last executing test programs: 735.134682ms ago: executing program 4 (id=210): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fd1ff7907001175f37538e486dd6317010000003a00db536873f45f08c6feaa70e2aef57b20000000000000000000000000ac1414aa"], 0xfdef) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 424.420021ms ago: executing program 3 (id=227): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) 405.780951ms ago: executing program 0 (id=228): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000880), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x48, 0x0, 0x0, 0x0, 0xffffffffffffff37, 0x0, 0x8, 0x0, 0x0}}, 0x10) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000d00)={r1}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r2, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xffe4, 0xfffffffffffffda0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000f40)=@base={0x2, 0x4, 0x941e, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 405.584251ms ago: executing program 1 (id=229): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="5c00000012006bab9e3fe3d86e6c1d000014a10dfe000000000004b68675f8001d000a00a0e69ee517d34460bc24eab556a705251e6182949a36c23d3b48dfd8cdbf9367b4fa51f60a64c9f4080003000601000004000200110000", 0x5b}, {&(0x7f0000000680)}], 0x2, 0x0, 0x0, 0x1f00c00e}, 0x0) 396.663241ms ago: executing program 2 (id=230): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000001580)=ANY=[], &(0x7f0000000600)=""/217, 0x52, 0xd9, 0x1, 0x7, 0x0, @void, @value}, 0x28) 389.767171ms ago: executing program 3 (id=231): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 362.230351ms ago: executing program 1 (id=232): openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$inet(r1, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x20}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000380), 0xff7a}], 0x1, &(0x7f0000007880)=ANY=[@ANYBLOB="1100000000000000004003000100000000000000000000001c00000000000000000f00fd08000000", @ANYRES32=0x0, @ANYBLOB="ac1414bbe0000001000000001c0000000000000000078f0208000000", @ANYRES32=0x0, @ANYBLOB="a00500000010000080000000240000000000000000000000070000009414000044108800000000006d720bd40000000000000000110000000000000000000000010000000000"], 0x98}, 0x0) 337.371731ms ago: executing program 0 (id=233): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x134, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x104101, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d40)={0x18, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3ff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r1}, 0x10) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8264, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x2018, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x11, 0x200000000000002, 0x300) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x6}, 0x104101, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r3, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @local}, 0x10, 0x0}, 0x30004081) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000500)=r2, 0x4) sendmsg(r3, &(0x7f0000002b80)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000380)="01", 0x1}], 0x1}, 0x0) sendmsg$inet(r3, &(0x7f00000002c0)={0x0, 0x7000014, &(0x7f0000000800)=[{&(0x7f0000000340)="fc", 0x7c70}], 0x5}, 0x1b8a) 327.65478ms ago: executing program 2 (id=234): r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000001340)=@hci={0x1f, 0x8, 0x2c}, 0x80, 0x0}, 0x480c0) 320.455151ms ago: executing program 4 (id=235): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03076844268cb89e14f008004be0ffff00124000632f77fbac141416ac141416070807034d2f87e5890c6aab845013f2325f1a39019403178da1880b251812a59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126f4000000000000000000", 0x0, 0xfe, 0x60000000, 0x0, 0xfffffffffffffcb6, &(0x7f0000000000), &(0x7f0000000880)="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", 0x6}, 0x2c) 319.796531ms ago: executing program 3 (id=236): r0 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x5, 0x0, 0x300) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x5ee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xa}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008900000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_DETACH(0x1c, &(0x7f0000000000)={@cgroup, 0xffffffffffffffff, 0x2f, 0x1000, 0x0, @void, @value}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040)=r3}, 0x20) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r3}, 0x57) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8993, &(0x7f0000000000)='k\xbaDF\xda;\x1a\x93\xd9\x82g\x85\x9f\x93l\x0fT\xe8#e\x96\x01W\xde\x01P\n\xb6\xe5Aql\x04\x9dkY2\xdd\xea\ft\x1c\tf\xd87\xb8)3fQ\x83\x95Hk\x9e\x9ag\x06j\x92Jy*\xd4') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000000)="d8000000320081024e81f782db44b904021d080005000000e8fe55a1180015000600142603600e120900210000000401a8001600a400014006000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}, {&(0x7f0000000100)="d9cf329847ab37d5d4597753a6c5e5e70fb230d9c4f408d2d446b8a30cccbe234578895386e31c9867f9b9cbeb05b728d5f83abb98744b4c6b3001b88d6fa3b8fef30799d7630117fef9fab531d380f80f9df87d27610c198bf75b6d9743eb89e31132c9b67114c960006985224dfe84609d52220aeafe4fcc9f2185820ca2c7046ae394c5e93b04546892ec9b2f62f87523d7926ef1e4444a43cfb7", 