last executing test programs: 2.489275681s ago: executing program 4 (id=3390): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="180000000000d1e0c02200a871a10542e7bdb7edc57a06ff6a92a56fdd580567d99da6e8c7b75c3305550c15b15c222e3965bdf74e8bf1a3eb776991bcc104f7ffe76d95210b795340e7581e018bb09ace585934c24054916eaad2862156b2d4a93e52b52d61", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r2}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x7, 0xfe, 0x0, 0x3ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680), 0x9}, 0x581}, 0x0, 0xffeffffffffffffd, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r4}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r3, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x22, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0xcd, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='blkio.bfq.time_recursive\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@bloom_filter={0x1e, 0x2, 0x7fffffff, 0xc, 0x800, 0x1, 0x8001, '\x00', r5, r6, 0x2, 0x2, 0x1000, 0x6}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc207a4ae63d9275c3d083d51c223ba9f0352efa1654fa857765e9fbf06fa990d9ebaeb0e0278c8cf1449be8154f1b9c8c10c0edac32ce42346a29c78019604723512e954dc553859bebbb0cfd1680053aad6c33874ab336b21edfef09d6e490157d5fb3d6481ed350e93457f66a3ab08ffc8c9ea5cafc60a1eabfc87f4c638ee56a2c82fbdde3d8d656ea185e9d3e76fa85ad"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r9}, 0x10) 2.419872017s ago: executing program 4 (id=3391): bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000087b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0xc0000, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010000000000000000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r7 = getpid() r8 = perf_event_open$cgroup(&(0x7f0000000500)={0x5, 0x80, 0x9, 0x1, 0x7f, 0x5, 0x0, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000300), 0xa}, 0x10200, 0xfffffffffffffffa, 0x9, 0x4, 0x2, 0x5, 0x3ff, 0x0, 0x6, 0x0, 0xd8e}, 0xffffffffffffffff, 0xe, r6, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r7, r8, 0x0, 0xa, &(0x7f0000000440)='syzkaller\x00'}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={0xffffffffffffffff, 0x0, 0xc5, 0xb2, &(0x7f0000000b40)="3487188b17b83a1bceb0a4291273fee0dd76ce28a412b233570f9b2a7fd7b26f34647a3883b87f2187fccd4f35a681d0d7f80bd210557bcfd732f331c1e52da8631fe9a875ed91ecd1921be5cca6c4d59b7baf5b1c90e118f56992b394b33a331fd21957509290cc4e235cd7c37fa40052795b2483decfb7db6a8b240ab85403166195f08f1a3b3719409a9b7383aba1fbc1c9a5c8952fad5e057bfa0645fc1406324780484cc75d725e79f8326a058507910e4960a34bf28c5629c8dd4222e43bdd98d7d3", &(0x7f0000000a80)=""/178, 0xfffffffd, 0x0, 0xb0, 0x0, &(0x7f00000007c0)="b520610c75311127840b58a6e774c99d77a2786b5e40e99889424fbfc0176e825cd85cc8f395cc354a00ece16e23cd51984ae79fe0c634560c8f464090ce6439af15b4b269d3c63de01fb868c4ab750db87f3cc40f48caf494b88d4d332dcdad4a30b6d5f0c4a12a74a2d9d5600fa499513a6fa2fb6e973865e244bef4ba9c1290e7442c310436080fcaef33c26eab89dcd4237911034b8003ac93f1c2867de6b54ea530fa73610bbf08f1001b0ee02c", &(0x7f0000000280), 0x0, 0x1ff}, 0x50) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000006300000095"], &(0x7f0000000080)='GPL\x00'}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.stat\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x9, 0x43, 0x3, 0x4, 0x0, 0x0, 0x4200, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5393, 0x6, @perf_config_ext={0x19, 0x200}, 0x800, 0x1, 0x0, 0x8, 0x5, 0x9, 0x5, 0x0, 0x80000001, 0x0, 0x5}, r9, 0x9, r5, 0x5) 2.390059209s ago: executing program 4 (id=3394): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x1c, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000f00000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000200000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000023008500000017000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.335940383s ago: executing program 4 (id=3397): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x11, 0xc, &(0x7f0000001b40)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000d9b8001801000020646c25009a000000000000001af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c85e230cc3b5c8e0000a57aff2dad384738ee6c093e3a5c3c63c26b000d95d9ef178c9e6b162e9ce3effcc2e04eaceba15906f3e52d0dd45610089ac1e690703fa8cda2917f2263e9034fa9c9e83f46a54f1062c4bcd3e2daa2ca8c7ab23f7e3cd5f568c37b7dae26a230219b72ba243e908770bb4dbcdebb60afe3f2d8bc6b829c88"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1}, 0x48) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0xf, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000000f000000bf0900000000000055090100000000009500000000000000bf91000000000000b70200000000000085000000ba000000b7000000000000009500000000000000"], &(0x7f0000001a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10208}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000006c0)={0xffffffffffffffff, &(0x7f00000008c0)="0eca1b19ad7c977b318cd37b6cd076f686e93fe3fb507cfb145d072650026f274bebf4aee16917946ccca7f05c0d40aefcef5a8645132c13b66d794a79b99673e0893fe2a2c3cb32bd39d95511a28b3c3c469c3b3a597018b36051d40175a693d5943de9ae1a870d9230b3", &(0x7f0000000940)=""/4096}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b0af8ff00000000bda107000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018010000202070250000000000202020db1af8ff00000000bfa10000000000006948c863d976b864018af89207010000f8ffffffb702000008000000b70300000000000085000000060000009500000000000000"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x2a, &(0x7f0000000100)=r6, 0x4) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x58, &(0x7f0000001ac0)}, 0x10) sendmsg$inet(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x4040040) recvmsg$unix(r4, 0x0, 0x0) r7 = gettid() r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r8, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_open_procfs$namespace(r7, &(0x7f0000000240)='ns/pid\x00') perf_event_open(&(0x7f0000000040)={0x0, 0xb1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r7, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) recvmsg$unix(r4, 0x0, 0x40000062) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'ip6gretap0\x00', 0x4000}) 2.25211342s ago: executing program 2 (id=3400): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x86, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) close(r2) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000200), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000005640)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'vxcan1\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r5, &(0x7f0000000180)=ANY=[@ANYBLOB="1e030800dd5c980128856306008e02400000000000e2ff3b3a58ae02120000479618bad5f149bf18235ff34d2d9efa28ac30e147"], 0xffdd) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1b, 0xfffffffd, 0x400, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r7, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000500)=ANY=[@ANYRESDEC=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xffc0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2.183854705s ago: executing program 2 (id=3402): r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x3, 0x5, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000003c0), 0x6}, 0x1004, 0x0, 0x0, 0x0, 0x5, 0xb071, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000001811000033026903dc5f8dec4f74b9b8617e363628fab1cce003d213b40312f9fc98229efb1d6b7d12651307d5d1ed989aa60c4b5f4395", @ANYRES32, @ANYBLOB="0000000000000000b7080000030000007b8af8ff00000000bfa200000000000007020000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000680), &(0x7f0000000bc0)='%pB \x00'}, 0x20) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000400), 0x4}, 0x81a0}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10041, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="851000000400000095000000000000001800000000000000000000000000000095000000773dbe1c0000000085100000fcffffff950000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000540), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, 0x0, &(0x7f00000002c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r5}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7"], &(0x7f0000000a40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000e00)={{r3, 0xffffffffffffffff}, &(0x7f0000000d80), &(0x7f0000000dc0)='%-010d \x00'}, 0x20) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x4, '\x00', 0x0, r2, 0x0, 0x1, 0x4}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000500)='GPL\x00', 0x6, 0x6f, &(0x7f0000000480)=""/111, 0x0, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x1}, 0x8, 0x10, 0x0, 0x0, 0x2d090, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r3, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r1, r3, r3, r7, r7, r6], &(0x7f0000000800)=[{0x5, 0x4, 0x5, 0xa}], 0x10, 0x1}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x3, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="180000000000000000000000000000006110770000000000950000302c5a0f32dd653be5786d0000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) 2.182782065s ago: executing program 4 (id=3403): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x10) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6}, 0x48) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) (async, rerun: 32) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async, rerun: 32) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0x0, 0x0, 0x407, 0xffffffffffffffff, 0x10, '\x00', 0x0, r3, 0x3, 0x3, 0x2, 0x4}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000001811000000", @ANYRES32=0x0, @ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001180)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) (async, rerun: 64) bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffff7c) (async, rerun: 64) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 2.169538977s ago: executing program 4 (id=3404): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x2, 0x3, 0xe, 0x800, r1, 0x2, '\x00', r0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0xf5) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r2}, &(0x7f0000000800), &(0x7f0000000840)=r4}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r5], 0x0, 0xc, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xa, 0x4, 0x4, 0x8}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r11}, 0x10) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES8=r1], &(0x7f0000000200)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r12}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x1000, 0x7}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./cgroup\x00', r13}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r15, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) close(r14) close(r8) 2.104033791s ago: executing program 2 (id=3405): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) unlink(0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000040)='mem_connect\x00', r2}, 0xd) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0x14, &(0x7f0000000c00)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000340)={r6}, 0x4) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b72f8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000080000000000030000009500000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r10, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x4e}, 0x10}, 0x90) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8946, &(0x7f0000000080)) setsockopt$sock_attach_bpf(r9, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r10, &(0x7f0000001000)={0x0, 0x0, 0x0}, 0x0) 1.385536669s ago: executing program 1 (id=3416): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0x0, 0x0, 0xb4, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x100}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000002c0)=ANY=[@ANYBLOB="18080000000000000f00000000100000000000001810000000000000", @ANYRES32=r0, @ANYBLOB="000000000000000000000083000000001800000000000000000000000000000095000000000000009500000000000000"], 0x0, 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup(r1, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001200)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x5, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r7, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 1.384725659s ago: executing program 1 (id=3417): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x0, 0x2, 0x8, 0x240, 0xffffffffffffffff, 0xfffffbf3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x4, 0x10}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x0, 0x2, 0x8, 0x240, 0xffffffffffffffff, 0xfffffbf3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x4, 0x10}, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r0, @ANYRESHEX=r2], 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff54}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x0, 0x1, 0x3, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x0, 0x1, 0x3, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r5}, &(0x7f0000000080), &(0x7f0000000200)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r5}, &(0x7f0000000080), &(0x7f0000000200)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r4, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYRES32=r3, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r7}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r7}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x3, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800002ddbf7fa04d1ebc52535fd00"/24, @ANYRESHEX=r9, @ANYRES8=r1], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe4, 0x1}, 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r12}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={r11, &(0x7f0000000180), 0x0}, 0x20) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000001780)="000000000000000002b2138373ef", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000030c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r13, 0x18000000000002a0, 0xe0c, 0xffe0, &(0x7f0000000640)="b9ff03076844268cb89e14f088a847fe884700121100632f77fbac14141dac1414", 0x0, 0x71, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r13, 0x18000000000002a0, 0xe0c, 0xffe0, &(0x7f0000000640)="b9ff03076844268cb89e14f088a847fe884700121100632f77fbac14141dac1414", 0x0, 0x71, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 1.287220427s ago: executing program 1 (id=3419): bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x0, 0x2, 0x76, 0xfffffff8, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) gettid() recvmsg(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/249, 0xf9}], 0x1}, 0x0) (async) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/249, 0xf9}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x20000083}, 0x0) (async) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x20000083}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000780)=ANY=[@ANYRES16=r0], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r1}, 0x10) socketpair(0x28, 0x80000, 0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x45}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00'}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETOFFLOAD(r2, 0x40086607, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xad2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x7, 0x20, 0x80, 0x2, 0x0, 0x6, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x198, 0x4, @perf_config_ext={0x8, 0x40}, 0x0, 0x9, 0x3, 0x9, 0x4, 0x200, 0x3, 0x0, 0x0, 0x0, 0x7}, r2, 0x8, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x55a79c82a4f81469) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000680)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000680)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c0000001f0000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) write$cgroup_subtree(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e408"], 0xe) 1.285581347s ago: executing program 2 (id=3420): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x5460, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xffffffff, [{0x0, 0x3, 0x6}, {0x0, 0x6}]}]}}, 0x0, 0x3e}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002100)={r0, 0x0, 0x0, 0x65, 0x0, &(0x7f0000001440)=""/101, 0xfff, 0x0, 0x8e, 0xa, &(0x7f0000002040)="ae37be70615dd47135adcbc53c62627a065ad49605558997ef65934ab9bf999b82274db0184d099942dce0bd35df92883d34508fcaef9b8cbe0d6ef587a209b334bbd2ace2deb5feb5cc0a90d152b0274cae831d3167c3aacab21ad8c0e6f2b89df8463d6750f531f4baf84b8c6583f35fd6bc9f81daddcbbbec326c32585b5c6c07607dd59c70c6f9324cbf01e8", &(0x7f00000014c0)="2d7fed2de65375dee02d"}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) 730.088672ms ago: executing program 1 (id=3424): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008040000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async, rerun: 64) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x1000008, 0x55628ef5e60e9e24, 0xffffffffffffffff, 0x9a2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0xfffffffd}, 0x48) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r0], 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x80000006, 0x2, 0x3, 0x0, r3, 0x10000, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x4, 0xe}, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r5 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000095000000b7000000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x2, 0x100b, &(0x7f0000001e40)=""/4107, 0x0, 0x20}, 0x90) (async) r7 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x420, 0x0, 0x0, 0x0, 0x8, 0x7, 0x0, 0x0, 0x8000}, 0x0, 0xc, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=0x0, @ANYBLOB="0000000200000000b7080000000000007b8af8ff000000000007020000f8ffffffb70300000800316b276892390002b704000000000000850000000300000095487e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x0, 0x10001, 0x8, 0x1}, 0x48) (async) close(0xffffffffffffffff) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000900)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r8}, 0x10) (async) r9 = bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffff18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={0x0, r9}, 0x10) (async) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) recvmsg$unix(r10, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x20, 0xf, &(0x7f0000000340)=ANY=[@ANYRES64=r7, @ANYRES8=r9, @ANYRES64=r2], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x17, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r11}, 0x2d) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xf000000}, 0x48) (async, rerun: 64) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 727.350142ms ago: executing program 0 (id=3425): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000680)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000e40)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb010018000000000000005d0000005d00000005000000030000000000000e00000000010000000200000000000001000000001a001c030300000000000009030000000f0000000300000f01000000000000000100000006000000040000008b000000010000000100000000000000000000000200000000305f000052a70f5abd5516a20ec8ec043297"], &(0x7f0000000dc0)=""/93, 0x7d, 0x5d, 0x1, 0x7}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_ext={0x1c, 0x21, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000009000000000000000500000082581000100000007fa050000800000085000000480000008510000007000000850000000a000000852000000500000018000000020000000000000074ef000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082000000b70800000000", @ANYRES32, @ANYBLOB="0000000000000000b705000008000000850000008500"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc0, &(0x7f0000000980)=""/192, 0x40f00, 0x40, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000ec0)={0x0, 0xc, 0x1}, 0x10, 0x27a6f, 0xffffffffffffffff, 0x2, &(0x7f0000000f80), &(0x7f0000000fc0)=[{0x0, 0x0, 0xe}, {0x5, 0x4, 0x0, 0x1}]}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{0x0}], 0x1}, 0x0) recvmsg(r6, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x40fd) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r8}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) 659.085307ms ago: executing program 3 (id=3426): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @fwd, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, r1, 0x0) perf_event_open(0x0, 0x0, 