last executing test programs: 9.439891678s ago: executing program 0 (id=3043): sendmsg$sock(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)=@ethernet={0x306, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000080)="004b33f997e9fdd9e01adf1ae047383c4014245a71b7fc18827c31d694358950730d11904d9417cc873688a2c56ca385da39bfd8e8202f6e168f017b591a8a0974f88e35aea34c", 0x47}, {&(0x7f0000000100)="5c687513789ed0e5cbf361246fbc579893823ef0a4a57043efa9560e39134ad58b118bf710c2a4f8b1e63d9db3826968e30d86f2cc369e7b5278763e4b91e4f564fbb68db7121dcdb97612760280675ddaccdd0200e98b4ffd582b0c5cd9a24bde406c2cfedbe59b401681f652dccae2c17272301ed8d5bc78d50b91dc034acded6fdcf51437c5fc2673de0292b9b4bdc4b0492cbbbd2b33feec576c4db0742c89280a7e54d13afdc473c55f0d13d4d1d5d71fc6efc24d8a828c082f7ac1", 0xbe}, {&(0x7f00000001c0)="518eaf00deecf98867c40c31d0099375564afb53f012c629f0c7ecd4cc887c1b76f6f29817233e5e7b6c4b923692f3069c204b9409a21ccb0a75505952f54584f707a6b2cc20e9efa4846a722243d0c7d38898ad03a722f21bce4929cd75d551d843af9daf274adb0d8f459db9a2888ba1e93627b969aabd57184381b2cefcdd19ed0088b5fc2c05a1b84cb4e212c4623b3a6452b6553f159b3321218fb52c53ecba934a446c2e08d3f2e997e5c2c940b0f7a8725cd4d3078e856ba465aeb05b517e43426ae2ce7699e400cc825fe28c3fdace5851d4ff9385c13e9fe148a08ceaf6e8461a10d0945fdb8015d65768de8e", 0xf1}, {&(0x7f00000002c0)="cb9f5a7734af9dabc07674ebdfc02d6502f18ddb2c1af46236e004fbacb9df9344b03bccdda817605cd76e7d7fef4ff48ed5438a1c7b4b4e653e685f1c62604028f62fc5f4b55d2d3c2dc9ddc048ef31e8eefe0c8023521918412ef729b56aedb21854e3868d8143523d22eaa71ac0d4ee17cc7c63d3cb61ac49a7abe60ecdff11bc39da29a2a71225ef2b2b510e8dbc02f22982a57748b19742d0783733780afcad8b61b344044482a16e2cd84eb303229c213276c0a3dd792749af91dc5e38ba885cd75fe12bfde2ba4edacba7086a165585b9442c38ee0ecd91bee2434b7ae0e53546ecd73092b077c4de42cc92e1761f8e76a6fb", 0xf6}, {&(0x7f00000003c0)="3f236d6aecf6d2", 0x7}, {&(0x7f0000000400)="28c06b385ab72136a94bbb865cdc", 0xe}, {&(0x7f0000000440)="f92a017a76a238e75e10de063bbe6a63e7bdf6f7ad04ce73d8a2cd165841d7aeaadf3ad115199c1fc6abab0d20c1d430e288c9fcc292c890699bb6327b25baa28a53c271020e02a0fd8638b27e72718b15b09d1493ea327f86d9b548d9aca0bba793bf514de6b27935a26eb0e6b541bc44", 0x71}, {&(0x7f00000004c0)="ea28641ea2d9a7e423501bb4477434dda419f5c84c9ca2965e1fbe33f8f6d09aa6dcc7c77fdde6442be69d30e51db72787526842b470fbb7ab458e3c01bfe970534e7921f3417a0d6004646967a57fe4a06b46f0c402cfc1d4c012dcd288adebbc0aababace3cc00770debd6ff398b13a474daff19a71e4936b6352aa9c71d537533920f27fd363a3e0073e11ba9031e1c8161e6a1f32d", 0x97}, {&(0x7f0000000580)="6d6ef664ce672826fe8966a15248e809340348e78a79578f900d4ea7fb1feb57d45c6fe87f1c19b5a68615aff1c51df056340c639e9f542b715619eb9182d2d69def5128ff82e877fae2612aec3aa40c4e9da60912d4f598e6de39656cfaf915787e64bef41c29bc6332688596fc86293f5e388f9e0dd652878180031acfdb52150f6aa5a2710b6df6b6103ccd8b855d2b3e564a0fe9dcd5d4f07ceacb995c7fc924bd66610964aa3d0f5c7544e9ce", 0xaf}], 0x9, &(0x7f0000000700)=[@mark={{0x14, 0x1, 0x24, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x9431}}, @mark={{0x14, 0x1, 0x24, 0xff}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0xfffffffe}}], 0xc0}, 0xa166ce7df593afd2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000800)='\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x20, &(0x7f0000000940)={&(0x7f0000000840)=""/53, 0x35, 0x0, &(0x7f0000000880)=""/154, 0x9a}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000a40)={{0x1, 0xffffffffffffffff}, &(0x7f00000009c0), &(0x7f0000000a00)='%pi6 \x00'}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b00)={0xffffffffffffffff, 0x58, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000b40)=r0, 0x4) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b80)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x6, '\x00', r2, r3, 0x4, 0x3, 0x5}, 0x48) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c00), 0x100, 0x0) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000c40), 0x4) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f0000000c80)=r6) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000cc0), 0x2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000d00)={r4}, 0x4) write$cgroup_subtree(r3, &(0x7f0000000d40)={[{0x2b, 'rlimit'}, {0x2d, 'freezer'}, {0x2d, 'net'}, {0x2d, 'perf_event'}, {0x2d, 'pids'}, {0x2d, 'cpuset'}, {0x2b, 'memory'}, {0x2b, 'rlimit'}]}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x7, 0x13, &(0x7f0000000d80)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3e}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7f41}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}], &(0x7f0000000e40)='syzkaller\x00', 0x101, 0x48, &(0x7f0000000e80)=""/72, 0x40f00, 0x18, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000f00)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000f40)={0x1, 0x0, 0x5, 0x2}, 0x10, r0, 0xffffffffffffffff, 0xa, 0x0, &(0x7f0000000f80)=[{0x2, 0x2, 0x0, 0xc}, {0x1, 0x5, 0x7, 0x7}, {0x1, 0x1, 0x5, 0x5}, {0x3, 0x1, 0x6, 0xa}, {0x3, 0x2, 0xd, 0x4}, {0x1, 0x1, 0x2, 0xc}, {0x5, 0x5, 0x10}, {0x2, 0x3, 0x2, 0x3}, {0x1, 0x5, 0x3, 0x9}, {0x3, 0x5, 0x7, 0x6}], 0x10, 0x4140000}, 0x90) r7 = gettid() syz_open_procfs$namespace(r7, &(0x7f0000001100)='ns/user\x00') bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001140)={r4}, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000001180), 0x2, 0x0) r8 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000011c0)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_int(r8, &(0x7f0000001200)=0xc7, 0x12) recvmsg$unix(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000001240)=""/13, 0xd}], 0x1, &(0x7f00000012c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x158}, 0x10061) write$cgroup_type(r13, &(0x7f0000001480), 0x9) perf_event_open$cgroup(&(0x7f0000001500)={0x5, 0x80, 0xc, 0x5, 0x6, 0x8, 0x0, 0x100000000, 0x20100, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4, 0x7, @perf_bp={&(0x7f00000014c0), 0x8}, 0x8, 0xb, 0x9, 0x5, 0x2, 0x5, 0x3, 0x0, 0x7, 0x0, 0x6}, r15, 0x0, r10, 0x6) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001580)={0x1b, 0x0, 0x0, 0x0, 0x0, r13, 0x0, '\x00', 0x0, r11, 0x0, 0x1, 0x1}, 0x48) ioctl$TUNSETIFINDEX(r14, 0x400454da, &(0x7f0000001600)) ioctl$TUNSETLINK(r5, 0x400454cd, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0x32, &(0x7f0000001640)=r9, 0x4) r16 = syz_clone(0x0, &(0x7f0000001680)="f7cfc57a400da8387a4329306188b7628866b5639abb", 0x16, &(0x7f00000016c0), &(0x7f0000001700), &(0x7f0000001740)="5a8eabcdb2f694e349dbb64829640b88619fc068a99f716f8efff42082ad39d64fb5b4270f420ce986183ce5498a360c6afe1aa563a15b6dc9f1af6c579ef86f20867ba898f6e96b338d0d") syz_open_procfs$namespace(r16, &(0x7f00000017c0)='ns/mnt\x00') recvmsg$unix(r14, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000001800)=""/223, 0xdf}, {&(0x7f0000001900)=""/194, 0xc2}], 0x2, &(0x7f0000001a40)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x88}, 0x123) 9.439416918s ago: executing program 0 (id=3044): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000001200)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffeffffeffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f00000002c0)='cpuset.effective_cpus\x00', 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x23d5a45ce51239d9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r6}, 0x10) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000800)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r9, @ANYBLOB="0000000000000000790000000000000018000000000000000000000000000000950000000000000005000000000000009500000000000000f9e3d2fb113f53c361c3543f7b67d987480a053481c2c608d406cdeec27156b8d8a304b5632dc50faf46fc7e7d67f830178cf5478f1aba0799450e38e040300200000000000000bec422c2cc5e56be4599b03ba228fe302239966a8910c72235507355f460e1148a8521ade6ce0379a5643fc8f66dd138a02c5418352bcf6694070a1c9aa56c457cb4f97be7a2c0f6ac7e8b3e7e422c0580904e0d657a2f47310d291ea2171daf6c734fa2cf7ec5599cf24cbc1cb463ee40aaf1de8262c1dd3eccd7406fa25fed928e835fb105c7f3925a2afa9eb3283fef94aa33078da4d1e921e54da61ce3e26a"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r10}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 9.325384278s ago: executing program 0 (id=3049): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) close(r4) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) r6 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000340)=0xffffffffffffffff, 0x12) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r5}, 0x8) write$cgroup_type(r7, &(0x7f0000000280), 0x9) close(r0) 9.206848797s ago: executing program 0 (id=3053): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="b702000026000000bfa300000000000007030000007effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400010000050404000001007d60b7030000000000006a0a00fe000000008500000028000000b7000000000000009500000000000000496cf27fb6d2c643db7e2d5fb4b0936cdf827fb43a431ca711fcd0cdfa146ed3d09a6175037958e27106e225b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc525d78c07f34e4d5b3185b310efcfa89147a09000000f110026e6d2ef831ab7ea0c34f17e3ad6eecbb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b0a341a2d7cbdb9cd38bdb2ca8e050000003a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c214733a18c8b6619f28d9961b626c57c2691208173656d60a17e3c184b751c51160fbcbbdb5b1e7be6148ba532e60a0ac346dfebd31a08060000000200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86acac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e957bc73ddc4eabba08ab1e1ad828267d4eadd3964663e88535c133f7130856f756436303767d2e24f29e5dad9796edb697a6ea0183babc190ae2ebf8aad34732181feb215139f15ea7e8cb0bae7c34d5ac5e7c805210600000000000000c3dec04b25dfc17975238345d4f71ab158c36657b7218baa0700f781c0a99bd50499ccc421ace5e845885efb5b9964e4beba3da8223fe5308e4e65ee93e107000000f8ddebf70132a4d0175b989b8eccf707882042e716df9b57b290c661d4e85031086197bcc5cb0e221a0c34323c129102b6ff0100002e88a1940b3c02ed9c92d6f64b1282dc51bb0015982730711c599e1c72ffa11ed8be1a6830d7507005154c46bd3ca96318c570f0721fc7aa2a5836ba99fe1f86468694f22cdf550ef091a78098534f0d973059594119d06d5ea9a8d0857382ec6e2a071474cfc12346e47ad97f4ead7cf70a9d1cdac944779dc08a705414888700a30e2366c6a06b3367a389ca39059787790017b0689a173db9c24db65c1e00015c1d093dab18fd0699fe3304000000323e9c7080397bc49d70c060d57bc88fbe3bbaa058b040362ab926150363fb099408885afc2bf9a46a076b7babfcddeff8c35030669ea69f5e4be1b8e0d6697e97186f9ae97d5670dba6623279f73db9dec75070cd9ab0fda6b069ef6d2857ca3e4effcf7462710d133d541da86e0477e4a6cc999dc21c3ef408e6b178e7c9f274d7fafc8d757d33dfa35aa2000034837d365e63845f3c1092f8dde8af3904ea0f4b82649b83ed4fa0f873339c4cadecc13219ba7518aa4f7db34ead13484742067ab743c1d82a5687f2ed690000000000000000000000000000000000000000000099d4fa0000000000003f0ecdc7c82e72919c91d2039afe17e95edeeeba72205beff7771bcb293747b88486cacee403000000a2919a4bff2ed893f2c814679fa69fc7e0cf761f918725704a01c56009a9f748e5aaf30a10bd8c409b1870c1f75e26b45264e3d3f8e0048e55ae289ce2ad779ce71d4dc30cbb2cc4289d2f884d66cddc76eb7f601110ff39053c262279f4ef00fbdb8c328615a9ec84f27a9f3938ae736138b8c1ec220c1540bf3d162dc1c27fa30f0dc60b9f257db5d1c7ed2e152cb2cf06f8edb30177fead735a952ffce676a93110904d5ee2abdab2ef3ff84c4d61443f73552195c7ccfbf9f03c44432eaa3b7501d4239354da8de21eada75d3a3afb2c76ff0700007981699b6c0f0e946766f57544ff52cef0dd811bec4e3c0a30f2d7d19d26d2503a3ea376721b8eded3bc475958dd498ee2b2d6146e33fc0de1dc2e0516ac565ddb1d4ae89e6712824a85eb9ee0a3b68c9e209756623adf685dd715d68ed11e4b4d5502f5124948f8f98c615cac3666c58f785c3f758be352a71871d5c081197d37980e4f4e26b5476fb20407ff7098b7174bef66fa03a99b5c0c20b378065fac4ef9ac2d0d804b9400000060e5d3f1749f6aecf69ba83a71caa9bdddc679f1b826f54b6563a4be1fd82b73c8c2bc65f63982b951fb058fd3c7b6341c4580376b6c16bd94d2da66059de81abfa15eeeb88b6ae5882ad341032c73f1285e21fff5a1d138e061b1dc7bbda199b5fab8e0719e9cd69b47dcb52b0be6a3a73afdf328132e1d4f21065716be0c53a23940d07188b015fa341dbc92231c8b5e5717eac184f46c9f61b69f55cd2231bcf821052429a1f250e8b734be0605a15f25923d599544b319319ff0a32621019347df460a098119a6f47eb1bac47946d7a009cbc6ec74c19a93cc7c7138b28c95270116181fd5f553573c48104d2ad0e10d3663488e664401453f22f0d76d2162635365258af61ae1f46f4a7862f302d91e3f7c2781f602220522e84602a939a8d5e4137ae31ccd397404dc72e06715a6503d4d865182803ee6725da7293b23daeebefd6fce7411c9624a7e8d5ba5a13e1c32adc4f3274497c6882a72475e4280a4d9a47c003c6ed3071330c58145be813a10788a720a6b5a498ca2b42496c479a0a71e2f6f9bad8c84bc6be20281bde0b348cf2c60538a505ad4a0510eebb023e4954c9eb6cd70627f5c03d867dbf3ad5d1f1dc852064dd0efafc3df20ec8faf3d194db76127f88f284fa1b71ab964fdd2474471da76373e65e9a8bf844bdfdd348bc7d00c4c7e7afe8a1f8cde79b7a6c5aafe954b8ba37818e40c14b37c23f9f614576b689436fef2f27f8b1e756e00262e22bca49c43fd73e7e99b2fa44a8c1db99c2cf2735ad6c5fabf082e0df0f8ba7e24272165f2f5b28230c02b53d44bd84bf6770157e96bbb96b5e1f165c87e7ad68a3600b3d357fa9a7d53c281d88ebb175a4dbb82130e6870982947913110f091d21760d985afd3163f2e6880682432f9b3b97d57a9f980edfa1116a3d04d58872a07d6a7e12db673acd2f7b8988d833e71943fe2c1c65a3cf36b955c56b55bfd3ecf0af694c71a03f2996c15b1ba971de1cb9c7e6a0000000000000014783ef54c51199317413f98dca8ff3d0bda50f6c0af58dbd6c031b1a5a7512c5896514adfa17d31429c68db50a93d88199defd3b4625fea426ff9293a28a544a6a9e2a79b55daa1b3c6b14c4ec6d164e902ce4913843d65d841973468729ea12bf6d3499036dbb66718f3497855c3baa6cc07c0fa388ec9df0617c1a28ef5a595ee267a76175b8a057e6efaf4fefe46def451f2858fe71a53e77b1a44e98843bb3a40102da3703dfb9f61bdcea2fb810b32d52e2157a150a63ea6135d1cf6f864c2e68884d7245bc5d61dc5a114d10ffb22e76678bbfc1e3865d17d128306d1b81884a934cb00000000000000000098a4526e6468987dbc63bff7590eb388afaba43d811996333eef7e9f472bee293f0c40d434b8be07cbd52325296e22802493edb5c590ad208bac683a8b2d4c9d2d57ff846ae8c422e0b28546671f11d8157bb762c91f3fbcca8e21589c92446ae65d408c0637ffcc2d44d715ce003dd1e12b085e186d069a55c2e96efbe5024d61a56a36d988c0f51a973a6c238e545b28211a92000000001501aed8d72af0fcd540a9d4e293690c5e697b3a1480e46df5071bca1cfb28a57c1b3c956ec81397e81fbf870a67385fea04220423f52ad8178b9fd04bdc7e5fee4bd52db996e633792118efdb6b88023e80da74fdf723c7f0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x9e}]}, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000380)="7c53310100f9ff61efd106939fc1", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 9.127958793s ago: executing program 0 (id=3054): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x5e, 0x0, 0x0, 0x10, 0x2}, 0xffffffffffffffb7) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (rerun: 32) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async, rerun: 64) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) (async) r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80}) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r2}, 0x8) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) (async) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) (async, rerun: 32) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) (async, rerun: 32) ioctl$TUNSETOFFLOAD(r3, 0x40047451, 0x2000000c) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) (async, rerun: 64) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) (rerun: 64) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x01\x00|4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) (async, rerun: 64) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000480)={0x1, 0xa7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x1) 8.996786635s ago: executing program 0 (id=3055): socketpair$tipc(0x1e, 0x4, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x2, 0xe, &(0x7f0000003300)=ANY=[@ANYRES16=r0], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000200)={0x1b, 0x0, 0x0, 0xf4, 0x0, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000300)=r2}, 0x20) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)={0x1b, 0x0, 0x0, 0x126a, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r6, &(0x7f0000000040), 0x9) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x660c, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000180), 0x12) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r6, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000780)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000700), &(0x7f0000000740)=r1}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r5, 0x58, &(0x7f0000000380)}, 0x10) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)='%pi6 \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r14 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000980)=@generic={&(0x7f0000000940)='./file0\x00'}, 0x18) r15 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r15, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090b000000000055090100000000009500000000000000b7020000000000008500000085000000b70000000000000095000000000000220000000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r16}, 0x10) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=@base={0x1, 0x5, 0x20009, 0x7}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r17, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r18, &(0x7f0000000000), &(0x7f0000000140)=""/181}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ac0)={0x6, 0x20, &(0x7f0000000b80)=ANY=[@ANYBLOB="1800000000100000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000007721cefffcffffff18120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000085100000feffffff18010000786c6c2500000000002020207b1af8ff00008000bfa100000000000007010000f8ffffffb702000008000000b7030000a60400008500000006000000185000000d0000000000000000000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000c3988d58f9c7d8f56f676f43c5c3ab899a5adedb165c9b8089abfd2a15d9bdb127ec9d"], &(0x7f0000000480)='syzkaller\x00', 0xffffff8b, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x0, 0xf, 0x6}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000a40)=[0xffffffffffffffff, r5, r9, r10, r11, r12, r13, 0x1, r14, 0xffffffffffffffff], &(0x7f0000000a80)=[{0x1, 0x4, 0xb, 0x2}, {0x1, 0x4, 0x8}, {0x4, 0x1000, 0xa, 0xc}], 0x10, 0x921}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r19, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x3}, 0x10, 0x0}, 0x0) 3.817526908s ago: executing program 4 (id=3151): bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f0000000000), &(0x7f0000000280)}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8929, &(0x7f0000001f40)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\xf5\a\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'5\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\x06\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xdcZ\xb9\xd7Z\x88\x9b\xdff[\x90\xfa\x9a{b\xf4Dq') r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/251, 0x2}], 0x1}, 0x40000100) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.rsvd.max_usage_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000440)='blkio.bfq.time_recursive\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x4008744b, 0x2000001d) 3.638045772s ago: executing program 4 (id=3156): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x2}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000004055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f0000000000)='/proc/t/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee\x00\x00'}, 