0x9c}, {&(0x7f00000001c0)="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", 0xfe}, {0x0}], 0x4}, 0x0) 317.698761ms ago: executing program 1 (id=237): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x7, 0x4, 0x8, 0x8, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f00000005c0), 0x0}, 0x20) 251.47118ms ago: executing program 4 (id=238): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xa, 0x8, 0x1, 0x40, 0x42, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r2}, 0x38) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x40, 0x0, 0x10000, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000000), 0x4) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000002000000000000000000082295"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x1f4, 0x0, 0x0, 0x0, 0x0, 0x300, 0x300, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe, 0x2}, 0x50) 251.21756ms ago: executing program 1 (id=239): r0 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r0, &(0x7f00000031c0)={&(0x7f00000006c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 251.03954ms ago: executing program 2 (id=240): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x5, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x35}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 179.80729ms ago: executing program 2 (id=241): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xa002a0, 0x10, 0x18, &(0x7f0000000000)="5ae02efc441a80536af0d1d905c723fa", &(0x7f0000000040)=""/24, 0x6414}, 0x28) 179.62106ms ago: executing program 1 (id=242): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c40)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000800)="b9ff03006844268cb89e14f00800", 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 178.21911ms ago: executing program 3 (id=243): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000880), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x48, 0x0, 0x0, 0x0, 0xffffffffffffff37, 0x0, 0x8, 0x0, 0x0}}, 0x10) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000d00)={r1}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r2, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xffe4, 0xfffffffffffffda0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000f40)=@base={0x2, 0x4, 0x941e, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 167.45182ms ago: executing program 0 (id=244): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000001580)=ANY=[@ANYBLOB], &(0x7f0000000600)=""/217, 0x52, 0xd9, 0x1, 0x7, 0x0, @void, @value}, 0x28) 153.02232ms ago: executing program 2 (id=245): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000c40)="5c00000016006bab9a3fe3d86e17aa0a046b876c060048007ea60864160af36504811a0038001d001931a0e69ee517d34460be06000000a705251e6182949a9a7b9bcb84c9f4d4938037e70e4509c5bb4de385aa2adb88a899a655ab", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r2}, 0x10) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x12a6, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000011008188040f46ecdb4cb9cca7480ef42b000081e3bd6efb010511000b0003000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x2a, &(0x7f0000000300), 0x4) recvmsg$kcm(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002200)=""/4096, 0x1000}, {&(0x7f0000000cc0)=""/4088, 0xff8}], 0x2}, 0x0) r4 = gettid() perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x210e, 0x14, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_config_ext={0x407fff, 0xae9}, 0x14105, 0x32, 0xfffffbff, 0x3, 0x2, 0x0, 0xfffa, 0x0, 0x0, 0x0, 0x2009}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r5 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r5, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x300080c1) setsockopt$sock_attach_bpf(r5, 0x1, 0x9, &(0x7f0000000080), 0x4) socket$kcm(0x2, 0x200000000000001, 0x106) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000840)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-010d \x00'}, 0x20) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x31, &(0x7f0000000640), 0x4) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) close(r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x4e, 0x1, 0x0, 0x0, 0x0, 0x210e, 0x40181, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7fff, 0xaea}, 0x110104, 0x32, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc038, 0x2, @perf_config_ext, 0x0, 0x9, 0x0, 0x3, 0x8, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x73) socket$kcm(0x28, 0x1, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8b14, &(0x7f0000000000)={'wlan1\x00', @random="0100000007ff"}) 142.84232ms ago: executing program 1 (id=246): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fd1ff7907001175f37538e486dd6317010000003a00db536873f45f08c6feaa70e2aef57b20000000000000000000000000ac1414aa"], 0xfdef) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 142.51591ms ago: executing program 3 (id=247): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 96.72578ms ago: executing program 0 (id=248): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x4, 0xdd, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000040), &(0x7f0000000080)='%+9llu \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x43}}, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 91.87888ms ago: executing program 3 (id=249): r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000d40)=""/207, 0xcf}, {&(0x7f0000000500)=""/211, 0xd3}, {&(0x7f0000005680)=""/4030, 0xfbe}, {&(0x7f00000006c0)=""/225, 0xe1}, {&(0x7f0000000f00)=""/176, 0xb0}, {&(0x7f0000001000)=""/198, 0xc6}, {&(0x7f00000003c0)=""/51, 0x33}, {&(0x7f0000002f40)=""/4100, 0x1004}, {&(0x7f0000000b00)=""/239, 0xef}, {&(0x7f0000000240)=""/185, 0xb9}], 0xa}, 0x0) recvmsg$kcm(r0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4a}, 0x0) 91.29244ms ago: executing program 4 (id=250): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x7, 0x4, 0x8, 0x8, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f00000005c0), 0x0}, 0x20) 60.01668ms ago: executing program 0 (id=251): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000680)='\'', 0x1}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 36.72047ms ago: executing program 4 (id=252): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03076844268cb89e14f008004be0ffff00124000632f77fbac141416ac141416070807034d2f87e5890c6aab845013f2325f1a39019403178da1880b251812a59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126f4000000000000000000", 0x0, 0xfe, 0x60000000, 0x0, 0xfffffffffffffcb6, &(0x7f0000000000), &(0x7f0000000880)="4310aace1ca3595b44f06133bfeefc8b6978626f96e29bb86a1efec7626ba161a6a29948171839999d52464bcac4b62831eb064bbc97bf42d0e88588558101dcbf98e4140395b2017d35b9b4ab3eaee60a7ab23800cde2d1b9bf1d88924dec6e19d834bc3093a34bd87af0a2d089f0b30c50059d87178d3e92af192125dd14b79e66135c5cec80638f5b8d1de406b8ff8171f004aa1bbb42e23f72fac3f61df5f4d9d8e314137d6f7839daa635a8d5e5c586d884d71df30b3a75ce94f8ffffffff0000000065e20882cefc31752404bbca85078189ffd2febf0d7fe1250f0d58769527ffafcafcf6244dfd580f5b2c5b22f3e57def50929a14590b585702dcb2bb404025b6850c22c064ac27a249c8f21199253881fc5cd8cfed8a64232df0a54a41cae8edea76f4d7298c0ea8e9559e81e19fd57d80b1705b0a62adc7fc86a806c1cbc16e6695e3c6695106ee28a3f24959e5efa4", 0x6}, 0x2c) 36.07502ms ago: executing program 2 (id=253): r0 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r0, &(0x7f00000031c0)={&(0x7f00000006c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, 0x0, 0x0, &(0x7f0000000b00)}, 0x0) 239.25µs ago: executing program 4 (id=254): r0 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x5, 0x0, 0x300) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x5ee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xa}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008900000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_DETACH(0x1c, &(0x7f0000000000)={@cgroup, 0xffffffffffffffff, 0x2f, 0x1000, 0x0, @void, @value}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040)=r3}, 0x20) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r3}, 0x57) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8993, &(0x7f0000000000)='k\xbaDF\xda;\x1a\x93\xd9\x82g\x85\x9f\x93l\x0fT\xe8#e\x96\x01W\xde\x01P\n\xb6\xe5Aql\x04\x9dkY2\xdd\xea\ft\x1c\tf\xd87\xb8)3fQ\x83\x95Hk\x9e\x9ag\x06j\x92Jy*\xd4') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000000)="d8000000320081024e81f782db44b904021d080005000000e8fe55a1180015000600142603600e120900210000000401a8001600a400014006000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}, {&(0x7f0000000100)="d9cf329847ab37d5d4597753a6c5e5e70fb230d9c4f408d2d446b8a30cccbe234578895386e31c9867f9b9cbeb05b728d5f83abb98744b4c6b3001b88d6fa3b8fef30799d7630117fef9fab531d380f80f9df87d27610c198bf75b6d9743eb89e31132c9b67114c960006985224dfe84609d52220aeafe4fcc9f2185820ca2c7046ae394c5e93b04546892ec9b2f62f87523d7926ef1e4444a43cfb7", 0x9c}, {&(0x7f00000001c0)="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", 0xfe}, {0x0}], 0x4}, 0x0) 0s ago: executing program 0 (id=255): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xa002a0, 0x10, 0x18, &(0x7f0000000000)="5ae02efc441a80536af0d1d905c723fa", &(0x7f0000000040)=""/24, 0x6414}, 0x28) kernel console output (not intermixed with test programs): [ 23.215513][ T29] audit: type=1400 audit(1738192387.422:81): avc: denied { read } for pid=2983 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.1.53' (ED25519) to the list of known hosts. [ 27.311307][ T29] audit: type=1400 audit(1738192391.512:82): avc: denied { mounton } for pid=3286 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 27.312376][ T3286] cgroup: Unknown subsys name 'net' [ 27.334186][ T29] audit: type=1400 audit(1738192391.512:83): avc: denied { mount } for pid=3286 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.361849][ T29] audit: type=1400 audit(1738192391.542:84): avc: denied { unmount } for pid=3286 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.602621][ T3286] cgroup: Unknown subsys name 'cpuset' [ 27.608938][ T3286] cgroup: Unknown subsys name 'rlimit' [ 27.800272][ T29] audit: type=1400 audit(1738192392.002:85): avc: denied { setattr } for pid=3286 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 27.825170][ T29] audit: type=1400 audit(1738192392.002:86): avc: denied { create } for pid=3286 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 