0xa, r1, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000380)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0xf2, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000500), 0x8, 0x61, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="8500000008000000350000000000ba00850000007d00000095000000000000004cf12aa56cd90200f81f06a9cf64f5e0a141d524581835d8050864d20000000201000000fa22beb5cf918d4aec9a100d4bb065b956a1cd1101257520ea98165b61a3cf5fc6dd8442230e7953f91136aa1f7035175106000000000060777a5a000097cbe5158a10861aaa1c8fee9ebaf9dce435554bc34e6bdea4217ce4a98af8ad0887c697acd962000000ff00e34f0a9c13ecee6156c599c7b293de0019b27de967bfb3fe241454a04080bf668ce021879c820f9b80fe2338a894113532b18ac144000000000000000000"], &(0x7f0000000140)='GPL\x00', 0x0, 0x2681efae3baf2c99, &(0x7f00000004c0)=""/153}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r5, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x72a}, 0x28) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{r4, 0xffffffffffffffff}, &(0x7f0000000540), &(0x7f00000006c0)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, &(0x7f0000001d40)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b06, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r7, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f00000007c0)=[0x0], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xda, &(0x7f0000000840)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0x87, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x4, 0xab, 0x3d83cda3, 0x1800, r3, 0x2, '\x00', r9, r1, 0x2, 0x5, 0x1, 0xc}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000030000001820000000000000000000f8ffffff0000000000", @ANYRES32, @ANYBLOB="000000000000000095000000000000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x3}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x1e, 0x32, &(0x7f0000000a80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1a84, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r8}}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xb}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x44}, @jmp={0x5, 0x0, 0x5, 0x4, 0x7, 0x80, 0xfffffffffffffff0}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xb7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @call={0x85, 0x0, 0x0, 0x95}, @tail_call={{0x18, 0x2, 0x1, 0x0, r10}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000680)='syzkaller\x00', 0x3, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x10, r1, 0x8, &(0x7f0000000740)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x9, 0x5, 0x6}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r6, r1, r10, r1, r1, r3], 0x0, 0x10, 0x7}, 0x90) 636.079299ms ago: executing program 1 (id=3427): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, 0x0}, 0x90) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x13, 0x13, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000a8162a35cc8c23bd18110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000000000008500000005000000bf91000000000000b702000085000000840000081e00000000000000950000000800000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async, rerun: 64) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x48) (rerun: 64) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000140)='mm_page_free_batched\x00', r3}, 0x10) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) (async, rerun: 32) r7 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (rerun: 32) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000040)='|\"@]K@{.\"\x02') (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={0x0, r8}, 0x10) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (rerun: 64) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) (async, rerun: 64) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00'}) socketpair(0x0, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x891e, &(0x7f0000000080)) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000800000000000000000040000005f811c0066000b000000c9aa0000950000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x4c) 616.556501ms ago: executing program 3 (id=3428): write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x13) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x13, 0x10, 0x1}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20, &(0x7f0000000980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xa008}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@map_fd={0x18, 0x0, 0x1, 0x0, 0x1}, @exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @ldst={0x2, 0x2, 0x4, 0x0, 0x5, 0xffffffffffffffe0, 0xfffffffffffffff0}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200), 0x3, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r5], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) close(r6) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000ac0)=@generic={0x0}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={r7, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b00), ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000b40)=[0x0, 0x0], &(0x7f0000000bc0)=[0x0, 0x0, 0x0], 0x0, 0x11, &(0x7f0000000c00)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000c40), &(0x7f0000000c80), 0x8, 0x50, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x5, &(0x7f0000000900)=@framed={{}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x4}]}, &(0x7f0000000940)='syzkaller\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x10, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001480)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000380)=@raw=[@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x9}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}], &(0x7f00000003c0)='syzkaller\x00', 0x9, 0x31, &(0x7f0000000400)=""/49, 0x41000, 0x30, '\x00', 0x0, 0x1b, r9, 0x8, &(0x7f0000000f00)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, r8, 0x0, 0x3, 0x0, &(0x7f0000000f80)=[{0x2, 0x4, 0xd, 0x3}, {0x3, 0x1, 0x10, 0x7}, {0x4, 0x3, 0x2, 0x2}], 0x10, 0x400}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000100)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x8, '\x00', 0x0, r9, 0x8, 0x2, 0x5}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x5460, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(r1, &(0x7f00000006c0)={[{0x2d, 'cpuset'}, {0x15, 'io'}, {0x2d, 'freezer'}, {0x2b, 'pids'}, {0x2d, 'net_prio'}, {0x2b, 'hugetlb'}, {0x2b, 'hugetlb'}, {0x2d, 'blkio'}, {0x2d, 'blkio'}]}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x2d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b7020000f53f6314bfa300000000000024020000fffeff7f7a03f0fff0ffffff79a4f0ff00000000b7060000ffffffff2e64050000000000750afaff07cd02020404000000247d60b7030000070a00006a0a00fe0000000c850000005b000000b70000000000002995000000000000001da5ad3548ebb63d18c5071c7e821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c0ec908abb6e7325ec1956bd8660bf3664148a2c96752fe2bb328dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8ef040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdbb126eb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b782ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a6211e52bb3598e9b5d4f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75b0100000042127a8f84538a9a311c757f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d32e3f4ee367c5a769c0a606636c9f4a4413c098f4fcc96623b7c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c436432b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48e7565efff2dbbb512218c98442406333c890923a797e00b75481739952fe87fde27ce81893f54ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45576c205c70631e8ad585951950e521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d9338923789a1edcd8043fe83919088383268324a25df14010c8ed6b8d43400eaa00ff9bc46e1cfecbdc0e451ac53b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404e0b7c723d3b19c3dc382fa91fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37deee7a60b903d2d9fe9d451cafcc8dc389671c2d08b6e264150a6b9445b00cee4585af04fa69e0380be0d66649dcf3bf8a906b029faca75ce34c41aec7aa86e596119109ea8b3f7c65c902499227c087301643baab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628e3e77a0de32e356521df06f995cb57f97052fc4158250ccecfb67ea8faf509593fadc7eafb613327b052397af1ede94d87590ce90a0a7579766f0e5eb09d38ac46e99e7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf16dc3af6e0b67f62a83a256474c97c925d9d447175b535c87dbdeb0dcca5303eed6689ea91e1665c691df736368dde47e6672e93a314c5f60e7b68c2242bd0f0d8c66449d8687dcf2d0f76668b2b9bf8b32b99b7daf34b2d825d192ade90a1162acfe9749d516d014cef5f99126324ea02baea5808c430985749901b09e4902a6f5addc0103756b894418e4591c624a9b206abbfb888d413d923b0d7c9d997d6d8e64787c4d397f57a15b6e0b4212b6cb55b9c207bbe08f483b1bea05f41b9a1d3af087047c568ae6ebfc0bb5ec10b6290dc757a4903a88fb2c035b2349b6d2f0c051b8b7718384eebd5fc19928cea713ff09e179c308fbe9bd64374d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad1030a79517a88de7596429a20793e12616aa32b3e720c6521fbe93963e9536d16f3db211fca7dd99c0a0125ff8ef534b93dcb34e1da2c008a9f2a29e30823bf0ec3639cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471667f82f5e250b979b9f2bd0d1b6bc03d11811ac6eec9a3ecd9e3c3299ee5eb3c6cac8fbd06514b7ee743ece79c04566d02a08fd5fcabbab3d129c0cced3ce11dafa380700000000000000c114d0b423e64c6157fac5e4e2168f33541daeff9983d0e488a78bef538f870b84798272b2101e0abf1cd64500b79e01e11d727389653bd80a39d5bbe2e23d2f5ff10047423429981bd9b4ce680e174c266391e3e7689452654e5cd5ada6e025327a1942b5a068f15fa58eaa267d4e0881783dddbdd777f8be0824ffdf6d06c621880dbbe9534f15e8c2e364d3ec67deb6ab9f2a0f03212972dbd38500000008173553a67be48633103809eee0be51d67d7ce230b389607b4c3b18da1c48f3180f2e0d79e54565fdd9a099b5b5ba2761905b88b7cbfc39c35dd153609da3da263438f12769602c2195245ff83e249119d4f6cabfbdef84ada19ef4a67ed66d7043036515d0be5a231f99e71aba5d5ae04676eff3e85f0844c41bbcfde7a931d1ec55c01f703bfd1b97756bfe55a91f6b379f34a018906339771157c66dbd7471d1beec7f029ef552cf5e92a1a0db21b59355763967ce26a577bc514b6d22a09c385c5ba6caf524e1688fc0f29f8bb35ae7bc8eb5ba51aebdf7d972c3267cedbe77ed70d9c539bc455a6f88b39196c8a224b0acf4d796fea59a07baa34cc270fb096ef330fbebdf872d7d0bc4f9a963355c554abc5cdb91464faabcd09cd9a53f5d1b2ea7e96f428f7cd6735c19c61dc9942d30bf29ef85ed01c2fcd6060aa40eeff971477b4fde48507b7bad95a496540adff7e4a72fd1f94d7c703ab1525c946c54e0da3d7ebfcc8cea2e84c3b310aaea5a1627df898c00a9aaf2d88a36afa4c5b1816384310600001c33125ad7f7970beeb256aec06e39fc6c66544e1d1dc5fea4b68a82e3568ca30aea9a1d097f06f11dc362f4bae5ef57c67686a15855cd351bf26f40fb1348cfce79897682228e6d9643530c81bab27bf7b1c4a76a5be180bb830cf06827c3f38a9c9c580c732c30aaceda78b0297de35a922b1375b129655beb31899e26052cc216f832fdb0a0015f93c9cff77f59cda1ec5f3e358848756cebb074266a47e39ae26e80e8c65aaf73c24925458520a9ca98760d1005c9f81846459ae6d5baa4f02807939ddc29c3520f7c58ed9bc5a569c7a1bc33cf4f330a18276ffb4550b9166c3939e8041094bec034aa0ec6638b74fe34f0f1ec6903a1135808d5d8d26c9203c3f87e66c407b7c5c0888d4558dd657cc0213efad68e76fdd7b23e68064fd4b271ed79c50abacdd2871b0c1f8c971df59a5a1901ddf804bed43e391f882d2a45c51cdbba86b2a1b7c0c4923642a731ea4dcbad2b6ebbebe787a8e28e781d75beee924b3b1e390750f316648133922c021f98fd2d5d71a7a3679397ef6cf432837b7e264831ec01c4c3146ba0caac3b13d55945ec00e978a1c1712cd51187936200606c9cd6877b2f72125295c54721f8e15df2ae282a8becb99a726fd92acc92141e1f574b4b0b3c992a61af3372d0d9217776b1a42cd2cee816a70bf1ddd69b590d53e28ba356e74b38e23e50d898e95cdc7cc809e462c884b53f672aab1411ecfd4c91e7a9782fc6763f0efd4bcbaf1fc3a00000000000000000000000000000000500000000000000000000000048e510340087caf22439d5304bd704a6a78a512269a9b1cbd13bea78c807bbc73853ae187cbb768673e9d1bf74a3b0a6c234accd8506adf314f4c5e08174540b69d3c0da660052b43b86baf49e7ac64d9c21598b1e01dc1e1b5a53626b090496dbf7af441e397016c3c094d5c91ffe0a7ceacfd225ed9a6c905f79ad7052747dd6cceef4c310e0e935311118bc6bf0e5ca6c7cca7d5c03be570308da8a40578b4db14961fbccf6e2f2d56e9509c434126515b56d032e20c12e830d1bc64826fc9b318da5911e466878dbb81edeff69363fb75af5cd80536f14d2eaa7764db23acdbd394bbbbccfd8b129258bb0a93cee1d44f8665172c06933d20f184b78b435462c52a85149451ffd564c56a7cbf11a1127c77242915e43b2bc"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x3, 0xa, &(0x7f0000000080)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1f000000}, @generic={0x6c, 0x0, 0x0, 0x12}, @map_fd={0x18, 0x0, 0x1, 0x6a, r0}, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xfdcb, &(0x7f0000000340)=""/238}, 0x21) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) 551.053616ms ago: executing program 0 (id=3429): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000bf080000000000007b8af8ff00000000bfa2000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYRESOCT=0x0, @ANYRES32=r2, @ANYRES8=r1], 0x0, 0x3, 0x0, 0x0, 0x40f00}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYRES16=r0, @ANYRES64=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x17, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0x2d, &(0x7f0000000040), 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r3, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xcd, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x60, 0x10, &(0x7f00000002c0), &(0x7f0000000400), 0x8, 0x39, 0x8, 0x8, &(0x7f00000005c0)}}, 0xfffffffffffffffc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_procs(r9, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) write$cgroup_subtree(r10, &(0x7f0000000040)=ANY=[@ANYBLOB='-'], 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r12, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 550.530066ms ago: executing program 3 (id=3430): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0], 0x0, 0x200009, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0], 0x0, 0x200009, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000800000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x18, 0x4, &(0x7f0000000700)=ANY=[@ANYRESHEX=r1, @ANYBLOB="d8a53d156e938da522035d02588aee20c07f99aaf6071b9f063a3c85cd12b660293b9cd2c8d11813dda5c3f5b5e5dcde9864b9937bf085fa9370b83277b2d553bf5e68ee22830550e4ccd4463f50b22e34e5bb7bec726278e25a1739c8b70f8133f4a456e997a24d1032e80ec0538ba86b7ce93fd05a30cbd1efc37035d0afa923b4522ab22d9928619d9b5918101dd6dae33624bf32fa28233c14ccc07ccfbff5575845e032814e0829ffb36f8f158a70f22c3eef248473ba27b67849fe7358c683c07f795013ea593fb018a8899de976"], 0x0, 0x0, 0x8f, &(0x7f0000000180)=""/143, 0x0, 0xd}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x18, 0x4, &(0x7f0000000700)=ANY=[@ANYRESHEX=r1, @ANYBLOB="d8a53d156e938da522035d02588aee20c07f99aaf6071b9f063a3c85cd12b660293b9cd2c8d11813dda5c3f5b5e5dcde9864b9937bf085fa9370b83277b2d553bf5e68ee22830550e4ccd4463f50b22e34e5bb7bec726278e25a1739c8b70f8133f4a456e997a24d1032e80ec0538ba86b7ce93fd05a30cbd1efc37035d0afa923b4522ab22d9928619d9b5918101dd6dae33624bf32fa28233c14ccc07ccfbff5575845e032814e0829ffb36f8f158a70f22c3eef248473ba27b67849fe7358c683c07f795013ea593fb018a8899de976"], 0x0, 0x0, 0x8f, &(0x7f0000000180)=""/143, 0x0, 0xd}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0x200000000000011e, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d4cdb00, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x20, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x3, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x1d, &(0x7f00000001c0), 0x4) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000d03000000000000000000000105002000800000000000000000000003000000000100000002"], &(0x7f0000000340)=""/142, 0x4e, 0xfeaf, 0x1}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x16, 0x1, 0x0, 0x6, 0x1600, 0xffffffffffffffff, 0x0, '\x00', 0x0, r4, 0x4, 0x1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYBLOB="478b26db7569854bbc891370605c53ab37cb042c51b6256bc66231fe4a774edd01acec0fb7e489c59777c6b703ea19e13cdb0ffa00", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYBLOB="478b26db7569854bbc891370605c53ab37cb042c51b6256bc66231fe4a774edd01acec0fb7e489c59777c6b703ea19e13cdb0ffa00", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x3}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xa, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000007}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xa, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000007}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0}, 0x10) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000580), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) 521.224879ms ago: executing program 1 (id=3431): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffa6) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x20000000000, r0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000a50000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r0, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0], 0x0, 0xad, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000003c0), &(0x7f0000000440), 0x8, 0xba, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r4, &(0x7f0000000200)=ANY=[@ANYBLOB="1b2308"], 0xffdd) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r6, 0x8004745a, 0x2000000c) 480.450452ms ago: executing program 0 (id=3432): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18060000000000000000000000000000180c00002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b7030000004ac9af0000008500000073000000955732e0af92edd590de33fa50ba4f473df76d57d3f0b2eedb02919c34a0186b9b4bc1ec07212ef521071822452e814432e3c391b9a4f266092955ff141f1168b4f64e3538d438c1cbccb0167f57c643d25d48a4525faeab5c0da3902a164823a3f7240d009010299d105bfb2b7bc2497e7bc3eba9f2015f83dbc1cdf0bf649bc837db0316240dee"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000800000000000000000000181100002052711f16fb919afd7a6ff4e0ef4801301adf4115da1dda93a07a5076b812008822bdf00f7ec694caeb6bd15f7d98f3456155e8a6b37fa2bc5e6294c1a9e06c12224c7238cae632d7fa4763151db309ebf295cc9f374b675681c565b21e62370053b560606a8baced43611ee2d4dfcd8d8f76a56ef2fb3e545e5b93b920", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='f2fs_file_write_iter\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1}, 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8947, &(0x7f0000002280)={'vlan1\x00', @random}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0xff, 0x2, 0x200, 0x40, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000280)={0x6, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={r4}, 0x24) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='initcall_start\x00'}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r4}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r2, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0xf5ffffff}, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x807, 0x0, 0x0, 0x0, 0x59, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xd7) 447.740734ms ago: executing program 2 (id=3433): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000680)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd63"], 0xfdef) 446.982734ms ago: executing program 0 (id=3434): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x1c, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000020000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000200000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000023008500000017000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 446.468954ms ago: executing program 3 (id=3435): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000088ae07", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fb000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x257}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x8b, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x20}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2}}]}}, 0x0, 0x4e}, 0x20) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000600)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={@cgroup=r6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0, 0x0], 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000029500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r8, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) 118.42986ms ago: executing program 3 (id=3436): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000680)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd63"], 0xfdef) (fail_nth: 3) 105.030242ms ago: executing program 0 (id=3437): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x0, 0x0, 0x7fe2}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={0xffffffffffffffff, 0x20, &(0x7f0000000980)={&(0x7f00000007c0)=""/198, 0xc6, 0x0, &(0x7f00000008c0)=""/130, 