last executing test programs: 11.030920288s ago: executing program 0 (id=6003): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r4}, 0x10) socketpair(0x15, 0x4, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r7}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x13, 0x8, &(0x7f0000000940)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7030000070400008500000021000000b70000000000000095"], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r8, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r10}, 0x10) socketpair(0xb, 0x6, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000600)='ext4_es_lookup_extent_exit\x00', r9, 0x0, 0x5}, 0x18) sendmsg$inet(r11, &(0x7f0000000900)={&(0x7f0000000680)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000000780)=[{&(0x7f00000006c0)="3449c8ad5f356d", 0x7}, {&(0x7f0000000700)="c588c7ad1f55a278be02351c99df8a80f868f57ea2be0cb0bd6db6e896d8f09defba07d57b5f273ac13973d7081f913d79a5ff411fea72d4c4ce8478169edb4da01d479bcb2cf4c9a835948184ea83d8bb126f14c52d", 0x56}], 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x108}, 0x80) 9.106643167s ago: executing program 0 (id=6003): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r4}, 0x10) socketpair(0x15, 0x4, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r7}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x13, 0x8, &(0x7f0000000940)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7030000070400008500000021000000b70000000000000095"], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r8, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r10}, 0x10) socketpair(0xb, 0x6, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000600)='ext4_es_lookup_extent_exit\x00', r9, 0x0, 0x5}, 0x18) sendmsg$inet(r11, &(0x7f0000000900)={&(0x7f0000000680)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000000780)=[{&(0x7f00000006c0)="3449c8ad5f356d", 0x7}, {&(0x7f0000000700)="c588c7ad1f55a278be02351c99df8a80f868f57ea2be0cb0bd6db6e896d8f09defba07d57b5f273ac13973d7081f913d79a5ff411fea72d4c4ce8478169edb4da01d479bcb2cf4c9a835948184ea83d8bb126f14c52d", 0x56}], 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x108}, 0x80) 7.348511599s ago: executing program 1 (id=6149): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110c230000) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r1}, 0x18) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) ioctl$TUNSETOFFLOAD(r0, 0x40047440, 0xf0ff1f00000000) 7.346893569s ago: executing program 4 (id=6151): r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000980)={r1}, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b000000000000d0", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/11], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000000)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x4, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/user\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)='GPL\x00'}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/net\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r5}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 7.209695893s ago: executing program 1 (id=6152): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000"], 0x0, 0x56}, 0x28) syz_open_procfs$namespace(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$sock(r1, &(0x7f00000004c0)={&(0x7f00000002c0)=@l2tp6={0xa, 0x0, 0x1ff, @local, 0x80}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000340)="6623a0049fde1ad45ff2f72a366fc311ae0722af4a5f42d067afea8527e01a6ffc914b", 0x23}], 0x1, &(0x7f00000003c0)=[@timestamping={{0x14, 0x1, 0x25, 0xbe2}}, @timestamping={{0x14, 0x1, 0x25, 0x7fff}}, @mark={{0x14}}], 0x48}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 7.150502369s ago: executing program 0 (id=6003): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r4}, 0x10) socketpair(0x15, 0x4, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r7}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x13, 0x8, &(0x7f0000000940)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7030000070400008500000021000000b70000000000000095"], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r8, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r10}, 0x10) socketpair(0xb, 0x6, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000600)='ext4_es_lookup_extent_exit\x00', r9, 0x0, 0x5}, 0x18) sendmsg$inet(r11, &(0x7f0000000900)={&(0x7f0000000680)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000000780)=[{&(0x7f00000006c0)="3449c8ad5f356d", 0x7}, {&(0x7f0000000700)="c588c7ad1f55a278be02351c99df8a80f868f57ea2be0cb0bd6db6e896d8f09defba07d57b5f273ac13973d7081f913d79a5ff411fea72d4c4ce8478169edb4da01d479bcb2cf4c9a835948184ea83d8bb126f14c52d", 0x56}], 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="1400000000000004000000000200000001000000000000005c000000000000000000000007000000890bb0e00000010a010101861c000000020609d8e75c9c531697020dd7ae8852418da50eb9a78c892332ac141426e000000164010102ffffffffac1e01010000000000000000640101000000000000001400000000000000000000000200000003000000000000001400000000000000000000000100000003000000000000001100000000000000000000000100000002002000000000001400000000000000000000000100000007000000000000001400000000ffec0000000000020000003d0b000000000000110000000000000000000000010000000400000000000000"], 0x108}, 0x80) 5.281118892s ago: executing program 1 (id=6153): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r5, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) r6 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="110000000475ac57b368f9de448174ac070000ff0900fffffffffb000000fc0002411b271df095bca4fa4032900697fa67e7", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r6, @ANYBLOB="0000000002000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x2c, 0x2, 0x3, &(0x7f0000000300)) socketpair(0x27, 0x800, 0x853d, &(0x7f0000000600)) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 5.277729312s ago: executing program 4 (id=6156): r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000180)='fib6_table_lookup\x00', r2}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0000000071105f00000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000004c0)={r3, &(0x7f0000000340), 0x0}, 0x20) r5 = perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0xf1, 0xd, 0x5, 0x4, 0x0, 0x101, 0x8000, 0xa, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0xfffffffffffffffc, 0x7fffffffffffffff}, 0x12718, 0xffffffffffffffff, 0x7, 0x2, 0x2700, 0x4f, 0x4, 0x0, 0x60000, 0x0, 0xb09}, 0xffffffffffffffff, 0x4, r0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0xe62}, 0x0, 0xc8, 0xf5d, 0x6, 0x0, 0x2, 0xfffa, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x10, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd"], 0xfdef) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000), 0xfdef) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x1, 0x4000000, 0x7, 0x2000000, 0x0, 0x7, 0x0, 0x200000, 0x0, 0x6}, 0x0, 0x0, r5, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)) 5.242693556s ago: executing program 2 (id=6157): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x5, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xfffffffc}, [@call={0x85, 0x0, 0x0, 0x29}, @call={0x85, 0x0, 0x0, 0x2a}]}, &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="08f272f808af"}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x4, 0x8820, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff, 0x3}, 0x0, 0xc8, 0x0, 0x6, 0x2, 0x0, 0x400, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000005000000000000010018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x80200, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000100000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1e, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) close(0x4) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r5) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) 5.055068775s ago: executing program 3 (id=6159): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000029c8466bac85c1fb00", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r0}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x21, &(0x7f0000000540), 0x4) recvmsg(r1, &(0x7f0000000500)={&(0x7f00000017c0)=@alg, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x12020) sendmsg$tipc(r2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1, 0xf, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000495"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000080)=r4, 0x4) sendmsg$inet(r6, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB="000000005ddf00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="18b2b4165004005788f7bb553e860b00"/28, @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r11}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0}, 0x94) 5.016916968s ago: executing program 4 (id=6160): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8912, &(0x7f0000000080)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180200000000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f00000005c0)=ANY=[@ANYBLOB="180800001bc81a00000000000185100000060000001800000046dc59d815810306cb2a3799b1a8220317b13a9e4d8fcce5ea715b62c5dfab9a3a046c0064acb298ddc033cf5e2563b3a36d4cfa64e59a5e40ae86223076c1a273405bddfc71677269dac7dafe3add01605afe957368b0abd8756f11d2bb8ccb4d7567a5a4f222c28110b91a6cb4db4facf813abd31ede8c33323310ba4e06424b5c64f4969d34fe31521e2240e61d62d39bc876279cabebee5847d77c6595f311a9d497afa7f74318", @ANYRES32, @ANYBLOB="00000000000000006608000000000101180000000000000000000000000000009500000000000000360a0000000f0000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81343a8800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000"], &(0x7f0000000140)='GPL\x00'}, 0x94) r8 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r7}, 0x8) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000008000000080000000100000000000000", @ANYRES32, @ANYBLOB="00000000000101000000000000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xd, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002a00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000fc0)={0x6, 0x3b, &(0x7f0000000cc0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xb88a, 0x0, 0x0, 0x0, 0x57a}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xb}, @ldst={0x6, 0x0, 0x3, 0xb, 0x3, 0x18}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xb540}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffff5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x1, 0x8, 0x8, 0xa, 0xfffffffffffffffc, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000ec0)='syzkaller\x00', 0xffffffff, 0x0, 0x0, 0x41000, 0x2c, '\x00', 0x0, 0x25, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000f00)={0x1, 0xd, 0x7fff, 0x2}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000f40)=[r4, r8, r4, r8, 0x1, r8], &(0x7f0000000f80)=[{0x1, 0x1, 0xe, 0x5}, {0x1, 0x2, 0x7, 0x1}, {0x2, 0x4, 0xc, 0x7}, {0x4, 0x1, 0x9, 0x6}], 0x10, 0x3}, 0x94) close(r8) r10 = syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000140)='sys_enter\x00', r12}, 0x10) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r10, r4, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x2, 0x4, 0x8, 0x9, 0x0, 0x7078, 0x1104, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xea, 0x2, @perf_bp={&(0x7f0000000180), 0x1}, 0x600, 0x5, 0x0, 0x4, 0x5bd0, 0xca8, 0x7, 0x0, 0x3ff, 0x0, 0x8}, r10, 0x1, r6, 0x3) sendmsg$unix(r5, &(0x7f0000000840)={&(0x7f0000000240)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000300)=[{&(0x7f00000002c0)="5eeffe89bd1b6254bfa314bf24e1f2220d", 0x11}, {&(0x7f0000000500)="a982405af2fea3c2db95513e53fe4efde4ded32e366c78091cf5b237e5f2c5cf880440f09d5989899c6aa010995c09a69b918e49eb9a54c95c68a5500ab37e4dd617a42b", 0x44}, {&(0x7f0000000700)="e40e439e354e283adaddd13afd81f36113ba774a0bf16ee75b83330429ef1dfd3cc4d913c5367b1d3a2899cd4df8e291f71458a75ea8daf6211137258369d825bc961d3655e6ca13cb0b79f5a4c878a07fcb0d772d813de699e20f2b0062b30128fede799a0805519d441d753ef112851f3e0326607050aae0950b56b4c25f866b901b733b359bba811adaa981163ab81fd6f74c76192e8d8b265cb259a91fb06b4ed0e64b1a212b6dc968cd6ba9406270189b77c81e6193123a26706a833855fa0a007a", 0xc4}], 0x3, &(0x7f0000000800)=[@cred={{0x1c, 0x1, 0x2, {r10, 0xee01, 0xffffffffffffffff}}}], 0x20, 0x4000}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000880)={r8, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r7, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000008c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x62, &(0x7f00000009c0)=[{}], 0x8, 0x10, &(0x7f0000000a00), &(0x7f0000000a40), 0x8, 0xd1, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000c40)={0x2, 0x4, 0x8, 0x1, 0x80, r13, 0x9, '\x00', r14, r8, 0x2, 0x3}, 0x50) 4.953138144s ago: executing program 2 (id=6161): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x40000100) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e0000000000000001000000"], 0x48) (async, rerun: 32) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async, rerun: 32) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x323, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1, 0x0, 0x20}, 0x1f00) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 32) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x100000000000000) (async, rerun: 32) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000000000000000001811", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000280), 0x6, r5}, 0x38) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r4}, 0x10) (async, rerun: 64) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r6}, 0x10) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x40010) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r3}, 0x10) (async, rerun: 64) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 4.868188202s ago: executing program 2 (id=6162): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x12, 0x8, 0x4, 0x7cb4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r3}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.740295015s ago: executing program 0 (id=6003): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r4}, 0x10) socketpair(0x15, 0x4, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r7}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x13, 0x8, &(0x7f0000000940)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7030000070400008500000021000000b70000000000000095"], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r8, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r10}, 0x10) socketpair(0xb, 0x6, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000600)='ext4_es_lookup_extent_exit\x00', r9, 0x0, 0x5}, 0x18) sendmsg$inet(r11, &(0x7f0000000900)={&(0x7f0000000680)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000000780)=[{&(0x7f00000006c0)="3449c8ad5f356d", 0x7}, {&(0x7f0000000700)="c588c7ad1f55a278be02351c99df8a80f868f57ea2be0cb0bd6db6e896d8f09defba07d57b5f273ac13973d7081f913d79a5ff411fea72d4c4ce8478169edb4da01d479bcb2cf4c9a835948184ea83d8bb126f14c52d", 0x56}], 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x108}, 0x80) 2.635311832s ago: executing program 1 (id=6163): bpf$TOKEN_CREATE(0x24, &(0x7f0000000180), 0x8) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000003c0)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0xffff}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000040000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) syz_clone(0x40089000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2}, 0x80) 2.632779242s ago: executing program 2 (id=6164): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000000400000000000098f601fcd94b9d35299c00f52df81381c523c053376ff695d86561d31d1d298ca20467390e5a1d068e4e9600909a499f80283baa7b879f94dfbb72da614a45f0f9ffa2ef2130e07ced26374665285f297d1e8d34ff97002ab90dc68599cc5d8a158abe85dd354976523714f9c7aba382fa6b6e3d9d0a51efffb2e5bed594ffc9b8719f8d7649d4ecea5887f0fb674437809e9d725b0ced7fc2"], 0x0, 0x26}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r0, 0x0, 0x9}, 0x18) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000404000000002e"], 0x0, 0x37}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0900000004000000040000000a00000004000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="02000000010000000000d6f68b370000"], 0x48) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000008600850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xff}, 0x0, 0x6, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67152944, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) 2.628723382s ago: executing program 3 (id=6165): write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r0, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d00)={0x0, 0x0}, 0x8) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r1, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r2, r0, 0x4, r0}, 0x10) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000000000000000001811"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000180), 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000009000000080000000000000a02000000002eec305f2e0061002d7711b17b7b4ae26774f045b1f7da8e31c088324bfece95313ab9ebd14b0e15198126a9aa20ab2c9a90d195ae8e617a124e69e0f0b78b6d5006fea3"], &(0x7f00000002c0)=""/5, 0x2d, 0x5, 0x0, 0xb737, 0xb94ee03eeff813b0}, 0x28) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001000000", @ANYRES32=0x0], 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) 2.534449832s ago: executing program 4 (id=6166): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5d, 0x1, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc46}, 0x100860, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="5c000000000000000000000000000000006bbe00", @ANYRES32=0x0, @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000340)=ANY=[@ANYRESOCT=r2], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x3, 0xc, &(0x7f0000000b00)=ANY=[@ANYRES8=r5, @ANYRES8=r1, @ANYRESHEX=r5, @ANYRES8, @ANYBLOB="65ffa75d192b8d0383a6027eafe8aa853cdd031836bff5c3c778b51735461a0886657eb57af4c5eed1b9f9977be7583c4b01bfd03aeada96cdca395852c32d91bbf939ebba1d0979ecd39020adfc3efc0ee14461766c9810dea721c137f6c42ff588d891b32bc68a27fa34a2", @ANYBLOB="ce253f291141c6dd356e1a69af43a6b0edb4cfd8fa130e480291738b3b44c92b50c51b4d87c0f0768db5ebc154f456a4fe62d972ff57556d7b2b1fd482c82c67c1fe09c6cf0a1f3080974dd1be36dc507ad978314bf4a5b9533f6736d319da7eb8fab1d7824e2fd720c4e31e80d7ffcad6cea87a12ad60cbd409c8fd509d24a1b33526a93d6265112ea90180cebd18e7a3f1906484e9ebc6e39361d8f557e4c1ab980ee773f63554055a1ab4be5d4348d1ddc58a89132d7f13100d438f236cfc8260f408c52e565133fce7beed85442383c77f234c6c6902b226f879e5155c4e221aa239c1e458071c4e34bf85"], 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r10, &(0x7f0000000000), 0x2a979d) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='&pu<00||!') syz_open_procfs$namespace(0x0, &(0x7f0000000680)='ns/cgroup\x00') r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f00000100000001000000", @ANYRES32, @ANYRES32], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000780), 