27.833280][ T3291] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 27.845661][ T29] audit: type=1400 audit(1738192392.002:87): avc: denied { write } for pid=3286 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.874795][ T29] audit: type=1400 audit(1738192392.012:88): avc: denied { read } for pid=3286 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.892187][ T3286] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 27.895481][ T29] audit: type=1400 audit(1738192392.012:89): avc: denied { mounton } for pid=3286 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 27.928995][ T29] audit: type=1400 audit(1738192392.012:90): avc: denied { mount } for pid=3286 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 27.952456][ T29] audit: type=1400 audit(1738192392.062:91): avc: denied { relabelto } for pid=3291 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 29.105825][ T3300] chnl_net:caif_netlink_parms(): no params data found [ 29.143859][ T3302] chnl_net:caif_netlink_parms(): no params data found [ 29.232314][ T3298] chnl_net:caif_netlink_parms(): no params data found [ 29.241464][ T3300] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.248675][ T3300] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.256096][ T3300] bridge_slave_0: entered allmulticast mode [ 29.262797][ T3300] bridge_slave_0: entered promiscuous mode [ 29.271601][ T3300] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.278700][ T3300] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.285971][ T3300] bridge_slave_1: entered allmulticast mode [ 29.292338][ T3300] bridge_slave_1: entered promiscuous mode [ 29.302769][ T3304] chnl_net:caif_netlink_parms(): no params data found [ 29.341116][ T3299] chnl_net:caif_netlink_parms(): no params data found [ 29.355566][ T3300] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.364768][ T3302] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.371965][ T3302] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.379198][ T3302] bridge_slave_0: entered allmulticast mode [ 29.385793][ T3302] bridge_slave_0: entered promiscuous mode [ 29.402380][ T3300] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.411514][ T3302] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.418808][ T3302] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.426049][ T3302] bridge_slave_1: entered allmulticast mode [ 29.432644][ T3302] bridge_slave_1: entered promiscuous mode [ 29.478155][ T3300] team0: Port device team_slave_0 added [ 29.493169][ T3298] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.500254][ T3298] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.507833][ T3298] bridge_slave_0: entered allmulticast mode [ 29.514495][ T3298] bridge_slave_0: entered promiscuous mode [ 29.521786][ T3300] team0: Port device team_slave_1 added [ 29.527571][ T3298] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.534914][ T3298] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.542163][ T3298] bridge_slave_1: entered allmulticast mode [ 29.548708][ T3298] bridge_slave_1: entered promiscuous mode [ 29.556566][ T3302] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.583569][ T3302] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.602670][ T3304] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.609871][ T3304] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.617194][ T3304] bridge_slave_0: entered allmulticast mode [ 29.624518][ T3304] bridge_slave_0: entered promiscuous mode [ 29.654482][ T3298] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.669052][ T3304] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.676295][ T3304] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.683488][ T3304] bridge_slave_1: entered allmulticast mode [ 29.689925][ T3304] bridge_slave_1: entered promiscuous mode [ 29.701509][ T3300] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.708616][ T3300] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.735663][ T3300] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.747335][ T3298] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.757167][ T3302] team0: Port device team_slave_0 added [ 29.772051][ T3300] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.779065][ T3300] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.805104][ T3300] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.821012][ T3302] team0: Port device team_slave_1 added [ 29.831598][ T3299] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.838793][ T3299] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.846154][ T3299] bridge_slave_0: entered allmulticast mode [ 29.852591][ T3299] bridge_slave_0: entered promiscuous mode [ 29.861399][ T3299] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.868626][ T3299] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.876322][ T3299] bridge_slave_1: entered allmulticast mode [ 29.883035][ T3299] bridge_slave_1: entered promiscuous mode [ 29.899658][ T3304] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.911298][ T3304] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.931083][ T3298] team0: Port device team_slave_0 added [ 29.954382][ T3300] hsr_slave_0: entered promiscuous mode [ 