0x30) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) close(0xffffffffffffffff) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='syzkaller\x00', 0x5, 0xd3, &(0x7f0000000500)=""/211, 0x0, 0x0, '\x00', 0x0, 0x37, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0xf}, 0x11000, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffdaa}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x4, 0x6, 0xfe, 0x42}, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x5, 0x9fd, 0x84}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000001c0), &(0x7f0000000240), 0x800, r4}, 0x38) (async) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r4}, 0x38) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={0x0, &(0x7f0000000940)=""/221, 0xa2, 0xdd}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x36) (async) syz_clone(0x4021400, 0x0, 0x0, 0x0, 0x0, 0x0) 3.622525414s ago: executing program 4 (id=3157): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x6}, 0x0, 0x0, 0x4, 0x5, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000e00)=ANY=[@ANYRESHEX], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffa6, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7b17}, 0x90) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="62030000002072"], 0x8) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000280), 0x9) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x8400, 0x1, 0x0, 0x1}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000b40)=ANY=[@ANYRESOCT=r0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/382], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x40000}, 0x10}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x2f9, 0x304, &(0x7f0000000040)="b90103600040f000009e0ff008001fffffe1000087e9450077fbac141411ac1414e0be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x2, 0x2, 0x204, 0x0, 0xffffffffffffffff, 0xfffffff9, '\x00', 0x0, r2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) openat$tun(0xffffff9c, &(0x7f00000001c0), 0x0, 0x0) 1.763800925s ago: executing program 4 (id=3175): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000001c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000018c0)=ANY=[@ANYBLOB="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"/4571], &(0x7f0000000100)='GPL\x00'}, 0x41) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x89f1, &(0x7f0000000900)={'ip6gre0\x00', @multicast}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYRES8=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000000)='ext4_mark_inode_dirty\x00', r5}, 0x10) unlink(&(0x7f00000007c0)='./cgroup\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) unlink(&(0x7f00000007c0)='./cgroup\x00') r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000a00)={0x5, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRESOCT=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x17, 0x4, 0x7, 0x8}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0x20000000000001ad, &(0x7f0000000040)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x59, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0xfffffffffffffc1a, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16=r3, @ANYRES32=r10, @ANYBLOB="bb3585651c2aab9e76fe84c6119a328bd45a51c4f4477bb1fb56a68a2189028b945f3d4853abbec9163cbae4ac036c5e5a1b917fe6316413d7c63b06e3755d74006a930cd2d57156b951d48a25c6a117b85958faaad17d67842abf08e4e8afff560b9f17b5ecccd3eb61b2771c440ba46bc5767c76f8824207c2acbd3ed08a1cbabbf466158510c1ad1731a45cb9f077d609adb4256e123e5e97832aafb718e62ca970c3e574cd943e36e5861cee48141b70925c5ba3b4e19fac7704819e4ea132ad90ac30d3b5999ba552f514253584c87f8d7cecd1f40f4c7d32d5c61a7dd4131ae3", @ANYRESOCT=r5, @ANYRES32=r2, @ANYBLOB="5340db9b600070ce071abdad7c52ab48511a4bccdc657a6773f5eedf77fde239d3ba99df129dc66b0f96ef5679f0d427c831f01c311de2", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.660973704s ago: executing program 2 (id=3178): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) sendmsg$unix(r1, &(0x7f0000002b80)={&(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x4, 0x10, &(0x7f00000008c0)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000000000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x4, 0x10, &(0x7f00000008c0)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000000000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.660412254s ago: executing program 2 (id=3179): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000000300)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x0, 0x8}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x0, 0x0, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0, r2}, 0x10) write$cgroup_pid(r0, &(0x7f0000000580), 0x12) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000140), 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r7}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) mkdirat$cgroup(r3, &(0x7f0000000200)='syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000005c0)=ANY=[@ANYRES32=r2, @ANYRESOCT=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 1.659782514s ago: executing program 4 (id=3180): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000200)=""/166}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) close(0xffffffffffffffff) (async) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x0, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x622000, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_queued_recursive\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40e00, 0x25, '\x00', 0x0, 0x2}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40e00, 0x25, '\x00', 0x0, 0x2}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000240)='global_dirty_state\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.io_merged_recursive\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x100002, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x100002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) 1.597773759s ago: executing program 2 (id=3181): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, 0x0, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0xa, 0x4, 0x1, 0x0, r1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r2, &(0x7f0000000300), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000300)={r2, &(0x7f0000001a40), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70400000800000085000800950000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x4, 0xfffffffa, 0xba, 0x2, r2, 0x36db, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3, 0x2}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050", @ANYRES16=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) (async) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000080000000000000000095202d060d79178928cc9b095d601062d4555a9dc90101a0310ee94221d9545b028155bc6a17ceb0ec912056e6606923dc412c602fb64656c25820a75231f7e23b811771413845a83a60e652b96bb9dafebe4c57b478fbfc53e5ba4559974457170c26a35d60c77ec4688956c72f0d7c227aa22f09"], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0xe) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r8, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r9, @ANYRESOCT=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000400)='mm_vmscan_wakeup_kswapd\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000700)='signal_generate\x00', r7}, 0x10) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r10}, 0x10) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 1.389607816s ago: executing program 2 (id=3185): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000010000000000000000000000711204000000000095000000000000005c11f092d7088457f72c365b1e06c4b1fb5289a7dc49c74a9a7c8c810f13a0aae56e21b4f7472f39218b636f3004f4fecc01213c1983428099d3e3c790de6d963c04eba171470e9247e28d2b2176f8700f94d2256ef77a7be3a067e10b61aba1a01d15cc8970fd3b3aec7654480f606a42cdbb688efce476562c25396e2ca1fe39827ce56a0597d3eddc47b590cb89db8e31df326b01"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x0, 0x5, 0x1, 0x54}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r2, &(0x7f0000000380), 0x20000000}, 0x20) (async) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r2, &(0x7f0000000380), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000014c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0200000000000000b7080000000000f29880a5ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095000000000000004f3a2194a446c376f472c0f75d7cc52812d29995c01d2ef6ddc2f6b3b5707a92d7a25ecbcf03865224e18f90fbe5c323ee12d0f844da6e2b7cb42c9a0c07dccf41"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)=@generic={&(0x7f00000004c0)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)=@generic={&(0x7f00000004c0)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x2000000, 0xe, 0x0, &(0x7f0000000340)="63eced8e46dc3f0adf33c9f7b95c", 0x0, 0x1101, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r6, 0x0, 0x0}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r6, 0x0, 0x0}, 0x10) close(r0) (async) close(r0) 1.183160713s ago: executing program 2 (id=3187): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)=')\x00') r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001400) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc008744c, 0x20000000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffff21, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x8, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000a7f1ffff00000000000000", @ANYRES32=r3, @ANYBLOB], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r6, 0x21, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000440)={0x0, 0x3, 0xffffff9b, 0x7f}, 0x10, 0xffffffffffffffff, r5, 0x2, &(0x7f0000000500)=[r3, r3, r3, r7], &(0x7f0000000540)=[{0x4, 0x1, 0xf, 0xb}, {0x0, 0x0, 0x2}], 0x10, 0x7}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000a5000000000000000000000018130000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008500000092000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41000, 0x30, '\x00', r6, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x3, 0x3, 0x2, 0x1}, 0x10, 0xffffffffffffffff, r1, 0x0, 0x0, &(0x7f0000000300), 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_ext={0x1c, 0x19, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffc00, 0x0, 0x0, 0x0, 0x9}, [@cb_func={0x18, 0x7, 0x4, 0x0, 0x7}, @alu={0x7, 0x1, 0x2, 0x4, 0x6, 0xfffffffffffffff0, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x4}, @map_fd={0x18, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10000}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0x4b, &(0x7f0000000140)=""/75, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0x0, 0x5, 0x6}, 0x10, 0x13d1f, 0xffffffffffffffff, 0x7, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r0, 0xffffffffffffffff], &(0x7f0000000480)=[{0x5, 0x5, 0xb, 0xc}, {0x1, 0x3, 0xc, 0xa}, {0x1, 0x1, 0x1, 0x1}, {0x0, 0x2, 0xe, 0x2}, {0x4, 0x5, 0x0, 0x4}, {0x1, 0x1, 0x6, 0x4}, {0x1, 0x3, 0xc, 0x7}], 0x10, 0x2}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0x6, 0x2, &(0x7f00000005c0)=@raw=[@call={0x85, 0x0, 0x0, 0x14}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}], &(0x7f0000000600)='syzkaller\x00', 0xffffffff, 0x92, &(0x7f0000000640)=""/146, 0x41100, 0x51, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000780)=[{0x3, 0x5, 0xf, 0x5}, {0x0, 0x3, 0xe}, {0x3, 0x2, 0x4, 0xa}, {0x5, 0x3, 0xa, 0x2}, {0x5, 0x1, 0xa, 0x1}, {0x1, 0x3, 0x4, 0xb}, {0x2, 0x1, 0x0, 0x4}, {0x5, 0x3, 0xb, 0x3}]}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000009500000005000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = openat$cgroup_ro(r7, &(0x7f0000000ec0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000f00)='\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f00000005c0)={@cgroup, 0x7, 0x1, 0xa2c5, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0]}, 0x40) 830.194112ms ago: executing program 4 (id=3189): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000000000000701000003ffffffb702000008000000b7030000000000838500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xe, r1, 0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x6, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x0, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000940)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x4}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x7fe2, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000900)={{r6}, &(0x7f0000000880), &(0x7f00000008c0)='%-010d \x00'}, 0x20) 561.582434ms ago: executing program 3 (id=3190): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0xfffff15e, 0x7ffe, 0x1a0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x0, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x5}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r1, &(0x7f0000000000), 0x20000000}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYRESDEC=r1, @ANYRES8=r1, @ANYRESHEX=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x14, 0x81, 0x7f, 0x7f, 0x2, r1, 0xfffffffa, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x1}, 0x48) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.controllers\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = gettid() r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r3}, 0x8) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x5, 0xef, 0x7, 0x1, 0x0, 0x0, 0x0, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000140)}, 0x220, 0x287d, 0x8001, 0x2, 0x7, 0x5, 0x0, 0x0, 0x4, 0x0, 0x2}, r4, 0xd, r5, 0xb) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00'}, 0x90) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x2, 0x4, 0x7fe6, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='rxrpc_improper_term\x00', r6}, 0x10) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r8, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r9}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) 519.585127ms ago: executing program 2 (id=3192): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000080000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8e, 0xe7c9, 0x1}, 0x48) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)={0x0, 0x0}) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r0, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000280)=[0x0], &(0x7f0000000340)=[0x0], 0x0, 0xcf, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x11, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000800)={0x1b, 0x0, 0x0, 0x4, 0x0, 0x1, 0xff, '\x00', 0x0, r4, 0x5, 0x4, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x1d, &(0x7f00000004c0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @jmp={0x5, 0x0, 0xb, 0xb, 0x4, 0x2, 0xffffffffffffffff}, @map_fd={0x18, 0x3, 0x1, 0x0, r5}], &(0x7f0000000180)='syzkaller\x00', 0x9e, 0x0, 0x0, 0x40f00, 0x3, '\x00', r7, 0x25, r4, 0x8, &(0x7f00000007c0)={0xa, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r8], 0x0, 0x10, 0x5}, 0x90) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000040)={'veth0_virt_wifi\x00', @random="6e42ed8dfd93"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000e80), 0x20000e92) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000200)={'virt_wifi0\x00'}) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x108044}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 519.191787ms ago: executing program 1 (id=3193): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x80000000, 0x1fd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x7b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f0000000000)='/proc/t/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee\x00\x00'}, 0x30) close(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x4, 0x6, 0xff, 0x42, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x20000000}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0xfffffe6d) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, r1}, 0x48) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000100000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00009700bfa200000000000007020000f8ffefffb703000008000000b70400000000000085000000010000009520e51659b1544fb10977f4683804ecb729ec82e7c6f062d22d4529560a079ece26ae4c49eae656df1108a42effe9bf372922c03fab5c26c9a9bda0328d7c4344136e5f40c429990a85ba8e9ff574494c0affbb4220d8f124376f89800eea97a2a5dbf433d59169a47cc1"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x3fc, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x626b}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 460.860622ms ago: executing program 3 (id=3194): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1a003}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @link_local}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r5}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @dev}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x6, [@enum={0x3, 0x1, 0x0, 0xf, 0x4000000, [{}]}, @struct]}, {0x0, [0x0, 0x0, 0x2e, 0x25]}}, &(0x7f0000002200)=""/4110, 0x3e, 0x100e, 0x1}, 0x20) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 460.411322ms ago: executing program 1 (id=3195): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000840)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r3}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7ffb, 0xcc}, 0x48) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r4}, 0x3d) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) 458.622352ms ago: executing program 1 (id=3196): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000640)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000680)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000005c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000700)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000006c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000580)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 406.720306ms ago: executing program 1 (id=3197): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f00000025c0)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r1, @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001180)='./file0\x00', r1, 0x4000, r0}, 0x18) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [], {{0x6, 0x1, 0xd, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000200)="9e36d448b388dd965f7a3312779a", 0x0, 0x0, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001100)={0x1, 0x58, &(0x7f0000001080)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0xfffffd63) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xc, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000071103e000000000095000000000000003a723d52a72fb861e2073b5613afe9585a178794e90279cb3ac4a0b859da43e9b9180d04d6e6aa1888b9c4e59488a1ae9b7cf3cde8514d5e46e42accd7883b6f947b5cebd665d716ecdf5a9abdd61f5a95ad1bd533d2c91563060a1a87dbd8"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) 405.785066ms ago: executing program 3 (id=3198): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) (async, rerun: 64) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x20, &(0x7f0000000440)={&(0x7f0000000380)=""/82, 0x52, 0x0, &(0x7f0000000400)=""/52, 0x34}}, 0x10) (async, rerun: 64) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000740)=@bpf_ext={0x1c, 