0x6, r11}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r12}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f0000000200)={r7, &(0x7f0000000c80)="eb3a9c6f60de573d78100dc6b6d0a3a704682a8d38df478c034c08672ed49e93ee8cc59eddf5fa8f0e00000000fad2960708e5e49e71e9a81bb4ea96f430604eec27031f39d3c282d51fa05d3d1798b4e2610e6caab4d93da93a4c6ab6c471b609af7ee042cbae1597835274998b40e8aae4d7d65a5500c1b26d740ef5d280fcf1913529d37fdb12e152c60c5bac9063050b6b1b4d0842508ab262834919c385d85374f0004ac51386bbe48662a3a5444392b91fa3d8d17f76c1250b7201827677803f1f03411d370bb7fcf7f5051a89ed382e22f9c308f1eac4d70cdcbef45b334d3e3bcd9fa6413030535dc2540e3a797565", &(0x7f0000000380)=""/66}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)=ANY=[@ANYRES16=0x0, @ANYRES64=r3, @ANYBLOB="c4feda2e487d050eb2d4abcdc0774e75c565415fbffadccaa2a0aa60beabb56e00fe5f3a942d15875ee3ade4c6354c3bb4c421efc0eb2abfeb22fbe69577efeb7fecc74b1beac624adb32d3a31075063aa761fbeaf7cbe32adbee48151a2b6c1d1444b1f7f5c314af2fe0ff9ef0ca7dc6bf9b6a9bd64e943ccb07dac1b240555e8dd0add75b771c917f8af44f49365b2453f925a5170414d8d42a63ada88dce18bd8844690c836a52d395934580c267189e8790e2f1c115cc755c2532a1e6e8dfc70b08bc42c006c05052c45043a57b2e9239d", @ANYRESHEX=r4, @ANYRESHEX=r8], 0x50) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) perf_event_open$cgroup(&(0x7f00000004c0)={0x5, 0x80, 0x8, 0x9, 0x4, 0xfe, 0x0, 0xfff, 0xa4f6e35545c750fa, 0x18, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xbd5a, 0x4, @perf_config_ext={0x8, 0x400}, 0x100, 0x0, 0x1, 0x1, 0x5, 0x2, 0xe03d, 0x0, 0x3, 0x0, 0x10000}, 0xffffffffffffffff, 0xb, r6, 0xa) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4}, 0x94) 2.474458808s ago: executing program 3 (id=6167): r0 = syz_clone(0x800, &(0x7f0000000000)="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", 0xff, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="1366aa24cd5ff7d13a3841cb30f2ab4c32b6e162060c05e10eaf25020049a879e7535db4a1fa8289111c") syz_open_procfs$namespace(r0, &(0x7f00000001c0)='ns/cgroup\x00') r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x5, 0x2, 0x3, 0x30100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5, 0x4}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, &(0x7f0000000480)=[0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xda, &(0x7f0000000500)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0xde, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@union={0x8, 0x3, 0x0, 0x5, 0x0, 0xb33, [{0x2, 0x3, 0x2}, {0xc, 0x0, 0xfffffe00}, {0xd, 0x1}]}]}, {0x0, [0x0, 0x30, 0x61]}}, &(0x7f00000007c0)=""/54, 0x4d, 0x36, 0x1, 0x2, 0x10000}, 0x28) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000880)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2}, 0x50) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x11, 0x12, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8000}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@jmp={0x5, 0x0, 0xa, 0x4, 0x2, 0xffffffffffffffe0, 0xffffffffffffffff}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x6}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000340)='GPL\x00', 0x8, 0xa4, &(0x7f0000000380)=""/164, 0x41000, 0x1b, '\x00', r2, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000840)={0x1, 0x0, 0x7, 0x7}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000900)=[0xffffffffffffffff, r4], &(0x7f0000000940)=[{0x0, 0x2, 0x2, 0x6}, {0x5, 0x5, 0x6}, {0x0, 0x2, 0xc, 0x5}, {0x1, 0x2, 0xc, 0x3}], 0x10, 0xd}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a40)) r6 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000a80), 0x2, 0x0) write$cgroup_type(r6, &(0x7f0000000ac0), 0x9) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000bc0)={&(0x7f0000000b00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x4, [@restrict={0x5, 0x0, 0x0, 0xb, 0x4}, @func={0xa, 0x0, 0x0, 0xc, 0x4}, @enum={0x2, 0x2, 0x0, 0x6, 0x4, [{0x9, 0xff}, {0xe, 0x81}]}]}, {0x0, [0x5f, 0x2e]}}, &(0x7f0000000b80)=""/26, 0x50, 0x1a, 0x1, 0x10}, 0x28) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x7, 0x0, r4, 0x7, '\x00', 0x0, r7, 0x1, 0x4, 0x2}, 0x50) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d80)={@map=0xffffffffffffffff, 0xc, 0x0, 0x401, &(0x7f0000000c80)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000cc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000d00)=[0x0, 0x0, 0x0], &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000010c0)={&(0x7f0000000dc0)="986997628981dc478b71c89bfbd6b42a", &(0x7f0000000e00)=""/168, &(0x7f0000000ec0)="f9efc882395f31ca98e420750b1fa2e55023f8d1e9a487c79a235476eab9f632292c9b8735a58caeea135bb28bb31d7bf790233c98afb079b445c5bfeb295461046b854f8d3267cdb6e08a5ea5a9746aa1c9ba319db746a72d36ae8e743ee52b295208d236a3a9f8a4cb05d3fcf06cef00a08328355bb929ae2bbb53200319c312d2464ee8616d1d5a695a78634ed5cce15c9ae1025a3b4e61a69eb7c39c7442c159f12500c677110d35f01747ce1a6b8d6550b5eb1857ea2e2fef2bd66d6e77586733d2d72fbd1c9b492ee4e11da3b4ec3273c4e854c69c2bd4750196f5a2e33a", &(0x7f0000000fc0)="4124893e4df2914e0b0c7784cf5d25abfa965a8eef7bb586858aa00447332acc26f6ec4405e73ddd19f04e3e04e5bdd45d74c74d3ee6b62c7a41689a0c45398d662611ea7b322c2d1e1846410e64f14449325c361731d7fced6294c295b58f5136ef84e90b5b10d9370fe09bec0a624e9f1cbd45131a61ae3b1ae8e5d2e97cd36560df6423459c54201d8901bfe90d80c597d3d343efcc2f2e7cdfca9cd82fa8e22e1c61fe8603a4c9d5683747de9bd482a8f219809ca2b1ffbc8be7c2c4f251e07362752d6796e299b8e2087ba0d78dc5150666ea4963f978bf68", 0x80ec, r8}, 0x38) r10 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000001100), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r10, &(0x7f0000001140)={'veth0', 0x32, 0x36}, 0x8) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0x14, 0x9, 0x8, 0x6, 0x0, 0x1, 0x10008, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000001180), 0x9}, 0xe598, 0x3, 0x7f9, 0x8, 0x6, 0x42, 0x0, 0x0, 0xf, 0x0, 0x80000000}, 0xffffffffffffffff, 0x3, r8, 0x8) openat$cgroup_procs(r6, &(0x7f0000001240)='cgroup.procs\x00', 0x2, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001280)={0xffffffffffffffff}) recvmsg(r11, &(0x7f0000001840)={&(0x7f00000012c0)=@phonet, 0x80, &(0x7f0000001780)=[{&(0x7f0000001340)=""/157, 0x9d}, {&(0x7f0000001400)=""/175, 0xaf}, {&(0x7f00000014c0)=""/119, 0x77}, {&(0x7f0000001540)=""/205, 0xcd}, {&(0x7f0000001640)=""/47, 0x2f}, {&(0x7f0000001680)=""/90, 0x5a}, {&(0x7f0000001700)=""/98, 0x62}], 0x7, &(0x7f0000001800)=""/21, 0x15}, 0x2) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001a80)={0x1b, 0x0, 0x0, 0x2, 0x0, r11, 0xe87, '\x00', r2, r3, 0x3, 0x0, 0x3}, 0x50) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001b00)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0xc0000000, '\x00', r2, r7, 0x4, 0x5, 0x5}, 0x50) r14 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001bc0)=@bpf_ext={0x1c, 0x15, &(0x7f0000001880)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [@cb_func={0x18, 0x7, 0x4, 0x0, 0x7}, @generic={0x0, 0x7, 0x7, 0x1, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xc052}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001940)='GPL\x00', 0x101, 0xcb, &(0x7f0000001980)=""/203, 0x40f00, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x24117, 0xffffffffffffffff, 0x0, &(0x7f0000001b80)=[r12, r8, r9, r8, r13, r1, r5, r8], 0x0, 0x10, 0x9}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d00)={{r1}, &(0x7f0000001c80), &(0x7f0000001cc0)=r14}, 0x20) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001d40)='cgroup.threads\x00', 0x2, 0x0) r15 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001dc0)={0x3, 0x4, 0x4, 0xa, 0x0, r13, 0x1, '\x00', r2, r7, 0x4, 0x0, 0x2}, 0x50) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001e40)=@o_path={&(0x7f0000001d80)='./file0\x00', 0x0, 0x10, r15}, 0x18) syz_clone(0x2100, &(0x7f0000001e80)="ece7968dc429b6bdf75d765cdf09bda235e0a66c16adfe6ade06dbb2c36b2712ed4dd53d9be0ab6226dcccb20998aacb82c1b5eeb7c1114dc965ac2435182a03643aeff6da3f7b379f85dbc49a6667f567be153ac73941f1019c9bda75255677b2d68a85a45174f173a6cfe49f940ea3a8573f4621153ab2c53d50f8ba7cd073561c294728d823c954c7ac13f0561578399a359f15ee46644667ac2258e5216db3b1098e562b10573864e3e156", 0xad, &(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0)="65bf0ee1371f1f4654318233e85ba3c903616d48a6739f3448ac6d669ebdead9603dd997ac3314e0b4cdf26b4a64b215d523659c561e985267fb2adabfb3490add515a114d8595e2a7d1fec69a3567b100a2502710ff0dab7b6361dabb402f089981a737011fedf360a7524f7c8a96fa1ee75eeb6ea0fac60945432ac599a9eec6cb577944a55593a7a21fc99d7f0e84b06f1c669696b141fe8382d40e8d5f5483cf4d9056662ae2ea7cd4c9bb16b56671") r16 = openat$cgroup(0xffffffffffffffff, &(0x7f0000002080)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r16, &(0x7f00000020c0)='cpuacct.usage_user\x00', 0x0, 0x0) 2.473634728s ago: executing program 2 (id=6168): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000004000000040000000a"], 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x16, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000008e04226d18110000", @ANYRES8=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r2}, &(0x7f0000000040), &(0x7f0000000180)=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x18) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f00000100000000010000", @ANYRES32, @ANYBLOB="00000100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000c650ba4100"/20], 0x50) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000004c0)={r5, &(0x7f0000000340), 0x0}, 0x20) close(r5) (async, rerun: 32) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (rerun: 32) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 32) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) (rerun: 32) close(r8) (async, rerun: 32) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async, rerun: 32) ioctl$SIOCSIFHWADDR(r8, 0x8923, &(0x7f0000002280)={'syzkaller0\x00', @random="2d311e000008"}) (async) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a0, &(0x7f0000000340)='%d\x00\x00\x00\x00j\xfef;q1\x95\xf4\xe4\x13\x95k\x00\x10\x00\x00\x00\x00\x00\x00\x0f\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcf\x01t\r%\xad-\x13\xb0 E\xaaC\xc388\x13\xc6H\x0f \x03\x86\xb5\xbfq\'\xab!\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdf\xde\x91\xfd\xf1B*j\n\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r10}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r11}, 0x10) (async) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r12, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) (async) ioctl$TUNATTACHFILTER(r12, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x48, 0x94}, {0x6}]}) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000080000000000000064ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) ioctl$TUNGETDEVNETNS(r6, 0x54e3, 0x0) 2.444156431s ago: executing program 0 (id=6003): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r4}, 0x10) socketpair(0x15, 0x4, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r7}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x13, 0x8, &(0x7f0000000940)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7030000070400008500000021000000b70000000000000095"], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r8, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r10}, 0x10) socketpair(0xb, 0x6, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000600)='ext4_es_lookup_extent_exit\x00', r9, 0x0, 0x5}, 0x18) sendmsg$inet(r11, &(0x7f0000000900)={&(0x7f0000000680)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000000780)=[{&(0x7f00000006c0)="3449c8ad5f356d", 0x7}, {&(0x7f0000000700)="c588c7ad1f55a278be02351c99df8a80f868f57ea2be0cb0bd6db6e896d8f09defba07d57b5f273ac13973d7081f913d79a5ff411fea72d4c4ce8478169edb4da01d479bcb2cf4c9a835948184ea83d8bb126f14c52d", 0x56}], 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="1400000000000004000000000200000001000000000000005c000000000000000000000007000000890bb0e00000010a010101861c000000020609d8e75c9c531697020dd7ae8852418da50eb9a78c892332ac141426e000000164010102ffffffffac1e01010000000000000000640101000000000000001400000000000000000000000200000003000000000000001400000000000000000000000100000003000000000000001100000000000000000000000100000002002000000000001400000000000000000000000100000007000000000000001400000000ffec0000000000020000003d0b000000000000110000000000000000000000010000000400000000000000"], 0x108}, 0x80) 388.855812ms ago: executing program 1 (id=6169): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1e0000000000000004000000ff00000004010000", @ANYRES32, @ANYBLOB="05000000000000000000b6b6942052a44c420000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300"/28], 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r3}, 0x10) write$cgroup_int(r1, &(0x7f0000000200), 0x43451) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000717c33ba830a6fda79cabe8eb53e6e000000000000"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10002}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{}, &(0x7f00000008c0), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x20, 0x10, &(0x7f0000000b00)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x73cea2d47785b24c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0xfffffebd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xebd7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') socketpair(0x21, 0x800, 0x6, &(0x7f0000000000)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r5, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r6}, 0xc) getpid() close(r7) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000200), &(0x7f00000003c0)=r8}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000fe030000000500000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) 388.165742ms ago: executing program 2 (id=6170): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x3, 0x20000000000000b9, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='signal_generate\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000640)=ANY=[@ANYRES16, @ANYRESHEX=r3, @ANYRES32, @ANYRES64=r1, @ANYRESOCT=r1, @ANYBLOB="d142304389b63b11c106fa1c47c3811699a53fa340d89468beb63003cdf273c6dc99753ed6345ab907dd1609b3e0c9fee648f3b7d6d88e5fb17602d4f72be348413da97d7ae883949aff5232b58c3afea22059c2cff5b5975b4e09e266d00a5afe436a016a0f47e705ab664b3a76519901370efe963a27868fad2a7652a72b8626c581e00da85a9c09ecea17571958705f1014e204f8bd4ad4406c9ec56c2b7ee3eb1bd541d4b08bd808a539b71262d9995b932b63bab70679c62c9bad5c5d0d620ce3a3a13c48b3b5791b94ad817378695a1a9676ce10ad670289f13e7bc7a33ec9e85a8bf5bef989012c7333d610961905efa462af", @ANYRES8, @ANYRESDEC=r4, @ANYRES32=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c01"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000340)='mm_page_alloc\x00', r6}, 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000080)='U', 0x1080}], 0x29a}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 387.434013ms ago: executing program 3 (id=6171): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0x28}, 0x18) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000006c0)={&(0x7f0000000340)="adfa28a09acda0ec02b68e9dee8506e7ed7f2d9340b72c871d2696359a2968478f666afba8c2082e45a3730d9743c39a12e85696f4bc0aebd75aba06a741eebfb93ab9cb7aea1251bbfb492f582f414909e87043531e875cacf09fdd342cd9c2d556ebd1cbc24dee418635446f8b4c3906053229a676a4d8e6ae398103327d890aa214b58147", &(0x7f00000004c0)=""/237, &(0x7f0000000400)="c679a4a6faa4d7afcb5d", &(0x7f00000005c0)="c5cef1787e8e97685a6513262164f834c3444322b6314442d6ea2879cd87f0b19dc07ebd69ad7e77bd10f2623c7b952751e97f52fc09df2c49c57b61aadc694a5a782c885acd42a3f91ce4c90fc1fc2d9c70b8f82f8722501b5ec5fa3ca35e65eb77be862998215f88d3d6", 0x4, r3, 0x4}, 0x38) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair(0x2, 0x1, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001", @ANYBLOB], 0x50) close(r2) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000ffffffff7b8af8ff00000000bfa2000000000000070200befeffffffb703000008000000b7040000000000008500000003002d009500000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x8, 0xe, 0x3, 0x7, 0x0, 0xbc, 0x140, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x1, @perf_bp={&(0x7f0000000180)}, 0x10450, 0x6, 0x7, 0x0, 0x4, 0x7, 0x40, 0x0, 0x68, 0x0, 0x1ff}, 0x0, 0x7, r6, 0x8) write$cgroup_devices(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="1e031800dd5c980128854d"], 0xffdd) 386.001862ms ago: executing program 4 (id=6172): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004020000080000d0f49153b946376100", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000004080000000000000003000000000000000000000002000000000000000000000000000002000000000000000000000004"], 0x0, 0x56}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="020000000400000008000000010000008012962b17a6a5d8874320ab3ea38731f8b654db45d24967c1", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="000000000100"/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r3}, &(0x7f0000000800), &(0x7f0000000840)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xf, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r7}, 0x10) (async) unlink(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) (async) r8 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000200)='ns/mnt\x00') ioctl$TUNSETIFF(r8, 0xb701, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x9, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xd0, &(0x7f0000000340)=""/208, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3fffffd}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x2020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) 367.776804ms ago: executing program 4 (id=6173): perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000007c0)='sched_switch\x00'}, 0x18) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="180900001200000000000000fe000000850000006d"], &(0x7f0000000980)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x65) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='workqueue_queue_work\x00', r1}, 0x18) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x10000, 0x1, 0x3, 0x4b51adbea1b2bac5}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x1) close(0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c230000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x40047452, 0xf0ff1f00000000) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdd, 0x3, 0x0, 0x0, 0x0, 0x4000000000, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x400000000000, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="0000000000a78ac527a6520d9236a1001d00ff0000019500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200), 0x3}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000200)='tegra_dma_complete_cb\x00', r3, 0x0, 0x4}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) close(r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="18003633000000000000000000000000000004000000bb7f1a006600feff000000009500000000000000687d3fb6779c50bfd7bf65be65f67426e74ec21535a73238ff1049f3eed0590278735ca5f34389"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xd0, 0x61e5cc96}, 0x4c) 314.65219ms ago: executing program 3 (id=6174): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x6, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000000000000850000001c00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f0000000800)=""/163}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB="000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r4) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0500000005000000fd0900008500000041000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"/297], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000180), 0x800, r6}, 0x38) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f0000000180)=r7, 0x4) sendmsg$inet(r9, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r10}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000200000010000000000000079120000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x1c, 0x20000000000000bb, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x22, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 302.524111ms ago: executing program 3 (id=6175): perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000b80)=ANY=[@ANYBLOB="0a00000016000000b30000007f"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18050000000000000000000000000000851000000600000018290000", @ANYRES32=r1, @ANYBLOB="00000000000000006600000000000000180000000000000000000000000000009500000000000000a60a000000000000180000002020782500000000002020207b0af8ff00000000bd510000000000000701000000feffffb702000008000000b70300000000000085000000190000009500000000000022"], &(0x7f0000000000)='GPL\x00', 0x5, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x5c}, 0x4a) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) socketpair(0x3, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0xbc, 0x0, 0x0, 0x38b7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x200000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x2, 0x0, r5, 0xc607, '\x00', 0x0, r5, 0x4, 0x1, 0x4}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = syz_clone(0x8000500, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, r8, 0xffffffffffffffff, r0, 0x1) sendmsg$inet(r7, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) 90.237851ms ago: executing program 1 (id=6176): perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x2, 0xfffffffffffffffc, 0x8}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x8) r0 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdd, 0x3, 0x0, 0x0, 0x0, 0x4000000000, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0xffffffffffffffff, 0x400000000000, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x4}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000440)={&(0x7f0000000140)="9c0b0c61177a72173f2cb652430ee08ec48e88446071d1292414a4b0c98cb5aaa34069975802fec5a302", &(0x7f0000000180)=""/96, &(0x7f0000000200)="dd6e3a1feda0a1ebadea678656177c68219ef135b3c2bea88c3c573e", &(0x7f0000000240)="353298723ed8845883d1cc765c41784271d2b28afb02fe93f4e05a99dde21a0457be2fad3b8450e6fb8f52d44a084eda325689619244bdefc663761c1e061b43b718652541aa00eb6e0399879490e8d0ba6ee8f67e824049c192abe98569c01a7ccbac063da28dc2d194fdbc59a78d92b63ded8e3c8366c0c6f6bd572a73786913431ce2d1dc0f699b45242b3805a8514f7520f8d7d249c00ab27bd151799769cd9b2b008c207ff0ae", 0xfffffff7, r3}, 0x38) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000500)={0x4, 0x80, 0x0, 0x7, 0x0, 0x20, 0x0, 0xfffffffffffffff7, 0x81410, 0xa, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xb15, 0x1, @perf_config_ext={0xfffffffffffffffb, 0x6}, 0x400, 0x9, 0x6, 0x6, 0x7f, 0x7, 0x400, 0x0, 0x7, 0x0, 0x5c}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000), 0xfdef) 0s ago: executing program 0 (id=6003): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r4}, 0x10) socketpair(0x15, 0x4, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r7}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x13, 0x8, &(0x7f0000000940)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7030000070400008500000021000000b70000000000000095"], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r8, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r10}, 0x10) socketpair(0xb, 0x6, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000600)='ext4_es_lookup_extent_exit\x00', r9, 0x0, 0x5}, 0x18) sendmsg$inet(r11, &(0x7f0000000900)={&(0x7f0000000680)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000000780)=[{&(0x7f00000006c0)="3449c8ad5f356d", 0x7}, {&(0x7f0000000700)="c588c7ad1f55a278be02351c99df8a80f868f57ea2be0cb0bd6db6e896d8f09defba07d57b5f273ac13973d7081f913d79a5ff411fea72d4c4ce8478169edb4da01d479bcb2cf4c9a835948184ea83d8bb126f14c52d", 0x56}], 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x108}, 0x80) kernel console output (not intermixed with test programs): 0: link becomes ready [ 23.284634][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.292887][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.301445][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.308904][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.323907][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.332450][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.339486][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.347043][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.355426][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.362503][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.389808][ T275] device veth0_vlan entered promiscuous mode [ 23.396864][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.405431][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.414204][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.422810][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.430741][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.438181][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.445736][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.454373][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.462785][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.469815][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.477381][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.485681][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.494153][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.501227][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.508613][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.517178][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.525650][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.533761][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.542191][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.550050][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.558201][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.566693][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.575005][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.582642][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.598598][ T279] device veth0_vlan entered promiscuous mode [ 23.612477][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.621251][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.629578][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.636653][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.645135][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.653665][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.662435][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.670320][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.679459][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.687642][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.695868][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.704239][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.712750][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.720157][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.733955][ T275] device veth1_macvtap entered promiscuous mode [ 23.742880][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.750596][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.759019][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.767352][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.775970][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.792054][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.805787][ T279] device veth1_macvtap entered promiscuous mode [ 23.813321][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.821734][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.830065][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.838617][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.847143][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.855433][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.863793][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.882436][ T277] device veth0_vlan entered promiscuous mode [ 23.889455][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.897827][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.905942][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.913793][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.922168][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.930111][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.938791][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.947441][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.955618][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.963785][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.971359][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.978747][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.986263][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.995132][ T276] device veth0_vlan entered promiscuous mode [ 24.002571][ T278] device veth0_vlan entered promiscuous mode [ 24.017444][ T277] device veth1_macvtap entered promiscuous mode [ 24.026673][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.035479][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.043942][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.052399][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.061022][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.069323][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.079697][ T276] device veth1_macvtap entered promiscuous mode [ 24.090931][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.099197][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.115962][ T275] request_module fs-gadgetfs succeeded, but still no fs? [ 24.127110][ T275] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 24.138591][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.147082][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.158575][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.167242][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.176211][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.185168][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.193964][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.202602][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.214461][ T278] device veth1_macvtap entered promiscuous mode [ 24.220700][ C0] hrtimer: interrupt took 34104 ns [ 24.234129][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.282508][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.296658][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.328905][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.341429][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.367539][ T333] cgroup: syz.2.6 (333) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 25.394575][ T333] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 26.172942][ T365] device pim6reg1 entered promiscuous mode [ 26.243482][ T379] sock: sock_set_timeout: `syz.4.21' (pid 379) tries to set negative timeout [ 26.299750][ T378] sock: sock_set_timeout: `syz.4.21' (pid 378) tries to set negative timeout [ 26.563179][ T24] kauditd_printk_skb: 38 callbacks suppressed [ 26.563191][ T24] audit: type=1400 audit(1761252825.220:112): avc: denied { create } for pid=393 comm="syz.0.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 26.681318][ T24] audit: type=1400 audit(1761252825.290:113): avc: denied { create } for pid=393 comm="syz.0.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 26.997242][ T407] device wg2 entered promiscuous mode [ 27.059821][ T24] audit: type=1400 audit(1761252825.710:114): avc: denied { relabelfrom } for pid=400 comm="syz.2.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 27.170467][ T24] audit: type=1400 audit(1761252825.730:115): avc: denied { relabelto } for pid=400 comm="syz.2.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 27.190276][ T24] audit: type=1400 audit(1761252825.740:116): avc: denied { setopt } for pid=410 comm="syz.1.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.461601][ T24] audit: type=1400 audit(1761252826.120:117): avc: denied { create } for pid=434 comm="syz.1.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 28.016942][ T24] audit: type=1400 audit(1761252826.670:118): avc: denied { cpu } for pid=463 comm="syz.3.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 28.087957][ T24] audit: type=1400 audit(1761252826.700:119): avc: denied { write } for pid=467 comm="syz.0.44" name="ppp" dev="devtmpfs" ino=152 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.377015][ T490] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.384276][ T490] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.196076][ T535] device pim6reg1 entered promiscuous mode [ 29.409858][ T546] cgroup: fork rejected by pids controller in /syz2 [ 29.985124][ T568] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.010170][ T568] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.025713][ T568] device bridge_slave_0 entered promiscuous mode [ 30.067169][ T568] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.109749][ T568] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.141709][ T568] device bridge_slave_1 entered promiscuous mode [ 30.268127][ T24] audit: type=1400 audit(1761252828.920:120): avc: denied { create } for pid=597 comm="syz.4.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 30.411169][ T24] audit: type=1400 audit(1761252829.070:121): avc: denied { create } for pid=608 comm="syz.3.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 30.533461][ T568] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.540569][ T568] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.547884][ T568] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.555001][ T568] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.813096][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.825436][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.842555][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.861072][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.949241][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.961098][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.981899][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.988987][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.010855][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.021010][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.028067][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.047435][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.065411][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.120514][ T568] device veth0_vlan entered promiscuous mode [ 31.173168][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.205197][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.213132][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.284510][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.301181][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.442765][ T568] device veth1_macvtap entered promiscuous mode [ 31.519393][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.571180][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.585602][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.674940][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.712919][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.749822][ T677] ±ÿ: renamed from team_slave_1 [ 31.760961][ T678] device pim6reg1 entered promiscuous mode [ 31.922952][ T296] device bridge_slave_1 left promiscuous mode [ 31.929465][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.937121][ T296] device bridge_slave_0 left promiscuous mode [ 31.943768][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.952196][ T296] device veth1_macvtap left promiscuous mode [ 32.154828][ T24] kauditd_printk_skb: 4 callbacks suppressed [ 32.154840][ T24] audit: type=1400 audit(1761252830.810:126): avc: denied { create } for pid=695 comm="syz.2.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 32.495865][ T698] device syzkaller0 entered promiscuous mode [ 32.659181][ T24] audit: type=1400 audit(1761252831.310:127): avc: denied { create } for pid=725 comm="syz.3.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 33.062085][ T24] audit: type=1400 audit(1761252831.720:128): avc: denied { create } for pid=738 comm="syz.3.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 34.292120][ T24] audit: type=1400 audit(1761252832.950:129): avc: denied { create } for pid=806 comm="syz.1.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 34.580253][ T822] device pim6reg1 entered promiscuous mode [ 34.635189][ T24] audit: type=1400 audit(1761252833.290:130): avc: denied { create } for pid=823 comm="syz.2.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 34.711653][ T24] audit: type=1400 audit(1761252833.360:131): avc: denied { create } for pid=825 comm="syz.1.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 34.955618][ T838] device sit0 entered promiscuous mode [ 35.062724][ T24] audit: type=1400 audit(1761252833.720:132): avc: denied { create } for pid=837 comm="syz.0.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 35.573103][ T861] device syzkaller0 entered promiscuous mode [ 35.720881][ T871] tap0: tun_chr_ioctl cmd 1074025675 [ 35.782650][ T871] tap0: persist enabled [ 35.841076][ T876] tap0: tun_chr_ioctl cmd 1074025675 [ 35.925702][ T876] tap0: persist enabled [ 36.610398][ T899] device veth0_vlan left promiscuous mode [ 36.699598][ T899] device veth0_vlan entered promiscuous mode [ 36.752461][ T913] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 36.778812][ T913] syzkaller0: persist disabled [ 37.016554][ T933] device sit0 entered promiscuous mode [ 38.090533][ T979] device pim6reg1 entered promiscuous mode [ 40.245489][ T1047] device wg2 left promiscuous mode [ 40.291164][ T1047] device wg2 entered promiscuous mode [ 40.710895][ T1089] device veth1_macvtap left promiscuous mode [ 41.296556][ T1102] device pim6reg1 entered promiscuous mode [ 41.373058][ T1096] device sit0 left promiscuous mode [ 41.699938][ T24] audit: type=1400 audit(1761252840.350:133): avc: denied { create } for pid=1154 comm="syz.1.224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 42.005037][ T1171] device pim6reg1 entered promiscuous mode [ 42.043238][ T1175] ±: renamed from pim6reg1 [ 42.140333][ T1178] device sit0 entered promiscuous mode [ 42.519423][ T1191] device pim6reg1 entered promiscuous mode [ 42.935571][ T24] audit: type=1400 audit(1761252841.590:134): avc: denied { create } for pid=1209 comm="syz.0.