29.960373][ T3300] hsr_slave_1: entered promiscuous mode [ 29.971832][ T3298] team0: Port device team_slave_1 added [ 29.978769][ T3299] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.988071][ T3302] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.995122][ T3302] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.021259][ T3302] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.032641][ T3302] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.039858][ T3302] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.066039][ T3302] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.082882][ T3304] team0: Port device team_slave_0 added [ 30.089885][ T3304] team0: Port device team_slave_1 added [ 30.101287][ T3299] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.143946][ T3299] team0: Port device team_slave_0 added [ 30.150026][ T3298] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.157189][ T3298] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.183389][ T3298] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.194690][ T3298] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.201815][ T3298] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.227869][ T3298] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.244918][ T3304] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.251973][ T3304] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.278265][ T3304] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.295968][ T3299] team0: Port device team_slave_1 added [ 30.315258][ T3299] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.322295][ T3299] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.348707][ T3299] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.365046][ T3304] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.372157][ T3304] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.398489][ T3304] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.415218][ T3299] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.422232][ T3299] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.448170][ T3299] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.496204][ T3302] hsr_slave_0: entered promiscuous mode [ 30.502429][ T3302] hsr_slave_1: entered promiscuous mode [ 30.508496][ T3302] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 30.516231][ T3302] Cannot create hsr debugfs directory [ 30.534822][ T3299] hsr_slave_0: entered promiscuous mode [ 30.541247][ T3299] hsr_slave_1: entered promiscuous mode [ 30.547170][ T3299] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 30.554778][ T3299] Cannot create hsr debugfs directory [ 30.579317][ T3298] hsr_slave_0: entered promiscuous mode [ 30.585571][ T3298] hsr_slave_1: entered promiscuous mode [ 30.591623][ T3298] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 30.599457][ T3298] Cannot create hsr debugfs directory [ 30.612617][ T3304] hsr_slave_0: entered promiscuous mode [ 30.618918][ T3304] hsr_slave_1: entered promiscuous mode [ 30.624827][ T3304] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 30.632526][ T3304] Cannot create hsr debugfs directory [ 30.739147][ T3300] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 30.763982][ T3300] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 30.776826][ T3300] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 30.785993][ T3300] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 30.852736][ T3302] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 30.872271][ T3302] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 30.881657][ T3302] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 30.893402][ T3302] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 30.911426][ T3304] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 30.923817][ T3304] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 30.933210][ T3304] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 30.944503][ T3304] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 30.975277][ T3298] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 30.994598][ T3298] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 31.018648][ T3298] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 31.028036][ T3298] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 31.039839][ T3299] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 31.049864][ T3299] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 31.076199][ T3299] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 31.091598][ T3300] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.098942][ T3299] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 31.125211][ T3302] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.139194][ T3300] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.163183][ T2197] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.170274][ T2197] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.182823][ T3302] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.191194][ T3304] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.199695][ T2197] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.206803][ T2197] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.232796][ T2197] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.240041][ T2197] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.269002][ T2197] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.276325][ T2197] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.291029][ T3298] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.310355][ T3304] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.328959][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.336067][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.353231][ T3298] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.362247][ T50] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.369355][ T50] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.399780][ T2197] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.406929][ T2197] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.416179][ T2197] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.423297][ T2197] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.459169][ T3299] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.468781][ T3300] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.502295][ T3302] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.525569][ T3299] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.568028][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.575159][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.600762][ T3304] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.625106][ T2372] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.632315][ T2372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.656317][ T3300] veth0_vlan: entered promiscuous mode [ 31.682769][ T3300] veth1_vlan: entered promiscuous mode [ 31.693642][ T3302] veth0_vlan: entered promiscuous mode [ 31.709714][ T3302] veth1_vlan: entered promiscuous mode [ 31.737040][ T3298] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.762933][ T3300] veth0_macvtap: entered promiscuous mode [ 31.774820][ T3302] veth0_macvtap: entered promiscuous mode [ 31.784392][ T3300] veth1_macvtap: entered promiscuous mode [ 31.793086][ T3302] veth1_macvtap: entered promiscuous mode [ 31.801627][ T3299] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.823410][ T3304] veth0_vlan: entered promiscuous mode [ 31.835772][ T3302] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.844872][ T3300] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.855627][ T3300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.867903][ T3300] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.880738][ T3304] veth1_vlan: entered promiscuous mode [ 31.888778][ T3300] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.910154][ T3302] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.921073][ T3302] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.932193][ T3302] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.948096][ T3302] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.957124][ T3302] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.966136][ T3302] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.974924][ T3302] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.986003][ T3300] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.994815][ T3300] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.003719][ T3300] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.012485][ T3300] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.036842][ T3304] veth0_macvtap: entered promiscuous mode [ 32.053447][ T3304] veth1_macvtap: entered promiscuous mode [ 32.066034][ T3298] veth0_vlan: entered promiscuous mode [ 32.083548][ T3298] veth1_vlan: entered promiscuous mode [ 32.100167][ T3304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.110771][ T3304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.120714][ T3304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.131277][ T3304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.144555][ T3304] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.144980][ T3302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 32.159301][ T3298] veth0_macvtap: entered promiscuous mode [ 32.179566][ T3299] veth0_vlan: entered promiscuous mode [ 32.192435][ T3304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.202942][ T3304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.212787][ T3304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.223266][ T3304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.234112][ T3304] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.243219][ T3304] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.252174][ T3304] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.260899][ T3304] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.269744][ T3304] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.294500][ T3298] veth1_macvtap: entered promiscuous mode [ 32.311915][ T29] kauditd_printk_skb: 33 callbacks suppressed [ 32.311933][ T29] audit: type=1400 audit(1738192396.512:125): avc: denied { create } for pid=3436 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 32.339691][ T3299] veth1_vlan: entered promiscuous mode [ 32.347861][ T29] audit: type=1400 