0x82}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='fib6_table_lookup\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r7}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1b, 0x17, &(0x7f0000000bc0)=ANY=[@ANYBLOB="180000000f00000000000000040000001811", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000010100008500000006000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000ead5ca2ceff811d7311737752d9d0c5a54d1b37251cd666aef153460e1c884ef043f6a2ec2eb3b6f"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xd8, &(0x7f0000000600)=""/216, 0x41100, 0x1, '\x00', r2, 0x33, r3, 0x8, &(0x7f00000004c0)={0x9, 0x1}, 0x8, 0x10, 0x0, 0x0, r4, r0, 0x0, &(0x7f0000000a80)=[0x1, r1], &(0x7f0000000ac0), 0x10, 0x1ff}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x3, 0x0, 0x0, 0x1, 0x0, 0x14}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0xf}, 0x90) 73.079514ms ago: executing program 0 (id=3438): bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x10, 0x1e, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, {}, {}, [@jmp={0x5, 0x1, 0x6, 0x9, 0x8, 0xfffffffffffffff8, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x64}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @ldst={0x3, 0x0, 0x4, 0x7fe2e2e0f6dd47ed, 0x2, 0xfffffffffffffff4, 0x4}, @generic={0x2, 0x9, 0xa, 0x0, 0x8001}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0xffff, 0x10, 0x5, 0x0, 0x1, 0xfffff31a, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x5, 0x4}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c828, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0x3, 0x0, &(0x7f0000000480)='GPL\x00'}, 0x90) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x814}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000400)={'ip6tnl0\x00', 0x84aebfbd6349bff2}) gettid() ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 45.154777ms ago: executing program 3 (id=3439): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000280)=""/176, 0xb0}, {&(0x7f0000000340)=""/227, 0xe3}, {&(0x7f00000004c0)=""/192, 0xc0}, {&(0x7f0000000580)=""/247, 0xf7}, {&(0x7f00000006c0)=""/185, 0xb9}, {&(0x7f0000000180)=""/60, 0x3c}, {&(0x7f0000000780)=""/227, 0xe3}, {&(0x7f0000000880)=""/149, 0x95}, {&(0x7f0000000a40)=""/155, 0x9b}, {&(0x7f0000000940)=""/79, 0x4f}], 0xa, &(0x7f0000000c00)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xe8}, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000680)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x45, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000540e0000000000000000000018110000", @ANYRES32, @ANYBLOB="000a000000000000b7080000000000007b8af8ff00000000bfa20000a17423187c66238d22e0110c7efa0673ebab89c0b815f8ffffffb703000004000000b7040000000000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000e200000000181100", @ANYRES8=0x0, @ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x956, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{}, &(0x7f0000000000), &(0x7f0000000200)=r6}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000", @ANYRES32, @ANYBLOB="000000040000000000001e3f000000107b8af8ff00000000bfa2000000"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) close(0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0x90) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) 0s ago: executing program 2 (id=3440): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x23, 0x10000, 0x0, 0x120c, 0xffffffffffffffff, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x0, 0xb}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x23, 0x10000, 0x0, 0x120c, 0xffffffffffffffff, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x0, 0xb}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="1b23000d"], 0xffdd) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7280000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r3}, &(0x7f0000000540), &(0x7f0000000580)=r5}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r3, &(0x7f0000000780)}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0x7fffffffffffffff) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/uts\x00') (async) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/uts\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}) (async) ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\'\x00') ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0xfffffffffffffffd) kernel console output (not intermixed with test programs): T53] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.258233][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.266156][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.272906][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.280298][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.288896][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.295820][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.318046][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.325997][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.339813][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.347161][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.354884][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.362687][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.371476][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.379523][ T15] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.386432][ T15] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.406242][ T283] device veth0_vlan entered promiscuous mode [ 23.416722][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.425024][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.433144][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.440563][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.447813][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.455714][ T15] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.462470][ T15] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.469601][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.477297][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.485027][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.493710][ T15] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.500733][ T15] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.515719][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.528081][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.535438][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.550145][ T283] device veth1_macvtap entered promiscuous mode [ 23.559698][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.567743][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.574560][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.582001][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.590593][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.597435][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.621878][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.630618][ T53] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.637469][ T53] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.644892][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.653372][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.665885][ T284] device veth0_vlan entered promiscuous mode [ 23.675155][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.683049][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.691099][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.699029][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.706743][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.715032][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.723011][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.731080][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.739424][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.747682][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.755806][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.763259][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.777054][ T284] device veth1_macvtap entered promiscuous mode [ 23.788548][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.796530][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.804595][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.820354][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.828034][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.835236][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.843434][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.851683][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.860060][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.868242][ T15] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.875131][ T15] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.882605][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.890471][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.898507][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.905955][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.913493][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.923859][ T286] device veth0_vlan entered promiscuous mode [ 23.932188][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.940437][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.948668][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.956810][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.965158][ T53] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.972023][ T53] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.994114][ T283] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 24.007477][ T285] device veth0_vlan entered promiscuous mode [ 24.018335][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.027551][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.035275][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.044113][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.052689][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.060906][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.069214][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.077177][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.085331][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.093056][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.111345][ T285] device veth1_macvtap entered promiscuous mode [ 24.121376][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.128884][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.136110][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.145131][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.154221][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.162326][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.170600][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.184772][ T287] device veth0_vlan entered promiscuous mode [ 24.198471][ T286] device veth1_macvtap entered promiscuous mode [ 24.215069][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.223033][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.231784][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.240839][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.249604][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.257123][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.265650][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.273985][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.282910][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.291649][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.299980][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.319973][ T287] device veth1_macvtap entered promiscuous mode [ 24.369416][ T315] device syzkaller0 entered promiscuous mode [ 24.378721][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.388818][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.397934][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.406196][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.414761][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.422388][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.430752][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.497225][ C1] hrtimer: interrupt took 26935 ns [ 24.536287][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.549925][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.558873][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.567101][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.638143][ T327] device syzkaller0 entered promiscuous mode [ 24.918954][ T345] device veth0_vlan left promiscuous mode [ 24.925322][ T345] device veth0_vlan entered promiscuous mode [ 27.498020][ T446] FAULT_INJECTION: forcing a failure. [ 27.498020][ T446] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 27.512813][ T446] CPU: 1 PID: 446 Comm: syz.3.40 Not tainted 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 27.522249][ T446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 27.532153][ T446] Call Trace: [ 27.535303][ T446] dump_stack_lvl+0x1e2/0x24b [ 27.539794][ T446] ? bfq_pos_tree_add_move+0x43b/0x43b [ 27.545079][ T446] ? 0xffffffffa002839c [ 27.549077][ T446] ? is_bpf_text_address+0x172/0x190 [ 27.554193][ T446] dump_stack+0x15/0x17 [ 27.558184][ T446] should_fail+0x3c6/0x510 [ 27.562440][ T446] should_fail_usercopy+0x1a/0x20 [ 27.567297][ T446] _copy_from_user+0x20/0xd0 [ 27.571750][ T446] __se_sys_bpf+0x232/0x11cb0 [ 27.576241][ T446] ? stack_trace_save+0x113/0x1c0 [ 27.581101][ T446] ? terminate_walk+0x407/0x4f0 [ 27.585792][ T446] ? stack_trace_snprint+0xf0/0xf0 [ 27.590745][ T446] ? kmem_cache_free+0xa9/0x1e0 [ 27.595426][ T446] ? kmem_cache_free+0xa9/0x1e0 [ 27.600106][ T446] ? kasan_set_track+0x5d/0x70 [ 27.604705][ T446] ? __x64_sys_bpf+0x90/0x90 [ 27.609132][ T446] ? __kasan_slab_free+0x11/0x20 [ 27.613927][ T446] ? slab_free_freelist_hook+0xc0/0x190 [ 27.619288][ T446] ? kmem_cache_free+0xa9/0x1e0 [ 27.624672][ T446] ? putname+0xe7/0x140 [ 27.628666][ T446] ? do_sys_openat2+0x1fc/0x710 [ 27.633347][ T446] ? __x64_sys_openat+0x243/0x290 [ 27.638214][ T446] ? do_syscall_64+0x34/0x70 [ 27.642631][ T446] ? _kstrtoull+0x3a0/0x4a0 [ 27.646973][ T446] ? kstrtouint_from_user+0x20a/0x2a0 [ 27.652181][ T446] ? kstrtol_from_user+0x310/0x310 [ 27.657124][ T446] ? memset+0x35/0x40 [ 27.660948][ T446] ? __fsnotify_parent+0x4b9/0x6c0 [ 27.665896][ T446] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 27.672488][ T446] ? proc_fail_nth_write+0x20b/0x290 [ 27.677606][ T446] ? proc_fail_nth_read+0x210/0x210 [ 27.682641][ T446] ? security_file_permission+0x86/0xb0 [ 27.688023][ T446] ? rw_verify_area+0x1c3/0x360 [ 27.692713][ T446] ? preempt_count_add+0x92/0x1a0 [ 27.697568][ T446] ? vfs_write+0x852/0xe70 [ 27.701824][ T446] ? kmem_cache_free+0x1c0/0x1e0 [ 27.706685][ T446] ? kernel_write+0x3d0/0x3d0 [ 27.711201][ T446] ? __kasan_check_write+0x14/0x20 [ 27.716142][ T446] ? mutex_lock+0xa5/0x110 [ 27.720397][ T446] ? mutex_trylock+0xa0/0xa0 [ 27.724822][ T446] ? __kasan_check_write+0x14/0x20 [ 27.729767][ T446] ? fput_many+0x160/0x1b0 [ 27.734026][ T446] ? debug_smp_processor_id+0x17/0x20 [ 27.739233][ T446] __x64_sys_bpf+0x7b/0x90 [ 27.743484][ T446] do_syscall_64+0x34/0x70 [ 27.747738][ T446] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 27.753461][ T446] RIP: 0033:0x7f76afcc39f9 [ 27.757719][ T446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 27.777156][ T446] RSP: 002b:00007f76ae943048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 27.785406][ T446] RAX: ffffffffffffffda RBX: 00007f76afe51f80 RCX: 00007f76afcc39f9 [ 27.793217][ T446] RDX: 0000000000000090 RSI: 0000000020000340 RDI: 0000000000000005 [ 27.801024][ T446] RBP: 00007f76ae9430a0 R08: 0000000000000000 R09: 0000000000000000 [ 27.808834][ T446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 27.816663][ T446] R13: 000000000000000b R14: 00007f76afe51f80 R15: 00007fff08770c88 [ 27.926577][ T24] kauditd_printk_skb: 41 callbacks suppressed [ 27.926589][ T24] audit: type=1400 audit(1722946459.000:117): avc: denied { write } for pid=459 comm="syz.3.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 28.013813][ T448] device syzkaller0 entered promiscuous mode [ 28.302351][ T473] device syzkaller0 entered promiscuous mode [ 28.458468][ T24] audit: type=1400 audit(1722946459.540:118): avc: denied { setopt } for pid=485 comm="syz.2.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.565811][ T491] syz.3.54[491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.565870][ T491] syz.3.54[491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.626467][ T24] audit: type=1400 audit(1722946459.700:119): avc: denied { read } for pid=487 comm="syz.2.53" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.723750][ T489] device syzkaller0 entered promiscuous mode [ 28.756630][ T24] audit: type=1400 audit(1722946459.740:120): avc: denied { open } for pid=487 comm="syz.2.53" path="/dev/ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.804724][ T24] audit: type=1400 audit(1722946459.750:121): avc: denied { ioctl } for pid=487 comm="syz.2.53" path="/dev/ppp" dev="devtmpfs" ino=133 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 29.044790][ T24] audit: type=1400 audit(1722946460.120:122): avc: denied { write } for pid=499 comm="syz.4.56" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 29.730325][ T24] audit: type=1400 audit(1722946460.810:123): avc: denied { create } for pid=524 comm="syz.3.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 29.775668][ T521] cgroup: syz.4.63 (521) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 29.849541][ T528] bridge0: port 3(veth0_to_batadv) entered blocking state [ 29.856623][ T528] bridge0: port 3(veth0_to_batadv) entered disabled state [ 29.865001][ T521] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 29.913728][ T528] device veth0_to_batadv entered promiscuous mode [ 29.944500][ T528] bridge0: port 3(veth0_to_batadv) entered blocking state [ 29.951743][ T528] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 29.984022][ T531] device veth0_to_batadv left promiscuous mode [ 29.990956][ T531] bridge0: port 3(veth0_to_batadv) entered disabled state [ 30.052718][ T541] FAULT_INJECTION: forcing a failure. [ 30.052718][ T541] name failslab, interval 1, probability 0, space 0, times 1 [ 30.066192][ T541] CPU: 0 PID: 541 Comm: syz.1.69 Not tainted 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 30.075634][ T541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 30.085523][ T541] Call Trace: [ 30.088661][ T541] dump_stack_lvl+0x1e2/0x24b [ 30.093166][ T541] ? panic+0x812/0x812 [ 30.097075][ T541] ? bfq_pos_tree_add_move+0x43b/0x43b [ 30.102386][ T541] ? avc_has_perm_noaudit+0x117/0x240 [ 30.107585][ T541] dump_stack+0x15/0x17 [ 30.111564][ T541] should_fail+0x3c6/0x510 [ 30.115822][ T541] ? __get_vm_area_node+0x116/0x470 [ 30.120864][ T541] __should_failslab+0xa4/0xe0 [ 30.125454][ T541] should_failslab+0x9/0x20 [ 30.129789][ T541] kmem_cache_alloc_trace+0x3a/0x2e0 [ 30.134914][ T541] __get_vm_area_node+0x116/0x470 [ 30.139784][ T541] __vmalloc_node_range+0xdc/0x7c0 [ 30.144717][ T541] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 30.150100][ T541] ? 