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 43.256767][ T1220] device pim6reg1 entered promiscuous mode [ 43.458933][ T1245] device wg2 entered promiscuous mode [ 45.662016][ T1307] device syzkaller0 entered promiscuous mode [ 46.026219][ T1320] device veth0_to_team entered promiscuous mode [ 46.063632][ T1325] device pim6reg1 entered promiscuous mode [ 46.153237][ T24] audit: type=1400 audit(1761252844.810:135): avc: denied { tracepoint } for pid=1326 comm="syz.0.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 46.277233][ T24] audit: type=1400 audit(1761252844.930:136): avc: denied { ioctl } for pid=1335 comm="syz.4.277" path="socket:[18230]" dev="sockfs" ino=18230 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 46.302486][ T1338] device sit0 left promiscuous mode [ 47.853940][ T24] audit: type=1400 audit(1761252846.510:137): avc: denied { create } for pid=1415 comm="syz.2.299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 48.044957][ T1438] device sit0 entered promiscuous mode [ 48.401597][ T1464] device syzkaller0 entered promiscuous mode [ 48.489758][ T1470] device pim6reg1 entered promiscuous mode [ 48.900066][ T1485] ±ÿ: renamed from team_slave_1 [ 49.622618][ T1504] device syzkaller0 entered promiscuous mode [ 49.890066][ T1516] device syzkaller0 entered promiscuous mode [ 50.114333][ T1533] device sit0 left promiscuous mode [ 50.258138][ T1536] device sit0 entered promiscuous mode [ 50.454256][ T24] audit: type=1400 audit(1761252849.110:138): avc: denied { create } for pid=1540 comm="syz.0.334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 51.887937][ T1600] device veth0_vlan left promiscuous mode [ 52.017333][ T1600] device veth0_vlan entered promiscuous mode [ 52.169113][ T1607] device pim6reg1 entered promiscuous mode [ 53.397575][ T24] audit: type=1400 audit(1761252852.050:139): avc: denied { create } for pid=1661 comm="syz.4.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 53.545678][ T24] audit: type=1400 audit(1761252852.200:140): avc: denied { create } for pid=1681 comm="syz.4.376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 53.624575][ T1682] device veth1_macvtap left promiscuous mode [ 53.690973][ T1693] device veth1_macvtap entered promiscuous mode [ 53.714176][ T1693] device macsec0 entered promiscuous mode [ 53.728349][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 53.956828][ T1701] device pim6reg1 entered promiscuous mode [ 54.020872][ T1710] device sit0 left promiscuous mode [ 54.659465][ T1757] device pim6reg1 entered promiscuous mode [ 55.364708][ T1796] syz.1.405[1796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.364799][ T1796] syz.1.405[1796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.786644][ T24] audit: type=1400 audit(1761252855.440:141): avc: denied { create } for pid=1802 comm="syz.3.408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 58.022349][ T24] audit: type=1400 audit(1761252856.670:142): avc: denied { create } for pid=1829 comm="syz.2.416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 60.750667][ T1903] device macsec0 entered promiscuous mode [ 60.876951][ T1906] device syzkaller0 entered promiscuous mode [ 61.005541][ T322] syzkaller0: tun_net_xmit 48 [ 61.643361][ T1949] device pim6reg1 entered promiscuous mode [ 61.933613][ T1955] device syzkaller0 entered promiscuous mode [ 64.583910][ T24] audit: type=1400 audit(1761252863.240:143): avc: denied { create } for pid=2051 comm="syz.2.480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 64.688728][ T24] audit: type=1400 audit(1761252863.340:144): avc: denied { write } for pid=2065 comm="syz.0.485" name="cgroup.subtree_control" dev="cgroup2" ino=397 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 64.770976][ T24] audit: type=1400 audit(1761252863.370:145): avc: denied { open } for pid=2065 comm="syz.0.485" path="" dev="cgroup2" ino=397 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 64.795266][ T24] audit: type=1400 audit(1761252863.390:146): avc: denied { create } for pid=2069 comm="syz.1.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 65.346528][ T24] audit: type=1400 audit(1761252864.000:147): avc: denied { create } for pid=2105 comm="syz.0.495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 65.512670][ T2106] device sit0 entered promiscuous mode [ 65.792133][ T2113] device syzkaller0 entered promiscuous mode [ 66.365710][ T2137] device syzkaller0 entered promiscuous mode [ 67.329528][ T2166] device pim6reg1 entered promiscuous mode [ 67.540385][ T24] audit: type=1400 audit(1761252866.190:148): avc: denied { create } for pid=2169 comm="syz.1.513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 68.363079][ T2203] syz.3.522 uses obsolete (PF_INET,SOCK_PACKET) [ 68.774450][ T2214] ------------[ cut here ]------------ [ 68.780141][ T2214] trace type BPF program uses run-time allocation [ 68.853598][ T2214] WARNING: CPU: 1 PID: 2214 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 68.865141][ T2214] Modules linked in: [ 68.878607][ T2214] CPU: 1 PID: 2214 Comm: syz.1.524 Not tainted syzkaller #0 [ 68.889091][ T2214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 68.900887][ T2214] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 68.907939][ T2214] Code: 85 e9 14 fe ff ff e8 99 fa ef ff 31 c0 e9 15 fe ff ff e8 8d fa ef ff c6 05 34 c9 2c 05 01 48 c7 c7 c0 77 05 85 e8 7a a4 fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 68.929363][ T2214] RSP: 0018:ffffc900013df468 EFLAGS: 00010246 [ 68.944873][ T2214] RAX: 557815e8fdcc4c00 RBX: 0000000000000001 RCX: 0000000000080000 [ 68.962012][ T2214] RDX: ffffc900018dc000 RSI: 0000000000001ef7 RDI: 0000000000001ef8 [ 68.990201][ T2229] syz.3.530[2229] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.990285][ T2229] syz.3.530[2229] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.000863][ T2214] RBP: ffffc900013df4b0 R08: dffffc0000000000 R09: ffffed103ee2a5f8 [ 69.073992][ T2214] R10: ffffed103ee2a5f8 R11: 1ffff1103ee2a5f7 R12: ffff88810b540000 [ 69.123434][ T2214] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888110575800 [ 69.145593][ T2233] device sit0 left promiscuous mode [ 69.281932][ T2214] FS: 00007f2b325e66c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 69.300739][ T2214] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 69.311092][ T2214] CR2: 0000000025016c64 CR3: 00000001164bb000 CR4: 00000000003506a0 [ 69.329717][ T2214] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 69.419146][ T2214] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 69.445954][ T2214] Call Trace: [ 69.469371][ T2214] ? __fdget+0x1a1/0x230 [ 69.505152][ T2214] resolve_pseudo_ldimm64+0x526/0x1020 [ 69.520562][ T2214] ? bpf_check+0xd680/0xd680 [ 69.527307][ T2214] ? bpf_check+0x765e/0xd680 [ 69.533126][ T2214] bpf_check+0x8d4b/0xd680 [ 69.537997][ T2214] ? kvm_sched_clock_read+0x18/0x40 [ 69.544307][ T2214] ? sched_clock+0x3a/0x40 [ 69.560225][ T2214] ? bpf_get_btf_vmlinux+0x60/0x60 [ 69.565859][ T2214] ? __irq_exit_rcu+0x40/0x150 [ 69.571464][ T2214] ? irq_exit_rcu+0x9/0x10 [ 69.576545][ T2214] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 69.584938][ T2214] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 69.630847][ T2214] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 69.674995][ T2214] ? __stack_depot_save+0x1e0/0x4c0 [ 69.686368][ T2214] ? kvm_sched_clock_read+0x18/0x40 [ 69.698690][ T2214] ? kvm_sched_clock_read+0x18/0x40 [ 69.724051][ T2214] ? sched_clock+0x3a/0x40 [ 69.779800][ T2214] ? sched_clock_cpu+0x1b/0x3d0 [ 69.785197][ T2214] ? sched_clock+0x3a/0x40 [ 69.791128][ T2214] ? sched_clock_cpu+0x1b/0x3d0 [ 69.796298][ T2214] ? __irq_exit_rcu+0x40/0x150 [ 69.801595][ T2214] ? irq_exit_rcu+0x9/0x10 [ 69.806223][ T2214] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 69.833073][ T2214] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 69.852029][ T2214] ? memset+0x35/0x40 [ 69.856131][ T2214] ? bpf_obj_name_cpy+0x193/0x1e0 [ 69.861835][ T2214] bpf_prog_load+0xf5a/0x1420 [ 69.866782][ T2214] ? map_freeze+0x320/0x320 [ 69.872016][ T2214] ? selinux_bpf+0xc7/0xf0 [ 69.877161][ T2214] ? security_bpf+0x82/0xa0 [ 69.888253][ T2214] __se_sys_bpf+0x442/0x680 [ 69.893278][ T2214] ? __x64_sys_bpf+0x90/0x90 [ 69.897999][ T2214] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 69.904509][ T2214] ? __kasan_check_read+0x11/0x20 [ 69.909665][ T2214] __x64_sys_bpf+0x7b/0x90 [ 69.915844][ T2214] do_syscall_64+0x31/0x40 [ 69.922479][ T2214] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 69.928591][ T2214] RIP: 0033:0x7f2b33b7dfc9 [ 69.933809][ T2214] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 70.024854][ T2214] RSP: 002b:00007f2b325e6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 70.130800][ T2214] RAX: ffffffffffffffda RBX: 00007f2b33dd4fa0 RCX: 00007f2b33b7dfc9 [ 70.212493][ T2214] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005 [ 70.311180][ T2214] RBP: 00007f2b33c00f91 R08: 0000000000000000 R09: 0000000000000000 [ 70.346484][ T2214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 70.403044][ T2214] R13: 00007f2b33dd5038 R14: 00007f2b33dd4fa0 R15: 00007ffc8657e208 [ 70.439153][ T2214] ---[ end trace 74bba0902fb168e2 ]--- [ 71.414911][ T2332] device pim6reg1 entered promiscuous mode [ 71.520812][ T24] audit: type=1400 audit(1761252870.170:149): avc: denied { ioctl } for pid=2341 comm="syz.1.562" path="" dev="cgroup2" ino=129 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 71.869998][ T2353] ÿÿÿÿÿÿ: renamed from vlan1 [ 72.133607][ T2351] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.216284][ T2351] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.258806][ T2351] device bridge_slave_0 entered promiscuous mode [ 72.308629][ T2351] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.326865][ T2351] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.334636][ T2351] device bridge_slave_1 entered promiscuous mode [ 72.732504][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.769139][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.828726][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.862292][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.888591][ T640] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.895705][ T640] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.955737][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 72.963576][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.972275][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.980572][ T640] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.987767][ T640] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.048432][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 73.069284][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 73.122768][ T2400] device pim6reg1 entered promiscuous mode [ 73.193502][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 73.447338][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 73.502197][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 73.622415][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 73.682437][ T2351] device veth0_vlan entered promiscuous mode [ 73.740080][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 73.792772][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 73.847023][ T2351] device veth1_macvtap entered promiscuous mode [ 73.860312][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 73.879502][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 73.888737][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 73.947529][ T24] audit: type=1400 audit(1761252872.600:150): avc: denied { ioctl } for pid=2417 comm="syz.1.584" path="mnt:[4026532284]" dev="nsfs" ino=4026532284 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.000048][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 74.060969][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 74.229216][ T2451] device sit0 left promiscuous mode [ 74.647153][ T2465] syz.2.597[2465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.647233][ T2465] syz.2.597[2465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.083017][ T439] device bridge_slave_1 left promiscuous mode [ 75.268944][ T439] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.347882][ T439] device bridge_slave_0 left promiscuous mode [ 75.387754][ T439] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.422099][ T439] device veth1_macvtap left promiscuous mode [ 75.428470][ T439] device veth0_vlan left promiscuous mode [ 79.083852][ T2619] cgroup: fork rejected by pids controller in /syz3 [ 80.351459][ T2660] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.358649][ T2660] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.367355][ T2660] device bridge_slave_0 entered promiscuous mode [ 80.374835][ T2660] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.382142][ T2660] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.401337][ T2660] device bridge_slave_1 entered promiscuous mode [ 81.472902][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 81.487393][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 81.945953][ T2691] device syzkaller0 entered promiscuous mode [ 81.958345][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 81.967205][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 81.975667][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.982989][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 81.990450][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 82.001499][ T2701] device wg2 entered promiscuous mode [ 82.023358][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 82.032752][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 82.041533][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.048726][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.076638][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 82.086664][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 82.145594][ T439] device bridge_slave_1 left promiscuous mode [ 82.175896][ T439] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.241955][ T439] device bridge_slave_0 left promiscuous mode [ 82.248137][ T439] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.331504][ T439] device veth1_macvtap left promiscuous mode [ 82.476080][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 82.486784][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 82.499609][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 82.514463][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 82.548006][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 82.556247][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 82.592862][ T2660] device veth0_vlan entered promiscuous mode [ 82.599228][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 82.647628][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 82.666176][ T2751] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.673407][ T2751] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.686851][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 82.697259][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 82.709115][ T2660] device veth1_macvtap entered promiscuous mode [ 82.793479][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 82.804765][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 82.825166][ T24] audit: type=1400 audit(1761252881.480:151): avc: denied { create } for pid=2763 comm="syz.4.678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 82.852426][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 82.891917][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 82.926108][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 84.087491][ T2787] device sit0 entered promiscuous mode [ 84.445809][ T2823] device syzkaller0 entered promiscuous mode [ 84.643494][ T2843] device sit0 entered promiscuous mode [ 85.324672][ T2850] device syzkaller0 entered promiscuous mode [ 85.774564][ T2863] device syzkaller0 entered promiscuous mode [ 86.911417][ T2940] device wg2 left promiscuous mode [ 87.142372][ T2958] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 88.352889][ T2991] device veth1_macvtap left promiscuous mode [ 88.377630][ T2991] device macsec0 left promiscuous mode [ 88.457233][ T2996] device veth1_macvtap entered promiscuous mode [ 88.512745][ T2996] device macsec0 entered promiscuous mode [ 89.256647][ T3029] : port 1(erspan0) entered blocking state [ 89.300872][ T3029] : port 1(erspan0) entered disabled state [ 89.308899][ T3028] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 89.319712][ T3029] device erspan0 entered promiscuous mode [ 90.342894][ T24] audit: type=1400 audit(1761252889.000:152): avc: denied { create } for pid=3092 comm="syz.1.762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 90.437187][ T24] audit: type=1400 audit(1761252889.090:153): avc: denied { create } for pid=3105 comm="syz.1.766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 90.445408][ T3106] syz.1.766[3106] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.459194][ T3106] syz.1.766[3106] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.528796][ T3095] device syzkaller0 entered promiscuous mode [ 90.862300][ T3117] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 92.553069][ T3211] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.561818][ T3211] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.708481][ T3211] device bridge_slave_1 left promiscuous mode [ 92.724884][ T3211] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.788148][ T3211] device bridge_slave_0 left promiscuous mode [ 92.797255][ T3211] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.617479][ T3256] device syzkaller0 entered promiscuous mode [ 93.768428][ T3273] device sit0 entered promiscuous mode [ 94.250166][ T3294] syz.4.821[3294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.250216][ T3294] syz.4.821[3294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.355314][ T3293] syz.4.821[3293] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.367541][ T3294] syz.4.821[3294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.380369][ T3293] syz.4.821[3293] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.395038][ T3294] syz.4.821[3294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.483462][ T3312] device veth0_to_batadv entered promiscuous mode [ 94.696809][ T3317] device veth0_vlan left promiscuous mode [ 94.718085][ T3317] device veth0_vlan entered promiscuous mode [ 94.752281][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.764217][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 94.782308][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 95.731511][ T3381] device pim6reg1 entered promiscuous mode [ 97.486533][ T3446] syz.2.865[3446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.486595][ T3446] syz.2.865[3446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.557065][ T3448] syz.0.866[3448] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.619099][ T3448] syz.0.866[3448] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.196812][ T3509] device syzkaller0 entered promiscuous mode [ 98.856069][ T3554] device veth0_vlan left promiscuous mode [ 98.939093][ T3554] device veth0_vlan entered promiscuous mode [ 99.242669][ T3563] device wg2 entered promiscuous mode [ 99.351601][ T3576] device sit0 left promiscuous mode [ 99.478609][ T3581] device sit0 entered promiscuous mode [ 99.921160][ T3611] device sit0 left promiscuous mode [ 100.394150][ T3632] device syzkaller0 entered promiscuous mode [ 101.854667][ T3714] device sit0 entered promiscuous mode [ 102.334710][ T3753] device pim6reg1 entered promiscuous mode [ 103.707690][ T3770] device syzkaller0 entered promiscuous mode [ 108.841635][ T4011] tap0: tun_chr_ioctl cmd 2147767521 [ 110.568755][ T4107] syz.4.1055[4107] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.568844][ T4107] syz.4.1055[4107] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.884116][ T4117] device veth0_vlan left promiscuous mode [ 110.919283][ T4117] device veth0_vlan entered promiscuous mode [ 112.183420][ T4162] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 112.521212][ T4183] ip6_tunnel:  xmit: Local address not yet configured! [ 112.531232][ T4183] ip6_tunnel:  xmit: Local address not yet configured! [ 112.550737][ C1] ip6_tunnel:  xmit: Local address not yet configured! [ 112.701254][ T4193] device pim6reg1 entered promiscuous mode [ 113.080724][ C1] ip6_tunnel:  xmit: Local address not yet configured! [ 113.101628][ C1] ip6_tunnel:  xmit: Local address not yet configured! [ 113.808043][ T4244] device syzkaller0 entered promiscuous mode [ 113.900505][ T4253] device sit0 left promiscuous mode [ 114.524463][ T24] audit: type=1400 audit(1761252913.180:154): avc: denied { create } for pid=4270 comm="syz.4.1097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 115.791402][ T4326] device sit0 entered promiscuous mode [ 116.580981][ C1] ip6_tunnel:  xmit: Local address not yet configured! [ 117.097879][ T4351] device syzkaller0 entered promiscuous mode [ 117.508545][ T4386] syz.2.1126[4386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.508603][ T4386] syz.2.1126[4386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.541789][ T4380] device wg2 left promiscuous mode [ 117.569370][ T4386] device wg2 entered promiscuous mode [ 118.802228][ T4434] device syzkaller0 entered promiscuous mode [ 122.029494][ T4526] device pim6reg1 entered promiscuous mode [ 124.900724][ C1] ip6_tunnel:  xmit: Local address not yet configured! [ 125.034882][ T4645] device sit0 entered promiscuous mode [ 125.785008][ T4692] device veth0_vlan left promiscuous mode [ 125.820406][ T4692] device veth0_vlan entered promiscuous mode [ 126.730421][ T4746] device veth0_vlan left promiscuous mode [ 126.768127][ T4746] device veth0_vlan entered promiscuous mode [ 126.822777][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 126.876693][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 126.896525][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 127.005681][ T4762] device syzkaller0 entered promiscuous mode [ 128.049844][ T4805] device pim6reg1 entered promiscuous mode [ 128.215954][ T4823] dvmrp1: tun_chr_ioctl cmd 1074812118 [ 128.291934][ T4826] device syzkaller0 entered promiscuous mode [ 130.098252][ T4894] : renamed from bond_slave_0 [ 130.246957][ T4894] device sit0 left promiscuous mode [ 133.532043][ T5055] device syzkaller0 entered promiscuous mode [ 134.965195][ T5151] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 135.125964][ T5159] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.133217][ T5159] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.360514][ T5169] syz.4.1356[5169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.360569][ T5169] syz.4.1356[5169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.379637][ T5167] syz.4.1356[5167] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.529834][ T5167] syz.4.1356[5167] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.336283][ T5169] device syzkaller0 entered promiscuous mode [ 136.595372][ T5198] device wg2 entered promiscuous mode [ 137.016750][ T5225] device pim6reg1 entered promiscuous mode [ 138.271240][ T5262] device pim6reg1 entered promiscuous mode [ 138.393553][ T5262] device sit0 left promiscuous mode [ 138.418733][ T5270] device pim6reg1 entered promiscuous mode [ 140.254688][ T5353] device syzkaller0 entered promiscuous mode [ 140.300986][ T5358] device wg2 left promiscuous mode [ 140.539937][ T5375] device veth0_vlan left promiscuous mode [ 140.574966][ T5375] device veth0_vlan entered promiscuous mode [ 140.637835][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 140.651213][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 140.669887][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 142.184123][ C1] ip6_tunnel:  xmit: Local address not yet configured! [ 142.711261][ T5447] device veth1_macvtap left promiscuous mode [ 142.717387][ T5447] device macsec0 left promiscuous mode [ 142.759542][ T5447] device veth1_macvtap entered promiscuous mode [ 142.768389][ T5447] device macsec0 entered promiscuous mode [ 142.795781][ T5452] device sit0 left promiscuous mode [ 142.945607][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 144.333751][ T5513] device wg2 left promiscuous mode [ 144.354482][ T5515] device wg2 entered promiscuous mode [ 145.948359][ T5577] device veth0_vlan left promiscuous mode [ 145.988571][ T5577] device veth0_vlan entered promiscuous mode [ 148.770782][ T5684] device syzkaller0 entered promiscuous mode [ 149.048148][ T5709] device wg2 left promiscuous mode [ 149.229863][ T5708] device wg2 entered promiscuous mode [ 149.681648][ T5734] device syzkaller0 entered promiscuous mode [ 149.986882][ T5758] device pim6reg1 entered promiscuous mode [ 150.474342][ T5784] device syzkaller0 entered promiscuous mode [ 150.516902][ T5789] device pim6reg1 entered promiscuous mode [ 151.743707][ T5857] device wg2 entered promiscuous mode [ 151.836998][ T5864] device pim6reg1 entered promiscuous mode [ 151.884586][ T5867] device veth0_vlan left promiscuous mode [ 151.909326][ T5867] device veth0_vlan entered promiscuous mode [ 151.946044][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 151.956811][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 151.966777][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 152.294829][ T5887] device wg2 left promiscuous mode [ 152.362561][ T5887] device wg2 entered promiscuous mode [ 152.639220][ T5910] device sit0 entered promiscuous mode [ 153.012286][ T5920] syz.4.1568[5920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.012350][ T5920] syz.4.1568[5920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.232063][ T5996] device wg2 left promiscuous mode [ 155.283018][ T5996] device wg2 entered promiscuous mode [ 155.427185][ T6013] device syzkaller0 entered promiscuous mode [ 156.056548][ T6037] device sit0 left promiscuous mode [ 156.153911][ T6037] device sit0 entered promiscuous mode [ 156.365905][ T6045] device sit0 entered promiscuous mode [ 156.994300][ T6058] ÿÿÿÿÿÿ: renamed from vlan1 [ 159.161330][ T6144] device veth0_vlan left promiscuous mode [ 159.172497][ T6144] device veth0_vlan entered promiscuous mode [ 159.210761][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 159.219229][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 159.294087][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 159.340827][ T6154] device sit0 left promiscuous mode [ 159.385604][ T24] audit: type=1400 audit(1761252958.040:155): avc: denied { read } for pid=6162 comm="syz.1.1641" dev="nsfs" ino=4026532286 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 159.502186][ T24] audit: type=1400 audit(1761252958.080:156): avc: denied { open } for pid=6162 comm="syz.1.1641" path="uts:[4026532286]" dev="nsfs" ino=4026532286 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 160.756654][ T6191] device syzkaller0 entered promiscuous mode [ 162.561083][ T6258] device sit0 entered promiscuous mode [ 163.011063][ T6296] device pim6reg1 entered promiscuous mode [ 164.308803][ T6351] device veth1_macvtap left promiscuous mode [ 164.664614][ T6353] device syzkaller0 entered promiscuous mode [ 165.011792][ T6357] device syzkaller0 entered promiscuous mode [ 165.335721][ T6383] device syzkaller0 entered promiscuous mode [ 165.345154][ T6380] device sit0 left promiscuous mode [ 165.556566][ T6381] device sit0 entered promiscuous mode [ 167.419426][ T6437] device syzkaller0 entered promiscuous mode [ 168.567360][ T6489] device syzkaller0 entered promiscuous mode [ 169.159358][ T6503] device sit0 left promiscuous mode [ 169.392665][ T6513] device veth1_macvtap entered promiscuous mode [ 169.404629][ T6513] device macsec0 entered promiscuous mode [ 169.431225][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 169.791794][ T6511] device syzkaller0 entered promiscuous mode [ 171.389425][ T24] audit: type=1400 audit(1761252970.040:157): avc: denied { create } for pid=6632 comm="syz.4.1779" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 174.727076][ T6773] device pim6reg1 entered promiscuous mode [ 175.639484][ T6837] device syzkaller0 entered promiscuous mode [ 176.741438][ C1] ip6_tunnel:  xmit: Local address not yet configured! [ 176.783233][ T6878] device syzkaller0 entered promiscuous mode [ 177.863832][ T6901] device pim6reg1 entered promiscuous mode [ 178.515645][ T6908] device syzkaller0 entered promiscuous mode [ 178.886833][ T6940] device veth0_vlan left promiscuous mode [ 178.897275][ T6940] device veth0_vlan entered promiscuous mode [ 178.932024][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 178.943895][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 178.962966][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 182.846166][ T7124] device pim6reg1 entered promiscuous mode [ 183.516074][ T7153] device veth1_macvtap left promiscuous mode [ 184.712270][ T7231] device syzkaller0 entered promiscuous mode [ 184.762983][ T7231] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 186.318908][ T7332] device pim6reg1 entered promiscuous mode [ 186.912390][ T7378] device syzkaller0 entered promiscuous mode [ 186.929572][ T7386] device pim6reg1 entered promiscuous mode [ 186.964026][ T7371] device wg2 left promiscuous mode [ 188.050866][ T7417] device syzkaller0 entered promiscuous mode [ 188.512798][ T7457] device pim6reg1 entered promiscuous mode [ 188.661912][ T7471] device veth0_vlan left promiscuous mode [ 188.697740][ T7471] device veth0_vlan entered promiscuous mode [ 188.757411][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.773730][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.814308][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 189.250916][ T7480] device syzkaller0 entered promiscuous mode [ 189.628836][ T7533] device pim6reg1 entered promiscuous mode [ 189.997104][ T7564] ±ÿ: renamed from team_slave_1 [ 190.606643][ T7590] device pim6reg1 entered promiscuous mode [ 190.757752][ T7593] device syzkaller0 entered promiscuous mode [ 191.142479][ T7625] device wg2 entered promiscuous mode [ 191.336552][ T7645] device pim6reg1 entered promiscuous mode [ 192.097252][ T7681] device veth0_vlan left promiscuous mode [ 192.111552][ T7681] device veth0_vlan entered promiscuous mode [ 193.015427][ T7730] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 193.050038][ T7730] device syzkaller0 entered promiscuous mode [ 194.554735][ T7809] device syzkaller0 entered promiscuous mode [ 194.936131][ T7836] device pim6reg1 entered promiscuous mode [ 195.479806][ T7855] device wg2 entered promiscuous mode [ 195.540298][ T7868] device syzkaller0 entered promiscuous mode [ 197.236441][ T24] audit: type=1400 audit(1761252995.890:158): avc: denied { ioctl } for pid=8002 comm="syz.1.2157" path="mnt:[4026532284]" dev="nsfs" ino=4026532284 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 197.420510][ T8021] device veth0_vlan left promiscuous mode [ 197.457505][ T8021] device veth0_vlan entered promiscuous mode [ 197.539668][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.560331][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 197.584111][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 201.522849][ T8244] device veth0_vlan left promiscuous mode [ 201.598926][ T8244] device veth0_vlan entered promiscuous mode [ 201.905057][ T8266] syz.1.2228[8266] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.905117][ T8266] syz.1.2228[8266] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.919685][ T8329] syz.1.2245[8329] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.004593][ T8329] syz.1.2245[8329] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.016725][ T8332] device wg2 left promiscuous mode [ 203.074791][ T8335] Â: renamed from pim6reg1 [ 203.123615][ T8332] device wg2 entered promiscuous mode [ 203.283989][ T8354] device syzkaller0 entered promiscuous mode [ 203.769576][ T8359] device syzkaller0 entered promiscuous mode [ 204.005101][ T8387] syz.4.2260[8387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.005191][ T8387] syz.4.2260[8387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.307090][ T8411] syz.3.2267[8411] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.357224][ T8414] syz.3.2267[8414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.389576][ T8411] syz.3.2267[8411] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.396429][ T8414] syz.3.2267[8414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.839646][ T8445] device veth0_vlan left promiscuous mode [ 204.959237][ T8445] device veth0_vlan entered promiscuous mode [ 204.985971][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 205.005701][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 205.049128][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 205.755055][ T8483] device pim6reg1 entered promiscuous mode [ 205.856461][ T8494] device veth0_vlan left promiscuous mode [ 205.920907][ T8494] device veth0_vlan entered promiscuous mode [ 206.197915][ T8501] device syzkaller0 entered promiscuous mode [ 206.231031][ T8501] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 208.541579][ T8581] device pim6reg1 entered promiscuous mode [ 208.791330][ T8612] device wg2 entered promiscuous mode [ 209.536667][ T8674] device pim6reg1 entered promiscuous mode [ 212.469302][ T8787] device veth1_macvtap left promiscuous mode [ 212.850559][ T8794] device syzkaller0 entered promiscuous mode [ 213.472283][ T8846] ÿÿÿÿÿÿ: renamed from vlan1 [ 215.116643][ T24] audit: type=1400 audit(1761253013.770:159): avc: denied { create } for pid=8915 comm="syz.0.2412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 215.349333][ T8914] device sit0 left promiscuous mode [ 215.642367][ T8924] device sit0 entered promiscuous mode [ 216.136078][ T8945] device wg2 left promiscuous mode [ 216.291603][ T8952] device wg2 entered promiscuous mode [ 216.426081][ T8960] device syzkaller0 entered promiscuous mode [ 216.457700][ T8958] device pim6reg1 entered promiscuous mode [ 216.627480][ T8981] device macsec0 left promiscuous mode [ 217.109190][ T9014] device sit0 left promiscuous mode [ 217.544191][ T9036] bpf_get_probe_write_proto: 2 callbacks suppressed [ 217.544202][ T9036] syz.3.2449[9036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.554249][ T9036] syz.3.2449[9036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.567420][ T9036] syz.3.2449[9036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.582133][ T9036] syz.3.2449[9036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.403526][ T9060] device syzkaller0 entered promiscuous mode [ 218.867032][ T9085] device pim6reg1 entered promiscuous mode [ 219.682617][ T9136] device pim6reg1 entered promiscuous mode [ 220.124738][ T9178] device wg2 left promiscuous mode [ 220.230283][ T9178] device wg2 entered promiscuous mode [ 220.793359][ T9210] Q±6ã`Ò˜: renamed from lo [ 221.139062][ T9260] : renamed from bond_slave_0 [ 221.833958][ T9308] device pim6reg1 entered promiscuous mode [ 222.177570][ T9333] device wg2 left promiscuous mode [ 222.203294][ T9333] device wg2 entered promiscuous mode [ 223.640891][ T2899] ip6_tunnel: GPL xmit: Local address not yet configured! [ 223.649394][ T2899] ip6_tunnel: GPL xmit: Local address not yet configured! [ 223.670682][ C1] ip6_tunnel: GPL xmit: Local address not yet configured! [ 223.684804][ T95] udevd[95]: worker [297] terminated by signal 33 (Unknown signal 33) [ 223.710849][ T95] udevd[95]: worker [297] failed while handling '/devices/virtual/block/loop0' [ 223.865659][ T9433] tap1: tun_chr_ioctl cmd 35108 [ 223.874649][ T9434] tap1: tun_chr_ioctl cmd 1074025677 [ 223.892632][ T9434] tap1: linktype set to 780 [ 223.903796][ T9432] tap1: tun_chr_ioctl cmd 1074025677 [ 223.909142][ T9432] tap1: linktype set to 258 [ 223.938962][ T24] audit: type=1400 audit(1761253022.590:160): avc: denied { create } for pid=9428 comm="syz.1.2570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 224.661107][ C1] ip6_tunnel: GPL xmit: Local address not yet configured! [ 224.740692][ C1] ip6_tunnel: GPL xmit: Local address not yet configured! [ 225.676969][ T9543] device syzkaller0 entered promiscuous mode [ 227.008036][ T9600] device macsec0 entered promiscuous mode [ 227.369302][ T9620] device syzkaller0 entered promiscuous mode [ 227.701305][ C1] ip6_tunnel: GPL xmit: Local address not yet configured! [ 227.900077][ T9635] pimreg: tun_chr_ioctl cmd 1074025677 [ 227.959237][ T9635] pimreg: linktype set to 6 [ 228.031050][ T9636] pimreg: tun_chr_ioctl cmd 35108 [ 230.055486][ T9718] device sit0 entered promiscuous mode [ 230.402467][ T9742] device pim6reg1 entered promiscuous mode [ 230.905220][ T9760] device syzkaller0 entered promiscuous mode [ 232.939912][ T9852] batadv0: tun_chr_ioctl cmd 2147767521 [ 232.973600][ T9852] batadv0: tun_chr_ioctl cmd 1074025692 [ 233.879816][ T9882] device veth1_macvtap left promiscuous mode [ 234.041722][ T9886] device pim6reg1 entered promiscuous mode [ 234.663020][ T24] audit: type=1400 audit(1761253033.320:161): avc: denied { create } for pid=9929 comm="syz.0.2714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 234.857444][ T24] audit: type=1400 audit(1761253033.510:162): avc: denied { create } for pid=9940 comm="syz.2.2717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 235.776553][ T9977] device sit0 entered promiscuous mode [ 236.262115][ C1] ip6_tunnel: GPL xmit: Local address not yet configured! [ 236.522021][T10017] device syzkaller0 entered promiscuous mode [ 236.738724][T10034] device veth0_vlan left promiscuous mode [ 236.767628][T10034] device veth0_vlan entered promiscuous mode [ 236.875013][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 236.925656][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 236.961835][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 237.614918][T10087] device bridge_slave_1 left promiscuous mode [ 237.651275][T10087] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.712921][T10087] device