audit(1738192396.522:126): avc: denied { map_create } for pid=3436 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 32.355278][ T3298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.366811][ T29] audit: type=1400 audit(1738192396.522:127): avc: denied { bpf } for pid=3436 comm="syz.3.4" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 32.377663][ T3298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.377679][ T3298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.377702][ T3298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.377715][ T3298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.377757][ T3298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.386845][ T3298] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.398457][ T29] audit: type=1400 audit(1738192396.522:128): avc: denied { map_read map_write } for pid=3436 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 32.454776][ T3298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.456993][ T29] audit: type=1400 audit(1738192396.522:129): avc: denied { prog_load } for pid=3436 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 32.476689][ T3298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.487075][ T29] audit: type=1400 audit(1738192396.522:130): avc: denied { create } for pid=3436 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 32.505934][ T3298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.516118][ T29] audit: type=1400 audit(1738192396.522:131): avc: denied { write } for pid=3436 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 32.535764][ T3298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.535784][ T3298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.535802][ T3298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.546277][ T29] audit: type=1400 audit(1738192396.522:132): avc: denied { setopt } for pid=3436 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 32.569830][ T3298] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.575747][ T29] audit: type=1400 audit(1738192396.542:133): avc: denied { read } for pid=3436 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 32.581853][ T29] audit: type=1400 audit(1738192396.622:134): avc: denied { prog_run } for pid=3438 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 32.618700][ T3298] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.669325][ T3298] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.678092][ T3298] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.686960][ T3298] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.755741][ T3299] veth0_macvtap: entered promiscuous mode [ 32.763691][ T3299] veth1_macvtap: entered promiscuous mode [ 32.789824][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.800493][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.810616][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.821217][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.831290][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.841749][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.851721][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.862288][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.874789][ T3299] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.887173][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.898058][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.908052][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.918713][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.928555][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.939021][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.948934][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.959419][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.972653][ T3299] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.988906][ T3299] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.997944][ T3299] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.006787][ T3299] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.015618][ T3299] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.158510][ C0] hrtimer: interrupt took 28038 ns [ 33.278640][ T3460] Driver unsupported XDP return value 0 on prog (id 5) dev N/A, expect packet loss! [ 33.545840][ T3491] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 34.133414][ T3569] netlink: 'syz.0.20': attribute type 10 has an invalid length. [ 34.187975][ T3569] hsr_slave_0: left promiscuous mode [ 34.196176][ T3569] hsr_slave_1: left promiscuous mode [ 34.231428][ T3581] netlink: 132 bytes leftover after parsing attributes in process `syz.1.22'. [ 34.244216][ T3584] Zero length message leads to an empty skb [ 34.291165][ T3588] netlink: 'syz.1.25': attribute type 21 has an invalid length. [ 34.321079][ T3586] tap0: tun_chr_ioctl cmd 1074025681 [ 34.336580][ T3586] tap0: tun_chr_ioctl cmd 1074025677 [ 34.352132][ T3586] tap0: linktype set to 786 [ 34.387428][ T3595] netlink: 132 bytes leftover after parsing attributes in process `syz.2.24'. [ 34.413660][ T3586] netlink: 'syz.2.24': attribute type 10 has an invalid length. [ 34.457401][ T3586] team0: Cannot enslave team device to itself [ 34.464240][ T3602] netlink: 