0xffffffffa00025b8 [ 30.154099][ T541] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 30.159479][ T541] __vmalloc+0x7a/0x90 [ 30.163380][ T541] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 30.168758][ T541] bpf_prog_alloc_no_stats+0x39/0x2a0 [ 30.173966][ T541] bpf_prog_alloc+0x21/0x1e0 [ 30.178391][ T541] __se_sys_bpf+0x9856/0x11cb0 [ 30.182995][ T541] ? kmem_cache_free+0xa9/0x1e0 [ 30.187685][ T541] ? kmem_cache_free+0xa9/0x1e0 [ 30.192366][ T541] ? kasan_set_track+0x5d/0x70 [ 30.196962][ T541] ? __x64_sys_bpf+0x90/0x90 [ 30.201389][ T541] ? __kasan_slab_free+0x11/0x20 [ 30.206162][ T541] ? slab_free_freelist_hook+0xc0/0x190 [ 30.211644][ T541] ? kmem_cache_free+0xa9/0x1e0 [ 30.216326][ T541] ? putname+0xe7/0x140 [ 30.220322][ T541] ? do_sys_openat2+0x1fc/0x710 [ 30.225622][ T541] ? __x64_sys_openat+0x243/0x290 [ 30.230484][ T541] ? do_syscall_64+0x34/0x70 [ 30.234997][ T541] ? _kstrtoull+0x3a0/0x4a0 [ 30.239340][ T541] ? memset+0x35/0x40 [ 30.243165][ T541] ? __fsnotify_parent+0x4b9/0x6c0 [ 30.248104][ T541] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 30.254704][ T541] ? proc_fail_nth_write+0x20b/0x290 [ 30.259818][ T541] ? proc_fail_nth_read+0x210/0x210 [ 30.264865][ T541] ? security_file_permission+0x86/0xb0 [ 30.270239][ T541] ? rw_verify_area+0x1c3/0x360 [ 30.274928][ T541] ? preempt_count_add+0x92/0x1a0 [ 30.279782][ T541] ? vfs_write+0x852/0xe70 [ 30.284041][ T541] ? kmem_cache_free+0xa9/0x1e0 [ 30.288728][ T541] ? kernel_write+0x3d0/0x3d0 [ 30.293236][ T541] ? __kasan_check_write+0x14/0x20 [ 30.298186][ T541] ? mutex_lock+0xa5/0x110 [ 30.302435][ T541] ? mutex_trylock+0xa0/0xa0 [ 30.306865][ T541] ? __kasan_check_write+0x14/0x20 [ 30.311808][ T541] ? fput_many+0x160/0x1b0 [ 30.316327][ T541] ? debug_smp_processor_id+0x17/0x20 [ 30.321620][ T541] __x64_sys_bpf+0x7b/0x90 [ 30.326163][ T541] do_syscall_64+0x34/0x70 [ 30.330517][ T541] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 30.336325][ T541] RIP: 0033:0x7f96ac1fb9f9 [ 30.340610][ T541] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 30.360013][ T541] RSP: 002b:00007f96aae7b048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 30.368255][ T541] RAX: ffffffffffffffda RBX: 00007f96ac389f80 RCX: 00007f96ac1fb9f9 [ 30.376063][ T541] RDX: 0000000000000090 RSI: 0000000020000340 RDI: 0000000000000005 [ 30.383876][ T541] RBP: 00007f96aae7b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 30.391689][ T541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 30.399497][ T541] R13: 000000000000000b R14: 00007f96ac389f80 R15: 00007ffc2c14d6e8 [ 30.412724][ T543] syz.4.70[543] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.412781][ T543] syz.4.70[543] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.496456][ T541] syz.1.69: vmalloc: allocation failure: 4096 bytes, mode:0x100dc0(GFP_USER|__GFP_ZERO), nodemask=(null),cpuset=syz1,mems_allowed=0 [ 30.527938][ T541] CPU: 0 PID: 541 Comm: syz.1.69 Not tainted 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 30.537549][ T541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 30.547434][ T541] Call Trace: [ 30.550585][ T541] dump_stack_lvl+0x1e2/0x24b [ 30.555078][ T541] ? wake_up_klogd+0xb8/0xf0 [ 30.559506][ T541] ? bfq_pos_tree_add_move+0x43b/0x43b [ 30.564798][ T541] ? pr_cont_kernfs_name+0xf0/0x100 [ 30.569834][ T541] dump_stack+0x15/0x17 [ 30.573831][ T541] warn_alloc+0x21a/0x390 [ 30.577992][ T541] ? __get_vm_area_node+0x116/0x470 [ 30.583117][ T541] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 30.588496][ T541] ? __kasan_kmalloc+0x9/0x10 [ 30.593010][ T541] ? __get_vm_area_node+0x34b/0x470 [ 30.598046][ T541] __vmalloc_node_range+0x287/0x7c0 [ 30.603073][ T541] ? 0xffffffffa00025b8 [ 30.607155][ T541] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 30.612548][ T541] __vmalloc+0x7a/0x90 [ 30.616456][ T541] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 30.621834][ T541] bpf_prog_alloc_no_stats+0x39/0x2a0 [ 30.627120][ T541] bpf_prog_alloc+0x21/0x1e0 [ 30.631553][ T541] __se_sys_bpf+0x9856/0x11cb0 [ 30.636148][ T541] ? kmem_cache_free+0xa9/0x1e0 [ 30.640829][ T541] ? kmem_cache_free+0xa9/0x1e0 [ 30.645526][ T541] ? kasan_set_track+0x5d/0x70 [ 30.650121][ T541] ? __x64_sys_bpf+0x90/0x90 [ 30.654565][ T541] ? __kasan_slab_free+0x11/0x20 [ 30.659318][ T541] ? slab_free_freelist_hook+0xc0/0x190 [ 30.664695][ T541] ? kmem_cache_free+0xa9/0x1e0 [ 30.669386][ T541] ? putname+0xe7/0x140 [ 30.673381][ T541] ? do_sys_openat2+0x1fc/0x710 [ 30.678245][ T541] ? __x64_sys_openat+0x243/0x290 [ 30.683182][ T541] ? do_syscall_64+0x34/0x70 [ 30.687612][ T541] ? _kstrtoull+0x3a0/0x4a0 [ 30.692044][ T541] ? memset+0x35/0x40 [ 30.695857][ T541] ? __fsnotify_parent+0x4b9/0x6c0 [ 30.700806][ T541] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 30.707400][ T541] ? proc_fail_nth_write+0x20b/0x290 [ 30.712608][ T541] ? proc_fail_nth_read+0x210/0x210 [ 30.717642][ T541] ? security_file_permission+0x86/0xb0 [ 30.723025][ T541] ? rw_verify_area+0x1c3/0x360 [ 30.727709][ T541] ? preempt_count_add+0x92/0x1a0 [ 30.732566][ T541] ? vfs_write+0x852/0xe70 [ 30.736822][ T541] ? kmem_cache_free+0xa9/0x1e0 [ 30.741510][ T541] ? kernel_write+0x3d0/0x3d0 [ 30.746024][ T541] ? __kasan_check_write+0x14/0x20 [ 30.750969][ T541] ? mutex_lock+0xa5/0x110 [ 30.755222][ T541] ? mutex_trylock+0xa0/0xa0 [ 30.759656][ T541] ? __kasan_check_write+0x14/0x20 [ 30.764597][ T541] ? fput_many+0x160/0x1b0 [ 30.768856][ T541] ? debug_smp_processor_id+0x17/0x20 [ 30.774053][ T541] __x64_sys_bpf+0x7b/0x90 [ 30.778304][ T541] do_syscall_64+0x34/0x70 [ 30.782650][ T541] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 30.788373][ T541] RIP: 0033:0x7f96ac1fb9f9 [ 30.792658][ T541] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 30.812066][ T541] RSP: 002b:00007f96aae7b048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 30.820315][ T541] RAX: ffffffffffffffda RBX: 00007f96ac389f80 RCX: 00007f96ac1fb9f9 [ 30.828124][ T541] RDX: 0000000000000090 RSI: 0000000020000340 RDI: 0000000000000005 [ 30.835936][ T541] RBP: 00007f96aae7b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 30.843747][ T541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 30.851565][ T541] R13: 000000000000000b R14: 00007f96ac389f80 R15: 00007ffc2c14d6e8 [ 30.867468][ T541] Mem-Info: [ 30.870889][ T541] active_anon:67 inactive_anon:2900 isolated_anon:0 [ 30.870889][ T541] active_file:3327 inactive_file:13068 isolated_file:0 [ 30.870889][ T541] unevictable:0 dirty:231 writeback:0 [ 30.870889][ T541] slab_reclaimable:6479 slab_unreclaimable:70249 [ 30.870889][ T541] mapped:20647 shmem:129 pagetables:498 bounce:0 [ 30.870889][ T541] free:1594605 free_pcp:983 free_cma:0 [ 30.907738][ T541] Node 0 active_anon:268kB inactive_anon:11600kB active_file:13308kB inactive_file:52272kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:82588kB dirty:924kB writeback:0kB shmem:516kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:3968kB all_unreclaimable? no [ 30.938452][ T541] DMA32 free:2983352kB min:62624kB low:78280kB high:93936kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2984772kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:1420kB local_pcp:52kB free_cma:0kB [ 30.967719][ T541] lowmem_reserve[]: 0 3941 3941 [ 30.977017][ T541] Normal free:3394884kB min:84828kB low:106032kB high:127236kB reserved_highatomic:0KB active_anon:268kB inactive_anon:11500kB active_file:13308kB inactive_file:52272kB unevictable:0kB writepending:924kB present:5242880kB managed:4035856kB mlocked:0kB pagetables:1992kB bounce:0kB free_pcp:2740kB local_pcp:1376kB free_cma:0kB [ 31.027427][ T541] lowmem_reserve[]: 0 0 0 [ 31.031811][ T541] DMA32: 6*4kB (UM) 4*8kB (M) 4*16kB (M) 6*32kB (UM) 8*64kB (UM) 5*128kB (UM) 6*256kB (UM) 5*512kB (M) 6*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2983352kB [ 31.049323][ T541] Normal: 786*4kB (UME) 542*8kB (UME) 445*16kB (UM) 334*32kB (UME) 305*64kB (UME) 46*128kB (UME) 19*256kB (UME) 32*512kB (UM) 9*1024kB (UM) 4*2048kB (UME) 807*4096kB (M) = 3394824kB [ 31.067649][ T541] 16524 total pagecache pages [ 31.073344][ T541] 0 pages in swap cache [ 31.079319][ T541] Swap cache stats: add 0, delete 0, find 0/0 [ 31.086006][ T541] Free swap = 124996kB [ 31.090216][ T541] Total swap = 124996kB [ 31.094173][ T541] 2097051 pages RAM [ 31.097996][ T541] 0 pages HighMem/MovableOnly [ 31.102575][ T541] 341894 pages reserved [ 31.106465][ T541] 0 pages cma reserved [ 31.221606][ T24] audit: type=1400 audit(1722946462.300:124): avc: denied { create } for pid=563 comm="syz.4.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 31.439964][ T24] audit: type=1400 audit(1722946462.520:125): avc: denied { create } for pid=563 comm="syz.4.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 31.515728][ T569] device sit0 entered promiscuous mode [ 31.968687][ T24] audit: type=1400 audit(1722946463.050:126): avc: denied { read } for pid=75 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 32.313559][ T586] device pim6reg1 entered promiscuous mode [ 32.421926][ T599] device veth0_vlan left promiscuous mode [ 32.429596][ T599] device veth0_vlan entered promiscuous mode [ 32.643890][ T624] device sit0 entered promiscuous mode [ 32.967298][ T24] kauditd_printk_skb: 1 callbacks suppressed [ 32.967311][ T24] audit: type=1400 audit(1722946464.040:128): avc: denied { write } for pid=648 comm="syz.2.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.053620][ T666] device sit0 entered promiscuous mode [ 33.265013][ T683] Â: renamed from pim6reg1 [ 33.299593][ T24] audit: type=1400 audit(1722946464.380:129): avc: denied { read } for pid=692 comm="syz.1.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.348823][ T24] audit: type=1400 audit(1722946464.430:130): avc: denied { create } for pid=692 comm="syz.1.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 33.449202][ T705] ------------[ cut here ]------------ [ 33.454488][ T705] trace type BPF program uses run-time allocation [ 33.461614][ T705] WARNING: CPU: 1 PID: 705 at kernel/bpf/verifier.c:10493 check_map_prog_compatibility+0x65b/0x7c0 [ 33.474355][ T705] Modules linked in: [ 33.478161][ T705] CPU: 1 PID: 705 Comm: syz.2.115 Not tainted 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 33.494290][ T705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 33.547604][ T705] RIP: 0010:check_map_prog_compatibility+0x65b/0x7c0 [ 33.588900][ T705] Code: c8 e9 84 fe ff ff e8 24 f5 ee ff 31 db e9 85 fe ff ff e8 18 f5 ee ff c6 05 2e 13 65 05 01 48 c7 c7 40 73 45 85 e8 d5 7b c2 ff <0f> 0b e9 42 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 17 fa ff [ 33.677162][ T705] RSP: 0018:ffffc90000e76f90 EFLAGS: 00010246 [ 33.685458][ T705] RAX: c4ab813c13879c00 RBX: ffff88810ce04000 RCX: ffff888125f18000 [ 33.698584][ T705] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 33.744193][ T705] RBP: ffffc90000e76fd0 R08: ffffffff81521b78 R09: fffff520001ced09 [ 33.780717][ T705] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 33.811772][ T705] R13: 1ffff92000025a04 R14: ffff88811a984000 R15: ffffc9000012d020 [ 33.839782][ T705] FS: 00007fab2198b6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 33.890812][ T705] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 33.911358][ T705] CR2: 0000001b2da1fffc CR3: 0000000118489000 CR4: 00000000003506b0 [ 33.926957][ T705] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 33.942693][ T705] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 33.975265][ T705] Call Trace: [ 33.983158][ T705] ? show_regs+0x58/0x60 [ 33.991182][ T705] ? __warn+0x160/0x2f0 [ 34.000054][ T705] ? check_map_prog_compatibility+0x65b/0x7c0 [ 34.010451][ T705] ? report_bug+0x3d9/0x5b0 [ 34.018113][ T705] ? check_map_prog_compatibility+0x65b/0x7c0 [ 34.035312][ T705] ? handle_bug+0x41/0x70 [ 34.070353][ T705] ? exc_invalid_op+0x1b/0x50 [ 34.087258][ T705] ? asm_exc_invalid_op+0x12/0x20 [ 34.107201][ T705] ? wake_up_klogd+0xb8/0xf0 [ 34.128600][ T705] ? check_map_prog_compatibility+0x65b/0x7c0 [ 34.154817][ T705] ? __fdget+0x1bc/0x240 [ 34.161211][ T705] resolve_pseudo_ldimm64+0x586/0x1020 [ 34.181928][ T705] ? bpf_check+0xf2b0/0xf2b0 [ 34.191176][ T705] ? kvmalloc_node+0x82/0x130 [ 34.203238][ T705] bpf_check+0xaf21/0xf2b0 [ 34.222737][ T705] ? stack_depot_save+0xe/0x10 [ 34.227725][ T705] ? __se_sys_bpf+0x9856/0x11cb0 [ 34.237535][ T705] ? sched_clock+0x3a/0x40 [ 34.241854][ T705] ? bpf_get_btf_vmlinux+0x60/0x60 [ 34.251948][ T705] ? __kernel_text_address+0x9b/0x110 [ 34.257157][ T705] ? unwind_get_return_address+0x4d/0x90 [ 34.277478][ T705] ? arch_stack_walk+0xf3/0x140 [ 34.282167][ T705] ? stack_trace_save+0x113/0x1c0 [ 34.323854][ T705] ? stack_trace_snprint+0xf0/0xf0 [ 34.333694][ T742] bridge_slave_0: mtu greater than device maximum [ 34.340066][ T705] ? stack_trace_snprint+0xf0/0xf0 [ 34.346398][ T705] ? selinux_bpf_prog_alloc+0x51/0x140 [ 34.352203][ T705] ? selinux_bpf_prog_alloc+0x51/0x140 [ 34.384802][ T705] ? ____kasan_kmalloc+0xed/0x110 [ 34.401781][ T705] ? ____kasan_kmalloc+0xdb/0x110 [ 34.410861][ T705] ? __kasan_kmalloc+0x9/0x10 [ 34.415373][ T705] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 34.421517][ T705] ? selinux_bpf_prog_alloc+0x51/0x140 [ 34.428587][ T705] ? security_bpf_prog_alloc+0x62/0x90 [ 34.439233][ T705] ? __se_sys_bpf+0x9f8c/0x11cb0 [ 34.446648][ T705] ? __x64_sys_bpf+0x7b/0x90 [ 34.457354][ T705] ? do_syscall_64+0x34/0x70 [ 34.461789][ T705] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 34.515438][ T705] ? __kasan_kmalloc+0x9/0x10 [ 34.534353][ T705] __se_sys_bpf+0x107a2/0x11cb0 [ 34.557048][ T705] ? futex_wait+0x6a0/0x7c0 [ 34.571718][ T705] ? __x64_sys_bpf+0x90/0x90 [ 34.587328][ T705] ? do_futex+0x17b0/0x17b0 [ 34.614123][ T705] ? do_futex+0x139a/0x17b0 [ 34.634346][ T705] ? __kasan_check_write+0x14/0x20 [ 34.651537][ T705] ? put_vma+0x8f/0xb0 [ 34.673368][ T705] ? __handle_speculative_fault+0x10c1/0x1e90 [ 34.699121][ T705] ? futex_exit_release+0x1e0/0x1e0 [ 34.720680][ T705] ? finish_fault+0xaf0/0xaf0 [ 34.736501][ T705] ? set_current_blocked+0x40/0x40 [ 34.765848][ T755] device vxcan1 entered promiscuous mode [ 34.770625][ T705] ? debug_smp_processor_id+0x17/0x20 [ 34.794963][ T705] ? __se_sys_futex+0x355/0x470 [ 34.807413][ T705] ? fpu__clear_all+0x20/0x20 [ 34.821875][ T705] ? __kasan_check_read+0x11/0x20 [ 34.857275][ T705] __x64_sys_bpf+0x7b/0x90 [ 34.861550][ T705] do_syscall_64+0x34/0x70 [ 34.867293][ T705] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 34.873021][ T705] RIP: 0033:0x7fab22d0b9f9 [ 34.891362][ T705] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.934554][ T705] RSP: 002b:00007fab2198b048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 34.948857][ T705] RAX: ffffffffffffffda RBX: 00007fab22e99f80 RCX: 00007fab22d0b9f9 [ 34.998420][ T705] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 35.014194][ T705] RBP: 00007fab22d798ee R08: 0000000000000000 R09: 0000000000000000 [ 35.027519][ T705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 35.069869][ T705] R13: 000000000000000b R14: 00007fab22e99f80 R15: 00007ffff41d1528 [ 35.088356][ T783] device syzkaller0 entered promiscuous mode [ 35.095754][ T705] ---[ end trace 705012ca9196faa5 ]--- [ 37.076242][ T904] device sit0 left promiscuous mode [ 37.101504][ T908] device sit0 entered promiscuous mode [ 37.339139][ T941] device syzkaller0 entered promiscuous mode [ 37.624615][ T24] audit: type=1400 audit(1722946468.700:131): avc: denied { setopt } for pid=977 comm="syz.0.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 38.467071][ T24] audit: type=1400 audit(1722946469.540:132): avc: denied { create } for pid=1033 comm="syz.4.204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 38.518341][ T24] audit: type=1400 audit(1722946469.540:133): avc: denied { append } for pid=1031 comm="syz.0.203" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 38.664104][ T1045] device pim6reg1 entered promiscuous mode [ 38.933876][ T1093] device syzkaller0 entered promiscuous mode [ 39.001651][ T1107] device sit0 left promiscuous mode [ 39.133787][ T1109] device sit0 entered promiscuous mode [ 39.150325][ T1107] syz.1.222[1107] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.150381][ T1107] syz.1.222[1107] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.432675][ T1113] bridge0: port 3(veth0_to_batadv) entered blocking state [ 39.473293][ T1113] bridge0: port 3(veth0_to_batadv) entered disabled state [ 39.503680][ T1113] device veth0_to_batadv entered promiscuous mode [ 39.525057][ T1113] bridge0: port 3(veth0_to_batadv) entered blocking state [ 39.532302][ T1113] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 39.549097][ T24] audit: type=1400 audit(1722946470.630:134): avc: denied { create } for pid=1130 comm="syz.1.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 39.568458][ T1133] device veth0_to_batadv left promiscuous mode [ 39.578969][ T1133] bridge0: port 3(veth0_to_batadv) entered disabled state [ 39.771689][ T24] audit: type=1400 audit(1722946470.850:135): avc: denied { create } for pid=1143 comm="syz.3.231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 39.822634][ T1150] syz.0.232[1150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.822689][ T1150] syz.0.232[1150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.860208][ T24] audit: type=1400 audit(1722946470.890:136): avc: denied { create } for pid=1149 comm="syz.0.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 40.171902][ T1169] device sit0 left promiscuous mode [ 41.626520][ T1208] device syzkaller0 entered promiscuous mode [ 41.806133][ T1219] device pim6reg1 entered promiscuous mode [ 41.949875][ T1225] device pim6reg1 entered promiscuous mode [ 42.079531][ T1228] ÿÿÿÿÿÿ: renamed from vlan0 [ 42.870544][ T24] audit: type=1400 audit(1722946473.950:137): avc: denied { create } for pid=1258 comm="syz.3.262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 43.369991][ T24] audit: type=1400 audit(1722946474.450:138): avc: denied { create } for pid=1275 comm="syz.3.269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 44.225637][ T1304] device syzkaller0 entered promiscuous mode [ 44.661518][ T1345] syz.0.291[1345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.661574][ T1345] syz.0.291[1345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.670458][ T1335] syz.2.287[1335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.713183][ T1335] syz.2.287[1335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.869221][ T1338] device syzkaller0 entered promiscuous mode [ 44.986900][ T1358] device sit0 entered promiscuous mode [ 45.186765][ T1388] syz.4.303[1388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.186838][ T1388] syz.4.303[1388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.199789][ T1388] syz.4.303[1388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.210979][ T1388] syz.4.303[1388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.255333][ T1370] device sit0 left promiscuous mode [ 46.406859][ T1430] syz.0.316[1430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.406911][ T1430] syz.0.316[1430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.439223][ T1428] device sit0 entered promiscuous mode [ 46.531895][ T1432] device syzkaller0 entered promiscuous mode [ 46.948607][ T1443] device sit0 entered promiscuous mode [ 47.362375][ T1461] device sit0 entered promiscuous mode [ 47.569179][ T24] audit: type=1400 audit(1722946478.650:139): avc: denied { create } for pid=1468 comm="syz.3.