bridge_slave_0 left promiscuous mode [ 237.719146][T10087] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.807863][T10103] syz.3.2764[10103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.807948][T10103] syz.3.2764[10103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.721834][T10118] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.741499][T10118] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.749530][T10118] device bridge_slave_0 entered promiscuous mode [ 238.758008][T10118] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.766528][T10118] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.775567][T10118] device bridge_slave_1 entered promiscuous mode [ 238.926921][T10132] device syzkaller0 entered promiscuous mode [ 239.320078][T10118] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.327314][T10118] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.334851][T10118] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.342153][T10118] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.655875][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.664825][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.681987][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.752866][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 239.764563][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 239.778190][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 239.790438][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.800771][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 239.810182][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 239.914029][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 239.951069][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 239.978208][T10118] device veth0_vlan entered promiscuous mode [ 240.013060][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.042635][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.106590][T10118] device veth1_macvtap entered promiscuous mode [ 240.150310][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 240.179422][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 240.206738][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 240.226948][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 240.240049][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 240.324962][T10185] device pim6reg1 entered promiscuous mode [ 240.383655][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 240.401462][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 241.332002][ T49] device bridge_slave_1 left promiscuous mode [ 241.347604][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.405037][ T49] device bridge_slave_0 left promiscuous mode [ 241.444177][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.030250][T10240] device sit0 left promiscuous mode [ 242.929779][T10273] device sit0 entered promiscuous mode [ 243.037593][T10283] device veth0_vlan left promiscuous mode [ 243.074331][T10283] device veth0_vlan entered promiscuous mode [ 243.981212][T10317] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.988429][T10317] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.996441][T10317] device bridge_slave_0 entered promiscuous mode [ 244.057089][T10317] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.075348][T10317] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.095448][T10317] device bridge_slave_1 entered promiscuous mode [ 244.308654][T10337] device sit0 entered promiscuous mode [ 244.629021][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 244.629720][ T24] audit: type=1400 audit(1761253043.280:163): avc: denied { create } for pid=10343 comm="syz.1.2833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 244.647465][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 244.733832][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 244.751594][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 244.768715][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.775838][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 244.875940][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 244.889101][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 244.897795][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 244.906504][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.913671][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 244.922774][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 244.930992][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 245.043694][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 245.058429][T10317] device veth0_vlan entered promiscuous mode [ 245.123103][T10356] syz.3.2837[10356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.123194][T10356] syz.3.2837[10356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.187365][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 245.207233][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 245.215136][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 245.223040][T10355] ±: renamed from pim6reg1 [ 245.283817][ T439] device bridge_slave_1 left promiscuous mode [ 245.290274][ T439] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.297982][ T439] device bridge_slave_0 left promiscuous mode [ 245.304398][ T439] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.312672][ T439] device veth1_macvtap left promiscuous mode [ 245.411517][T10317] device veth1_macvtap entered promiscuous mode [ 245.421621][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 245.430479][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 245.440866][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 245.540079][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 245.548982][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 245.557637][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 245.566594][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 245.584440][ T24] audit: type=1400 audit(1761253044.240:164): avc: denied { unmount } for pid=10317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 245.894000][T10375] device pim6reg1 entered promiscuous mode [ 246.023164][ T24] audit: type=1400 audit(1761253044.680:165): avc: denied { append } for pid=10384 comm="syz.1.2846" name="ppp" dev="devtmpfs" ino=152 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 251.126262][T10661] device sit0 left promiscuous mode [ 251.990084][T10708] device sit0 left promiscuous mode [ 252.493044][T10747] syz.4.2943[10747] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.495016][T10747] syz.4.2943[10747] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.263302][T10800] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.283500][T10800] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.818754][T10825] device bridge_slave_1 left promiscuous mode [ 253.827322][T10825] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.839988][T10825] device bridge_slave_0 left promiscuous mode [ 253.846724][T10825] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.028426][T10836] device syzkaller0 entered promiscuous mode [ 254.478120][T10844] device pim6reg1 entered promiscuous mode [ 254.739628][T10878] device pim6reg1 entered promiscuous mode [ 255.650033][T10898] device pim6reg1 entered promiscuous mode [ 256.051697][T10904] syz.2.2987 (10904) used obsolete PPPIOCDETACH ioctl [ 256.649512][T10950] syz.1.2999[10950] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.649581][T10950] syz.1.2999[10950] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.840401][T10962] device syzkaller0 entered promiscuous mode [ 256.880900][T10961] device sit0 left promiscuous mode [ 257.061539][T10966] device sit0 entered promiscuous mode [ 257.449213][T10972] device syzkaller0 entered promiscuous mode [ 257.741064][T10994] device pim6reg1 entered promiscuous mode [ 257.774534][T10999] syz.2.3013[10999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.774601][T10999] syz.2.3013[10999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.886747][T11004] device sit0 entered promiscuous mode [ 258.190185][T11019] device sit0 entered promiscuous mode [ 258.730273][T11037] syz.4.3024[11037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.730333][T11037] syz.4.3024[11037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.052156][T11059] device pim6reg1 entered promiscuous mode [ 259.126392][T11061] device syzkaller0 entered promiscuous mode [ 259.520982][T11082] syz.4.3036[11082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.521039][T11082] syz.4.3036[11082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.851686][T11098] syz.3.3038[11098] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.879469][T11098] syz.3.3038[11098] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.476708][T11109] device pim6reg1 entered promiscuous mode [ 260.699310][T11118] syz.3.3047[11118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.703902][T11118] syz.3.3047[11118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.461888][T11168] device wg2 left promiscuous mode [ 262.217936][T11214] device wg2 left promiscuous mode [ 262.321941][T11214] device wg2 entered promiscuous mode [ 264.119738][T11302] device syzkaller0 entered promiscuous mode [ 264.646854][ T24] audit: type=1400 audit(1761253063.300:166): avc: denied { mounton } for pid=11336 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 265.057004][T11336] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.066582][T11336] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.082104][T11336] device bridge_slave_0 entered promiscuous mode [ 265.141549][T11336] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.180791][T11336] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.189225][T11336] device bridge_slave_1 entered promiscuous mode [ 265.350525][T11357] device syzkaller0 entered promiscuous mode [ 265.395645][T11336] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.402769][T11336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.410078][T11336] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.417161][T11336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.455609][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.464364][ T640] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.572389][ T640] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.605862][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.627917][ T640] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.635028][ T640] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.642540][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.651153][ T640] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.658220][ T640] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.693599][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 265.714921][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 265.740641][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 265.755544][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 265.839490][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 265.863314][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 265.993606][T11336] device veth0_vlan entered promiscuous mode [ 266.001022][T11377] device sit0 entered promiscuous mode [ 266.220512][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 266.237422][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 266.289385][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 266.320375][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 266.332998][T11383] ªªªªªª: renamed from vlan0 [ 266.351449][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 266.368516][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 266.417819][T11336] device veth1_macvtap entered promiscuous mode [ 266.573635][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 266.591458][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 266.632112][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 266.803731][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 266.863590][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 267.278455][T11412] bpf_get_probe_write_proto: 2 callbacks suppressed [ 267.278480][T11412] syz.3.3134[11412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.320647][T11414] device wg2 entered promiscuous mode [ 267.346162][T11412] syz.3.3134[11412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.135810][T11453] device syzkaller0 entered promiscuous mode [ 268.800196][T11474] syz.3.3150[11474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.800299][T11474] syz.3.3150[11474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.755665][T11583] device veth0_vlan left promiscuous mode [ 271.845176][T11583] device veth0_vlan entered promiscuous mode [ 271.922540][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 271.951844][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 271.976816][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 272.337235][T11613] device wg2 entered promiscuous mode [ 273.041929][T11649] device syzkaller0 entered promiscuous mode [ 273.659661][T11709] device veth0_vlan left promiscuous mode [ 273.696470][T11709] device veth0_vlan entered promiscuous mode [ 273.756299][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 273.777285][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 273.842476][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 274.198447][T11728] device sit0 left promiscuous mode [ 274.623680][T11742] device syzkaller0 entered promiscuous mode [ 276.228509][T11821] device aaaaaaaaaaaaaaa entered promiscuous mode [ 276.632875][T11851] device syzkaller0 entered promiscuous mode [ 277.024633][T11861] device veth0_vlan left promiscuous mode [ 277.051964][T11861] device veth0_vlan entered promiscuous mode [ 277.113687][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 277.187924][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 277.212382][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 277.411541][T11888] ÿÿÿÿÿÿ: renamed from vlan1 [ 277.536472][T11891] device sit0 left promiscuous mode [ 277.640967][T11899] device pim6reg1 entered promiscuous mode [ 278.995945][T11977] device pim6reg1 entered promiscuous mode [ 279.020989][T11964] device veth0_vlan left promiscuous mode [ 279.035532][T11964] device veth0_vlan entered promiscuous mode [ 279.088464][T11964] device pim6reg1 entered promiscuous mode [ 279.328188][T11995] device wg2 left promiscuous mode [ 279.802594][ T24] audit: type=1400 audit(1761253078.460:167): avc: denied { associate } for pid=12015 comm="syz.3.3304" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 281.129841][T12067] device syzkaller0 entered promiscuous mode [ 281.312465][T12067] device veth0_vlan left promiscuous mode [ 281.382599][T12067] device veth0_vlan entered promiscuous mode [ 281.961651][T12100] device sit0 entered promiscuous mode [ 282.520310][T12145] device syzkaller0 entered promiscuous mode [ 282.537560][T12144] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.545000][T12144] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.590998][T12149] device pim6reg1 entered promiscuous mode [ 283.349612][T12214] 7B’ç÷ï: renamed from syzkaller0 [ 283.394137][T12217] cgroup: fork rejected by pids controller in /syz0 [ 283.437089][T12220] device pim6reg1 entered promiscuous mode [ 283.533463][T12224] syz.3.3367[12224] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.533507][T12224] syz.3.3367[12224] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.786057][T12226] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.843539][T12226] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.851552][T12226] device bridge_slave_0 entered promiscuous mode [ 283.859841][T12226] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.867330][T12226] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.875056][T12226] device bridge_slave_1 entered promiscuous mode [ 283.948783][T12226] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.955882][T12226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.963211][T12226] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.970380][T12226] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.011123][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.019846][ T439] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.027514][ T439] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.049672][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 284.063171][ T439] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.070278][ T439] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.078119][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 284.086535][ T439] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.093628][ T439] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.152366][T12226] device veth0_vlan entered promiscuous mode [ 284.162026][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 284.177887][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 284.187587][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 284.195675][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 284.203629][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 284.211978][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 284.232959][T12269] device syzkaller0 entered promiscuous mode [ 284.528462][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 284.536819][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 284.546405][T12226] device veth1_macvtap entered promiscuous mode [ 284.558923][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 284.567226][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 284.576137][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 284.621116][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 284.638854][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 285.282820][ T296] device bridge_slave_1 left promiscuous mode [ 285.289007][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.321119][ T296] device bridge_slave_0 left promiscuous mode [ 285.327334][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.335873][ T296] device veth1_macvtap left promiscuous mode [ 285.342140][ T296] device veth0_vlan left promiscuous mode [ 285.773311][T12335] device veth0_vlan left promiscuous mode [ 285.780142][T12335] device veth0_vlan entered promiscuous mode [ 285.790398][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 285.800338][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 285.808523][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 285.857592][T12343] device pim6reg1 entered promiscuous mode [ 286.214962][T12363] device pim6reg1 entered promiscuous mode [ 286.619281][T12397] device sit0 entered promiscuous mode [ 286.876940][T12403] device wg2 entered promiscuous mode [ 287.478777][T12436] device syzkaller0 entered promiscuous mode [ 288.938225][T12493] device sit0 entered promiscuous mode [ 289.120742][T12501] device sit0 left promiscuous mode [ 289.178646][T12502] device