0x20, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0xa2}, {}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0xfff94bba670c667e}}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x401}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000005c0)='GPL\x00', 0x6, 0x4c, &(0x7f0000000600)=""/76, 0x41100, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000006c0)={0x2, 0xf, 0x284b, 0x9}, 0x10, 0x2000b, 0xffffffffffffffff, 0x0, &(0x7f0000000700)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={0xffffffffffffffff, 0x5, 0x10}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@bloom_filter={0x1e, 0x78, 0x8, 0xee8a, 0x40, 0xffffffffffffffff, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x3, 0xb}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x7, 0x20, &(0x7f00000000c0)=@raw=[@exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f00000001c0)='syzkaller\x00', 0x6f, 0x0, 0xfffffffffffffffc, 0x41000, 0x1, '\x00', r1, 0x36, r2, 0x8, &(0x7f0000000300)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0x8, 0x0, 0x9}, 0x10, r3, r4, 0xa, &(0x7f00000008c0)=[r5, r6], &(0x7f0000000900)=[{0x0, 0x1, 0xb, 0x8}, {0x4, 0x1, 0xe, 0xb}, {0x4, 0x5, 0x0, 0x7}, {0x2, 0x5, 0xf, 0xa}, {0x0, 0x4, 0x7, 0x2}, {0x4, 0x5, 0x3, 0x1}, {0x1, 0x3, 0xa, 0x3}, {0x1, 0x5, 0xf, 0x7}, {0x1, 0x5, 0x9, 0x8}, {0x5, 0x1}], 0x10, 0x2}, 0x90) (async) r8 = perf_event_open$cgroup(&(0x7f0000000ac0)={0x0, 0x80, 0x81, 0x3, 0xe4, 0xa0, 0x0, 0xe110, 0x8, 0xe, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000a80), 0x2}, 0x660, 0x6, 0x2, 0x8, 0x0, 0x8, 0x2, 0x0, 0x8, 0x0, 0x44}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xffffffffffff0000) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000bc0)={r6, 0x58, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) mkdir(&(0x7f0000000c00)='./file0\x00', 0x88) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000c40)=r3, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x81, 0x0, r6, 0x7, '\x00', r9, r10, 0x2, 0x3, 0x3}, 0x48) r11 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000d00)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_int(r11, &(0x7f0000000d40)=0xfff, 0x12) (async, rerun: 64) r12 = getpid() (rerun: 64) perf_event_open(&(0x7f0000000d80)={0x1, 0x80, 0x1, 0x40, 0x3, 0x0, 0x0, 0x5, 0x12004, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x74, 0x4, @perf_config_ext={0x89a3, 0x2}, 0x10000, 0x6, 0x9, 0x8, 0x8, 0x400000, 0x0, 0x0, 0x1ff, 0x0, 0x40}, r12, 0xd, r8, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000e00)='afs_reload_dir\x00', r7}, 0x10) (async) r13 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e80)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r13, &(0x7f0000000ec0), 0x2, 0x0) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000f00), 0xa800, 0x0) close(r14) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001200)={&(0x7f0000000f40)="547483566d9ae5280e73040058381d0ed2e45743f74aba970d0473ca04f4a8dd858dc9ec5ec67c76d9367dc6142155d5c361009366c0f90186200e2f4c85437b", &(0x7f0000000f80)=""/75, &(0x7f0000001000)="506bee841c7b07d087bc416d8abb27141bc5abe4f4fbb1f5d8a75eb4f5a20acd19fa41cf0299f7f1a81c740d3998e8cba3b39b7caa6a5cd5aa64b9fb7964b6356ac4bd53f56a74a8e9f07abd57395e2b4fb75dadcf3ef01f54176c19a91a76e39b4877da1f9e11b574541968947097b56a2606868dcfea7d951a2bc0a0f4d8397dab89a619cb2de72a69bbb1ee7bae193485461ccec719bf61f98b8de1e52e8a09a9d40d06485e76ebd0b3abcfe9a47f1d3ed0d75296b2188bd9ec24a2ddf303025d20ec15152653b54d6d49ce20e4d1b00f063d9f1dffd663b5434c03e4b4de9492d12c868581779486c9f47a0cfce7de", &(0x7f0000001100)="52c97edbd775c74277d7af849aecdccb4ede0bdf6f9bc307c041b0700a878e24a5ec875c4a977cdce738b770a03d73898847d1a78b36c1ab7f7195cbf2f085e5fa4b91ae237fbac38b09d93fd8cdadbe4b3726283e0a70d2baf52a843ca7032690a3928ff17faa054539136786da1c689e3e60e2e7391dea6c270adcfb9a6f1be42308cf1fe7216a08df863e2ced7b70283361b4e28ecd191d5e06b6b3f2a733002315fdc2df31e68b0321090046c5129aa20c40406a840a1681aa44bf6bbd0e23648cfa686dfd3b843fb6c4364c", 0x0, r6}, 0x38) (async, rerun: 32) ioctl$TUNSETOFFLOAD(r14, 0x400454d0, 0x15) (rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001480)={r7, 0x0, 0x99, 0x89, &(0x7f0000001240)="1361ae3a22858ffb1fc310465e2ddb969918fa9224fe24a56b1d7cd41fdf827208ad41e6538d3b798511c38a98de371241cb2603ac0e6de783e7e0ba56f2c9d2415feebced97bc69a42c34bbe362e77aef2b2c20a298731a4b33ed35c16c4d2f2c32bf11644f33398946ed128d76f523d73c6971b5db14b1eb93f45a03f0aa29f1c76926db85090b199c8a467dd393717b71469c9e74ccffed", &(0x7f0000001300)=""/137, 0x8001, 0x0, 0x51, 0x13, &(0x7f00000013c0)="8ac16157ac832e248d65468d3745dcac351a004e82d592ac1bf520eb3dd22975ef00602fdd22f22a2db420e40eb902bc82a96b5cf85a8b12dc4f0cd7beabf298ec46a3eaaff8bdbf8f86be928a0fb5c7b4", &(0x7f0000001440)="ea48c5e14344b6ad41faeb6b53a84162ea15bc", 0x0, 0x0, 0x3}, 0x50) (async) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000001500)={0x101, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001540)=r15, 0x4) (async, rerun: 32) openat$ppp(0xffffffffffffff9c, &(0x7f0000001580), 0x50c41, 0x0) (rerun: 32) ioctl$TUNSETIFF(r14, 0x400454ca, &(0x7f00000015c0)={'batadv_slave_1\x00', 0x4000}) 315.104224ms ago: executing program 3 (id=3199): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x13, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000000000008500000005000000bf91000000000000b702000085000000840000081e00000000000000950000000800000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x0, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={r3, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x40, '\x00', r6, 0xffffffffffffffff, 0x1, 0x3, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000500000000000018110000", @ANYRES32=r5, @ANYRESHEX=r2], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x41}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r5, 0xffffffffffffffff}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x48) r9 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000005000000850000008200000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0xe, 0x20, &(0x7f0000000780)=ANY=[@ANYBLOB="180000000100000000000000090000006c863000f0ffffff85200000030000006000f4ff0000000018110000", @ANYRES32=r8, @ANYBLOB="000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a5000000851ffff70400000085200000030000009500000000000000"], &(0x7f0000000880)='syzkaller\x00', 0x748, 0x1d, &(0x7f0000000740)=""/29, 0x41100, 0x0, '\x00', 0x0, 0xa, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000d40)={0x5, 0x0, 0x2, 0xf0000000}, 0x10, 0x0, r9, 0x1, &(0x7f0000000400)=[r7, 0xffffffffffffffff, r5, 0xffffffffffffffff, r0, r7, 0xffffffffffffffff], &(0x7f0000001140)=[{0x4, 0x5, 0x4, 0xc}], 0x10, 0xaba}, 0x90) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f00000006c0)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x10) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r11}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 143.223138ms ago: executing program 1 (id=3200): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f00000000c0)=[0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0], 0x0, 0x4c, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x34, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000380)='mm_page_alloc\x00', r4}, 0x10) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500)=0xffffffffffffffff, 0x4) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xf, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r7}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='blkio.bfq.idle_time\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r7, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000480)=[0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x6e, &(0x7f0000000500)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000780), &(0x7f0000000840), 0x8, 0xd2, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000b00)={@map=0x1, 0x3, 0x0, 0x2238, &(0x7f0000000a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000a40)=[0x0, 0x0, 0x0], &(0x7f0000000a80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000ac0)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b40)={@ifindex=r8, r9, 0x2f, 0x201c, 0x0, @prog_id=r10, r11}, 0x20) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={@ifindex=r2, r3, 0x33, 0x18, r4, @link_fd=r5, r11}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="efa86fc91b000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b706000014000000b7030000000d00008500000005000000bca900000000000035090100000000009500000000000000b7020000000000007b6af8ff00000000b5090000000000007baaf0ff00000000bf8700000000000007080000fffdffffbf2400000000000007060000f0ffffff740200000800000018260000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000005000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 46.261186ms ago: executing program 3 (id=3201): bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="00001614000000b7000000008500f2ffffffffffff0000000000100000bf910000d81d020000000000000000008500000000000000b70000000000faff9400000000000000000000000000000000000000000000000000000000000054d897ad30ce1658f686279c3a18b1fbeac39df4b375a6485791d05cf7a07282285d2fc0298a2f3e43fd4c7b58f6eebf6a59cddbff6ce53ec7c97ff1fb95386efb21b915"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5, r0}, 0x38) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="660a00000000000061114c000000000085000000850000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) 513.439µs ago: executing program 1 (id=3202): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x1, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000010018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.current\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x0, 0x8, 0x4000000, 0x2, r0, 0x6, '\x00', 0x0, r6, 0x4, 0x0, 0x0, 0x6}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) recvmsg$unix(r7, &(0x7f0000000600)={&(0x7f0000000300), 0x6e, &(0x7f0000000400)=[{&(0x7f0000000380)=""/100, 0x64}, {&(0x7f00000004c0)=""/79, 0x4f}, {&(0x7f0000000200)=""/52, 0x34}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}, 0x10000) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r9) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r10) 0s ago: executing program 3 (id=3203): perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffff, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000007c0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r2, @ANYBLOB="000000000000000066000000000000001800000000000000000000000000000095000000000000008401000000000000950062000000000057adb0f9b000cbe2abe9f9407806e80182ae5d08977e8e4538ab6d06cf7caacfcc38661048063ac600813ea3b8f5dc1140a1287d0147b4063ebf061f76bc2d4fb47d336b5b3db043"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000007c0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r2, @ANYBLOB="000000000000000066000000000000001800000000000000000000000000000095000000000000008401000000000000950062000000000057adb0f9b000cbe2abe9f9407806e80182ae5d08977e8e4538ab6d06cf7caacfcc38661048063ac600813ea3b8f5dc1140a1287d0147b4063ebf061f76bc2d4fb47d336b5b3db043"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='ext4_ext_handle_unwritten_extents\x00'}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r5}, &(0x7f0000000540), &(0x7f0000000580)=r6}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r5, 0xffffffffffffffff}, &(0x7f0000000540), &(0x7f0000000580)=r6}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f00000012c0)=ANY=[@ANYRESOCT=r1, @ANYRES32, @ANYRESDEC=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f00000012c0)=ANY=[@ANYRESOCT=r1, @ANYRES32, @ANYRESDEC=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r5, &(0x7f0000000780)}, 0x20) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r5, &(0x7f0000000780)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xd, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000d80)='memory.events\x00', 0x26e1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000300), 0x9) (async) write$cgroup_type(r9, &(0x7f0000000300), 0x9) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) openat$cgroup_type(r7, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='cpu&00\t||') (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='cpu&00\t||') kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.179' (ED25519) to the list of known hosts. [ 22.543471][ T24] audit: type=1400 audit(1722094275.889:66): avc: denied { mounton } for pid=276 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.544399][ T276] cgroup: Unknown subsys name 'net' [ 22.566110][ T24] audit: type=1400 audit(1722094275.889:67): avc: denied { mount } for pid=276 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.592971][ T24] audit: type=1400 audit(1722094275.919:68): avc: denied { unmount } for pid=276 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.593128][ T276] cgroup: Unknown subsys name 'devices' [ 22.738864][ T276] cgroup: Unknown subsys name 'hugetlb' [ 22.744259][ T276] cgroup: Unknown subsys name 'rlimit' [ 22.875331][ T24] audit: type=1400 audit(1722094276.219:69): avc: denied { setattr } for pid=276 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.898253][ T24] audit: type=1400 audit(1722094276.219:70): avc: denied { mounton } for pid=276 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.922901][ T24] audit: type=1400 audit(1722094276.219:71): avc: denied { mount } for pid=276 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.927741][ T279] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 22.954376][ T24] audit: type=1400 audit(1722094276.299:72): avc: denied { relabelto } for pid=279 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.979626][ T24] audit: type=1400 audit(1722094276.299:73): avc: denied { write } for pid=279 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.007755][ T24] audit: type=1400 audit(1722094276.359:74): avc: denied { read } for pid=276 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.033063][ T24] audit: type=1400 audit(1722094276.359:75): avc: denied { open } for pid=276 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.033101][ T276] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.517495][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.524335][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.531655][ T285] device bridge_slave_0 entered promiscuous mode [ 23.538269][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.545129][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.552298][ T285] device bridge_slave_1 entered promiscuous mode [ 23.586020][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.592872][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.600027][ T288] device bridge_slave_0 entered promiscuous mode [ 23.612849][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.619700][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.626733][ T288] device bridge_slave_1 entered promiscuous mode [ 23.637043][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.643869][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.651053][ T287] device bridge_slave_0 entered promiscuous mode [ 23.659438][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.666258][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.673477][ T287] device bridge_slave_1 entered promiscuous mode [ 23.689108][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.695933][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.703191][ T289] device bridge_slave_0 entered promiscuous mode [ 23.711600][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.718464][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.725601][ T289] device bridge_slave_1 entered promiscuous mode [ 23.749764][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.756592][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.764243][ T286] device bridge_slave_0 entered promiscuous mode [ 23.796813][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.803643][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.811049][ T286] device bridge_slave_1 entered promiscuous mode [ 23.904909][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.911756][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.918850][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.925626][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.933628][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.940464][ T288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.947551][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.954340][ T288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.973624][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.980473][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.987553][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.994339][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.009769][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.016593][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.023705][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.030497][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.041488][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.048335][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.055418][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.062227][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.087679][ T15] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.094688][ T15] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.102111][ T15] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.108989][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.116202][ T15] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.123251][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.131260][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.139368][ T15] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.146356][ T15] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.153330][ T15] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.160251][ T15] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.187521][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.195597][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.203115][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.210976][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.218485][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.225571][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.233528][ T15] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.240349][ T15] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.247645][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.255509][ T15] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.262288][ T15] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.269399][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.277266][ T15] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.284071][ T15] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.291234][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.299021][ T15] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.305768][ T15] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.312926][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.320722][ T15] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.327489][ T15] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.334576][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.342504][ T15] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.349324][ T15] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.356436][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.377994][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.386055][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.394190][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.401955][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.409648][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.424320][ T286] device veth0_vlan entered promiscuous mode [ 24.435892][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.444192][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.452355][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.460260][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.468141][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.475293][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.488962][ T287] device veth0_vlan entered promiscuous mode [ 24.499697][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.507224][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.514831][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.522416][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.536591][ T285] device veth0_vlan entered promiscuous mode [ 24.543452][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.551408][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.559179][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.566995][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.574632][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.582963][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.590997][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.598658][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.606978][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.614135][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.621380][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.629437][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.639997][ T287] device veth1_macvtap entered promiscuous mode [ 24.646670][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.654710][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.662698][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.671895][ T288] device veth0_vlan entered promiscuous mode [ 24.680716][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.688476][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.696075][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.704416][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.712416][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.719246][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.726515][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.734723][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.742634][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.749456][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.756584][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.763738][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.783727][ T285] device veth1_macvtap entered promiscuous mode [ 24.791123][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.799226][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.807782][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.815666][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.823672][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.831462][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.839352][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.847172][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.854792][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.862697][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.870568][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.880637][ T286] device veth1_macvtap entered promiscuous mode [ 24.892659][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.900396][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.908580][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.918278][ T288] device veth1_macvtap entered promiscuous mode [ 24.925753][ T287] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 24.933189][ T289] device veth0_vlan entered promiscuous mode [ 24.952964][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.961806][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.971074][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.979362][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.987798][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.995848][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.003825][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.011819][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.020127][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.028508][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.036475][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.044817][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.053016][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.061316][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.069503][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.078132][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.085314][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.104966][ T289] device veth1_macvtap entered promiscuous mode [ 25.112587][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.121412][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.130337][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.139210][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.147333][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.167389][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.175427][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.200910][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.210132][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.336796][ C1] hrtimer: interrupt took 17022 ns [ 25.779770][ T402] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.788512][ T402] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.795947][ T402] device bridge_slave_0 entered promiscuous mode [ 25.803069][ T402] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.810098][ T402] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.817769][ T402] device bridge_slave_1 entered promiscuous mode [ 26.482853][ T402] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.489722][ T402] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.496821][ T402] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.503584][ T402] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.539278][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.572186][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.640555][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.817186][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.826025][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.834577][ T320] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.841431][ T320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.849635][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.857932][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.865929][ T320] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.872768][ T320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.880549][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.888908][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.896715][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.904810][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.912772][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.921500][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.952435][ T402] device veth0_vlan entered promiscuous mode [ 27.047893][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.066160][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.175208][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.198774][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.288300][ T402] device veth1_macvtap entered promiscuous mode [ 27.381171][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.419026][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.427244][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.539651][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.569585][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.629347][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.648374][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.934148][ T497] device syzkaller0 entered promiscuous mode [ 28.024791][ T48] device bridge_slave_1 left promiscuous mode [ 28.037326][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.087908][ T48] device bridge_slave_0 left promiscuous mode [ 28.093857][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.106381][ T48] device veth1_macvtap left promiscuous mode [ 28.112667][ T48] device veth0_vlan left promiscuous mode [ 29.487713][ T579] device pim6reg1 entered promiscuous mode [ 30.623860][ T596] device veth1_macvtap left promiscuous mode [ 31.118470][ T24] kauditd_printk_skb: 44 callbacks suppressed [ 31.118480][ T24] audit: type=1400 audit(1722094284.469:120): avc: denied { create } for pid=629 comm="syz.3.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 31.359059][ T24] audit: type=1400 audit(1722094284.539:121): avc: denied { tracepoint } for pid=645 comm="syz.3.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 31.682758][ T24] audit: type=1400 audit(1722094285.019:122): avc: denied { create } for pid=645 comm="syz.3.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 31.717268][ T24] audit: type=1400 audit(1722094285.069:123): avc: denied { read } for pid=76 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 31.992185][ T24] audit: type=1400 audit(1722094285.339:124): avc: denied { create } for pid=665 comm="syz.2.96" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 32.302457][ T683] device sit0 entered promiscuous mode [ 32.345200][ T689] device syzkaller0 entered promiscuous mode [ 32.561473][ T24] audit: type=1400 audit(1722094285.909:125): avc: denied { create } for pid=707 comm="syz.3.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 32.589398][ T712] device syzkaller0 entered promiscuous mode [ 32.595271][ T24] audit: type=1400 audit(1722094285.909:126): avc: denied { write } for pid=707 comm="syz.3.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 32.757606][ T24] audit: type=1400 audit(1722094286.099:127): avc: denied { setopt } for pid=721 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.135410][ T725] device syzkaller0 entered promiscuous mode [ 33.280772][ T755] cgroup: syz.0.119 (755) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 33.326033][ T755] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 34.307373][ T24] audit: type=1400 audit(1722094287.659:128): avc: denied { relabelfrom } for pid=871 comm="syz.4.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 34.436529][ T24] audit: type=1400 audit(1722094287.679:129): avc: denied { relabelto } for pid=871 comm="syz.4.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 34.929305][ T894] device macsec0 entered promiscuous mode [ 35.118185][ T906] syz.2.159[906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.118232][ T906] syz.2.159[906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.263385][ T916] syz.4.162[916] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.307032][ T916] syz.4.162[916] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.771519][ T978] device veth0_to_team entered promiscuous mode [ 36.899494][ T24] audit: type=1400 audit(1722094290.249:130): avc: denied { create } for pid=995 comm="syz.4.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 36.955991][ T24] audit: type=1400 audit(1722094290.299:131): avc: denied { read } for pid=997 comm="syz.2.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 37.467139][ T1045] device syzkaller0 entered promiscuous mode [ 37.759625][ T1063] device pim6reg1 entered promiscuous mode [ 37.785078][ T1068] device sit0 entered promiscuous mode [ 39.886694][ T1141] ref_ctr_offset mismatch. inode: 0xd4 offset: 0x0 ref_ctr_offset(old): 0x7602 ref_ctr_offset(new): 0x7604 [ 40.213137][ T24] audit: type=1400 audit(1722094293.559:132): avc: denied { ioctl } for pid=1172 comm="syz.0.230" path="socket:[16729]" dev="sockfs" ino=16729 ioctlcmd=0x8907 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 40.505568][ T1182] device pim6reg1 entered promiscuous mode [ 40.618192][ T1195] device pim6reg1 entered promiscuous mode [ 41.775293][ T24] audit: type=1400 audit(1722094295.109:133): avc: denied { create } for pid=1261 comm="syz.0.253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 41.898914][ T1278] tap0: tun_chr_ioctl cmd 1074025675 [ 41.904750][ T1278] tap0: persist enabled [ 42.288541][ T24] audit: type=1400 audit(1722094295.639:134): avc: denied { create } for pid=1290 comm="syz.1.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 42.805242][ T1332] syz.0.269[1332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.816529][ T1332] syz.0.269[1332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.105373][ T24] audit: type=1400 audit(1722094296.449:135): avc: denied { create } for pid=1349 comm="syz.1.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 43.367988][ T24] audit: type=1400 audit(1722094296.489:136): avc: denied { create } for pid=1349 comm="syz.1.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 43.639308][ T1380] syz.1.280 (1380) used obsolete PPPIOCDETACH ioctl [ 44.263747][ T24] audit: type=1400 audit(1722094297.609:137): avc: denied { create } for pid=1415 comm="syz.2.289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 44.603988][ T1452] device syzkaller0 entered promiscuous mode [ 44.735121][ T1464] device veth1_macvtap left promiscuous mode [ 44.762229][ T1464] device veth1_macvtap entered promiscuous mode [ 44.771490][ T1464] device macsec0 entered promiscuous mode [ 44.791321][ T1466] device syzkaller0 entered promiscuous mode [ 44.866617][ T1472] device veth1_macvtap left promiscuous mode [ 44.918577][ T1472] device macsec0 left promiscuous mode [ 44.956182][ T1477] device veth1_macvtap entered promiscuous mode [ 44.962826][ T1477] device macsec0 entered promiscuous mode [ 45.439675][ T1495] rose0: tun_chr_ioctl cmd 1074025677 [ 45.501374][ T1495] rose0: linktype set to 805 [ 45.868071][ T1517] device syzkaller0 entered promiscuous mode [ 45.877932][ T1522] device pim6reg1 entered promiscuous mode [ 45.925406][ T1530] device veth0_vlan left promiscuous mode [ 46.060284][ T1530] device veth0_vlan entered promiscuous mode [ 46.358800][ T1537] device veth0_vlan left promiscuous mode [ 46.370672][ T1537] device veth0_vlan entered promiscuous mode [ 47.490307][ T1604] device sit0 entered promiscuous mode [ 47.679476][ T1606] device syzkaller0 entered promiscuous mode [ 48.268189][ T24] audit: type=1400 audit(1722094301.619:138): avc: denied { create } for pid=1638 comm="syz.1.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 48.762559][ T1664] device pim6reg1 entered promiscuous mode [ 48.773510][ T1666] device sit0 left promiscuous mode [ 48.919129][ T1667] device veth1_macvtap left promiscuous mode [ 48.925127][ T1667] device macsec0 left promiscuous mode [ 49.286910][ T1666] device sit0 entered promiscuous mode [ 49.584371][ T1687] syz.4.370[1687] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.584450][ T1687] syz.4.370[1687] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.597019][ T1691] syz.4.370[1691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.658874][ T1696] tap0: tun_chr_ioctl cmd 1074025677 [ 49.725351][ T1696] tap0: linktype set to 1 [ 49.748065][ T1699] tap0: tun_chr_ioctl cmd 1074025677 [ 49.755301][ T1699] tap0: linktype set to 1 [ 49.840501][ T1721] device syzkaller0 entered promiscuous mode [ 49.858346][ T1721] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 50.488706][ T1730] device veth1_macvtap left promiscuous mode [ 50.686161][ T1744] device syzkaller0 entered promiscuous mode [ 51.241395][ T1791] device veth1_macvtap left promiscuous mode [ 51.331061][ T1781] device syzkaller0 entered promiscuous mode [ 51.737734][ T1817] syz.3.407[1817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.737778][ T1817] syz.3.407[1817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.770287][ T24] audit: type=1400 audit(1722094305.119:139): avc: denied { create } for pid=1819 comm="syz.4.409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 51.803248][ T1820] device lo entered promiscuous mode [ 51.809100][ T1818] syz.3.407[1818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.809146][ T1818] syz.3.407[1818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.845961][ T1822] ------------[ cut here ]------------ [ 51.938551][ T1822] trace type BPF program uses run-time allocation [ 51.954988][ T1827] device syzkaller0 entered promiscuous mode [ 51.977028][ T1822] WARNING: CPU: 1 PID: 1822 at kernel/bpf/verifier.c:10493 check_map_prog_compatibility+0x65b/0x7c0 [ 51.988630][ T1830] device pim6reg1 entered promiscuous mode [ 52.004240][ T1827] device syzkaller0 left promiscuous mode [ 52.036868][ T1822] Modules linked in: [ 52.040603][ T1822] CPU: 1 PID: 1822 Comm: syz.2.408 Not tainted 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 52.106319][ T1822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 52.196764][ T1822] RIP: 0010:check_map_prog_compatibility+0x65b/0x7c0 [ 52.281619][ T1822] Code: c8 e9 84 fe ff ff e8 24 f5 ee ff 31 db e9 85 fe ff ff e8 18 f5 ee ff c6 05 2e 13 65 05 01 48 c7 c7 40 73 45 85 e8 d5 7b c2 ff <0f> 0b e9 42 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 17 fa ff [ 52.713844][ T1822] RSP: 0018:ffffc90000f16f90 EFLAGS: 00010246 [ 52.878009][ T1822] RAX: db0a3a3902362d00 RBX: ffff888121e4e000 RCX: 0000000000040000 [ 52.935270][ T1822] RDX: ffffc90002d53000 RSI: 000000000000092a RDI: 000000000000092b [ 53.145514][ T1822] RBP: ffffc90000f16fd0 R08: ffffffff81521b78 R09: ffffed103ee2a5f8 [ 53.246914][ T1822] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 53.274735][ T1822] R13: 1ffff92000019a04 R14: ffff888111f78000 R15: ffffc900000cd020 [ 53.317966][ T1822] FS: 00007f3196fa26c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 53.326716][ T1822] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 53.333388][ T1822] CR2: 0000000000000000 CR3: 0000000112780000 CR4: 00000000003506a0 [ 53.351699][ T1822] DR0: 0000000020000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 53.444715][ T1822] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 53.557166][ T1822] Call Trace: [ 53.560290][ T1822] ? show_regs+0x58/0x60 [ 53.584782][ T1822] ? __warn+0x160/0x2f0 [ 53.594863][ T1822] ? check_map_prog_compatibility+0x65b/0x7c0 [ 53.604943][ T1822] ? report_bug+0x3d9/0x5b0 [ 53.613892][ T1822] ? check_map_prog_compatibility+0x65b/0x7c0 [ 53.626822][ T1822] ? handle_bug+0x41/0x70 [ 53.636964][ T1822] ? exc_invalid_op+0x1b/0x50 [ 53.646942][ T1822] ? asm_exc_invalid_op+0x12/0x20 [ 53.657030][ T1822] ? wake_up_klogd+0xb8/0xf0 [ 53.661429][ T1822] ? check_map_prog_compatibility+0x65b/0x7c0 [ 53.676818][ T1822] ? __fdget+0x1bc/0x240 [ 53.686951][ T1822] resolve_pseudo_ldimm64+0x586/0x1020 [ 53.696940][ T1822] ? bpf_check+0xf2b0/0xf2b0 [ 53.701333][ T1822] ? kvmalloc_node+0x82/0x130 [ 53.715986][ T1822] bpf_check+0xaf21/0xf2b0 [ 53.721156][ T1822] ? stack_depot_save+0xe/0x10 [ 53.725729][ T1822] ? __se_sys_bpf+0x9856/0x11cb0 [ 53.740667][ T1822] ? sched_clock+0x3a/0x40 [ 53.744895][ T1822] ? 