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 48.143950][ T1487] device syzkaller0 entered promiscuous mode [ 48.260988][ T1510] device syzkaller0 entered promiscuous mode [ 48.636145][ T1544] device syzkaller0 entered promiscuous mode [ 48.709626][ T24] audit: type=1400 audit(1722946479.790:140): avc: denied { create } for pid=1549 comm="syz.3.354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 49.158955][ T1571] device syzkaller0 entered promiscuous mode [ 50.549960][ T1652] device pim6reg1 entered promiscuous mode [ 50.912538][ T24] audit: type=1400 audit(1722946481.990:141): avc: denied { create } for pid=1710 comm="syz.3.399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 51.548420][ T24] audit: type=1400 audit(1722946482.630:142): avc: denied { setattr } for pid=1727 comm="syz.1.404" path="/dev/ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 51.747023][ T1739] device syzkaller0 entered promiscuous mode [ 52.042979][ T1781] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 52.055279][ T24] audit: type=1400 audit(1722946483.130:143): avc: denied { create } for pid=1778 comm="syz.0.413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 52.076165][ T1781] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 52.083487][ T1781] syzkaller0: linktype set to 65535 [ 52.498841][ T1840] device sit0 left promiscuous mode [ 52.666300][ T1840] device sit0 entered promiscuous mode [ 53.796852][ T1878] device syzkaller0 entered promiscuous mode [ 54.567655][ T1944] syz.4.457[1944] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.567710][ T1944] syz.4.457[1944] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.610645][ T1938] ¯Ê®¸}p: renamed from pim6reg1 [ 55.994437][ T2013] device pim6reg1 entered promiscuous mode [ 56.098488][ T2013] tap0: tun_chr_ioctl cmd 1074025677 [ 56.109239][ T2013] tap0: linktype set to 270 [ 56.607361][ T2056] device veth1_macvtap left promiscuous mode [ 56.613641][ T2056] device macsec0 entered promiscuous mode [ 56.639976][ T2063] device veth1_macvtap entered promiscuous mode [ 57.244284][ T24] audit: type=1400 audit(1722946488.320:144): avc: denied { create } for pid=2141 comm="syz.0.497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 58.011038][ T2185] device pim6reg1 entered promiscuous mode [ 58.073698][ T2195] syz.0.510 uses obsolete (PF_INET,SOCK_PACKET) [ 58.095167][ T2194] device syzkaller0 entered promiscuous mode [ 58.299311][ T2211] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.306341][ T2211] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.486732][ T2210] device syzkaller0 entered promiscuous mode [ 58.631704][ T2217] device pim6reg1 entered promiscuous mode [ 58.642132][ T2224] syz.4.520[2224] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.642183][ T2224] syz.4.520[2224] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.076298][ T2259] device sit0 left promiscuous mode [ 59.111225][ T2262] device pim6reg1 entered promiscuous mode [ 59.157025][ T2264] device sit0 entered promiscuous mode [ 59.481956][ T2319] device syzkaller0 entered promiscuous mode [ 60.320883][ T2380] tap0: tun_chr_ioctl cmd 1074025678 [ 60.327281][ T2380] tap0: group set to 0 [ 61.454869][ T24] audit: type=1400 audit(1722946492.530:145): avc: denied { create } for pid=2432 comm="syz.2.584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 62.171624][ T2521] device sit0 left promiscuous mode [ 62.704300][ T2575] device veth1_macvtap left promiscuous mode [ 62.984445][ T2592] syz.2.624[2592] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.984500][ T2592] syz.2.624[2592] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.552549][ T2614] device sit0 left promiscuous mode [ 63.600026][ T2615] device sit0 entered promiscuous mode [ 63.947275][ T2634] syz.0.637[2634] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.948891][ T2634] syz.0.637[2634] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.978990][ T24] audit: type=1400 audit(1722946495.060:146): avc: denied { ioctl } for pid=2630 comm="syz.4.636" path="socket:[21983]" dev="sockfs" ino=21983 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 64.149029][ T2636] device syzkaller0 entered promiscuous mode [ 64.520580][ T2655] tap0: tun_chr_ioctl cmd 1074025675 [ 64.527273][ T2655] tap0: persist enabled [ 64.541413][ T2655] tap0: tun_chr_ioctl cmd 1074025698 [ 64.741474][ T24] audit: type=1400 audit(1722946495.820:147): avc: denied { create } for pid=2668 comm="syz.2.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 65.022124][ T2683] device syzkaller0 entered promiscuous mode [ 65.203115][ T24] audit: type=1400 audit(1722946496.280:148): avc: denied { create } for pid=2695 comm="syz.1.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 66.274581][ T2744] device pim6reg1 entered promiscuous mode [ 66.528097][ T2762] syz.4.674[2762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.528155][ T2762] syz.4.674[2762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.213298][ T2830] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 67.406698][ T2842] device syzkaller0 entered promiscuous mode [ 67.518939][ T2857] device syzkaller0 entered promiscuous mode [ 67.716228][ T2869] device veth0_vlan left promiscuous mode [ 67.729957][ T2869] device veth0_vlan entered promiscuous mode [ 67.744223][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.752590][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 67.760269][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 67.792949][ T2868] device pim6reg1 entered promiscuous mode [ 68.070612][ T2879] device syzkaller0 entered promiscuous mode [ 68.163693][ T2891] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.170892][ T2891] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.178527][ T2891] device bridge_slave_0 entered promiscuous mode [ 68.185548][ T2891] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.192969][ T2891] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.200537][ T2891] device bridge_slave_1 entered promiscuous mode [ 68.292138][ T2092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.304600][ T2092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.319014][ T2093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.327907][ T2093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.337934][ T2093] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.344797][ T2093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.461674][ T2093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.525880][ T2093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.581163][ T2093] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.588055][ T2093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.747017][ T2092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.758036][ T2092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 68.766112][ T2092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.774867][ T2092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 68.783132][ T2092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.844983][ T2093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 68.877018][ T2093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 68.903107][ T2093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 68.911068][ T2093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.951612][ T2891] device veth0_vlan entered promiscuous mode [ 69.001238][ T2092] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 69.031159][ T2092] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 69.186533][ T2891] device veth1_macvtap entered promiscuous mode [ 69.219131][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 69.250077][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 69.299546][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 69.376908][ T1988] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 69.415744][ T1988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 69.492305][ T1988] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 69.550058][ T1988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 69.641065][ T24] audit: type=1400 audit(1722946500.720:149): avc: denied { mounton } for pid=2891 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=357 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 69.803021][ T2945] device syzkaller0 entered promiscuous mode [ 69.885822][ T2962] device syzkaller0 entered promiscuous mode [ 70.085178][ T2979] device pim6reg1 entered promiscuous mode [ 70.162321][ T24] audit: type=1400 audit(1722946501.240:150): avc: denied { create } for pid=2986 comm="syz.2.740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 70.462551][ T3012] device sit0 entered promiscuous mode [ 70.812674][ T3019] device syzkaller0 entered promiscuous mode [ 71.338763][ T3077] device syzkaller0 entered promiscuous mode [ 72.465674][ T3127] device syzkaller0 entered promiscuous mode [ 72.548971][ T3137] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.556042][ T3137] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.598483][ T3137] device bridge_slave_1 left promiscuous mode [ 72.604551][ T3137] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.628105][ T3137] device bridge_slave_0 left promiscuous mode [ 72.634410][ T3137] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.756137][ T3160] syz.2.784[3160] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.756193][ T3160] syz.2.784[3160] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.116850][ T3185] device syzkaller0 entered promiscuous mode [ 73.516600][ T3233] device syzkaller0 entered promiscuous mode [ 74.292828][ T3294] device syzkaller0 entered promiscuous mode [ 74.669477][ T3321] device veth1_macvtap entered promiscuous mode [ 74.676225][ T3321] device macsec0 entered promiscuous mode [ 74.698195][ T2092] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 74.996058][ T3330] device syzkaller0 entered promiscuous mode [ 75.064932][ T3344] device syzkaller0 entered promiscuous mode [ 75.098779][ T3352] device sit0 left promiscuous mode [ 75.419528][ T3407] device syzkaller0 entered promiscuous mode [ 75.828596][ T3425] device syzkaller0 entered promiscuous mode [ 76.310763][ T3458] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 76.560698][ T3463] device syzkaller0 entered promiscuous mode [ 76.881933][ T3487] device pim6reg1 entered promiscuous mode [ 77.344467][ T3506] device syzkaller0 entered promiscuous mode [ 77.389143][ T3510] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.396116][ T3510] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.403252][ T3510] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.410107][ T3510] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.424158][ T3510] device bridge0 entered promiscuous mode [ 77.894687][ T3528] bridge0: port 3(veth0_to_batadv) entered blocking state [ 77.902017][ T3528] bridge0: port 3(veth0_to_batadv) entered disabled state [ 77.909566][ T3528] device veth0_to_batadv entered promiscuous mode [ 77.916011][ T3528] bridge0: port 3(veth0_to_batadv) entered blocking state [ 77.923070][ T3528] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 78.083884][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.519363][ T3556] device syzkaller0 entered promiscuous mode [ 78.572570][ T3564] device veth1_macvtap left promiscuous mode [ 78.791498][ T3581] device wg2 entered promiscuous mode [ 78.805872][ T3586] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 78.905710][ T3591] device syzkaller0 entered promiscuous mode [ 79.414942][ T3634] device syzkaller0 entered promiscuous mode [ 79.997451][ T3654] device sit0 left promiscuous mode [ 80.050555][ T3654] device sit0 entered promiscuous mode [ 80.265399][ T3672] device syzkaller0 entered promiscuous mode [ 80.499586][ T3695] device vxcan1 entered promiscuous mode [ 81.060576][ T3708] device vxcan1 entered promiscuous mode [ 81.175462][ T3717] device syzkaller0 entered promiscuous mode [ 81.356557][ T3737] device veth1_macvtap entered promiscuous mode [ 81.372977][ T3737] device macsec0 entered promiscuous mode [ 81.398441][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 81.468824][ T3746] device sit0 entered promiscuous mode [ 81.742034][ T3763] device syzkaller0 entered promiscuous mode [ 81.975130][ T3773] device syzkaller0 entered promiscuous mode [ 82.096512][ T3792] device vxcan1 entered promiscuous mode [ 82.752546][ T3828] device syzkaller0 entered promiscuous mode [ 83.056978][ T3835] device pim6reg1 entered promiscuous mode [ 83.204202][ T3836] device veth1_macvtap left promiscuous mode [ 83.339723][ T3843] ÿÿÿÿÿÿ: renamed from vlan0 [ 83.432065][ T3865] device syzkaller0 entered promiscuous mode [ 83.820271][ T3904] device syzkaller0 entered promiscuous mode [ 84.246775][ T3932] device veth1_macvtap left promiscuous mode [ 84.253499][ T3932] device macsec0 left promiscuous mode [ 85.231518][ T3974] device syzkaller0 entered promiscuous mode [ 85.379636][ T3990] device sit0 left promiscuous mode [ 85.555486][ T24] audit: type=1400 audit(1722946516.630:151): avc: denied { write } for pid=4001 comm="syz.2.1041" name="task" dev="proc" ino=25103 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 85.685816][ T24] audit: type=1400 audit(1722946516.650:152): avc: denied { add_name } for pid=4001 comm="syz.2.1041" name="cgroup.stat" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 85.733520][ T4012] device syzkaller0 entered promiscuous mode [ 85.854426][ T24] audit: type=1400 audit(1722946516.670:153): avc: denied { create } for pid=4001 comm="syz.2.1041" name="cgroup.stat" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 85.984925][ T24] audit: type=1400 audit(1722946516.670:154): avc: denied { associate } for pid=4001 comm="syz.2.1041" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 86.122404][ T4062] device pim6reg1 entered promiscuous mode [ 86.208592][ T4073] device syzkaller0 entered promiscuous mode [ 86.370561][ T4086] device sit0 entered promiscuous mode [ 86.763407][ T4129] device syzkaller0 entered promiscuous mode [ 86.767082][ T4135] syz.3.1080[4135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.790342][ T4135] syz.3.1080[4135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.053231][ T4169] device veth0_vlan left promiscuous mode [ 87.156932][ T4169] device veth0_vlan entered promiscuous mode [ 87.262574][ T2094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 87.274181][ T2094] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 87.289876][ T2094] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 87.335088][ T4190] device syzkaller0 entered promiscuous mode [ 87.354227][ T4194] device veth0_vlan left promiscuous mode [ 87.365206][ T4194] device veth0_vlan entered promiscuous mode [ 87.394021][ T2093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 87.403262][ T2093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 87.412433][ T2093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 87.632890][ T4216] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.639830][ T4216] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.650618][ T4216] device bridge0 left promiscuous mode [ 87.718414][ T4213] device macsec0 entered promiscuous mode [ 87.724626][ T2091] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 87.829217][ T4220] device syzkaller0 entered promiscuous mode [ 87.841323][ T4216] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.848479][ T4216] bridge0: port 2(bridge_slave_1) entered forwarding state [ 87.857583][ T4216] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.864532][ T4216] bridge0: port 1(bridge_slave_0) entered forwarding state [ 87.895126][ T4216] device bridge0 entered promiscuous mode [ 88.118509][ T4247] device syzkaller0 entered promiscuous mode [ 88.207813][ T4260] device syzkaller0 entered promiscuous mode [ 88.214584][ T4260] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 88.640678][ T4269] device veth0_vlan left promiscuous mode [ 88.647459][ T4269] device veth0_vlan entered promiscuous mode [ 88.683456][ T4283] device pim6reg1 entered promiscuous mode [ 88.728189][ T2058] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 88.974206][ T4302] geneve1: tun_chr_ioctl cmd 1074025672 [ 88.979685][ T4302] geneve1: ignored: set checksum enabled [ 89.012353][ T4300] device syzkaller0 entered promiscuous mode [ 89.116353][ T4308] device syzkaller0 entered promiscuous mode [ 90.107837][ T4362] FAULT_INJECTION: forcing a failure. [ 90.107837][ T4362] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 90.123614][ T4355] device syzkaller0 entered promiscuous mode [ 90.140992][ T4362] CPU: 1 PID: 4362 Comm: syz.3.1151 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 90.152260][ T4362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 90.162266][ T4362] Call Trace: [ 90.165412][ T4362] dump_stack_lvl+0x1e2/0x24b [ 90.169909][ T4362] ? bfq_pos_tree_add_move+0x43b/0x43b [ 90.175197][ T4362] ? 0xffffffffa0028000 [ 90.179193][ T4362] ? is_bpf_text_address+0x172/0x190 [ 90.184312][ T4362] dump_stack+0x15/0x17 [ 90.188307][ T4362] should_fail+0x3c6/0x510 [ 90.192562][ T4362] should_fail_usercopy+0x1a/0x20 [ 90.197421][ T4362] _copy_from_user+0x20/0xd0 [ 90.201863][ T4362] __se_sys_bpf+0x232/0x11cb0 [ 90.206358][ T4362] ? stack_trace_save+0x113/0x1c0 [ 90.211226][ T4362] ? terminate_walk+0x407/0x4f0 [ 90.215993][ T4362] ? stack_trace_snprint+0xf0/0xf0 [ 90.220944][ T4362] ? kmem_cache_free+0xa9/0x1e0 [ 90.225628][ T4362] ? kmem_cache_free+0xa9/0x1e0 [ 90.230401][ T4362] ? kasan_set_track+0x5d/0x70 [ 90.235000][ T4362] ? __x64_sys_bpf+0x90/0x90 [ 90.239423][ T4362] ? __kasan_slab_free+0x11/0x20 [ 90.244196][ T4362] ? slab_free_freelist_hook+0xc0/0x190 [ 90.249581][ T4362] ? kmem_cache_free+0xa9/0x1e0 [ 90.254344][ T4362] ? putname+0xe7/0x140 [ 90.258261][ T4362] ? do_sys_openat2+0x1fc/0x710 [ 90.262946][ T4362] ? __x64_sys_openat+0x243/0x290 [ 90.267806][ T4362] ? do_syscall_64+0x34/0x70 [ 90.272320][ T4362] ? _kstrtoull+0x3a0/0x4a0 [ 90.276661][ T4362] ? kstrtouint_from_user+0x20a/0x2a0 [ 90.281870][ T4362] ? kstrtol_from_user+0x310/0x310 [ 90.286816][ T4362] ? memset+0x35/0x40 [ 90.290727][ T4362] ? __fsnotify_parent+0x4b9/0x6c0 [ 90.295605][ T4362] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 90.302179][ T4362] ? proc_fail_nth_write+0x20b/0x290 [ 90.307300][ T4362] ? proc_fail_nth_read+0x210/0x210 [ 90.312336][ T4362] ? security_file_permission+0x86/0xb0 [ 90.317714][ T4362] ? rw_verify_area+0x1c3/0x360 [ 90.322434][ T4362] ? preempt_count_add+0x92/0x1a0 [ 90.327357][ T4362] ? vfs_write+0x852/0xe70 [ 90.331697][ T4362] ? kmem_cache_free+0x1c0/0x1e0 [ 90.336470][ T4362] ? kernel_write+0x3d0/0x3d0 [ 90.340984][ T4362] ? __kasan_check_write+0x14/0x20 [ 90.345929][ T4362] ? mutex_lock+0xa5/0x110 [ 90.350183][ T4362] ? mutex_trylock+0xa0/0xa0 [ 90.354619][ T4362] ? __kasan_check_write+0x14/0x20 [ 90.359561][ T4362] ? fput_many+0x160/0x1b0 [ 90.363815][ T4362] ? debug_smp_processor_id+0x17/0x20 [ 90.369015][ T4362] __x64_sys_bpf+0x7b/0x90 [ 90.373266][ T4362] do_syscall_64+0x34/0x70 [ 90.377522][ T4362] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 90.383249][ T4362] RIP: 0033:0x7fbbc11749f9 [ 90.387510][ T4362] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 90.406953][ T4362] RSP: 002b:00007fbbbfdf4048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 90.415272][ T4362] RAX: ffffffffffffffda RBX: 00007fbbc1302f80 RCX: 00007fbbc11749f9 [ 90.423172][ T4362] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 90.430983][ T4362] RBP: 00007fbbbfdf40a0 R08: 0000000000000000 R09: 0000000000000000 [ 90.438794][ T4362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 90.446695][ T4362] R13: 000000000000000b R14: 00007fbbc1302f80 R15: 00007fffa332e3e8 [ 90.455669][ T24] audit: type=1400 audit(1722946521.530:155): avc: denied { remove_name } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 90.486275][ T4360] device syzkaller0 entered promiscuous mode [ 90.504523][ T24] audit: type=1400 audit(1722946521.530:156): avc: denied { rename } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 90.589051][ T4368] device syzkaller0 entered promiscuous mode [ 90.684080][ T4372] device sit0 left promiscuous mode [ 90.701123][ T4372] device sit0 entered promiscuous mode [ 91.681088][ T4422] device syzkaller0 entered promiscuous mode [ 91.719721][ T4440] device sit0 left promiscuous mode [ 91.762415][ T4440] device sit0 entered promiscuous mode [ 92.279712][ T4481] device syzkaller0 entered promiscuous mode [ 92.608331][ T4505] device pim6reg1 entered promiscuous mode [ 93.031302][ T4525] device pim6reg1 entered promiscuous mode [ 93.239402][ T4530] device syzkaller0 entered promiscuous mode [ 95.949384][ T4667] device syzkaller0 entered promiscuous mode [ 96.805564][ T4713] device syzkaller0 entered promiscuous mode [ 97.060631][ T4720] device pim6reg1 entered promiscuous mode [ 97.306549][ T4734] device sit0 entered promiscuous mode [ 97.511512][ T4741] device syzkaller0 entered promiscuous mode [ 98.148003][ T4803] device sit0 left promiscuous mode [ 98.169426][ T4803] device sit0 entered promiscuous mode [ 99.941455][ T4836] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.957723][ T4836] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.978461][ T4836] device bridge_slave_0 entered promiscuous mode [ 100.015250][ T4836] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.033582][ T4836] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.041746][ T4836] device bridge_slave_1 entered promiscuous mode [ 100.347165][ T4882] device syzkaller0 entered promiscuous mode [ 100.504310][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.512027][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.532064][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 100.540668][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 100.555045][ T409] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.562095][ T409] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.572364][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 100.581094][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.589458][ T409] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.596309][ T409] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.617923][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 100.638353][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 100.654955][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 