sit0 entered promiscuous mode [ 290.836969][T12596] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.847991][T12596] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.217046][T12665] device syzkaller0 entered promiscuous mode [ 292.788686][T12700] device pim6reg1 entered promiscuous mode [ 293.057106][T12711] device macsec0 left promiscuous mode [ 295.711342][T12815] device wg2 left promiscuous mode [ 297.385462][T12846] device veth0_vlan left promiscuous mode [ 297.400877][T12846] device veth0_vlan entered promiscuous mode [ 299.396680][T12920] device pim6reg1 entered promiscuous mode [ 299.972575][T12928] device pim6reg1 entered promiscuous mode [ 300.133645][T12941] device pim6reg1 entered promiscuous mode [ 300.373257][T12959] device sit0 entered promiscuous mode [ 300.811890][T12964] device wg2 entered promiscuous mode [ 300.963968][T12971] device veth0_vlan left promiscuous mode [ 300.988440][T12971] device veth0_vlan entered promiscuous mode [ 301.411394][ T24] audit: type=1400 audit(1761253100.060:168): avc: denied { create } for pid=12994 comm="syz.2.3586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 302.295290][T13022] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.302594][T13022] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.310328][T13022] device bridge_slave_0 entered promiscuous mode [ 302.317892][T13022] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.325257][T13022] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.333016][T13022] device bridge_slave_1 entered promiscuous mode [ 302.515896][T13022] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.522995][T13022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.530282][T13022] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.537375][T13022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.680715][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 302.716067][ T439] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.730502][ T439] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.776714][T13046] device wg2 entered promiscuous mode [ 302.808827][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 302.824472][ T439] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.831758][ T439] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.897284][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 302.910934][ T439] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.918144][ T439] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.940832][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 303.027028][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 303.083115][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 303.170351][T13022] device veth0_vlan entered promiscuous mode [ 303.183605][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 303.204041][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 303.228319][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 303.246675][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 303.270509][T13022] device veth1_macvtap entered promiscuous mode [ 303.311687][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 303.328099][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 303.337055][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 303.362295][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 303.373555][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 303.393711][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 303.403064][ T439] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 303.753870][T13116] device pim6reg1 entered promiscuous mode [ 303.828395][ T9] device bridge_slave_1 left promiscuous mode [ 303.840753][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.881060][ T9] device bridge_slave_0 left promiscuous mode [ 303.907577][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.941026][ T9] device veth0_vlan left promiscuous mode [ 304.369232][T13125] device veth0_vlan left promiscuous mode [ 304.397162][T13125] device veth0_vlan entered promiscuous mode [ 304.665405][T13158] device veth0_vlan left promiscuous mode [ 304.674908][T13158] device veth0_vlan entered promiscuous mode [ 306.304025][T13228] device syzkaller0 entered promiscuous mode [ 306.830921][T13276] device pim6reg1 entered promiscuous mode [ 307.264307][T13288] device syzkaller0 entered promiscuous mode [ 307.569231][T13292] device syzkaller0 entered promiscuous mode [ 307.688514][T13316] device wg2 left promiscuous mode [ 307.883433][T13316] device wg2 entered promiscuous mode [ 307.953389][T13332] syz.4.3681[13332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.953487][T13332] syz.4.3681[13332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.179951][T13346] device pim6reg1 entered promiscuous mode [ 308.225731][T13346] device veth1_macvtap left promiscuous mode [ 308.458271][T13361] device syzkaller0 entered promiscuous mode [ 308.597293][T13361] device veth0_vlan left promiscuous mode [ 308.611544][T13361] device veth0_vlan entered promiscuous mode [ 308.914481][T13383] syz.4.3701[13383] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.914566][T13383] syz.4.3701[13383] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.558165][T13414] device pim6reg1 entered promiscuous mode [ 309.615313][T13421] device sit0 entered promiscuous mode [ 310.339702][T13458] device wg2 left promiscuous mode [ 310.422198][T13469] device sit0 left promiscuous mode [ 310.592105][T13469] device sit0 entered promiscuous mode [ 310.698948][T13491] device pim6reg1 entered promiscuous mode [ 312.233930][ T24] audit: type=1400 audit(1761253110.890:169): avc: denied { attach_queue } for pid=13561 comm="syz.0.3753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 312.628880][T13564] device syzkaller0 entered promiscuous mode [ 313.066039][T13591] device syzkaller0 entered promiscuous mode [ 313.100088][T13589] device sit0 left promiscuous mode [ 314.904514][T13658] device syzkaller0 entered promiscuous mode [ 315.686320][T13683] device sit0 left promiscuous mode [ 316.002295][T13683] device sit0 entered promiscuous mode [ 316.331215][T13712] device pim6reg1 entered promiscuous mode [ 316.516649][T13725] syz.1.3799[13725] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.516713][T13725] syz.1.3799[13725] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.591873][T13732] syz.1.3799[13732] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.691065][T13732] syz.1.3799[13732] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.980604][T13744] device sit0 left promiscuous mode [ 317.135176][T13746] device sit0 entered promiscuous mode [ 318.295992][T13777] device syzkaller0 entered promiscuous mode [ 318.481331][T13774] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.489568][T13774] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.669630][T13800] device bridge_slave_1 left promiscuous mode [ 318.725585][T13800] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.781642][T13800] device bridge_slave_0 left promiscuous mode [ 318.796847][T13800] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.238038][T13950] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.245612][T13950] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.253342][T13950] device bridge_slave_0 entered promiscuous mode [ 320.261396][T13950] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.268817][T13950] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.277527][T13950] device bridge_slave_1 entered promiscuous mode [ 320.643135][T13950] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.650666][T13950] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.657982][T13950] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.665271][T13950] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.727158][ T640] device erspan0 left promiscuous mode [ 320.733365][ T640] : port 1(erspan0) entered disabled state [ 320.826580][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 320.837402][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.856595][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.938401][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 320.947069][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.954159][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.961690][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 320.969997][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.977093][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.993662][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 321.002435][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 321.010523][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 321.019690][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 321.126744][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 321.161027][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 321.204206][T13950] device veth0_vlan entered promiscuous mode [ 321.225040][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 321.235045][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 321.426805][T13950] device veth1_macvtap entered promiscuous mode [ 321.434201][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 321.443009][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 321.450803][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 321.459135][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 321.467820][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 321.529890][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 321.538597][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 321.548158][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 321.557794][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 321.949781][T14019] device veth1_macvtap left promiscuous mode [ 322.008263][T14019] device veth1_macvtap entered promiscuous mode [ 322.014706][T14019] device macsec0 entered promiscuous mode [ 322.066913][T14016] device wg2 entered promiscuous mode [ 323.711049][T14136] device sit0 left promiscuous mode [ 323.845678][T14146] device sit0 entered promiscuous mode [ 324.106101][T14159] device sit0 entered promiscuous mode [ 324.300870][T14159] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.310259][T14159] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.478885][T14166] device bridge_slave_1 left promiscuous mode [ 324.505701][T14166] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.544317][T14166] device bridge_slave_0 left promiscuous mode [ 324.594207][T14166] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.125149][T14186] device veth1_macvtap left promiscuous mode [ 325.132539][T14186] device macsec0 left promiscuous mode [ 325.184613][T14189] device sit0 left promiscuous mode [ 325.253871][T14186] device sit0 entered promiscuous mode [ 326.304120][T14242] syz.4.3917[14242] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.304180][T14242] syz.4.3917[14242] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.486388][T14242] device syzkaller0 entered promiscuous mode [ 327.300737][T14290] device sit0 left promiscuous mode [ 327.309620][T14290] device sit0 entered promiscuous mode [ 327.438333][T14292] device veth1_macvtap left promiscuous mode [ 327.473830][T14292] device veth1_macvtap entered promiscuous mode [ 327.516404][T14292] device macsec0 entered promiscuous mode [ 328.519010][T14365] device syzkaller0 entered promiscuous mode [ 328.928229][T14380] device sit0 left promiscuous mode [ 328.967597][T14385] device sit0 entered promiscuous mode [ 330.177801][T14476] device sit0 left promiscuous mode [ 330.524539][T14494] device syzkaller0 entered promiscuous mode [ 330.545573][T14494] syzkaller0: create flow: hash 843048261 index 1 [ 330.552756][ T7637] syzkaller0: tun_net_xmit 48 [ 330.617371][T14492] syzkaller0: delete flow: hash 843048261 index 1 [ 333.342773][T14655] syz.3.4045[14655] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.342838][T14655] syz.3.4045[14655] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.971788][T14675] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.993070][T14675] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.087752][T14685] device bridge_slave_1 left promiscuous mode [ 334.094570][T14685] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.105399][T14685] device bridge_slave_0 left promiscuous mode [ 334.112411][T14685] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.247312][T14707] device sit0 entered promiscuous mode [ 335.180453][T14747] device veth0_vlan left promiscuous mode [ 335.194393][T14747] device veth0_vlan entered promiscuous mode [ 335.707967][T14775] device veth1_macvtap left promiscuous mode [ 335.759527][T14775] device macsec0 entered promiscuous mode [ 336.175039][T14788] device syzkaller0 entered promiscuous mode [ 336.350514][T14796] device veth0_vlan left promiscuous mode [ 336.360445][T14796] device veth0_vlan entered promiscuous mode [ 336.746753][T14815] device wg2 left promiscuous mode [ 339.592873][T14935] device sit0 left promiscuous mode [ 339.711915][T14938] device sit0 entered promiscuous mode [ 340.067351][T14973] device veth1_macvtap left promiscuous mode [ 340.276510][T15014] device sit0 left promiscuous mode [ 340.349367][T15018] device sit0 entered promiscuous mode [ 342.556171][T15098] device syzkaller0 entered promiscuous mode [ 344.111878][T15143] device pim6reg1 entered promiscuous mode [ 344.777581][T15165] device syzkaller0 entered promiscuous mode [ 345.775342][T15223] device veth0_vlan left promiscuous mode [ 345.831116][T15223] device veth0_vlan entered promiscuous mode [ 345.955101][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 345.993896][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 346.028606][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 347.950736][T15316] device pim6reg1 entered promiscuous mode [ 350.394915][T15373] device syzkaller0 entered promiscuous mode [ 351.710935][T15478] device syzkaller0 entered promiscuous mode [ 352.186624][T15497] -1: renamed from syzkaller0 [ 352.715582][T15519] device pim6reg1 entered promiscuous mode [ 352.773094][T15517] device pim6reg1 entered promiscuous mode [ 353.324258][T15538] device syzkaller0 entered promiscuous mode [ 354.743297][T15633] syz.1.4315[15633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.743360][T15633] syz.1.4315[15633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.924000][T15636] device pim6reg1 entered promiscuous mode [ 354.966682][T15642] device pim6reg1 entered promiscuous mode [ 355.042309][T15663] syz.1.4322[15663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.042371][T15663] syz.1.4322[15663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.084392][T15663] syz.1.4322[15663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.102840][T15663] syz.1.4322[15663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.928952][ T95] udevd[95]: worker [9720] terminated by signal 33 (Unknown signal 33) [ 355.999897][ T95] udevd[95]: worker [9720] failed while handling '/devices/virtual/block/loop3' [ 356.473445][T15742] device syzkaller0 entered promiscuous mode [ 357.562762][T15835] device veth0_vlan left promiscuous mode [ 357.597228][T15835] device veth0_vlan entered promiscuous mode [ 357.766202][T15877] device syzkaller0 entered promiscuous mode [ 358.122702][T15901] device syzkaller0 entered promiscuous mode [ 358.255978][T15925] device syzkaller0 entered promiscuous mode [ 358.332934][T15935] device wg2 left promiscuous mode [ 358.602614][T15979] device wg2 entered promiscuous mode [ 359.136376][T16003] device veth0_to_team entered promiscuous mode [ 360.881734][T16127] device veth1_macvtap entered promiscuous mode [ 360.915027][T16127] device macsec0 entered promiscuous mode [ 361.141500][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 361.826689][T16178] device pim6reg1 entered promiscuous mode [ 362.050307][T16216] device sit0 left promiscuous mode [ 362.159331][T16226] device sit0 entered promiscuous mode [ 363.317728][T16286] device pim6reg1 entered promiscuous mode [ 364.207761][T16315] device veth0_vlan left promiscuous mode [ 364.255602][T16315] device veth0_vlan entered promiscuous mode [ 364.585869][T16340] syz.1.4505[16340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 364.585928][T16340] syz.1.4505[16340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 364.763396][T16348] device pim6reg1 entered promiscuous mode [ 365.712534][T16380] device syzkaller0 entered promiscuous mode [ 366.678473][T16427] device pim6reg1 entered promiscuous mode [ 368.809912][T16565] device wg2 entered promiscuous mode [ 369.610894][T16595] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.618268][T16595] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.688299][T16608] device syzkaller0 entered promiscuous mode [ 369.769133][T16614] device syzkaller0 entered promiscuous mode [ 369.846127][T16615] device veth0_vlan left promiscuous mode [ 369.874357][T16615] device veth0_vlan entered promiscuous mode [ 369.976423][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 370.011357][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 370.029489][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 370.342487][T16632] device sit0 entered promiscuous mode [ 370.857106][T16654] device pim6reg1 entered promiscuous mode [ 371.684422][T16687] device veth0_vlan left promiscuous mode [ 371.709250][T16687] device veth0_vlan entered promiscuous mode [ 372.529957][T16722] device pim6reg1 entered promiscuous mode [ 372.708632][T16748] device pim6reg1 entered promiscuous mode [ 372.723570][T16740] device syzkaller0 left promiscuous mode [ 373.004038][T16763] device syzkaller0 entered promiscuous mode [ 373.013504][T16761] device sit0 left promiscuous mode [ 373.575317][T16822] : port 1(syz_tun) entered blocking state [ 373.583741][T16822] : port 1(syz_tun) entered disabled state [ 373.591184][T16822] device syz_tun entered promiscuous mode [ 373.649522][T16835] device pim6reg1 entered promiscuous mode [ 373.809000][T16852] syz.2.4652[16852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.809114][T16852] syz.2.4652[16852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.930375][T16860] device syzkaller0 entered promiscuous mode [ 373.994467][T16869] pimreg: tun_chr_ioctl cmd 1074025677 [ 374.000125][T16869] pimreg: linktype set to 270 [ 374.045088][T16869] pimreg: tun_chr_ioctl cmd 2147767506 [ 374.124758][T16871] device sit0 left promiscuous mode [ 375.169568][T16933] device veth0_vlan left promiscuous mode [ 375.223694][T16933] device veth0_vlan entered promiscuous mode [ 375.766710][T16968] device syzkaller0 entered promiscuous mode [ 379.426702][T17115] syz.4.4719[17115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.426766][T17115] syz.4.4719[17115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.511106][ T24] audit: type=1400 audit(1761253178.160:170): avc: denied { create } for pid=17107 comm="syz.3.4717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 379.571191][T17115] device wg2 entered promiscuous