0xffffffffa00287ac [ 53.760830][ T1822] ? bpf_get_btf_vmlinux+0x60/0x60 [ 53.765749][ T1822] ? __kernel_text_address+0x9b/0x110 [ 53.781293][ T1822] ? unwind_get_return_address+0x4d/0x90 [ 53.791369][ T1822] ? arch_stack_walk+0xf3/0x140 [ 53.796031][ T1822] ? stack_trace_save+0x113/0x1c0 [ 53.811481][ T1822] ? stack_trace_snprint+0xf0/0xf0 [ 53.816476][ T1822] ? stack_trace_snprint+0xf0/0xf0 [ 53.821752][ T1822] ? selinux_bpf_prog_alloc+0x51/0x140 [ 53.827278][ T1822] ? selinux_bpf_prog_alloc+0x51/0x140 [ 53.832580][ T1822] ? ____kasan_kmalloc+0xed/0x110 [ 53.837632][ T1822] ? ____kasan_kmalloc+0xdb/0x110 [ 53.842456][ T1822] ? __kasan_kmalloc+0x9/0x10 [ 53.847334][ T1822] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 53.852743][ T1822] ? selinux_bpf_prog_alloc+0x51/0x140 [ 53.858274][ T1822] ? security_bpf_prog_alloc+0x62/0x90 [ 53.863592][ T1822] ? __se_sys_bpf+0x9f8c/0x11cb0 [ 53.868511][ T1822] ? __x64_sys_bpf+0x7b/0x90 [ 53.872899][ T1822] ? do_syscall_64+0x34/0x70 [ 53.877556][ T1822] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 53.883474][ T1822] ? __kasan_kmalloc+0x9/0x10 [ 53.888191][ T1822] __se_sys_bpf+0x107a2/0x11cb0 [ 53.892849][ T1822] ? __kasan_check_write+0x14/0x20 [ 53.897530][ T1875] device syzkaller0 entered promiscuous mode [ 53.898043][ T1822] ? __x64_sys_bpf+0x90/0x90 [ 53.908061][ T1822] ? futex_wake+0x630/0x790 [ 53.912436][ T1822] ? nlmsg_notify+0x161/0x1c0 [ 53.916923][ T1822] ? do_futex+0x13c5/0x17b0 [ 53.921223][ T1822] ? __rtnl_unlock+0x77/0x80 [ 53.925686][ T1822] ? netdev_run_todo+0xd5a/0xdc0 [ 53.930446][ T1822] ? netdev_refcnt_read+0x1e0/0x1e0 [ 53.935677][ T1822] ? futex_exit_release+0x1e0/0x1e0 [ 53.940749][ T1822] ? check_stack_object+0xf4/0x130 [ 53.945709][ T1822] ? __kasan_check_read+0x11/0x20 [ 53.950512][ T1822] ? rtnl_unlock+0xe/0x10 [ 53.954769][ T1822] ? __tun_chr_ioctl+0xae9/0x2260 [ 53.959545][ T1822] ? __se_sys_futex+0x355/0x470 [ 53.964280][ T1822] ? __fget_files+0x31e/0x380 [ 53.968900][ T1822] ? fpu__clear_all+0x20/0x20 [ 53.973384][ T1822] ? __kasan_check_read+0x11/0x20 [ 53.978510][ T1822] __x64_sys_bpf+0x7b/0x90 [ 53.982728][ T1822] do_syscall_64+0x34/0x70 [ 53.987188][ T1822] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 53.992967][ T1822] RIP: 0033:0x7f3198322299 [ 53.997321][ T1822] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 54.017053][ T1822] RSP: 002b:00007f3196fa2048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 54.025368][ T1822] RAX: ffffffffffffffda RBX: 00007f31984b0f80 RCX: 00007f3198322299 [ 54.033487][ T1822] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 54.041580][ T1822] RBP: 00007f319838f8e6 R08: 0000000000000000 R09: 0000000000000000 [ 54.049621][ T1822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 54.057539][ T1822] R13: 000000000000000b R14: 00007f31984b0f80 R15: 00007ffea1dddeb8 [ 54.065414][ T1822] ---[ end trace 7c19c427ff590e9e ]--- [ 58.122867][ T24] audit: type=1400 audit(1722094311.469:140): avc: denied { create } for pid=2067 comm="syz.3.469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 58.207516][ T2088] device veth1_macvtap entered promiscuous mode [ 58.219272][ T2088] device macsec0 entered promiscuous mode [ 58.251978][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 58.591898][ T2124] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 58.604257][ T2124] syzkaller0: linktype set to 65535 [ 59.413852][ T2188] syz.3.491[2188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.413902][ T2188] syz.3.491[2188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.679088][ T2232] device sit0 left promiscuous mode [ 60.703562][ T2237] device sit0 entered promiscuous mode [ 60.796102][ T2238] device pim6reg1 entered promiscuous mode [ 60.952771][ T2264] device syzkaller0 entered promiscuous mode [ 61.803780][ T24] audit: type=1400 audit(1722094315.149:141): avc: denied { create } for pid=2322 comm="syz.1.527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 61.831345][ T2312] device syzkaller0 entered promiscuous mode [ 62.367741][ T24] audit: type=1400 audit(1722094315.719:142): avc: denied { ioctl } for pid=2346 comm="syz.1.536" path="cgroup:[4026532283]" dev="nsfs" ino=4026532283 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 62.592707][ T24] audit: type=1400 audit(1722094315.939:143): avc: denied { create } for pid=2350 comm="syz.3.537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 62.701208][ T24] audit: type=1400 audit(1722094316.049:144): avc: denied { append } for pid=2355 comm="syz.1.538" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 63.282242][ T2390] device syzkaller0 entered promiscuous mode [ 63.369241][ T2398] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.376261][ T2398] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.090379][ T2416] device syzkaller0 entered promiscuous mode [ 64.282050][ T2447] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.289025][ T2447] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.322715][ T2447] device bridge_slave_1 left promiscuous mode [ 64.367467][ T2447] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.375036][ T2447] device bridge_slave_0 left promiscuous mode [ 64.465921][ T2447] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.750155][ T2474] syz.1.569[2474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.750230][ T2474] syz.1.569[2474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.822562][ T2498] device syzkaller0 entered promiscuous mode [ 65.925440][ T2517] syz.3.581[2517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.925489][ T2517] syz.3.581[2517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.047869][ T2560] device sit0 left promiscuous mode [ 67.540155][ T2581] device syzkaller0 entered promiscuous mode [ 68.715999][ T2609] device syzkaller0 entered promiscuous mode [ 70.923910][ T2659] device sit0 entered promiscuous mode [ 71.256635][ T2671] device syzkaller0 entered promiscuous mode [ 73.051377][ T2708] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.086447][ T2708] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.109471][ T2708] device bridge_slave_0 entered promiscuous mode [ 73.116743][ T2708] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.125067][ T2708] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.133317][ T2708] device bridge_slave_1 entered promiscuous mode [ 73.982437][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.010155][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.084001][ T339] device bridge_slave_1 left promiscuous mode [ 74.091737][ T339] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.101318][ T339] device bridge_slave_0 left promiscuous mode [ 74.111122][ T339] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.133426][ T339] device veth1_macvtap left promiscuous mode [ 74.210085][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.218281][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.226231][ T408] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.233066][ T408] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.240466][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 74.249146][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.257126][ T408] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.263942][ T408] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.271145][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 74.279115][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 74.286876][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 74.343774][ T2781] device syzkaller0 entered promiscuous mode [ 74.353208][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 74.361625][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 74.418087][ T2708] device veth0_vlan entered promiscuous mode [ 74.470138][ T717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 74.478300][ T717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 74.567219][ T717] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 74.574495][ T717] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 74.637656][ T2708] device veth1_macvtap entered promiscuous mode [ 74.702083][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 74.738465][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 74.796365][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 74.970309][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 75.057159][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 75.153950][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 75.170601][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 75.242185][ T24] audit: type=1400 audit(1722094328.579:145): avc: denied { mounton } for pid=2708 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=357 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 75.515027][ T2810] device syzkaller0 entered promiscuous mode [ 76.601363][ T2865] device pim6reg1 entered promiscuous mode [ 76.721466][ T2887] device wg2 entered promiscuous mode [ 76.998722][ T2904] device pim6reg1 entered promiscuous mode [ 78.012637][ T2940] device pim6reg1 entered promiscuous mode [ 78.131299][ T24] audit: type=1400 audit(1722094331.479:146): avc: denied { create } for pid=2946 comm="syz.1.691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 78.188119][ T2949] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.195053][ T2949] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.007528][ T24] audit: type=1400 audit(1722094332.359:147): avc: denied { create } for pid=2981 comm="syz.2.701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 79.246128][ T2969] device syzkaller0 entered promiscuous mode [ 81.371332][ T3077] device wg2 entered promiscuous mode [ 83.195566][ T3125] ¯Ê®¸}p: renamed from pim6reg1 [ 85.221759][ T3171] device pim6reg1 entered promiscuous mode [ 85.785250][ T24] audit: type=1400 audit(1722094339.129:148): avc: denied { create } for pid=3241 comm="syz.2.771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 86.869295][ T3294] device syzkaller0 entered promiscuous mode [ 86.911419][ T24] audit: type=1400 audit(1722094340.259:149): avc: denied { create } for pid=3298 comm="syz.2.788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 86.966769][ T3304] syz.2.790[3304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.968263][ T3304] syz.2.790[3304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.991345][ T3295] device syzkaller0 entered promiscuous mode [ 87.019689][ T3300] device syzkaller0 entered promiscuous mode [ 87.375902][ T3348] device pim6reg1 entered promiscuous mode [ 87.395547][ T3350] syz.0.805[3350] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.395592][ T3350] syz.0.805[3350] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.458154][ T3350] syz.0.805[3350] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.496937][ T3350] syz.0.805[3350] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.588332][ T3364] bridge0: port 3(veth0_to_batadv) entered blocking state [ 87.717833][ T3364] bridge0: port 3(veth0_to_batadv) entered disabled state [ 87.771216][ T3364] device veth0_to_batadv entered promiscuous mode [ 87.823186][ T3364] bridge0: port 3(veth0_to_batadv) entered blocking state [ 87.830137][ T3364] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 88.221422][ T3396] syz.1.817[3396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.221480][ T3396] syz.1.817[3396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.457224][ T3410] device lo entered promiscuous mode [ 89.437864][ T24] audit: type=1400 audit(1722094342.789:150): avc: denied { create } for pid=3444 comm="syz.4.829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 89.550921][ T3445] device sit0 left promiscuous mode [ 90.078241][ T24] audit: type=1400 audit(1722094343.429:151): avc: denied { create } for pid=3508 comm="syz.4.850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 90.650854][ T3540] device veth1_macvtap left promiscuous mode [ 90.657130][ T3540] device macsec0 left promiscuous mode [ 91.128639][ T3569] device veth0_vlan left promiscuous mode [ 91.236809][ T3569] device veth0_vlan entered promiscuous mode [ 91.563687][ T3260] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 91.577112][ T3260] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 91.600609][ T3260] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 91.710448][ T3604] device team_slave_1 entered promiscuous mode [ 91.723106][ T3260] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 91.738712][ T3260] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 92.898048][ T3660] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 93.003472][ T3673] device pim6reg1 entered promiscuous mode [ 93.138096][ T3699] device syzkaller0 entered promiscuous mode [ 93.563212][ T3759] device pim6reg1 entered promiscuous mode [ 93.627893][ T94] udevd[94]: worker [547] terminated by signal 33 (Unknown signal 33) [ 93.643791][ T94] udevd[94]: worker [547] failed while handling '/devices/virtual/block/loop0' [ 93.834137][ T3789] device macsec0 entered promiscuous mode [ 94.197879][ T3819] device vxcan1 entered promiscuous mode [ 94.630244][ T3884] device wg2 left promiscuous mode [ 94.792905][ T3896] tap1: tun_chr_ioctl cmd 1074025677 [ 94.799693][ T3896] tap1: linktype set to 821 [ 95.373897][ T3926] syz.1.959[3926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.373946][ T3926] syz.1.959[3926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.491709][ T3941] device pim6reg1 entered promiscuous mode [ 96.271653][ T3989] syz.2.976[3989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.279817][ T3989] syz.2.976[3989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.356596][ T3998] device syzkaller0 entered promiscuous mode [ 96.628924][ T4023] device pim6reg1 entered promiscuous mode [ 96.852816][ T4018] bridge0: port 3(veth0_vlan) entered blocking state [ 96.860878][ T4018] bridge0: port 3(veth0_vlan) entered disabled state [ 97.132243][ T4051] device syzkaller0 entered promiscuous mode [ 98.328780][ T24] audit: type=1400 audit(1722094351.679:152): avc: denied { create } for pid=4110 comm="syz.0.1009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 99.519947][ T4146] device pim6reg1 entered promiscuous mode [ 103.332520][ T4246] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.420013][ T4246] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.459714][ T4246] device bridge_slave_0 entered promiscuous mode [ 103.466514][ T4246] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.571936][ T4246] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.579174][ T4246] device bridge_slave_1 entered promiscuous mode [ 103.683395][ T4262] syz.2.1049[4262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.683464][ T4262] syz.2.1049[4262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.739657][ T4246] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.757623][ T4246] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.764693][ T4246] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.771512][ T4246] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.808021][ T4265] device pim6reg1 entered promiscuous mode [ 103.826384][ T697] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 103.842468][ T697] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 103.863839][ T697] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 103.871618][ T697] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 103.882673][ T697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 103.890588][ T697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 103.909795][ T4293] device veth1_macvtap left promiscuous mode [ 103.915629][ T4293] device macsec0 left promiscuous mode [ 103.945521][ T4246] device veth0_vlan entered promiscuous mode [ 103.951679][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 103.961680][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.969705][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 103.977175][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 103.985023][ T4293] device veth1_macvtap entered promiscuous mode [ 103.991251][ T4293] device macsec0 entered promiscuous mode [ 104.008414][ T1863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 104.016854][ T4246] device veth1_macvtap entered promiscuous mode [ 104.027287][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 104.044324][ T1863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 104.268676][ T4322] bridge0: port 3(veth0_to_batadv) entered blocking state [ 104.275761][ T4322] bridge0: port 3(veth0_to_batadv) entered disabled state [ 104.301513][ T4322] device veth0_to_batadv entered promiscuous mode [ 104.350851][ T4340] device pim6reg1 entered promiscuous mode [ 104.563933][ T4375] device team_slave_1 entered promiscuous mode [ 104.583032][ T1863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 104.600454][ T1863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 105.113412][ T4445] device syzkaller0 entered promiscuous mode [ 107.397742][ T4516] device syzkaller0 entered promiscuous mode [ 109.440659][ T4587] syz.3.1128[4587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.440706][ T4587] syz.3.1128[4587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.763019][ T4590] device syzkaller0 entered promiscuous mode [ 114.425521][ T4774] device sit0 left promiscuous mode [ 114.444865][ T4777] device sit0 entered promiscuous mode [ 114.754491][ T4814] device sit0 left promiscuous mode [ 114.895102][ T4824] device veth0_to_batadv left promiscuous mode [ 114.901396][ T4824] bridge0: port 3(veth0_to_batadv) entered disabled state [ 114.908838][ T4816] device sit0 entered promiscuous mode [ 115.126864][ T24] audit: type=1400 audit(1722094368.459:153): avc: denied { create } for pid=4841 comm="syz.4.1194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 115.232998][ T4835] device syzkaller0 entered promiscuous mode [ 117.172753][ T4891] syz.4.1211 uses obsolete (PF_INET,SOCK_PACKET) [ 117.275992][ T4897] device veth0_vlan left promiscuous mode [ 117.284529][ T4897] device veth0_vlan entered promiscuous mode [ 117.326649][ T4899] device veth1_macvtap left promiscuous mode [ 117.332653][ T4899] device macsec0 left promiscuous mode [ 117.584245][ T4933] device