100.673276][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 100.691238][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 100.708239][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 100.725293][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 100.750642][ T4836] device veth0_vlan entered promiscuous mode [ 100.758174][ T2058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 100.769196][ T2058] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.793356][ T2058] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.800793][ T2058] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.813452][ T4836] device veth1_macvtap entered promiscuous mode [ 100.821397][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 100.849006][ T2058] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 100.857129][ T2058] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 100.871491][ T2058] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 100.892381][ T2058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 101.231749][ T9] device bridge_slave_1 left promiscuous mode [ 101.252598][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.294670][ T9] device bridge_slave_0 left promiscuous mode [ 101.362341][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.373499][ T9] device veth1_macvtap left promiscuous mode [ 101.379751][ T9] device veth0_vlan left promiscuous mode [ 101.548777][ T4932] device bridge0 entered promiscuous mode [ 101.602132][ T4942] device vxcan1 entered promiscuous mode [ 101.680979][ T4949] bridge0: port 3(veth0_to_batadv) entered disabled state [ 101.688009][ T4949] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.694879][ T4949] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.704048][ T4950] device veth0_to_batadv left promiscuous mode [ 101.710943][ T4950] bridge0: port 3(veth0_to_batadv) entered disabled state [ 101.718663][ T4950] device bridge_slave_1 left promiscuous mode [ 101.724785][ T4950] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.752301][ T4950] device bridge_slave_0 left promiscuous mode [ 101.773097][ T4950] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.013374][ T4972] syz.1.1334[4972] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.013462][ T4972] syz.1.1334[4972] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.310678][ T4989] device syzkaller0 entered promiscuous mode [ 102.361146][ T4984] ¯Ê®¸}p: renamed from pim6reg1 [ 102.522005][ T4999] device veth0_vlan left promiscuous mode [ 102.545947][ T4999] device veth0_vlan entered promiscuous mode [ 103.349104][ T5036] ¯Ê®¸}p: renamed from pim6reg1 [ 104.088483][ T93] udevd[93]: worker [309] terminated by signal 33 (Unknown signal 33) [ 104.133675][ T93] udevd[93]: worker [309] failed while handling '/devices/virtual/block/loop2' [ 104.298910][ T93] udevd[93]: worker [647] terminated by signal 33 (Unknown signal 33) [ 104.405129][ T93] udevd[93]: worker [647] failed while handling '/devices/virtual/block/loop0' [ 104.493608][ T93] udevd[93]: worker [5089] terminated by signal 33 (Unknown signal 33) [ 104.658315][ T93] udevd[93]: worker [5089] failed while handling '/devices/virtual/block/loop3' [ 105.047983][ T5131] device sit0 left promiscuous mode [ 105.363100][ T5135] syz.4.1380[5135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.363152][ T5135] syz.4.1380[5135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.374539][ T5136] syz.4.1380[5136] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.407675][ T5136] syz.4.1380[5136] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.966532][ T5173] device syzkaller0 entered promiscuous mode [ 106.205420][ T5187] device macsec0 left promiscuous mode [ 106.502746][ T5207] device syzkaller0 entered promiscuous mode [ 106.594331][ T5206] device syzkaller0 entered promiscuous mode [ 106.914630][ T5249] device syzkaller0 entered promiscuous mode [ 107.242074][ T5298] device syzkaller0 entered promiscuous mode [ 107.310139][ T5318] device sit0 left promiscuous mode [ 107.329618][ T24] audit: type=1400 audit(1722946538.410:157): avc: denied { create } for pid=5320 comm="syz.0.1428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 107.354577][ T5318] device sit0 entered promiscuous mode [ 107.904263][ T5363] syz.0.1439[5363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.904626][ T5363] syz.0.1439[5363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.402159][ T5378] device syzkaller0 entered promiscuous mode [ 109.366396][ T5428] device sit0 left promiscuous mode [ 109.395055][ T5429] device sit0 left promiscuous mode [ 109.620598][ T5444] device syzkaller0 entered promiscuous mode [ 110.065424][ T5502] syz.2.1481[5502] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.065480][ T5502] syz.2.1481[5502] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.741639][ T5629] tap0: tun_chr_ioctl cmd 1074025677 [ 111.758106][ T5629] tap0: linktype set to 776 [ 111.816383][ T5628] device syzkaller0 entered promiscuous mode [ 111.906675][ T5640] device syzkaller0 entered promiscuous mode [ 112.104902][ T5651] bridge_slave_0: mtu greater than device maximum [ 112.722370][ T5681] device syzkaller0 entered promiscuous mode [ 112.769665][ T5689] device syzkaller0 entered promiscuous mode [ 112.966381][ T5702] syz.2.1542[5702] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.966443][ T5702] syz.2.1542[5702] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.978868][ T5702] syz.2.1542[5702] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.990430][ T5702] syz.2.1542[5702] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.226882][ T5721] device syzkaller0 entered promiscuous mode [ 113.265082][ T5717] device pim6reg1 entered promiscuous mode [ 113.604189][ T5734] device syzkaller0 entered promiscuous mode [ 113.834538][ T5749] device sit0 entered promiscuous mode [ 114.355215][ T5807] device sit0 entered promiscuous mode [ 114.670662][ T5848] ªªªªªª: renamed from vlan0 [ 114.771818][ T5855] device vxcan1 entered promiscuous mode [ 114.816379][ T5860] device syzkaller0 entered promiscuous mode [ 115.293915][ T24] audit: type=1400 audit(1722946546.370:158): avc: denied { create } for pid=5909 comm="syz.3.1600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 115.915519][ T5948] syz.3.1617[5948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.919000][ T5948] syz.3.1617[5948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.619640][ T5987] syz.2.1631[5987] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.791410][ T5987] syz.2.1631[5987] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.250233][ T6037] ¯Ê®¸}p: renamed from pim6reg1 [ 117.302976][ T6038] device vxcan1 entered promiscuous mode [ 117.998912][ T6094] device syzkaller0 entered promiscuous mode [ 118.175730][ T6109] device pim6reg1 entered promiscuous mode [ 118.312927][ T6113] ¯Ê®¸}p: renamed from pim6reg1 [ 119.200315][ T6144] device macsec0 entered promiscuous mode [ 119.663595][ T6195] device syzkaller0 entered promiscuous mode [ 119.830040][ T6199] device pim6reg1 entered promiscuous mode [ 120.542606][ T6237] device pim6reg1 entered promiscuous mode [ 120.757984][ T6255] syz.2.1710[6255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.758044][ T6255] syz.2.1710[6255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.823035][ T6252] syz.1.1709[6252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.857081][ T6252] syz.1.1709[6252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.866180][ T6324] device syzkaller0 entered promiscuous mode [ 124.244566][ T6350] device syzkaller0 entered promiscuous mode [ 124.556430][ T6424] device pim6reg1 entered promiscuous mode [ 124.873832][ T6440] device syzkaller0 entered promiscuous mode [ 127.165034][ T6575] device syzkaller0 entered promiscuous mode [ 127.314921][ T6587] pim6reg0: tun_chr_ioctl cmd 1074025680 [ 128.258213][ T24] audit: type=1400 audit(1722946559.340:159): avc: denied { attach_queue } for pid=6645 comm="syz.2.1831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 128.753114][ T6691] device vxcan1 entered promiscuous mode [ 128.826755][ T6720] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 128.904883][ T6740] ÿÿÿÿÿÿ: renamed from vlan0 [ 128.917054][ T6755] device sit0 entered promiscuous mode [ 129.138800][ T6776] O3ãc¤±: renamed from bridge_slave_0 [ 129.885979][ T6793] device sit0 left promiscuous mode [ 129.914422][ T6794] device sit0 entered promiscuous mode [ 131.932050][ T6853] device pim6reg1 entered promiscuous mode [ 132.373688][ T6885] syz.4.1900[6885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.373756][ T6885] syz.4.1900[6885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.441292][ T6885] device lo entered promiscuous mode [ 132.473010][ T6886] syz.4.1900[6886] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.473079][ T6886] syz.4.1900[6886] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.578789][ T6876] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.683866][ T6876] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.744525][ T6876] device bridge_slave_0 entered promiscuous mode [ 132.802038][ T6876] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.870529][ T6876] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.932964][ T6876] device bridge_slave_1 entered promiscuous mode [ 133.269396][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 133.286843][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 133.388700][ T1103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 133.396958][ T1103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 133.406826][ T1103] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.413776][ T1103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.423102][ T1103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 133.431443][ T1103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 133.439671][ T1103] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.446534][ T1103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.637307][ T1103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 133.644806][ T1103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 133.652712][ T1103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.660482][ T1103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 133.668562][ T1103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.676286][ T1103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 133.684420][ T1103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 133.713881][ T6928] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.721108][ T6928] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.728452][ T6928] device bridge0 left promiscuous mode [ 133.746750][ T6876] device veth0_vlan entered promiscuous mode [ 133.766055][ T5281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 133.774334][ T5281] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 133.782132][ T5281] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 133.853726][ T5282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 133.884264][ T6876] device veth1_macvtap entered promiscuous mode [ 133.993494][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 134.002694][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 134.049844][ T5281] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 134.063671][ T5281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 134.113611][ T6950] device veth0_vlan left promiscuous mode [ 134.133496][ T6950] device veth0_vlan entered promiscuous mode [ 134.249832][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.272640][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 134.331540][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.528651][ T6974] syz.0.1925[6974] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.528742][ T6974] syz.0.1925[6974] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.644143][ T6984] syz.1.1927[6984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.685939][ T6984] syz.1.1927[6984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.782572][ T7026] device syzkaller0 entered promiscuous mode [ 137.004754][ T7108] device syzkaller0 entered promiscuous mode [ 137.120043][ T7115] syz.0.1969[7115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.120129][ T7115] syz.0.1969[7115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.189846][ T7110] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.210654][ T7110] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.489957][ T7160] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.496844][ T7160] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.503957][ T7160] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.510711][ T7160] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.586354][ T7160] device bridge0 entered promiscuous mode [ 137.623493][ T7152] device syzkaller0 entered promiscuous mode [ 137.646761][ T7173] device pim6reg1 entered promiscuous mode [ 138.152119][ T7227] device syzkaller0 entered promiscuous mode [ 138.324439][ T7242] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.332972][ T7242] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.344200][ T7242] device bridge0 left promiscuous mode [ 138.990697][ T7285] device syzkaller0 entered promiscuous mode [ 139.730505][ T7322] device syzkaller0 entered promiscuous mode [ 139.761141][ T7320] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 139.941274][ T7331] device syzkaller0 entered promiscuous mode [ 140.049414][ T7335] device syzkaller0 entered promiscuous mode [ 140.055939][ T7340] device veth1_macvtap left promiscuous mode [ 140.120079][ T7344] device veth1_macvtap entered promiscuous mode [ 140.126725][ T7344] device macsec0 entered promiscuous mode [ 140.230570][ T7367] tap0: tun_chr_ioctl cmd 1074025677 [ 140.235697][ T7367] tap0: linktype set to 1 [ 140.401588][ T7397] device syzkaller0 entered promiscuous mode [ 140.417823][ T7400] device pim6reg1 entered promiscuous mode [ 140.488846][ T7410] device syzkaller0 entered promiscuous mode [ 140.581057][ T7449] device sit0 left promiscuous mode [ 140.601206][ T7449] device sit0 entered promiscuous mode [ 140.715139][ T7459] device syzkaller0 entered promiscuous mode [ 140.873404][ T7494] device syzkaller0 entered promiscuous mode [ 141.656281][ T7590] device syzkaller0 entered promiscuous mode [ 141.772178][ T7593] device syzkaller0 entered promiscuous mode [ 142.505643][ T7604] device syzkaller0 entered promiscuous mode [ 142.538838][ T7619] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.545854][ T7619] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.555247][ T7622] device bridge_slave_1 left promiscuous mode [ 142.561252][ T7622] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.569876][ T7622] device bridge_slave_0 left promiscuous mode [ 142.575795][ T7622] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.672595][ T7634] device syzkaller0 entered promiscuous mode [ 143.045911][ T7658] device pim6reg1 entered promiscuous mode [ 143.059554][ T7662] device pim6reg1 entered promiscuous mode [ 143.193952][ T7668] device syzkaller0 entered promiscuous mode [ 143.311595][ T7674] device syzkaller0 entered promiscuous mode [ 143.371733][ T7678] device syzkaller0 entered promiscuous mode [ 143.430348][ T7682] device sit0 left promiscuous mode [ 143.454012][ T7682] device sit0 entered promiscuous mode [ 143.514775][ T7684] device sit0 entered promiscuous mode [ 144.401260][ T7749] device pim6reg1 entered promiscuous mode [ 144.539830][ T7763] device sit0 left promiscuous mode [ 144.719491][ T7769] device sit0 entered promiscuous mode [ 144.819298][ T7770] device syzkaller0 entered promiscuous mode [ 145.564518][ T7818] device vxcan1 entered promiscuous mode [ 145.719787][ T7821] device syzkaller0 entered promiscuous mode [ 146.056012][ T7829] ¯Ê®¸}p: renamed from pim6reg1 [ 146.378581][ T7843] device pim6reg1 entered promiscuous mode [ 146.456733][ T7847] device sit0 left promiscuous mode [ 147.011408][ T7857] device syzkaller0 entered promiscuous mode [ 147.083420][ T7865] syzkaller0: refused to change device tx_queue_len [ 147.672318][ T7890] device syzkaller0 entered promiscuous mode [ 148.127995][ T7897] bridge0: port 3(syz_tun) entered blocking state [ 148.134240][ T7897] bridge0: port 3(syz_tun) entered disabled state [ 148.141410][ T7897] device syz_tun entered promiscuous mode [ 148.430990][ T7906] device syzkaller0 entered promiscuous mode [ 149.383719][ T7940] device pim6reg1 entered promiscuous mode [ 149.915002][ T7957] device syzkaller0 entered promiscuous mode [ 150.051176][ T7979] device syzkaller0 entered promiscuous mode [ 151.210734][ T8026] device syzkaller0 entered promiscuous mode [ 152.258260][ T8077] device syzkaller0 entered promiscuous mode [ 152.535170][ T8084] device sit0 left promiscuous mode [ 153.229113][ T8124] device syzkaller0 entered promiscuous mode [ 154.299270][ T8191] syz.0.2274[8191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.299322][ T8191] syz.0.2274[8191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.364514][ T8201] device syzkaller0 entered promiscuous mode [ 154.535360][ T8204] device pim6reg1 entered promiscuous mode [ 155.453073][ T8244] device syzkaller0 entered promiscuous mode [ 155.480539][ T8247] device pim6reg1 entered promiscuous mode [ 156.328393][ T24] audit: type=1400 audit(1722946587.410:160): avc: denied { create } for pid=8279 comm="syz.2.2300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 156.396974][ T8285] device pim6reg1 entered promiscuous mode [ 156.565573][ T8294] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.577318][ T8294] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.584631][ T8294] device bridge_slave_0 entered promiscuous mode [ 156.597082][ T8294] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.604031][ T8294] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.611276][ T8294] device bridge_slave_1 entered promiscuous mode [ 156.692330][ T8294] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.699221][ T8294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.706297][ T8294] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.713100][ T8294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.796668][ T2066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.809194][ T2066] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.816655][ T2066] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.842828][ T1167] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.858130][ T1167] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.865001][ T1167] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.876564][ T1167] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.888387][ T8340] syz.2.2314[8340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.888447][ T8340] syz.2.2314[8340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.901650][ T1167] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.919614][ T1167] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.990228][ T2065] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 157.009181][ T2065] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.093045][ T8294] device veth0_vlan entered promiscuous mode [ 157.107477][ T8294] device veth1_macvtap entered promiscuous mode [ 157.116130][ T7527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 157.125011][ T7527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 157.135885][ T7527] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 157.144421][ T7527] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 157.151986][ T7527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 157.169132][ T2065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 157.219025][ T8355] device syzkaller0 entered promiscuous mode [ 157.233190][ T2065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 157.259729][ T8353] device pim6reg1 entered promiscuous mode [ 157.359969][ T8362] device pim6reg1 entered promiscuous mode [ 157.655995][ T8374] bridge0: port 3(gretap0) entered blocking state [ 157.669687][ T8374] bridge0: port 3(gretap0) entered disabled state [ 157.687041][ T8374] device gretap0 entered promiscuous mode [ 157.694536][ T8374] bridge0: port 3(gretap0) entered blocking state [ 157.700827][ T8374] bridge0: port 3(gretap0) entered forwarding state [ 