'syz.4.30': attribute type 10 has an invalid length. [ 34.472099][ T3602] netlink: 65015 bytes leftover after parsing attributes in process `syz.4.30'. [ 34.838266][ T3620] netlink: 'syz.2.37': attribute type 3 has an invalid length. [ 34.846634][ T3620] netlink: 132 bytes leftover after parsing attributes in process `syz.2.37'. [ 34.859747][ T3620] netlink: 16186 bytes leftover after parsing attributes in process `syz.2.37'. [ 35.100232][ T3628] netlink: 134780 bytes leftover after parsing attributes in process `syz.2.40'. [ 35.185860][ T3638] netlink: 2 bytes leftover after parsing attributes in process `syz.3.43'. [ 35.435583][ T3659] netlink: 'syz.3.49': attribute type 29 has an invalid length. [ 35.467901][ T3652] netlink: 'syz.3.49': attribute type 29 has an invalid length. [ 35.494240][ T3650] netlink: 'syz.4.48': attribute type 3 has an invalid length. [ 35.498531][ T3652] netlink: 'syz.3.49': attribute type 29 has an invalid length. [ 35.502310][ T3650] netlink: 132 bytes leftover after parsing attributes in process `syz.4.48'. [ 35.524932][ T3650] netlink: 16186 bytes leftover after parsing attributes in process `syz.4.48'. [ 35.605075][ T3668] bridge0: port 3(bond0) entered blocking state [ 35.611453][ T3668] bridge0: port 3(bond0) entered disabled state [ 35.618570][ T3668] bond0: entered allmulticast mode [ 35.623965][ T3668] bond_slave_0: entered allmulticast mode [ 35.629804][ T3668] bond_slave_1: entered allmulticast mode [ 35.638903][ T3668] bond0: entered promiscuous mode [ 35.644047][ T3668] bond_slave_0: entered promiscuous mode [ 35.649886][ T3668] bond_slave_1: entered promiscuous mode [ 35.698257][ T3674] netlink: 'syz.4.57': attribute type 10 has an invalid length. [ 35.735511][ T3668] bridge0: port 3(bond0) entered blocking state [ 35.741897][ T3668] bridge0: port 3(bond0) entered forwarding state [ 35.749052][ T3680] syz.4.57 uses obsolete (PF_INET,SOCK_PACKET) [ 35.756246][ T3674] hsr0: entered promiscuous mode [ 35.770337][ T3674] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 35.781171][ T3674] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 35.793919][ T3674] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 36.622872][ T3745] netlink: 65047 bytes leftover after parsing attributes in process `syz.3.83'. [ 37.089262][ T3793] bridge0: port 3(bond0) entered blocking state [ 37.095683][ T3793] bridge0: port 3(bond0) entered disabled state [ 37.115066][ T3793] bond0: entered allmulticast mode [ 37.120608][ T3793] bond_slave_0: entered allmulticast mode [ 37.126679][ T3793] bond_slave_1: entered allmulticast mode [ 37.163334][ T3793] bond0: entered promiscuous mode [ 37.168704][ T3793] bond_slave_0: entered promiscuous mode [ 37.174804][ T3793] bond_slave_1: entered promiscuous mode [ 37.190789][ T3793] bridge0: port 3(bond0) entered blocking state [ 37.197177][ T3793] bridge0: port 3(bond0) entered forwarding state [ 38.265198][ T3979] bridge0: port 3(bond0) entered blocking state [ 38.271568][ T3979] bridge0: port 3(bond0) entered disabled state [ 38.294062][ T3979] bond0: entered allmulticast mode [ 38.299242][ T3979] bond_slave_0: entered allmulticast mode [ 38.305263][ T3979] bond_slave_1: entered allmulticast mode [ 38.313901][ T3979] bond0: entered promiscuous mode [ 38.318993][ T3979] bond_slave_0: entered promiscuous mode [ 38.325404][ T3979] bond_slave_1: entered promiscuous mode [ 38.359423][ T3979] bridge0: port 3(bond0) entered blocking state [ 38.365782][ T3979] bridge0: port 3(bond0) entered forwarding state [ 39.007067][ T4067] syz.0.233 (4067) used greatest stack depth: 10360 bytes left [ 39.226781][ T4109] ================================================================== [ 39.235367][ T4109] BUG: KCSAN: data-race in bq_flush_to_queue / cpu_map_kthread_run [ 39.243305][ T4109] [ 39.245738][ T4109] write to 0xffff888118b34240 of 8 bytes by task 4110 on cpu 0: [ 39.253425][ T4109] cpu_map_kthread_run+0x4a1/0x11e0 [ 39.258649][ T4109] kthread+0x4ae/0x520 [ 39.262761][ T4109] ret_from_fork+0x4b/0x60 [ 39.267214][ T4109] ret_from_fork_asm+0x1a/0x30 [ 39.272025][ T4109] [ 39.274382][ T4109] read to 0xffff888118b34240 of 8 bytes by task 4109 on cpu 1: [ 39.281952][ T4109] bq_flush_to_queue+0x125/0x360 [ 39.286930][ T4109] cpu_map_enqueue+0x19e/0x1b0 [ 39.291742][ T4109] xdp_do_redirect_frame+0x2a4/0x6b0 [ 39.297084][ T4109] bpf_test_run_xdp_live+0x8c6/0x1040 [ 39.302492][ T4109] bpf_prog_test_run_xdp+0x51d/0x8b0 [ 39.307850][ T4109] bpf_prog_test_run+0x20f/0x3a0 [ 39.312829][ T4109] __sys_bpf+0x400/0x7a0 [ 39.317105][ T4109] __x64_sys_bpf+0x43/0x50 [ 39.321599][ T4109] x64_sys_call+0x2914/0x2dc0 [ 39.326322][ T4109] do_syscall_64+0xc9/0x1c0 [ 39.330962][ T4109] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.336893][ T4109] [ 39.339244][ T4109] value changed: 0xffff888119360070 -> 0x0000000000000000 [ 39.346402][ T4109] [ 39.348776][ T4109] Reported by Kernel Concurrency Sanitizer on: [ 39.354942][ T4109] CPU: 1 UID: 0 PID: 4109 Comm: syz.4.254 Not tainted 6.13.0-syzkaller-09383-gebbb8be421ee #0 [ 39.365208][ T4109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 39.375380][ T4109] ==================================================================