel_stack 0 [ 62.128044][ T2241] percpu 0 [ 62.128044][ T2241] sock 0 [ 62.128044][ T2241] shmem 296964096 [ 62.128044][ T2241] file_mapped 1216512 [ 62.128044][ T2241] file_dirty 0 [ 62.128044][ T2241] file_writeback 135168 [ 62.128044][ T2241] anon_thp 0 [ 62.128044][ T2241] inactive_anon 302370816 [ 62.128044][ T2241] active_anon 1081344 [ 62.128044][ T2241] inactive_file 0 [ 62.128044][ T2241] active_file 1335296 [ 62.128044][ T2241] unevictable 0 [ 62.128044][ T2241] slab_reclaimable 0 [ 62.128044][ T2241] slab_unreclaimable 0 [ 62.128044][ T2241] slab 0 [ 62.128044][ T2241] workingset_refault_anon 33 [ 62.128044][ T2241] workingset_refault_file 3036 [ 62.128044][ T2241] workingset_activate_anon 0 [ 62.128044][ T2241] workingset_activate_file 2607 [ 62.128044][ T2241] workingset_restore_anon 0 [ 62.128044][ T2241] workingset_restore_file 2013 [ 62.449451][ T2241] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz.0.721,pid=2956,uid=0 [ 62.464105][ T2241] Memory cgroup out of memory: Killed process 2956 (syz.0.721) total-vm:80748kB, anon-rss:596kB, file-rss:9596kB, shmem-rss:0kB, UID:0 pgtables:96kB oom_score_adj:1000 [ 62.788177][ T3068] syz.0.751[3068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.788955][ T3068] syz.0.751[3068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.315864][ T3075] bridge0: port 3(veth0_to_batadv) entered blocking state [ 63.391417][ T3075] bridge0: port 3(veth0_to_batadv) entered disabled state [ 63.425443][ T3075] device veth0_to_batadv entered promiscuous mode [ 63.451682][ T3075] bridge0: port 3(veth0_to_batadv) entered blocking state [ 63.458675][ T3075] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 64.870298][ T3144] syz.4.771[3144] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.870353][ T3144] syz.4.771[3144] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.544426][ T24] audit: type=1400 audit(1720354108.680:147): avc: denied { create } for pid=3171 comm="syz.4.781" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 65.902778][ T3222] syz.1.792[3222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.902838][ T3222] syz.1.792[3222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.007753][ T3220] ªªªªªª: renamed from vlan0 [ 66.042370][ T3222] syz.1.792[3222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.042428][ T3222] syz.1.792[3222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.704504][ T3272] device syzkaller0 entered promiscuous mode [ 67.201420][ T3301] device veth0_vlan left promiscuous mode [ 67.246924][ T3301] device veth0_vlan entered promiscuous mode [ 68.755670][ T3430] syz_tun: tun_net_xmit 86 [ 69.777562][ C1] syz_tun: tun_net_xmit 86 [ 69.916349][ T3473] device syzkaller0 entered promiscuous mode [ 70.565546][ T24] audit: type=1400 audit(1720354113.700:148): avc: denied { create } for pid=3492 comm="syz.4.865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 70.705177][ T3504] device syzkaller0 entered promiscuous mode [ 70.817628][ C1] syz_tun: tun_net_xmit 86 [ 71.411608][ T3583] device pim6reg1 entered promiscuous mode [ 71.426102][ T3590] device pim6reg1 entered promiscuous mode [ 71.597842][ T3601] syz.0.896[3601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.597905][ T3601] syz.0.896[3601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.656441][ T3601] syz.0.896[3601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.746599][ T3601] syz.0.896[3601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.812867][ T3613] syz_tun: tun_net_xmit 86 [ 72.228622][ T3625] device veth0_vlan left promiscuous mode [ 72.250481][ T3625] device veth0_vlan entered promiscuous mode [ 72.327909][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.350945][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.372116][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 72.809107][ T3654] device macsec0 entered promiscuous mode [ 72.817234][ C1] syz_tun: tun_net_xmit 86 [ 72.841896][ T24] audit: type=1400 audit(1720354115.980:149): avc: denied { create } for pid=3655 comm="syz.2.911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 73.199737][ T3686] syz.3.919[3686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.199811][ T3686] syz.3.919[3686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.211662][ T3686] syz.3.919[3686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.230354][ T3686] syz.3.919[3686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.245882][ T3686] syz.3.919[3686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.258266][ T3686] syz.3.919[3686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.603353][ T3748] device veth0_vlan left promiscuous mode [ 73.631731][ T3748] device veth0_vlan entered promiscuous mode [ 73.684830][ T3756] device macsec0 entered promiscuous mode [ 73.826486][ T3792] device pim6reg1 entered promiscuous mode [ 73.857753][ C1] syz_tun: tun_net_xmit 86 [ 75.015963][ T3883] device pim6reg1 entered promiscuous mode [ 75.311394][ T3905] device syzkaller0 entered promiscuous mode [ 75.413253][ T3909] device pim6reg1 entered promiscuous mode [ 75.655187][ T3934] device syzkaller0 entered promiscuous mode [ 75.835469][ T3941] device veth1_macvtap left promiscuous mode [ 76.176270][ T3994] device syzkaller0 entered promiscuous mode SYZFAIL: proc resp pipe read failed n=-1 (errno 11: Resource temporarily unavailable) [ 77.379666][ T326] device veth0_to_batadv left promiscuous mode [ 77.385796][ T326] bridge0: port 3(veth0_to_batadv) entered disabled state [ 77.393163][ T326] device bridge_slave_1 left promiscuous mode [ 77.399200][ T326] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.406558][ T326] device bridge_slave_0 left promiscuous mode [ 77.412545][ T326] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.420053][ T326] device bridge_slave_1 left promiscuous mode [ 77.425949][ T326] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.433217][ T326] device bridge_slave_0 left promiscuous mode [ 77.439194][ T326] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.446752][ T326] device bridge_slave_1 left promiscuous mode [ 77.452732][ T326] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.460076][ T326] device bridge_slave_0 left promiscuous mode [ 77.466025][ T326] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.473967][ T326] device veth1_macvtap left promiscuous mode [ 77.479795][ T326] device veth0_vlan left promiscuous mode [ 77.485449][ T326] device veth1_macvtap left promiscuous mode [ 77.491297][ T326] device veth0_vlan left promiscuous mode [ 79.738637][ T326] device veth1_macvtap left promiscuous mode [ 79.744659][ T326] device veth0_vlan left promiscuous mode