157.855278][ T8399] device syzkaller0 entered promiscuous mode [ 158.107862][ T8415] device syzkaller0 entered promiscuous mode [ 158.356728][ T8445] device syzkaller0 entered promiscuous mode [ 159.271350][ T8508] device syzkaller0 entered promiscuous mode [ 159.775868][ T8527] device sit0 entered promiscuous mode [ 160.090037][ T24] audit: type=1400 audit(1722946591.170:161): avc: denied { create } for pid=8536 comm="syz.2.2370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 160.178086][ T24] audit: type=1400 audit(1722946591.260:162): avc: denied { append } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 160.205395][ T24] audit: type=1400 audit(1722946591.260:163): avc: denied { open } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 160.229007][ T24] audit: type=1400 audit(1722946591.260:164): avc: denied { getattr } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 160.284663][ T8553] device syzkaller0 entered promiscuous mode [ 160.291304][ T8551] device pim6reg1 entered promiscuous mode [ 161.208966][ T8591] device syzkaller0 entered promiscuous mode [ 161.727406][ T8613] device pim6reg1 entered promiscuous mode [ 161.858569][ T8629] device syzkaller0 entered promiscuous mode [ 162.466143][ T8683] device syzkaller0 entered promiscuous mode [ 162.513905][ T8685] ªªªªªª: renamed from vlan0 [ 162.859069][ T8695] device syzkaller0 entered promiscuous mode [ 163.307004][ T8720] device syzkaller0 entered promiscuous mode [ 163.844937][ T8764] device syzkaller0 entered promiscuous mode [ 164.741869][ T8820] device syzkaller0 entered promiscuous mode [ 164.850299][ T8824] syz.2.2452[8824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.850356][ T8824] syz.2.2452[8824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.153010][ T8865] device syzkaller0 entered promiscuous mode [ 166.269615][ T8930] cgroup: fork rejected by pids controller in /syz2 [ 166.369256][ T8933] device syzkaller0 entered promiscuous mode [ 166.614817][ T8941] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.621886][ T8941] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.629202][ T8941] device bridge_slave_0 entered promiscuous mode [ 166.690512][ T8941] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.698592][ T8941] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.705888][ T8941] device bridge_slave_1 entered promiscuous mode [ 166.783962][ T7531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.791926][ T7531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.808299][ T7529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.816663][ T7529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.887984][ T7529] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.894841][ T7529] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.014004][ T7529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.022358][ T7529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.044813][ T7529] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.051694][ T7529] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.068185][ T7529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.076587][ T7529] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.147036][ T7531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.156801][ T7531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.173537][ T7531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.210264][ T8941] device veth0_vlan entered promiscuous mode [ 167.230470][ T7529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 167.240085][ T7529] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 167.258742][ T7529] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 167.289138][ T7529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 167.314666][ T8941] device veth1_macvtap entered promiscuous mode [ 167.329595][ T7533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 167.371173][ T7529] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 167.379686][ T7529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 167.471730][ T7529] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 167.532904][ T7529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 167.687851][ T8999] device syzkaller0 entered promiscuous mode [ 167.875128][ T8983] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.888140][ T8983] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.895531][ T8983] device bridge_slave_0 entered promiscuous mode [ 167.951453][ T8983] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.965080][ T8983] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.979410][ T8983] device bridge_slave_1 entered promiscuous mode [ 168.101249][ T8983] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.108232][ T8983] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.115314][ T8983] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.122100][ T8983] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.202658][ T9056] device syzkaller0 entered promiscuous mode [ 168.221533][ T328] device bridge_slave_1 left promiscuous mode [ 168.227904][ T328] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.249049][ T328] device bridge_slave_0 left promiscuous mode [ 168.255059][ T328] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.263456][ T328] device veth1_macvtap left promiscuous mode [ 168.394210][ T2066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.407777][ T2066] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.415099][ T2066] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.441380][ T2066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.450298][ T2066] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.457185][ T2066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.470586][ T2066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.478843][ T2066] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.485681][ T2066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.553073][ T2062] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.565098][ T2062] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.586388][ T8983] device veth0_vlan entered promiscuous mode [ 168.625739][ T2066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 168.634488][ T2066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 168.644097][ T2066] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 168.651939][ T2066] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 168.769646][ T2066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 168.790063][ T8983] device veth1_macvtap entered promiscuous mode [ 168.870321][ T1167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 168.966444][ T9101] device syzkaller0 entered promiscuous mode [ 168.973323][ T7531] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 168.981515][ T7531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 169.924035][ T9150] device syzkaller0 entered promiscuous mode [ 170.141516][ T9157] ÿÿÿÿÿÿ: renamed from vlan0 [ 170.651589][ T9178] geneve1: tun_chr_ioctl cmd 2147767521 [ 170.860353][ T9183] device syzkaller0 entered promiscuous mode [ 171.196973][ T9196] device syzkaller0 entered promiscuous mode [ 171.849244][ T9237] device syzkaller0 entered promiscuous mode [ 172.518048][ T9274] syz.2.2572[9274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.518099][ T9274] syz.2.2572[9274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.570517][ T9274] syz.2.2572[9274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.588788][ T9274] syz.2.2572[9274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.618078][ T24] audit: type=1400 audit(1722946603.690:165): avc: denied { create } for pid=9273 comm="syz.2.2572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 172.725579][ T9283] device syzkaller0 entered promiscuous mode [ 172.981041][ T24] audit: type=1400 audit(1722946604.060:166): avc: denied { create } for pid=9296 comm="syz.0.2580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 173.490293][ T9314] device syzkaller0 entered promiscuous mode [ 173.537072][ T24] audit: type=1400 audit(1722946604.610:167): avc: denied { ioctl } for pid=9335 comm="syz.2.2588" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 173.661284][ T9345] device syzkaller0 entered promiscuous mode [ 173.721924][ T9346] device syzkaller0 entered promiscuous mode [ 173.745686][ T9340] ¯Ê®¸}p: renamed from pim6reg1 [ 174.405426][ T9362] device pim6reg1 entered promiscuous mode [ 174.827197][ T9399] device syzkaller0 entered promiscuous mode [ 175.243801][ T9444] device syzkaller0 entered promiscuous mode [ 175.250291][ T9436] device pim6reg1 entered promiscuous mode [ 175.292421][ T9442] device veth1_macvtap entered promiscuous mode [ 175.298621][ T9442] device macsec0 entered promiscuous mode [ 175.304900][ T2065] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 175.446791][ T9484] device sit0 left promiscuous mode [ 175.828022][ T9521] device syzkaller0 entered promiscuous mode [ 175.896315][ T9533] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.903343][ T9533] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.914192][ T9533] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.921076][ T9533] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.928223][ T9533] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.935064][ T9533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.946020][ T9533] device bridge0 entered promiscuous mode [ 175.953908][ T9535] syz.3.2641[9535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.953967][ T9535] syz.3.2641[9535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.970014][ T9535] syz.3.2641[9535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.984764][ T9535] syz.3.2641[9535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.071184][ T9553] device pim6reg1 entered promiscuous mode [ 176.385214][ T9572] bridge0: port 3(veth0_to_batadv) entered blocking state [ 176.407905][ T9572] bridge0: port 3(veth0_to_batadv) entered disabled state [ 176.448778][ T9572] device veth0_to_batadv entered promiscuous mode [ 176.476280][ T9572] bridge0: port 3(veth0_to_batadv) entered blocking state [ 176.483321][ T9572] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 176.507332][ T9582] device veth0_to_batadv left promiscuous mode [ 176.513839][ T9582] bridge0: port 3(veth0_to_batadv) entered disabled state [ 176.555712][ T9584] device syzkaller0 entered promiscuous mode [ 176.848846][ T9641] device syzkaller0 entered promiscuous mode [ 176.905597][ T9647] device veth1_macvtap left promiscuous mode [ 176.912333][ T9647] device macsec0 left promiscuous mode [ 176.928192][ T9647] device veth1_macvtap entered promiscuous mode [ 176.934382][ T9647] device macsec0 entered promiscuous mode [ 176.949664][ T9647] device syzkaller0 entered promiscuous mode [ 177.286951][ T9680] device syzkaller0 entered promiscuous mode [ 177.315606][ T9682] device syzkaller0 entered promiscuous mode [ 177.488518][ T9689] device veth1_macvtap left promiscuous mode [ 177.494327][ T9689] device macsec0 left promiscuous mode [ 178.435084][ T9727] device syzkaller0 entered promiscuous mode [ 178.961728][ T9751] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.968916][ T9751] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.976222][ T9751] device bridge_slave_0 entered promiscuous mode [ 178.983222][ T9751] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.991176][ T9751] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.999033][ T9751] device bridge_slave_1 entered promiscuous mode [ 179.064488][ T9751] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.071468][ T9751] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.078555][ T9751] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.085313][ T9751] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.116048][ T7530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 179.125294][ T7530] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.135625][ T7530] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.158159][ T7532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.179973][ T7532] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.186933][ T7532] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.200067][ T7532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.208292][ T7532] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.215220][ T7532] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.245729][ T7527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 179.258584][ T7527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 179.349069][ T7527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 179.368559][ T9751] device veth0_vlan entered promiscuous mode [ 179.377482][ T7527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 179.406296][ T7527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 179.421015][ T9751] device veth1_macvtap entered promiscuous mode [ 179.430710][ T7533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 179.438843][ T7533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 179.454406][ T7533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 179.467666][ T7533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 179.476064][ T7533] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 179.500032][ T9776] device syzkaller0 entered promiscuous mode [ 179.526268][ T7533] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 179.537802][ T7533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 179.548347][ T7533] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 179.556554][ T7533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 179.989111][ T9789] device syzkaller0 entered promiscuous mode [ 180.260393][ T9840] device syzkaller0 entered promiscuous mode [ 180.301978][ T9847] device sit0 entered promiscuous mode [ 180.505637][ T9870] bridge0: port 4(veth0_to_batadv) entered blocking state [ 180.512857][ T9870] bridge0: port 4(veth0_to_batadv) entered disabled state [ 180.520588][ T9870] device veth0_to_batadv entered promiscuous mode [ 180.526921][ T9870] bridge0: port 4(veth0_to_batadv) entered blocking state [ 180.533800][ T9870] bridge0: port 4(veth0_to_batadv) entered forwarding state [ 180.641785][ T9902] device syzkaller0 entered promiscuous mode [ 180.972216][ T9958] device syzkaller0 entered promiscuous mode [ 181.889465][T10016] device syzkaller0 entered promiscuous mode [ 182.384021][T10055] device syzkaller0 entered promiscuous mode [ 182.650424][T10084] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.657632][T10084] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.664973][T10084] device bridge_slave_0 entered promiscuous mode [ 182.679507][T10084] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.686705][T10084] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.694102][T10084] device bridge_slave_1 entered promiscuous mode [ 182.761532][T10118] device syzkaller0 entered promiscuous mode [ 182.834778][T10084] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.841646][T10084] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.848753][T10084] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.855510][T10084] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.908307][ T7529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.915969][ T7529] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.925209][ T7529] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.944854][T10137] tap0: tun_chr_ioctl cmd 1074025678 [ 182.950714][T10137] tap0: group set to 0 [ 182.954880][T10137] tap0: tun_chr_ioctl cmd 1074025694 [ 182.962848][ T7533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.971303][ T7533] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.978261][ T7533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.986513][ T7533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.996532][ T7533] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.003402][ T7533] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.041276][T10084] device veth0_vlan entered promiscuous mode [ 183.048624][ T7529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 183.056871][ T7529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.065426][ T7529] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 183.073464][ T7529] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 183.081263][ T7529] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.089427][ T7529] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.104477][T10084] device veth1_macvtap entered promiscuous mode [ 183.117140][ T7533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 183.212248][T10162] device syzkaller0 entered promiscuous mode [ 183.235077][ T7527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 183.243582][ T7527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 183.818586][T10210] device syzkaller0 entered promiscuous mode [ 184.020778][T10235] device sit0 left promiscuous mode [ 184.537668][T10261] device syzkaller0 entered promiscuous mode [ 184.734286][T10271] syz.0.2838[10271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.734342][T10271] syz.0.2838[10271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.991461][T10334] syz.4.2855[10334] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.108793][T10334] syz.4.2855[10334] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.418088][T10354] device syzkaller0 entered promiscuous mode [ 186.609572][T10366] bridge0: port 3(gretap0) entered blocking state [ 186.628871][T10366] bridge0: port 3(gretap0) entered disabled state [ 186.656400][T10366] device gretap0 entered promiscuous mode [ 186.671288][T10366] bridge0: port 3(gretap0) entered blocking state [ 186.678039][T10366] bridge0: port 3(gretap0) entered forwarding state [ 186.784817][T10408] device vxcan1 entered promiscuous mode [ 186.946983][T10420] device syzkaller0 entered promiscuous mode [ 187.556569][T10447] device sit0 left promiscuous mode [ 187.680911][T10450] device sit0 entered promiscuous mode [ 187.712047][T10452] device syzkaller0 entered promiscuous mode [ 187.729888][T10455] device syzkaller0 entered promiscuous mode [ 187.739966][ T7530] syzkaller0: tun_net_xmit 48 [ 187.761771][T10455] syzkaller0: tun_net_xmit 1280 [ 187.766516][T10455] syzkaller0: create flow: hash 1270365797 index 1 [ 187.775491][T10458] syz.4.2890[10458] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.775545][T10458] syz.4.2890[10458] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.788392][T10454] syzkaller0: delete flow: hash 1270365797 index 1 [ 188.267027][T10501] device syzkaller0 entered promiscuous mode [ 188.770242][T10525] device sit0 entered promiscuous mode [ 189.781762][T10547] device syzkaller0 entered promiscuous mode [ 190.461398][T10566] syzkaller0: refused to change device tx_queue_len [ 190.986935][T10592] device syzkaller0 entered promiscuous mode [ 192.032635][T10636] device syzkaller0 entered promiscuous mode [ 192.294261][T10645] device pim6reg1 entered promiscuous mode [ 192.494535][T10674] device syzkaller0 entered promiscuous mode [ 193.020415][T10724] device syzkaller0 entered promiscuous mode [ 193.417586][T10741] device syzkaller0 entered promiscuous mode [ 194.174452][T10784] syz.1.2982[10784] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.174512][T10784] syz.1.2982[10784] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.402034][T10789] device syzkaller0 entered promiscuous mode [ 194.819794][T10808] device pim6reg1 entered promiscuous mode [ 195.102718][T10847] device syzkaller0 entered promiscuous mode [ 195.369449][T10874] device syzkaller0 entered promiscuous mode [ 195.910560][T10891] device syzkaller0 entered promiscuous mode [ 196.149159][T10908] syz.1.3018[10908] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.149208][T10908] syz.1.3018[10908] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.227405][T10926] device pim6reg1 entered promiscuous mode [ 196.257834][T10932] syz.0.3025[10932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.257900][T10932] syz.0.3025[10932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.293503][T10932] ªªªªªª: renamed from vlan0 [ 196.398177][T10937] device syzkaller0 entered promiscuous mode [ 196.612333][T10956] syz.1.3032[10956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.612390][T10956] syz.1.3032[10956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.200032][T10976] device