macsec0 entered promiscuous mode [ 119.457917][ T5008] syz.2.1245[5008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.457960][ T5008] syz.2.1245[5008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.471456][ T5008] syz.2.1245[5008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.482902][ T5008] syz.2.1245[5008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.537310][ T5008] syz.2.1245[5008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.569205][ T5008] syz.2.1245[5008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.692686][ T5029] syz.1.1255[5029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.708370][ T5029] syz.1.1255[5029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.528767][ T5054] device pim6reg1 entered promiscuous mode [ 120.766747][ T5077] tap0: tun_chr_ioctl cmd 1074025677 [ 120.772310][ T5077] tap0: linktype set to 512 [ 120.888727][ T5114] device wg2 entered promiscuous mode [ 121.959925][ T5200] device macsec0 left promiscuous mode [ 124.343569][ T5266] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.350617][ T5266] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.360256][ T5266] device bridge_slave_1 left promiscuous mode [ 124.366307][ T5266] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.374056][ T5266] device bridge_slave_0 left promiscuous mode [ 124.380199][ T5266] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.225604][ T5305] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.287516][ T5305] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.354289][ T5305] device bridge_slave_0 entered promiscuous mode [ 125.433931][ T5305] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.498972][ T5305] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.572229][ T5305] device bridge_slave_1 entered promiscuous mode [ 126.120907][ T697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 126.134451][ T697] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 126.218836][ T697] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 126.358964][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 126.372283][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 126.397292][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 126.412294][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 126.430600][ T5145] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.437459][ T5145] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.464643][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 126.485183][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 126.504308][ T5145] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.511164][ T5145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.519131][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 126.534469][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 126.564871][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 126.582360][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 126.716274][ T5305] device veth0_vlan entered promiscuous mode [ 126.730288][ T5305] device veth1_macvtap entered promiscuous mode [ 126.740108][ T5142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 126.749440][ T5142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 126.769018][ T5142] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 126.776327][ T5142] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 126.783783][ T5142] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 126.792397][ T5142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 126.800734][ T5142] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 126.809409][ T5142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 126.889924][ T5383] syz.1.1347[5383] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.889966][ T5383] syz.1.1347[5383] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.903773][ T5385] syz.1.1347[5385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.917627][ T5385] syz.1.1347[5385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.344576][ T5431] device syzkaller0 entered promiscuous mode [ 127.653823][ T5442] tap0: tun_chr_ioctl cmd 1074025677 [ 127.778183][ T5442] tap0: linktype set to 776 [ 128.378514][ T5440] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.412581][ T5440] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.420055][ T5440] device bridge_slave_0 entered promiscuous mode [ 128.442695][ T5440] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.454405][ T5440] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.494228][ T5440] device bridge_slave_1 entered promiscuous mode [ 128.920077][ T5440] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.926953][ T5440] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.934032][ T5440] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.940826][ T5440] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.021715][ T5147] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.037010][ T5147] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.087731][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 129.107070][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 129.180645][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.247615][ T5147] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.254487][ T5147] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.369607][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.422711][ T5147] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.429571][ T5147] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.526597][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 129.610074][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 129.741933][ T5440] device veth0_vlan entered promiscuous mode [ 129.885848][ T5144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 129.925897][ T5144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 130.005680][ T5144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 130.072612][ T5144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.155954][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 130.174910][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 130.191147][ T5440] device veth1_macvtap entered promiscuous mode [ 130.254829][ T1857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 130.264992][ T1857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 130.283306][ T1857] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 130.320997][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 130.333116][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 130.346131][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 130.354327][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 130.599587][ T24] audit: type=1400 audit(1722094383.949:154): avc: denied { remove_name } for pid=76 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 130.622403][ T24] audit: type=1400 audit(1722094383.949:155): avc: denied { rename } for pid=76 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 130.847676][ T5566] device sit0 entered promiscuous mode [ 131.672410][ T5578] device pim6reg1 entered promiscuous mode [ 132.310304][ T5597] device sit0 entered promiscuous mode [ 132.706147][ T24] audit: type=1400 audit(1722094386.049:156): avc: denied { write } for pid=5613 comm="syz.2.1406" name="cgroup.subtree_control" dev="cgroup2" ino=322 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 132.940309][ T24] audit: type=1400 audit(1722094386.099:157): avc: denied { open } for pid=5613 comm="syz.2.1406" path="" dev="cgroup2" ino=322 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 133.291957][ T5628] sock: sock_set_timeout: `syz.4.1414' (pid 5628) tries to set negative timeout [ 134.228072][ T5677] device syzkaller0 entered promiscuous mode [ 135.114937][ T5705] device syzkaller0 entered promiscuous mode [ 135.631868][ T5744] device pim6reg1 entered promiscuous mode [ 136.378488][ T5862] ªªªªªª: renamed from vlan0 [ 136.547358][ T5874] device team_slave_1 entered promiscuous mode [ 136.558982][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 136.577497][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 137.254946][ T5938] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.261944][ T5938] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.271027][ T5938] device bridge_slave_1 left promiscuous mode [ 137.277375][ T5938] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.284916][ T5938] device bridge_slave_0 left promiscuous mode [ 137.291288][ T5938] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.730618][ T5981] device syzkaller0 entered promiscuous mode [ 137.737502][ T20] syzkaller0: tun_net_xmit 48 [ 137.785061][ T5981] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 137.799999][ T24] audit: type=1400 audit(1722094391.149:158): avc: denied { create } for pid=5980 comm="syz.0.1503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 137.844781][ T5985] device syzkaller0 entered promiscuous mode [ 137.897053][ T5981] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 137.902686][ T5981] syzkaller0: Linktype set failed because interface is up [ 137.957141][ T5989] rose0: tun_chr_ioctl cmd 1074812118 [ 137.975989][ T5981] syzkaller0: tun_net_xmit 1280 [ 138.113806][ T6003] device sit0 left promiscuous mode [ 138.180455][ T6001] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.189443][ T6001] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.206447][ T6001] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.213624][ T6001] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.349674][ T6001] device bridge0 entered promiscuous mode [ 138.709434][ T6005] device sit0 entered promiscuous mode [ 138.832793][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 139.624240][ T6034] device syzkaller0 entered promiscuous mode [ 139.805662][ T6045] device syzkaller0 entered promiscuous mode [ 140.119543][ T6071] device veth0_to_team entered promiscuous mode [ 140.300575][ T6097] -÷Š: renamed from syzkaller0 [ 140.524539][ T6132] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.531520][ T6132] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.618194][ T6132] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.625094][ T6132] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.644185][ T6132] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.653182][ T6132] bridge0: port 1(bridge_slave_0) entered forwarding state [ 140.914159][ T6132] device bridge0 entered promiscuous mode [ 143.543569][ T286] cgroup: fork rejected by pids controller in /syz1 [ 144.002982][ T6297] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.009897][ T6297] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.017191][ T6297] device bridge_slave_0 entered promiscuous mode [ 144.024014][ T6297] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.031007][ T6297] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.038334][ T6297] device bridge_slave_1 entered promiscuous mode [ 144.145157][ T6297] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.152034][ T6297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.159113][ T6297] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.165886][ T6297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.223418][ T5134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 144.231057][ T5134] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.238356][ T5134] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.270653][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.278809][ T5135] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.285648][ T5135] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.293664][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.301719][ T5135] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.308561][ T5135] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.315676][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 144.323363][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 144.500436][ T6297] device veth0_vlan entered promiscuous mode [ 144.513780][ T6297] device veth1_macvtap entered promiscuous mode [ 144.521499][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 144.530011][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 144.538187][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 144.546576][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 144.554314][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 144.634475][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 144.647372][ T5134] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 144.655280][ T5134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 144.688715][ T6317] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.695773][ T6317] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.705236][ T6317] device bridge_slave_0 entered promiscuous mode [ 144.724139][ T6317] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.730997][ T6317] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.738373][ T6317] device bridge_slave_1 entered promiscuous mode [ 144.760046][ T6331] device syzkaller0 entered promiscuous mode [ 144.816353][ T6317] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.823224][ T6317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.830302][ T6317] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.837096][ T6317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.859835][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 144.867967][ T5135] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.874919][ T5135] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.893470][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.901772][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.908623][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.939379][ T5134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.947456][ T5134] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.954282][ T5134] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.961537][ T5134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 144.970626][ T5134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 144.985182][ T4091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 144.996255][ T6317] device veth0_vlan entered promiscuous mode [ 145.003390][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 145.011708][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 145.019074][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 145.034743][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 145.046114][ T6317] device veth1_macvtap entered promiscuous mode [ 145.056976][ T1857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 145.065108][ T1857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 145.139412][ T6356] syz.1.1599[6356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.139453][ T6356] syz.1.1599[6356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.484958][ T7] bridge0: port 3(veth0_vlan) entered disabled state [ 145.506084][ T7] device bridge_slave_1 left promiscuous mode [ 145.512335][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.519779][ T7] device bridge_slave_0 left promiscuous mode [ 145.525709][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.534155][ T7] device veth1_macvtap left promiscuous mode [ 145.540267][ T7] device veth0_vlan left promiscuous mode [ 145.787738][ T6361] device sit0 entered promiscuous mode [ 146.399100][ T6369] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.406053][ T6369] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.693709][ T6393] bridge0: port 3(veth0_to_batadv) entered blocking state [ 146.718904][ T6393] bridge0: port 3(veth0_to_batadv) entered disabled state [ 146.784893][ T6393] device veth0_to_batadv entered promiscuous mode [ 146.801929][ T6393] bridge0: port 3(veth0_to_batadv) entered blocking state [ 146.810041][ T6393] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 147.166313][ T6412] syz.2.1614[6412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.166356][ T6412] syz.2.1614[6412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.243013][ T6448] bridge0: port 3(veth0_to_batadv) entered disabled state [ 148.261081][ T6448] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.268015][ T6448] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.734595][ T6499] syz.0.1636[6499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.734625][ T6499] syz.0.1636[6499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.824253][ T6502] syz.0.1637[6502] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.835608][ T6502] syz.0.1637[6502] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.198919][ T6572] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 149.293386][ T6587] device veth1_macvtap entered promiscuous mode [ 149.299583][ T6587] device macsec0 entered promiscuous mode [ 149.305912][ T5144] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 149.569633][ T6605] device sit0 entered promiscuous mode [ 150.007512][ T6646] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 150.142250][ T6664] device syzkaller0 entered promiscuous mode [ 150.565691][ T6688] device syzkaller0 entered promiscuous mode [ 150.737958][ T6702] device vxcan1 entered promiscuous mode [ 150.799740][ T6702] device pim6reg1 entered promiscuous mode [ 150.926927][ T6727] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 151.012689][ T6737] bridge_slave_0: mtu greater than device maximum [ 151.058945][ T6747] device syzkaller0 entered promiscuous mode [ 152.082145][ T6813] device pim6reg1 entered promiscuous mode [ 154.402847][ T6884] device pim6reg1 entered promiscuous mode [ 154.941336][ T6888] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.948591][ T6888] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.966209][ T6888] device bridge_slave_0 entered promiscuous mode [ 154.977565][ T6888] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.012543][ T6888] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.020134][ T6888] device bridge_slave_1 entered promiscuous mode [ 155.027692][ T6913] device pim6reg1 entered promiscuous mode [ 155.034048][ T6917] device sit0 left promiscuous mode [ 155.610783][ T6888] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.617640][ T6888] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.624713][ T6888] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.631537][ T6888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.240621][ T464] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.258625][ T464] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.429430][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.456280][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.568362][ T6928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 156.608450][ T6928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.616435][ T6928] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.623286][ T6928] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.827227][ T6928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 156.835382][ T6928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.934758][ T6928] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.941626][ T6928] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.971130][ T6928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 156.987297][ T6928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 157.005209][ T6928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 157.059788][ T6928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.315302][ T6888] device veth0_vlan entered promiscuous mode [ 157.357754][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 157.368094][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 157.381872][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 157.389758][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 157.504209][ T6923] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 157.534182][ T6923] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 157.592851][ T6992] device syzkaller0 entered promiscuous mode [ 157.617708][ T5098] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 157.625678][ T5098] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 157.634852][ T6888] device veth1_macvtap entered promiscuous mode [ 157.644937][ T5098] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 157.658828][ T5098] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 157.675831][ T5098] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 157.703916][ T5092] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 157.713887][ T5092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 157.785002][ T7029] device sit0 left promiscuous mode [ 159.231890][ T7104] device pim6reg1 entered promiscuous mode [ 162.549218][ T7255] device vxcan1 entered promiscuous mode [ 163.559570][ T7313] device syzkaller0 entered promiscuous mode [ 164.535500][ T7355] device syzkaller0 entered promiscuous mode [ 165.116698][ T7417] device pim6reg1 entered promiscuous mode [ 165.460670][ T7430] device veth0_to_batadv left promiscuous mode [ 165.473127][ T7430] bridge0: port 3(veth0_to_batadv) entered disabled state [ 165.506257][ T7436] device syzkaller0 entered promiscuous mode [ 166.279045][ T7486] device sit0 left promiscuous mode [ 166.344887][ T7490] device sit0 entered promiscuous mode [ 167.372374][ T7516] device syzkaller0 entered promiscuous mode [ 167.487505][ T7567] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.494377][ T7567] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.501481][ T7567] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.508253][ T7567] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.515980][ T7567] device bridge0 entered promiscuous mode [ 167.522310][ T7337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.851236][ T7576] device syzkaller0 entered promiscuous mode [ 168.176915][ T7598] device sit0 left promiscuous mode [ 168.413556][ T7605] device veth0_vlan left promiscuous mode [ 168.511869][ T7605] device veth0_vlan entered promiscuous mode [ 168.821685][ T7598] device sit0 entered promiscuous mode [ 168.837277][ T7612] device veth1_macvtap left promiscuous mode [ 169.986151][ T7694] device veth0_vlan left promiscuous mode [ 170.165076][ T7694] device veth0_vlan entered promiscuous mode [ 171.245346][ T7796] device sit0 left promiscuous mode [ 171.915372][ T24] audit: type=1400 audit(1722094425.259:159): avc: denied { append } for pid=76 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 171.957988][ T24] audit: type=1400 audit(1722094425.259:160): avc: denied { open } for pid=76 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 171.983746][ T24] audit: type=1400 audit(1722094425.259:161): avc: denied { getattr } for pid=76 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 172.066055][ T7850] device syzkaller0 entered promiscuous mode [ 173.297623][ T7930] syz.3.2006[7930] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.297674][ T7930] syz.3.2006[7930] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.331718][ T7961] device veth0_vlan left promiscuous mode [ 174.350964][ T7961] device veth0_vlan entered promiscuous mode [ 175.399459][ T8059] bridge0: port 3(gretap0) entered blocking state [ 175.526230][ T8059] bridge0: port 3(gretap0) entered disabled state [ 175.542195][ T8059] device gretap0 entered promiscuous mode [ 175.617181][ T8059] bridge0: port 3(gretap0) entered blocking state [ 175.623426][ T8059] bridge0: port 3(gretap0) entered forwarding state [ 175.835982][ T8071] device syzkaller0 entered promiscuous mode [ 178.273579][ T8159] device veth1_macvtap entered promiscuous mode [ 178.279748][ T8159] device macsec0 entered promiscuous mode [ 178.418843][ T5146] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 178.465470][ T8182] syz.4.2074[8182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.465543][ T8182] syz.4.2074[8182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.613512][ T8182] syz.4.2074[8182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.681713][ T8182] syz.4.2074[8182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.318929][ T8207] tap0: tun_chr_ioctl cmd 1074025677 [ 179.335180][ T8207] tap0: linktype set to 804 [ 180.074669][ T8245] device pim6reg1 entered promiscuous mode [ 180.127180][ T24] audit: type=1400 audit(1722094433.479:162): avc: denied { create } for pid=8251 comm="syz.0.2092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 181.016488][ T8277] device syzkaller0 entered promiscuous mode [ 181.664624][ T8314] device syzkaller0 entered promiscuous mode [ 182.005744][ T8317] tap0: tun_chr_ioctl cmd 1074025677 [ 182.010921][ T8317] tap0: linktype set to 821 [ 182.056242][ T8318] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.063172][ T8318] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.070882][ T8318] device bridge_slave_0 entered promiscuous mode [ 182.087580][ T8318] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.094501][ T8318] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.102095][ T8318] device bridge_slave_1 entered promiscuous mode [ 182.260546][ T8318] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.267427][ T8318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.274502][ T8318] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.281299][ T8318] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.555142][ T7338] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.572601][ T7338] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.665001][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.673192][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.695349][ T5116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.703589][ T5116] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.712263][ T5116] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.719129][ T5116] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.726661][ T5116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.735488][ T5116] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.743832][ T5116] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.750686][ T5116] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.786528][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 182.836288][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.901452][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 182.931780][ T5091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.955270][ T8318] device veth0_vlan entered promiscuous mode [ 182.991413][ T8383] device pim6reg1 entered promiscuous mode [ 183.021655][ T5116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 183.074670][ T5116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 183.082917][ T5116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 183.090657][ T5116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.098897][ T5116] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 183.106126][ T5116] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 183.120259][ T8318] device veth1_macvtap entered promiscuous mode [ 183.187405][ T7341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 183.207252][ T7341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 183.215487][ T7341] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 183.271280][ T5116] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 183.304921][ T5116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 183.316576][ T5116] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 183.327501][ T5116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 183.522889][ T8424] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.530041][ T8424] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.023553][ T471] device veth1_macvtap left promiscuous mode [ 184.047734][ T471] device veth0_vlan left promiscuous mode [ 184.235427][ T24] audit: type=1400 audit(1722094437.579:163): avc: denied { create } for pid=8448 comm="syz.0.2137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 184.790054][ T8454] syz.0.2138[8454] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.790107][ T8454] syz.0.2138[8454] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.105397][ T8469] syz.0.2138[8469] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.116066][ T8474] tap0: tun_chr_ioctl cmd 1074025677 [ 185.156922][ T8474] tap0: linktype set to 270 [ 185.231566][ T8469] syz.0.2138[8469] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.342747][ T8476] device syzkaller0 entered promiscuous mode [ 188.070720][ T8594] device sit0 entered promiscuous mode [ 188.977886][ T8635] syz.1.2184[8635] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.977966][ T8635] syz.1.2184[8635] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.983573][ T8701] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.013064][ T8701] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.020806][ T8701] device bridge_slave_0 entered promiscuous mode [ 192.168102][ T8701] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.172324][ T8724] syz.0.2208[8724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.174946][ T8701] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.174989][ T8724] syz.0.2208[8724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.197945][ T8701] device bridge_slave_1 entered promiscuous mode [ 192.376927][ T24] audit: type=1400 audit(1722094445.719:164): avc: denied { create } for pid=8725 comm="syz.2.2209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 192.404869][ T8727] device lo entered promiscuous mode [ 193.324724][ T8756] device pim6reg1 entered promiscuous mode [ 193.708039][ T5118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.715321][ T5118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.777512][ T5118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.821462][ T5118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.849207][ T5118] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.856058][ T5118] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.904481][ T5118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.972657][ T5118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.042785][ T5118] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.049667][ T5118] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.073420][ T5118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.105619][ T5118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.141083][ T8701] device veth0_vlan entered promiscuous mode [ 194.194261][ T5118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 194.202509][ T5118] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 194.210092][ T5118] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 194.227028][ T5118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 194.296462][ T5118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 194.601517][ T8701] device veth1_macvtap entered promiscuous mode [ 194.621112][ T5119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 194.633358][ T5119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 194.641653][ T5119] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 194.659558][ T5112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 194.668349][ T5112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 194.696773][ T5118] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 194.707490][ T5118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 194.856450][ T8793] device veth1_macvtap left promiscuous mode [ 194.864632][ T8786] device veth1_macvtap entered promiscuous mode [ 194.871292][ T8786] device macsec0 entered promiscuous mode [ 194.923826][ T8801] device syzkaller0 entered promiscuous mode [ 198.834148][ T8965] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 198.921288][ T8965] device syzkaller0 entered promiscuous mode [ 199.702955][ T8993] device pim6reg1 entered promiscuous mode [ 199.999706][ T9023] device syzkaller0 entered promiscuous mode [ 200.741722][ T9034] device syzkaller0 entered promiscuous mode [ 202.031111][ T9087] device pim6reg1 entered promiscuous mode [ 202.042579][ T9088] device veth0_vlan left promiscuous mode [ 202.049455][ T9088] device veth0_vlan entered promiscuous mode [ 203.517654][ T9139] device syzkaller0 entered promiscuous mode [ 203.895789][ T9166] device pim6reg1 entered promiscuous mode [ 204.355513][ T9185] geneve1: tun_chr_ioctl cmd 1074025677 [ 204.433274][ T9185] geneve1: linktype set to 6 [ 204.524439][ T9181] device pim6reg1 entered promiscuous mode [ 206.254914][ T9221] device syzkaller0 entered promiscuous mode [ 206.273989][ T9227] device syzkaller0 entered promiscuous mode [ 207.083145][ T9270] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.090097][ T9270] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.157390][ T9270] device bridge0 left promiscuous mode [ 207.865512][ T9311] device syzkaller0 entered promiscuous mode [ 211.409688][ T9425] device syzkaller0 entered promiscuous mode [ 212.869888][ T9457] device pim6reg1 entered promiscuous mode [ 213.432352][ T9465] syz.3.2390[9465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.432396][ T9465] syz.3.2390[9465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.172296][ T9531] device syzkaller0 entered promiscuous mode [ 214.923043][ T9581] device pim6reg1 entered promiscuous mode [ 215.870325][ T9615] bridge0: port 3(veth0_to_batadv) entered blocking state [ 215.877660][ T9615] bridge0: port 3(veth0_to_batadv) entered disabled state [ 215.885037][ T9615] device veth0_to_batadv entered promiscuous mode [ 215.901744][ T9619] ¯Ê®¸}p: renamed from pim6reg1 [ 215.943157][ T9611] device veth0_to_batadv left promiscuous mode [ 215.967827][ T9611] bridge0: port 3(veth0_to_batadv) entered disabled state [ 216.318059][ T9622] device syzkaller0 entered promiscuous mode [ 217.742464][ T9730] syz.3.2462[9730] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.742517][ T9730] syz.3.2462[9730] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.330088][ T9851] device sit0 entered promiscuous mode [ 220.963547][ T9861] syz.1.2496[9861] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.963601][ T9861] syz.1.2496[9861] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.231695][ T9867] syz.1.2496[9867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.269680][ T9867] syz.1.2496[9867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.491327][ T9977] bridge0: port 3(veth0_to_batadv) entered blocking state [ 223.617616][ T9977] bridge0: port 3(veth0_to_batadv) entered disabled state [ 223.858389][ T9977] device veth0_to_batadv entered promiscuous mode [ 223.873502][ T9977] bridge0: port 3(veth0_to_batadv) entered blocking state [ 223.881451][ T9977] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 224.073269][ T9980] device veth0_to_batadv left promiscuous mode [ 224.126309][ T9980] bridge0: port 3(veth0_to_batadv) entered disabled state [ 224.398175][T10014] device pim6reg1 entered promiscuous mode [ 224.845298][T10032] cgroup: fork rejected by pids controller in /syz2 [ 226.442377][T10193] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.459854][T10193] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.467657][T10193] device bridge_slave_0 entered promiscuous mode [ 226.474654][T10193] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.481855][T10193] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.489325][T10193] device bridge_slave_1 entered promiscuous mode [ 226.724881][ T24] audit: type=1400 audit(1722094480.069:165): avc: denied { create } for pid=10213 comm="syz.3.2566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 227.065340][T10231] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.072330][T10231] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.216877][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.224145][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.247076][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.255261][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.263324][ T5123] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.270169][ T5123] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.277511][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.285653][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.293680][ T5123] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.300520][ T5123] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.310265][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 227.318248][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 227.326140][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 227.334024][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 227.438806][ T5134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.471537][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 227.515481][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 227.726010][T10236] device syzkaller0 entered promiscuous mode [ 227.854249][T10237] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.862379][T10237] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.874618][T10237] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.882262][T10237] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.891665][T10237] device bridge0 entered promiscuous mode [ 227.912409][T10193] device veth0_vlan entered promiscuous mode [ 227.926287][T10193] device veth1_macvtap entered promiscuous mode [ 227.997050][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 228.004786][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 228.019371][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 228.029884][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 228.051423][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 228.063799][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 228.097398][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 228.187112][ T8961] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 228.195229][ T8961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 228.310506][ T8961] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 228.373350][ T8961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 228.841174][T10318] device sit0 entered promiscuous mode [ 228.980756][ T339] device bridge_slave_1 left promiscuous mode [ 228.989259][ T339] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.002452][ T339] device bridge_slave_0 left promiscuous mode [ 229.009656][T10332] syz.0.2601[10332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.009791][T10332] syz.0.2601[10332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.046398][ T339] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.116345][ T339] device veth1_macvtap left promiscuous mode [ 230.132090][T10385] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.139700][T10385] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.147190][T10385] device bridge_slave_0 entered promiscuous mode [ 230.154118][T10385] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.161174][T10385] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.168691][T10385] device bridge_slave_1 entered promiscuous mode [ 230.233775][T10385] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.240657][T10385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.247746][T10385] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.254506][T10385] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.279101][ T5112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.292284][ T5112] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.305220][ T5112] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.394811][ T5103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.402914][ T5103] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.409765][ T5103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.417570][ T5103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.425978][ T5103] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.432927][ T5103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.441817][T10415] device sit0 left promiscuous mode [ 231.049758][ T5112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.101652][ T5112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.179768][T10385] device veth0_vlan entered promiscuous mode [ 231.251824][ T5116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 231.274808][ T5116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 231.309586][ T5116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 231.356061][ T5116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 231.386708][T10385] device veth1_macvtap entered promiscuous mode [ 231.418152][ T5103] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 231.439524][ T5103] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 231.447511][ T5103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 231.455419][ T5103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 231.463469][ T5103] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 231.581072][ T5098] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 231.593353][ T5098] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 231.601756][ T5098] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 231.610597][ T5098] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 232.067939][ T339] device bridge_slave_1 left promiscuous mode [ 232.074193][ T339] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.084711][ T339] device bridge_slave_0 left promiscuous mode [ 232.103114][ T339] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.338889][T10467] device veth1_macvtap left promiscuous mode [ 232.344733][T10467] device macsec0 entered promiscuous mode [ 235.206952][T10589] device veth0_vlan left promiscuous mode [ 235.265563][T10589] device veth0_vlan entered promiscuous mode [ 235.316246][ T8960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.328625][ T8960] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.346700][ T8960] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 235.806512][T10616] device pim6reg1 entered promiscuous mode [ 236.636845][T10656] device syzkaller0 entered promiscuous mode [ 236.728073][T10655] device syzkaller0 left promiscuous mode [ 237.153172][T10677] syz.3.2694[10677] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.153215][T10677] syz.3.2694[10677] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.664950][T10699] device pim6reg1 entered promiscuous mode [ 238.469365][T10717] device veth0_vlan left promiscuous mode [ 238.590085][T10717] device veth0_vlan entered promiscuous mode [ 240.134345][T10826] syz.0.2730[10826] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.134398][T10826] syz.0.2730[10826] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.198049][T10826] syz.0.2730[10826] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.210224][T10826] syz.0.2730[10826] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.642778][T10939] device syzkaller0 entered promiscuous mode [ 243.642248][T10982] device wg2 entered promiscuous mode [ 244.436745][T11006] device pim6reg1 entered promiscuous mode [ 245.221126][T11034] device pim6reg1 entered promiscuous mode [ 245.814604][T11070] device pim6reg1 entered promiscuous mode [ 246.551891][T11123] bridge0: port 3(vlan1) entered blocking state [ 246.576867][T11123] bridge0: port 3(vlan1) entered disabled state [ 246.584441][T11123] device vlan1 entered promiscuous mode [ 246.716258][T11147] device syzkaller0 entered promiscuous mode [ 246.725931][T11147] device veth0_vlan left promiscuous mode [ 246.731908][T11147] device veth0_vlan entered promiscuous mode [ 246.738580][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.746581][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 246.754489][ T464] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 247.155146][T11161] bridge0: port 3(veth0_to_batadv) entered blocking state [ 247.220651][T11161] bridge0: port 3(veth0_to_batadv) entered disabled state [ 247.257963][T11161] device veth0_to_batadv entered promiscuous mode [ 247.265359][T11161] bridge0: port 3(veth0_to_batadv) entered blocking state [ 247.272349][T11161] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 247.383623][T11170] syz.1.2823[11170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.383812][T11170] syz.1.2823[11170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.633394][T11218] device veth1_to_bond entered promiscuous mode [ 247.687296][T11216] device syzkaller0 entered promiscuous mode [ 247.695715][T11222] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.702815][T11222] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.722501][T11224] bridge0: port 3(veth0_to_batadv) entered blocking state [ 247.730645][T11224] bridge0: port 3(veth0_to_batadv) entered disabled state [ 247.738309][T11224] device veth0_to_batadv entered promiscuous mode [ 247.749400][T11224] device veth0_to_batadv left promiscuous mode [ 247.755500][T11224] bridge0: port 3(veth0_to_batadv) entered disabled state [ 248.346547][T11262] device syzkaller0 entered promiscuous mode [ 250.056340][T11332] device syzkaller0 entered promiscuous mode [ 250.485322][T11354] device syzkaller0 entered promiscuous mode [ 250.689433][T11365] device sit0 entered promiscuous mode [ 251.403437][T11384] device syzkaller0 entered promiscuous mode [ 252.099827][T11445] device wg2 left promiscuous mode [ 252.114255][T11445] device wg2 entered promiscuous mode [ 253.376323][T11487] device syzkaller0 entered promiscuous mode [ 254.929823][T11581] device pim6reg1 entered promiscuous mode [ 255.891336][T11642] device sit0 entered promiscuous mode [ 256.014625][T11654] device syzkaller0 entered promiscuous mode [ 256.295123][T11666] device veth0_vlan left promiscuous mode [ 256.405701][T11666] device veth0_vlan entered promiscuous mode [ 256.432760][T11687] syz.2.2964[11687] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.432810][T11687] syz.2.2964[11687] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.565661][ T5112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 256.595281][ T5112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 256.607654][ T5112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 256.624717][T11695] syz.0.2965[11695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.624759][T11695] syz.0.2965[11695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.980219][T11713] device pim6reg1 entered promiscuous mode [ 257.510891][T11724] device veth0_vlan left promiscuous mode [ 257.672008][T11724] device veth0_vlan entered promiscuous mode [ 258.652468][T11755] device veth0_vlan left promiscuous mode [ 258.669258][T11755] device veth0_vlan entered promiscuous mode [ 258.681108][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 258.698268][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 258.770006][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 260.580175][T11801] device syzkaller0 entered promiscuous mode [ 260.747756][T11803] syzkaller0: refused to change device tx_queue_len [ 261.667329][T11844] device pim6reg1 entered promiscuous mode [ 262.469026][T11927] device pim6reg1 entered promiscuous mode [ 262.690982][T11940] syz.0.3036[11940] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.691036][T11940] syz.0.3036[11940] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.765325][T11947] syz.1.3039[11947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.778670][T11948] syz.1.3039[11948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.790059][T11947] syz.1.3039[11947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.802260][T11948] syz.1.3039[11948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.997995][T11973] syz.2.3046[11973] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.009411][T11973] syz.2.3046[11973] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.048157][T11980] device syzkaller0 entered promiscuous mode [ 263.925993][T12037] device vxcan1 entered promiscuous mode [ 264.004170][T12049] device syzkaller0 entered promiscuous mode [ 264.351712][T12090] tap0: tun_chr_ioctl cmd 1074025678 [ 264.410644][T12090] tap0: group set to 0 [ 264.803745][T12089] device syzkaller0 entered promiscuous mode [ 265.699299][T12129] device syzkaller0 entered promiscuous mode [ 265.758696][T12142] device pim6reg1 entered promiscuous mode [ 265.769236][T12139] device sit0 left promiscuous mode [ 265.790416][T12140] device sit0 entered promiscuous mode [ 265.802124][ T24] audit: type=1400 audit(1722094519.149:166): avc: denied { create } for pid=12138 comm="syz.1.3091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 266.034211][T12168] device veth1_macvtap left promiscuous mode [ 266.040674][T12168] device macsec0 entered promiscuous mode [ 266.053773][T12168] device veth1_macvtap entered promiscuous mode [ 266.064815][T12164] bridge0: port 3(veth0_to_batadv) entered blocking state [ 266.078106][T12164] bridge0: port 3(veth0_to_batadv) entered disabled state [ 266.140917][T12164] device veth0_to_batadv entered promiscuous mode [ 266.159846][T12164] bridge0: port 3(veth0_to_batadv) entered blocking state [ 266.167023][T12164] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 266.258511][T12180] device veth0_vlan left promiscuous mode [ 266.312075][T12180] device veth0_vlan entered promiscuous mode [ 266.341809][ T1863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 266.350547][ T1863] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 266.358177][ T1863] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 266.368229][T12203] device veth0_vlan left promiscuous mode [ 266.374990][T12203] device veth0_vlan entered promiscuous mode [ 266.493139][T12219] device sit0 entered promiscuous mode [ 267.562457][T12261] device syzkaller0 entered promiscuous mode [ 267.945138][T12285] device syzkaller0 entered promiscuous mode [ 268.113343][T12295] device pim6reg1 entered promiscuous mode [ 268.245062][T12310] syz.4.3141[12310] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.245103][T12310] syz.4.3141[12310] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.280463][T12313] device pim6reg1 entered promiscuous mode [ 268.683429][T12351] device syzkaller0 entered promiscuous mode [ 268.721145][T12354] device sit0 left promiscuous mode [ 269.423501][T12372] syz.1.3160[12372] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.423556][T12372] syz.1.3160[12372] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.426672][T12399] device syzkaller0 entered promiscuous mode [ 270.574379][T12414] device pim6reg1 entered promiscuous mode [ 270.618359][T12422] syz.4.3175[12422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.618419][T12422] syz.4.3175[12422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.638791][T12425] syzkaller0: refused to change device tx_queue_len [ 270.658175][T12422] syz.4.3175[12422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.658220][T12422] syz.4.3175[12422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.700776][T12434] syz.2.3179[12434] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.712144][T12434] syz.2.3179[12434] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.793281][T12436] device veth1_macvtap left promiscuous mode [ 271.591684][T12446] device syzkaller0 entered promiscuous mode [ 271.868774][T12479] device pim6reg1 entered promiscuous mode [ 272.416022][T12508] ------------[ cut here ]------------ [ 272.421672][T12508] kernel BUG at kernel/bpf/arraymap.c:977! [ 272.430646][T12508] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 272.436538][T12508] CPU: 1 PID: 12508 Comm: syz.3.3203 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 272.447720][T12508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 272.457654][T12508] RIP: 0010:prog_array_map_poke_run+0x68f/0x6b0 [ 272.463701][T12508] Code: 93 e8 ff eb 05 e8 01 93 e8 ff 48 83 c4 70 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 ed 92 e8 ff 0f 0b e9 de f9 ff ff e8 e1 92 e8 ff <0f> 0b e8 da 92 e8 ff 0f 0b e8 d3 92 e8 ff 0f 0b e8 cc 92 e8 ff 0f [ 272.483133][T12508] RSP: 0018:ffffc900015a7720 EFLAGS: 00010293 [ 272.489030][T12508] RAX: ffffffff8182161f RBX: 00000000fffffff0 RCX: ffff88810edc3b40 [ 272.496841][T12508] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 272.504750][T12508] RBP: ffffc900015a77b8 R08: ffffffff818212c2 R09: fffffbfff0cdd669 [ 272.512569][T12508] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881390dbb00 [ 272.520368][T12508] R13: 0000000000000000 R14: ffff88810aa8b800 R15: dffffc0000000000 [ 272.528182][T12508] FS: 00007f804b7146c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 272.536949][T12508] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 272.543371][T12508] CR2: 00007f804b713fa8 CR3: 000000013bcf0000 CR4: 00000000003506a0 [ 272.551182][T12508] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 272.558993][T12508] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 272.566895][T12508] Call Trace: [ 272.570044][T12508] ? __die_body+0x62/0xb0 [ 272.574189][T12508] ? die+0x88/0xb0 [ 272.577835][T12508] ? do_trap+0x1a4/0x310 [ 272.581918][T12508] ? prog_array_map_poke_run+0x68f/0x6b0 [ 272.587384][T12508] ? handle_invalid_op+0x95/0xc0 [ 272.592157][T12508] ? prog_array_map_poke_run+0x68f/0x6b0 [ 272.597625][T12508] ? exc_invalid_op+0x32/0x50 [ 272.602225][T12508] ? asm_exc_invalid_op+0x12/0x20 [ 272.607086][T12508] ? prog_array_map_poke_run+0x332/0x6b0 [ 272.612650][T12508] ? prog_array_map_poke_run+0x68f/0x6b0 [ 272.618121][T12508] ? prog_array_map_poke_run+0x68f/0x6b0 [ 272.623579][T12508] bpf_fd_array_map_update_elem+0x201/0x310 [ 272.629315][T12508] bpf_map_update_value+0xbc/0x420 [ 272.634250][T12508] __se_sys_bpf+0x7687/0x11cb0 [ 272.638856][T12508] ? __kasan_check_read+0x11/0x20 [ 272.643716][T12508] ? pagevec_add_and_need_flush+0x1fe/0x430 [ 272.649547][T12508] ? __x64_sys_bpf+0x90/0x90 [ 272.654131][T12508] ? __mod_memcg_lruvec_state+0x131/0x310 [ 272.659692][T12508] ? __mod_node_page_state+0xac/0xf0 [ 272.664798][T12508] ? lru_cache_add+0x15e/0x380 [ 272.669478][T12508] ? __lru_cache_add_inactive_or_unevictable+0x37/0x160 [ 272.676255][T12508] ? _raw_spin_unlock+0x4d/0x70 [ 272.680934][T12508] ? handle_pte_fault+0x1472/0x3e30 [ 272.685969][T12508] ? vmf_allows_speculation+0x6f0/0x6f0 [ 272.691354][T12508] ? __kasan_check_write+0x14/0x20 [ 272.696292][T12508] ? put_vma+0x8f/0xb0 [ 272.700199][T12508] ? __handle_speculative_fault+0x10c1/0x1e90 [ 272.706108][T12508] ? finish_fault+0xaf0/0xaf0 [ 272.710619][T12508] ? set_current_blocked+0x40/0x40 [ 272.715739][T12508] ? __kasan_check_write+0x14/0x20 [ 272.720787][T12508] ? __se_sys_rt_sigprocmask+0x30a/0x380 [ 272.726258][T12508] ? debug_smp_processor_id+0x17/0x20 [ 272.731467][T12508] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 272.737383][T12508] ? irqentry_exit_to_user_mode+0x41/0x80 [ 272.742925][T12508] __x64_sys_bpf+0x7b/0x90 [ 272.747174][T12508] do_syscall_64+0x34/0x70 [ 272.751429][T12508] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 272.757154][T12508] RIP: 0033:0x7f804cad6299 [ 272.761509][T12508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 272.780939][T12508] RSP: 002b:00007f804b714048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 272.789182][T12508] RAX: ffffffffffffffda RBX: 00007f804cc65130 RCX: 00007f804cad6299 [ 272.796986][T12508] RDX: 0000000000000020 RSI: 00000000200005c0 RDI: 0000000000000002 [ 272.804802][T12508] RBP: 00007f804cb438e6 R08: 0000000000000000 R09: 0000000000000000 [ 272.812609][T12508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 272.820421][T12508] R13: 000000000000000b R14: 00007f804cc65130 R15: 00007ffd49d94458 [ 272.828244][T12508] Modules linked in: [ 272.897401][T12508] ---[ end trace 7c19c427ff590e9f ]--- [ 272.902708][T12508] RIP: 0010:prog_array_map_poke_run+0x68f/0x6b0 [ 272.918982][T12508] Code: 93 e8 ff eb 05 e8 01 93 e8 ff 48 83 c4 70 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 ed 92 e8 ff 0f 0b e9 de f9 ff ff e8 e1 92 e8 ff <0f> 0b e8 da 92 e8 ff 0f 0b e8 d3 92 e8 ff 0f 0b e8 cc 92 e8 ff 0f [ 272.958468][T12508] RSP: 0018:ffffc900015a7720 EFLAGS: 00010293 [ 272.968671][T12508] RAX: ffffffff8182161f RBX: 00000000fffffff0 RCX: ffff88810edc3b40 [ 272.976477][T12508] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 272.984546][T12508] RBP: ffffc900015a77b8 R08: ffffffff818212c2 R09: fffffbfff0cdd669 [ 272.992754][T12508] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881390dbb00 [ 273.001491][T12508] R13: 0000000000000000 R14: ffff88810aa8b800 R15: dffffc0000000000 [ 273.009845][T12508] FS: 00007f804b7146c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 273.018954][T12508] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 273.025391][T12508] CR2: 00007f804b6f3d58 CR3: 000000013bcf0000 CR4: 00000000003506b0 [ 273.033470][T12508] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 273.041496][T12508] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 273.049522][T12508] Kernel panic - not syncing: Fatal exception [ 273.055607][T12508] Kernel Offset: disabled [ 273.059731][T12508] Rebooting in 86400 seconds..