syzkaller0 entered promiscuous mode [ 197.612197][T11002] device sit0 left promiscuous mode [ 197.706249][T11002] device sit0 entered promiscuous mode [ 198.006550][T11020] device syzkaller0 entered promiscuous mode [ 198.363712][T11070] device syzkaller0 entered promiscuous mode [ 198.491971][T11084] device sit0 left promiscuous mode [ 198.521799][T11087] device veth0_vlan left promiscuous mode [ 198.569404][T11087] device veth0_vlan entered promiscuous mode [ 198.717630][T11091] device veth0_to_batadv left promiscuous mode [ 198.725894][T11091] bridge0: port 4(veth0_to_batadv) entered disabled state [ 198.761027][T11109] device pim6reg1 entered promiscuous mode [ 198.787797][T11111] device syzkaller0 entered promiscuous mode [ 198.949345][T11136] device sit0 left promiscuous mode [ 199.364510][T11194] device veth0_vlan left promiscuous mode [ 199.387147][T11194] device veth0_vlan entered promiscuous mode [ 199.420588][ T2087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 199.430846][ T2087] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 199.438594][ T2087] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 199.555474][T11193] device pim6reg1 entered promiscuous mode [ 199.792780][T11225] device syzkaller0 entered promiscuous mode [ 200.416549][T11258] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.423596][T11258] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.524274][T11274] device syzkaller0 entered promiscuous mode [ 200.620769][T11303] device pim6reg1 entered promiscuous mode [ 201.276888][T11374] device syzkaller0 entered promiscuous mode [ 201.631222][T11394] geneve1: tun_chr_ioctl cmd 2147767521 [ 201.821581][T11411] device syzkaller0 entered promiscuous mode [ 201.954878][T11419] device vxcan1 entered promiscuous mode [ 202.498951][T11465] device syzkaller0 entered promiscuous mode [ 202.927931][ T328] device bridge_slave_1 left promiscuous mode [ 202.977460][ T328] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.013631][ T328] device bridge_slave_0 left promiscuous mode [ 203.019740][ T328] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.033565][ T328] device veth1_macvtap left promiscuous mode [ 203.042146][ T328] device veth0_vlan left promiscuous mode [ 203.319604][T11573] device syzkaller0 entered promiscuous mode [ 203.622869][T11607] device veth0_vlan left promiscuous mode [ 203.628922][T11607] device veth0_vlan entered promiscuous mode [ 203.635738][T11185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 203.644187][T11185] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 203.651622][T11185] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.671307][T11614] device syzkaller0 entered promiscuous mode [ 203.938312][T11634] device syzkaller0 entered promiscuous mode [ 204.138292][T11658] tap0: tun_chr_ioctl cmd 1074025677 [ 204.144366][T11658] tap0: linktype set to 804 [ 204.624794][ T24] audit: type=1400 audit(1722946635.690:168): avc: denied { write } for pid=11669 comm="syz.1.3219" name="cgroup.subtree_control" dev="cgroup2" ino=305 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 204.860192][ T24] audit: type=1400 audit(1722946635.760:169): avc: denied { open } for pid=11669 comm="syz.1.3219" path="" dev="cgroup2" ino=305 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 204.938736][T11677] pim6reg: tun_chr_ioctl cmd 1074025677 [ 204.985142][T11677] pim6reg: linktype set to 823 [ 205.202329][T11695] device syzkaller0 entered promiscuous mode [ 206.185855][T11772] device syzkaller0 entered promiscuous mode [ 206.329092][T11782] syz.0.3247[11782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.329151][T11782] syz.0.3247[11782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.503803][T11791] device pim6reg1 entered promiscuous mode [ 207.131214][T11812] device pim6reg1 entered promiscuous mode [ 207.151218][T11810] syz.0.3256[11810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.154991][T11810] syz.0.3256[11810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.228207][T11817] device syzkaller0 entered promiscuous mode [ 207.823167][T11869] geneve1: tun_chr_ioctl cmd 1074025673 [ 207.911061][T11865] geneve1: tun_chr_ioctl cmd 1074025681 [ 207.955963][T11875] device syzkaller0 entered promiscuous mode [ 207.969100][T11864] geneve1: tun_chr_ioctl cmd 3221517374 [ 209.335753][T11920] device syzkaller0 entered promiscuous mode [ 209.681893][T11942] device veth0_vlan left promiscuous mode [ 209.719368][T11942] device veth0_vlan entered promiscuous mode [ 209.808565][ T7496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 209.819055][ T7496] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 209.843178][ T7496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 210.172381][T11971] device syzkaller0 entered promiscuous mode [ 211.175723][T12018] device syzkaller0 entered promiscuous mode [ 212.005233][T12082] device syzkaller0 entered promiscuous mode [ 212.186250][T12095] device sit0 entered promiscuous mode [ 212.459457][T12112] bridge_slave_0: mtu greater than device maximum [ 212.766374][T12126] device syzkaller0 entered promiscuous mode [ 213.462299][T12176] device syzkaller0 entered promiscuous mode [ 213.696698][T12210] device veth1_macvtap left promiscuous mode [ 213.793368][T12223] device syzkaller0 entered promiscuous mode [ 214.755964][T12273] device syzkaller0 entered promiscuous mode [ 214.991083][T12304] device vxcan1 entered promiscuous mode [ 215.092397][T12317] device pim6reg1 entered promiscuous mode [ 215.164407][T12321] device syzkaller0 entered promiscuous mode [ 215.250527][T12324] device syzkaller0 entered promiscuous mode [ 215.258281][T12324] FAULT_INJECTION: forcing a failure. [ 215.258281][T12324] name failslab, interval 1, probability 0, space 0, times 0 [ 215.270839][T12324] CPU: 0 PID: 12324 Comm: syz.0.3407 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 215.281963][T12324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 215.291950][T12324] Call Trace: [ 215.295094][T12324] dump_stack_lvl+0x1e2/0x24b [ 215.299582][T12324] ? bfq_pos_tree_add_move+0x43b/0x43b [ 215.304905][T12324] dump_stack+0x15/0x17 [ 215.308879][T12324] should_fail+0x3c6/0x510 [ 215.313122][T12324] ? __alloc_skb+0x80/0x510 [ 215.317459][T12324] __should_failslab+0xa4/0xe0 [ 215.322067][T12324] should_failslab+0x9/0x20 [ 215.326402][T12324] kmem_cache_alloc+0x3d/0x2e0 [ 215.331002][T12324] __alloc_skb+0x80/0x510 [ 215.335171][T12324] ? __kasan_check_write+0x14/0x20 [ 215.340120][T12324] __napi_alloc_skb+0x15d/0x2e0 [ 215.344805][T12324] napi_get_frags+0x6a/0x170 [ 215.349315][T12324] tun_get_user+0xc88/0x38f0 [ 215.353740][T12324] ? kasan_set_track+0x4b/0x70 [ 215.358348][T12324] ? kmem_cache_free+0xa9/0x1e0 [ 215.363129][T12324] ? do_sys_openat2+0x1fc/0x710 [ 215.367811][T12324] ? _kstrtoull+0x3a0/0x4a0 [ 215.372154][T12324] ? tun_do_read+0x1f60/0x1f60 [ 215.376740][T12324] ? kstrtouint_from_user+0x20a/0x2a0 [ 215.381949][T12324] ? kstrtol_from_user+0x310/0x310 [ 215.386902][T12324] ? avc_policy_seqno+0x1b/0x70 [ 215.391583][T12324] ? selinux_file_permission+0x2bb/0x560 [ 215.397083][T12324] ? fsnotify_perm+0x67/0x4e0 [ 215.401569][T12324] tun_chr_write_iter+0x1a8/0x250 [ 215.406424][T12324] vfs_write+0xb4c/0xe70 [ 215.410504][T12324] ? kernel_write+0x3d0/0x3d0 [ 215.415119][T12324] ? __fdget_pos+0x209/0x3a0 [ 215.419533][T12324] ? ksys_write+0x77/0x2c0 [ 215.423781][T12324] ksys_write+0x199/0x2c0 [ 215.427950][T12324] ? __ia32_sys_read+0x90/0x90 [ 215.432556][T12324] ? debug_smp_processor_id+0x17/0x20 [ 215.437757][T12324] __x64_sys_write+0x7b/0x90 [ 215.442303][T12324] do_syscall_64+0x34/0x70 [ 215.446555][T12324] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 215.452287][T12324] RIP: 0033:0x7ff2a0d2d9f9 [ 215.456540][T12324] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 215.476078][T12324] RSP: 002b:00007ff29f9ad048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 215.484318][T12324] RAX: ffffffffffffffda RBX: 00007ff2a0ebbf80 RCX: 00007ff2a0d2d9f9 [ 215.492122][T12324] RDX: 000000000000fdef RSI: 0000000020000440 RDI: 0000000000000003 [ 215.499940][T12324] RBP: 00007ff29f9ad0a0 R08: 0000000000000000 R09: 0000000000000000 [ 215.507840][T12324] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 215.515816][T12324] R13: 000000000000000b R14: 00007ff2a0ebbf80 R15: 00007fffb35cabe8 [ 215.630282][T12338] syz.3.3413[12338] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.630339][T12338] syz.3.3413[12338] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.873150][T12348] syz.1.3417[12348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.884524][T12348] syz.1.3417[12348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.897292][T12352] device syzkaller0 entered promiscuous mode [ 216.092067][T12356] device syzkaller0 entered promiscuous mode [ 216.169961][T12362] device syzkaller0 entered promiscuous mode [ 216.178750][T12362] FAULT_INJECTION: forcing a failure. [ 216.178750][T12362] name failslab, interval 1, probability 0, space 0, times 0 [ 216.191227][T12362] CPU: 1 PID: 12362 Comm: syz.3.3421 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 216.202353][T12362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 216.212229][T12362] Call Trace: [ 216.215370][T12362] dump_stack_lvl+0x1e2/0x24b [ 216.219873][T12362] ? panic+0x812/0x812 [ 216.223783][T12362] ? bfq_pos_tree_add_move+0x43b/0x43b [ 216.229077][T12362] dump_stack+0x15/0x17 [ 216.233073][T12362] should_fail+0x3c6/0x510 [ 216.237326][T12362] ? __napi_alloc_skb+0x15d/0x2e0 [ 216.242189][T12362] __should_failslab+0xa4/0xe0 [ 216.246804][T12362] should_failslab+0x9/0x20 [ 216.251144][T12362] __kmalloc_track_caller+0x5f/0x320 [ 216.256243][T12362] ? kmem_cache_alloc+0x168/0x2e0 [ 216.261099][T12362] ? __alloc_skb+0x80/0x510 [ 216.265452][T12362] ? __napi_alloc_skb+0x15d/0x2e0 [ 216.270303][T12362] __alloc_skb+0xbc/0x510 [ 216.274559][T12362] ? __kasan_check_write+0x14/0x20 [ 216.279500][T12362] __napi_alloc_skb+0x15d/0x2e0 [ 216.284194][T12362] napi_get_frags+0x6a/0x170 [ 216.288624][T12362] tun_get_user+0xc88/0x38f0 [ 216.293039][T12362] ? kasan_set_track+0x4b/0x70 [ 216.297663][T12362] ? kmem_cache_free+0xa9/0x1e0 [ 216.302331][T12362] ? do_sys_openat2+0x1fc/0x710 [ 216.307016][T12362] ? _kstrtoull+0x3a0/0x4a0 [ 216.311446][T12362] ? tun_do_read+0x1f60/0x1f60 [ 216.316042][T12362] ? kstrtouint_from_user+0x20a/0x2a0 [ 216.321249][T12362] ? kstrtol_from_user+0x310/0x310 [ 216.326291][T12362] ? avc_policy_seqno+0x1b/0x70 [ 216.330990][T12362] ? selinux_file_permission+0x2bb/0x560 [ 216.336526][T12362] ? fsnotify_perm+0x67/0x4e0 [ 216.341046][T12362] tun_chr_write_iter+0x1a8/0x250 [ 216.345988][T12362] vfs_write+0xb4c/0xe70 [ 216.350070][T12362] ? kernel_write+0x3d0/0x3d0 [ 216.354583][T12362] ? __fdget_pos+0x209/0x3a0 [ 216.359005][T12362] ? ksys_write+0x77/0x2c0 [ 216.363263][T12362] ksys_write+0x199/0x2c0 [ 216.367425][T12362] ? __ia32_sys_read+0x90/0x90 [ 216.372036][T12362] ? debug_smp_processor_id+0x17/0x20 [ 216.377322][T12362] __x64_sys_write+0x7b/0x90 [ 216.381744][T12362] do_syscall_64+0x34/0x70 [ 216.386000][T12362] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 216.391732][T12362] RIP: 0033:0x7f29338009f9 [ 216.395981][T12362] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 216.415421][T12362] RSP: 002b:00007f2932480048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 216.423661][T12362] RAX: ffffffffffffffda RBX: 00007f293398ef80 RCX: 00007f29338009f9 [ 216.431473][T12362] RDX: 000000000000fdef RSI: 0000000020000440 RDI: 0000000000000003 [ 216.439289][T12362] RBP: 00007f29324800a0 R08: 0000000000000000 R09: 0000000000000000 [ 216.447095][T12362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 216.454910][T12362] R13: 000000000000000b R14: 00007f293398ef80 R15: 00007ffe7ccdee48 [ 216.848377][T12398] device syzkaller0 entered promiscuous mode [ 216.856300][T12398] FAULT_INJECTION: forcing a failure. [ 216.856300][T12398] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 216.870596][T12398] CPU: 0 PID: 12398 Comm: syz.3.3436 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 216.881769][T12398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 216.891658][T12398] Call Trace: [ 216.894792][T12398] dump_stack_lvl+0x1e2/0x24b [ 216.899299][T12398] ? bfq_pos_tree_add_move+0x43b/0x43b [ 216.904593][T12398] ? __kasan_slab_alloc+0x63/0xe0 [ 216.909455][T12398] ? slab_post_alloc_hook+0x61/0x2f0 [ 216.914576][T12398] dump_stack+0x15/0x17 [ 216.918565][T12398] should_fail+0x3c6/0x510 [ 216.922823][T12398] should_fail_alloc_page+0x52/0x60 [ 216.928291][T12398] __alloc_pages_nodemask+0x1b3/0xaf0 [ 216.933502][T12398] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 216.938883][T12398] kmalloc_order+0x4c/0x170 [ 216.943307][T12398] kmalloc_order_trace+0x18/0x90 [ 216.948081][T12398] ? tun_get_user+0x10a6/0x38f0 [ 216.952767][T12398] __kmalloc_track_caller+0x1dd/0x320 [ 216.957979][T12398] ? tun_get_user+0x10a6/0x38f0 [ 216.962657][T12398] pskb_expand_head+0x12b/0x1180 [ 216.967432][T12398] ? __napi_alloc_skb+0x16a/0x2e0 [ 216.972295][T12398] tun_get_user+0x10a6/0x38f0 [ 216.976811][T12398] ? _kstrtoull+0x3a0/0x4a0 [ 216.981146][T12398] ? tun_do_read+0x1f60/0x1f60 [ 216.985742][T12398] ? kstrtouint_from_user+0x20a/0x2a0 [ 216.990956][T12398] ? kstrtol_from_user+0x310/0x310 [ 216.995902][T12398] ? avc_policy_seqno+0x1b/0x70 [ 217.000590][T12398] ? selinux_file_permission+0x2bb/0x560 [ 217.006141][T12398] ? fsnotify_perm+0x67/0x4e0 [ 217.010655][T12398] tun_chr_write_iter+0x1a8/0x250 [ 217.015518][T12398] vfs_write+0xb4c/0xe70 [ 217.019601][T12398] ? kernel_write+0x3d0/0x3d0 [ 217.024200][T12398] ? __fdget_pos+0x209/0x3a0 [ 217.028629][T12398] ? ksys_write+0x77/0x2c0 [ 217.032875][T12398] ksys_write+0x199/0x2c0 [ 217.037193][T12398] ? __ia32_sys_read+0x90/0x90 [ 217.041730][T12398] ? debug_smp_processor_id+0x17/0x20 [ 217.046932][T12398] __x64_sys_write+0x7b/0x90 [ 217.051379][T12398] do_syscall_64+0x34/0x70 [ 217.055613][T12398] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 217.061337][T12398] RIP: 0033:0x7f29338009f9 [ 217.065597][T12398] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 217.085119][T12398] RSP: 002b:00007f2932480048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 217.093364][T12398] RAX: ffffffffffffffda RBX: 00007f293398ef80 RCX: 00007f29338009f9 [ 217.101175][T12398] RDX: 000000000000fdef RSI: 0000000020000440 RDI: 0000000000000003 [ 217.108985][T12398] RBP: 00007f29324800a0 R08: 0000000000000000 R09: 0000000000000000 [ 217.116795][T12398] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 217.124610][T12398] R13: 000000000000000b R14: 00007f293398ef80 R15: 00007ffe7ccdee48 [ 217.223257][T12407] device syzkaller0 entered promiscuous mode [ 217.230086][T12390] device syzkaller0 entered promiscuous mode [ 217.241956][T12409] ------------[ cut here ]------------ [ 217.257516][T12409] kernel BUG at kernel/bpf/arraymap.c:990! [ 217.263410][T12409] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 217.269291][T12409] CPU: 0 PID: 12409 Comm: syz.2.3440 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 217.280477][T12409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 217.290382][T12409] RIP: 0010:prog_array_map_poke_run+0x696/0x6b0 [ 217.296449][T12409] Code: 93 e8 ff 48 83 c4 70 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 ed 92 e8 ff 0f 0b e9 de f9 ff ff e8 e1 92 e8 ff 0f 0b e8 da 92 e8 ff <0f> 0b e8 d3 92 e8 ff 0f 0b e8 cc 92 e8 ff 0f 0b 66 2e 0f 1f 84 00 [ 217.315889][T12409] RSP: 0018:ffffc90000c1f790 EFLAGS: 00010293 [ 217.322656][T12409] RAX: ffffffff81821626 RBX: ffff88810c1497d0 RCX: ffff888110c33b40 [ 217.330444][T12409] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 217.338259][T12409] RBP: ffffc90000c1f828 R08: ffffffff818213b1 R09: fffffbfff0cdd669 [ 217.346159][T12409] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88810a301a00 [ 217.353972][T12409] R13: dffffc0000000000 R14: ffff88810a8ae800 R15: 00000000fffffff0 [ 217.361781][T12409] FS: 00007fdfe21916c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 217.370544][T12409] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 217.376966][T12409] CR2: 0000000100000000 CR3: 0000000135c23000 CR4: 00000000003506b0 [ 217.384783][T12409] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 217.392590][T12409] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 217.400399][T12409] Call Trace: [ 217.403536][T12409] ? __die_body+0x62/0xb0 [ 217.407697][T12409] ? die+0x88/0xb0 [ 217.411255][T12409] ? do_trap+0x1a4/0x310 [ 217.415337][T12409] ? prog_array_map_poke_run+0x696/0x6b0 [ 217.420803][T12409] ? handle_invalid_op+0x95/0xc0 [ 217.425572][T12409] ? prog_array_map_poke_run+0x696/0x6b0 [ 217.431046][T12409] ? exc_invalid_op+0x32/0x50 [ 217.435556][T12409] ? asm_exc_invalid_op+0x12/0x20 [ 217.440426][T12409] ? prog_array_map_poke_run+0x421/0x6b0 [ 217.445882][T12409] ? prog_array_map_poke_run+0x696/0x6b0 [ 217.451355][T12409] ? prog_array_map_poke_run+0x696/0x6b0 [ 217.456819][T12409] ? bpf_prog_bf0f031b30feb8f6+0xb/0x650 [ 217.462291][T12409] fd_array_map_delete_elem+0x154/0x250 [ 217.467674][T12409] __se_sys_bpf+0x6ef6/0x11cb0 [ 217.472272][T12409] ? try_invoke_on_locked_down_task+0x280/0x280 [ 217.478347][T12409] ? get_futex_key+0x8b7/0xe70 [ 217.482951][T12409] ? __kasan_check_write+0x14/0x20 [ 217.487891][T12409] ? __x64_sys_bpf+0x90/0x90 [ 217.492319][T12409] ? futex_wake+0x630/0x790 [ 217.496656][T12409] ? futex_wait+0x7c0/0x7c0 [ 217.500999][T12409] ? __kasan_check_read+0x11/0x20 [ 217.505859][T12409] ? do_futex+0x13c5/0x17b0 [ 217.510198][T12409] ? update_load_avg+0x541/0x1690 [ 217.515062][T12409] ? __kasan_check_write+0x14/0x20 [ 217.520004][T12409] ? __switch_to+0x5f6/0x1240 [ 217.524522][T12409] ? futex_exit_release+0x1e0/0x1e0 [ 217.529549][T12409] ? __perf_event_task_sched_in+0x219/0x2a0 [ 217.535289][T12409] ? __se_sys_futex+0x355/0x470 [ 217.539972][T12409] ? fpu__clear_all+0x20/0x20 [ 217.544490][T12409] ? __kasan_check_read+0x11/0x20 [ 217.549342][T12409] __x64_sys_bpf+0x7b/0x90 [ 217.553610][T12409] do_syscall_64+0x34/0x70 [ 217.557851][T12409] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 217.563573][T12409] RIP: 0033:0x7fdfe35119f9 [ 217.567828][T12409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 217.587275][T12409] RSP: 002b:00007fdfe2191048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 217.595516][T12409] RAX: ffffffffffffffda RBX: 00007fdfe369ff80 RCX: 00007fdfe35119f9 [ 217.603328][T12409] RDX: 0000000000000020 RSI: 00000000200007c0 RDI: 0000000000000003 [ 217.611147][T12409] RBP: 00007fdfe357f8ee R08: 0000000000000000 R09: 0000000000000000 [ 217.618953][T12409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 217.626761][T12409] R13: 000000000000000b R14: 00007fdfe369ff80 R15: 00007ffc3f060968 [ 217.634754][T12409] Modules linked in: [ 217.639395][T12409] ---[ end trace 705012ca9196faa6 ]--- [ 217.644833][T12409] RIP: 0010:prog_array_map_poke_run+0x696/0x6b0 [ 217.651009][T12409] Code: 93 e8 ff 48 83 c4 70 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 ed 92 e8 ff 0f 0b e9 de f9 ff ff e8 e1 92 e8 ff 0f 0b e8 da 92 e8 ff <0f> 0b e8 d3 92 e8 ff 0f 0b e8 cc 92 e8 ff 0f 0b 66 2e 0f 1f 84 00 [ 217.670783][T12409] RSP: 0018:ffffc90000c1f790 EFLAGS: 00010293 [ 217.677890][T12409] RAX: ffffffff81821626 RBX: ffff88810c1497d0 RCX: ffff888110c33b40 [ 217.685760][T12409] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 217.693567][T12409] RBP: ffffc90000c1f828 R08: ffffffff818213b1 R09: fffffbfff0cdd669 [ 217.701700][T12409] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88810a301a00 [ 217.709704][T12409] R13: dffffc0000000000 R14: ffff88810a8ae800 R15: 00000000fffffff0 [ 217.717838][T12409] FS: 00007fdfe21916c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 217.726655][T12409] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 217.733065][T12409] CR2: 0000000000000000 CR3: 0000000135c23000 CR4: 00000000003506a0 [ 217.741072][T12409] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 217.749390][T12409] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 217.757267][T12409] Kernel panic - not syncing: Fatal exception [ 217.763300][T12409] Kernel Offset: disabled [ 217.767426][T12409] Rebooting in 86400 seconds..