mode [ 379.954996][T17153] device syzkaller0 entered promiscuous mode [ 380.451715][T17176] syz.1.4736[17176] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.453840][T17176] syz.1.4736[17176] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.809173][T17187] device syzkaller0 entered promiscuous mode [ 381.359242][T17223] device veth0_vlan left promiscuous mode [ 381.375237][T17223] device veth0_vlan entered promiscuous mode [ 381.434407][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 381.448984][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 381.461616][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 381.912146][T17265] device veth1_macvtap left promiscuous mode [ 381.918384][T17265] device macsec0 left promiscuous mode [ 383.843241][T17375] device sit0 left promiscuous mode [ 383.887405][T17379] device macsec0 entered promiscuous mode [ 384.022583][T17388] device wg2 left promiscuous mode [ 384.700975][T17415] syz.4.4806[17415] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 384.701039][T17415] syz.4.4806[17415] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 385.073778][T17435] device syzkaller0 entered promiscuous mode [ 387.522142][T17537] device sit0 entered promiscuous mode [ 387.637857][T17562] device veth0_vlan left promiscuous mode [ 387.659919][T17562] device veth0_vlan entered promiscuous mode [ 387.712013][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 387.736303][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 387.754504][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 388.688202][T17604] device macsec0 left promiscuous mode [ 388.878378][T17626] device macsec0 left promiscuous mode [ 389.460181][T17644] ÿÿÿÿÿÿ: renamed from vlan1 [ 390.340011][T17683] cgroup: fork rejected by pids controller in /syz4 [ 390.381627][T17688] device pim6reg1 entered promiscuous mode [ 391.107012][T17725] device veth0_vlan left promiscuous mode [ 391.124760][T17725] device veth0_vlan entered promiscuous mode [ 391.191690][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 391.220322][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 391.231307][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 391.449075][T17723] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.472209][T17723] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.480320][T17723] device bridge_slave_0 entered promiscuous mode [ 391.555273][T17723] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.570857][T17723] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.578611][T17723] device bridge_slave_1 entered promiscuous mode [ 391.674231][T17748] device sit0 left promiscuous mode [ 392.827272][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 392.838014][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 392.925906][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 392.934892][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 392.943563][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.950901][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 393.092723][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 393.100603][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 393.109204][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 393.117709][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 393.124928][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 393.252713][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 393.270024][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 393.290192][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 393.298796][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 393.307609][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 393.317033][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 393.381007][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 393.390167][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 393.402582][T17723] device veth0_vlan entered promiscuous mode [ 393.443108][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 393.451001][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 393.501336][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 393.517876][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 393.535648][T17723] device veth1_macvtap entered promiscuous mode [ 393.622118][T17809] device syzkaller0 left promiscuous mode [ 393.683480][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 393.712812][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 393.751442][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 393.909836][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 393.927486][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 394.770077][T17850] device veth0_vlan left promiscuous mode [ 394.805833][T17850] device veth0_vlan entered promiscuous mode [ 396.228813][T17918] device bridge_slave_1 entered promiscuous mode [ 396.894346][T17930] : port 1(erspan0) entered blocking state [ 396.907431][T17930] : port 1(erspan0) entered disabled state [ 396.929188][T17930] device erspan0 entered promiscuous mode [ 396.945776][T17931] : port 1(erspan0) entered blocking state [ 396.951840][T17931] : port 1(erspan0) entered forwarding state [ 400.812069][T17961] -1: renamed from syzkaller0 [ 401.906037][T18004] device syzkaller0 entered promiscuous mode [ 402.407370][T18039] device syzkaller0 entered promiscuous mode [ 402.490624][T18060] device macsec0 entered promiscuous mode [ 402.897813][T18089] device pim6reg1 entered promiscuous mode [ 404.034417][T18130] device syzkaller0 entered promiscuous mode [ 404.362182][T18160] device pim6reg1 entered promiscuous mode [ 407.413910][T18252] device pim6reg1 entered promiscuous mode [ 407.752409][T18272] device veth1_macvtap left promiscuous mode [ 407.889403][T18284] device veth1_macvtap entered promiscuous mode [ 407.955838][T18284] device macsec0 entered promiscuous mode [ 408.039088][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 408.197783][T18302] device pim6reg1 entered promiscuous mode [ 408.286134][T18304] device syzkaller0 entered promiscuous mode [ 409.198600][T18354] syz.3.5069[18354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.205654][T18354] syz.3.5069[18354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.345301][T18354] syz.3.5069[18354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.404275][T18354] syz.3.5069[18354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 411.430960][T18454] syzkaller0: mtu less than device minimum [ 411.458872][T18456] syzkaller0: mtu less than device minimum [ 412.267012][T18485] device sit0 entered promiscuous mode [ 413.244911][T18541] device pim6reg1 entered promiscuous mode [ 413.630591][T18553] device syzkaller0 entered promiscuous mode [ 413.951910][T18585] device pim6reg1 entered promiscuous mode [ 414.012803][T18597] device pim6reg1 entered promiscuous mode [ 415.669477][T18684] syz.0.5170[18684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 415.669538][T18684] syz.0.5170[18684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 415.707134][T18683] syz.0.5170[18683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 415.797611][T18697] device veth1_macvtap left promiscuous mode [ 415.940464][T18697] device macsec0 left promiscuous mode [ 416.148278][T18697] device veth1_macvtap entered promiscuous mode [ 416.162966][T18697] device macsec0 entered promiscuous mode [ 417.192106][T18742] device pim6reg1 entered promiscuous mode [ 417.427543][T18745] device pim6reg1 entered promiscuous mode [ 417.831509][T18760] device veth0_vlan left promiscuous mode [ 417.850962][T18760] device veth0_vlan entered promiscuous mode [ 417.857939][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 417.893109][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 417.936560][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 418.764894][T18797] device syzkaller0 entered promiscuous mode [ 418.900157][T18801] device pim6reg1 entered promiscuous mode [ 421.293023][T18887] device pim6reg1 entered promiscuous mode [ 421.651106][T18899] device pim6reg1 entered promiscuous mode [ 422.462391][T18929] device wg2 left promiscuous mode [ 422.518167][T18938] device wg2 entered promiscuous mode [ 423.313705][T19007] syz.4.5266[19007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 423.313772][T19007] syz.4.5266[19007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 423.659735][T19007] device veth0_vlan left promiscuous mode [ 423.701459][T19007] device veth0_vlan entered promiscuous mode [ 423.809376][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 423.848103][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 423.890697][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 423.917564][T19019] device veth0_vlan left promiscuous mode [ 423.947167][T19019] device veth0_vlan entered promiscuous mode [ 424.201154][T19045] device pim6reg1 entered promiscuous mode [ 424.486190][T19070] device veth0_vlan left promiscuous mode [ 424.513692][T19070] device veth0_vlan entered promiscuous mode [ 424.594261][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 424.617315][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 424.680217][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 424.874426][T19083] device syzkaller0 entered promiscuous mode [ 425.621649][T19134] syz.0.5304[19134] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.621718][T19134] syz.0.5304[19134] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.009930][T19162] device pim6reg1 entered promiscuous mode [ 427.019452][T19223] device wg2 entered promiscuous mode [ 427.127022][T19238] device sit0 left promiscuous mode [ 427.228072][T19232] device veth1_macvtap entered promiscuous mode [ 427.240863][T19232] device macsec0 entered promiscuous mode [ 427.262760][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 427.536910][T19277] tap0: tun_chr_ioctl cmd 1074025677 [ 427.547561][T19277] tap0: linktype set to 780 [ 427.737681][T19288] device syzkaller0 entered promiscuous mode [ 427.810816][T19302] device wg2 left promiscuous mode [ 427.840741][T19302] device wg2 entered promiscuous mode [ 427.985109][T19307] device syzkaller0 entered promiscuous mode [ 428.510224][T19345] ªªªªªª: renamed from vlan0 [ 428.602477][T19356] bridge0: port 3(veth1) entered blocking state [ 428.609030][T19356] bridge0: port 3(veth1) entered disabled state [ 428.706829][T19356] device veth1 entered promiscuous mode [ 429.482584][T19397] ÿÿÿÿÿÿ: renamed from vlan1 [ 431.204283][T19471] device pim6reg1 entered promiscuous mode [ 431.872666][T19513] syz.4.5411[19513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.880817][T19513] syz.4.5411[19513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 433.875653][T19608] syz.0.5440[19608] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 433.960839][T19608] syz.0.5440[19608] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.137546][T19687] bridge0: port 1(bridge_slave_0) entered blocking state [ 435.256738][T19687] bridge0: port 1(bridge_slave_0) entered disabled state [ 435.283995][T19687] device bridge_slave_0 entered promiscuous mode [ 435.339075][T19687] bridge0: port 2(bridge_slave_1) entered blocking state [ 435.381810][T19687] bridge0: port 2(bridge_slave_1) entered disabled state [ 435.392236][T19687] device bridge_slave_1 entered promiscuous mode [ 435.808470][T19727] device veth0_vlan left promiscuous mode [ 435.864896][T19727] device veth0_vlan entered promiscuous mode [ 435.930875][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 435.949930][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 435.986237][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 436.078386][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 436.088595][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 436.099775][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 436.113925][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 436.173621][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 436.180825][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 436.220829][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 436.233160][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 436.244868][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 436.252755][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 436.301452][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 436.309221][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 436.325673][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 436.337528][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 436.348008][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 436.370066][T19744] device sit0 entered promiscuous mode [ 436.387084][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 436.406142][T19687] device veth0_vlan entered promiscuous mode [ 436.422529][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 436.431674][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 436.447227][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 436.562647][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 436.646345][T19687] device veth1_macvtap entered promiscuous mode [ 436.701078][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 436.724769][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 436.800977][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 436.859170][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 436.999408][T19761] device veth1_macvtap left promiscuous mode [ 437.017631][T19761] device macsec0 entered promiscuous mode [ 437.599913][ T296] device bridge_slave_1 left promiscuous mode [ 437.609486][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.647333][ T296] device bridge_slave_0 left promiscuous mode [ 437.678801][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.718643][ T296] device veth1_macvtap left promiscuous mode [ 439.914038][T19798] device veth0_vlan left promiscuous mode [ 439.943935][T19798] device veth0_vlan entered promiscuous mode [ 439.999166][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 440.031547][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 440.067458][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 440.681629][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 441.725044][T19904] device pim6reg1 entered promiscuous mode [ 442.024234][ C0] Illegal XDP return value 16128, expect packet loss! [ 443.529521][T19972] device sit0 left promiscuous mode [ 443.908876][T19983] device lo entered promiscuous mode [ 449.181092][T20176] device syzkaller0 entered promiscuous mode [ 449.456760][T20183] device syzkaller0 entered promiscuous mode [ 449.831637][T20208] syzkaller0: refused to change device tx_queue_len [ 451.772839][T20349] device veth0_vlan left promiscuous mode [ 451.797926][T20349] device veth0_vlan entered promiscuous mode [ 452.631263][T20383] device syzkaller0 left promiscuous mode [ 453.315326][T20413] device pim6reg1 entered promiscuous mode [ 454.823311][T20486] device pim6reg1 entered promiscuous mode [ 455.772855][T20595] device sit0 left promiscuous mode [ 455.835799][T20594] device sit0 entered promiscuous mode [ 456.150877][T20607] device pim6reg1 entered promiscuous mode [ 456.962325][T20691] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 457.081791][T20708] device syzkaller0 entered promiscuous mode [ 457.098088][T20711] device sit0 left promiscuous mode [ 457.169668][T20711] device sit0 entered promiscuous mode [ 457.669288][T20749] : renamed from bond_slave_0 [ 457.690282][T20746] device veth0_vlan left promiscuous mode [ 457.719479][T20746] device veth0_vlan entered promiscuous mode [ 457.823227][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 457.849764][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 457.861069][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 458.286953][T20810] device pim6reg1 entered promiscuous mode [ 458.737112][T20818] device syzkaller0 entered promiscuous mode [ 459.917549][T20889] syz.1.5803[20889] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 459.920901][T20889] syz.1.5803[20889] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 461.967848][T20976] device sit0 entered promiscuous mode [ 462.432736][ T24] audit: type=1400 audit(1761253261.090:171): avc: denied { create } for pid=21008 comm="syz.0.5837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 462.502831][T21015] syz.0.5839[21015] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 462.502893][T21015] syz.0.5839[21015] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 462.588721][T21015] device veth0_vlan left promiscuous mode [ 462.610339][T21015] device veth0_vlan entered promiscuous mode [ 462.628574][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 462.644538][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 462.659203][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 463.283482][T21065] device wg2 left promiscuous mode [ 463.371461][T21066] device wg2 entered promiscuous mode [ 463.382131][T21066] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 463.465395][T21066] device syzkaller0 entered promiscuous mode [ 465.001439][T21136] device pim6reg1 entered promiscuous mode [ 465.549121][T21171] Ÿë: port 1(veth0_vlan) entered blocking state [ 465.556499][T21171] Ÿë: port 1(veth0_vlan) entered disabled state [ 465.862340][T21224] syz.4.5899[21224] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.862403][T21224] syz.4.5899[21224] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.157211][T21230] device pim6reg1 entered promiscuous mode [ 466.467008][T21258] device macsec0 left promiscuous mode [ 466.488776][T21258] device veth1_macvtap entered promiscuous mode [ 466.535111][T21258] device macsec0 entered promiscuous mode [ 466.582727][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 466.952151][T21261] device syzkaller0 entered promiscuous mode [ 467.696665][T21323] device veth0_vlan left promiscuous mode [ 467.743283][T21323] device veth0_vlan entered promiscuous mode [ 467.928576][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 467.952484][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 468.025546][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 469.565702][T21397] device pim6reg1 entered promiscuous mode [ 469.839169][T21421] device syzkaller0 entered promiscuous mode [ 471.139035][T21477] device wg2 entered promiscuous mode [ 471.529727][T21498] device syzkaller0 entered promiscuous mode [ 471.763471][T21520] ±ÿ: renamed from team_slave_1 [ 471.857926][T21526] device syzkaller0 entered promiscuous mode [ 472.305719][T21566] device wg2 entered promiscuous mode [ 474.323243][ T296] device veth0_vlan left promiscuous mode [ 481.173419][T21894] device wg2 left promiscuous mode [ 481.249375][T21897] device wg2 entered promiscuous mode [ 482.456622][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 482.465853][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 482.475277][ T640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 483.860749][T21961] device veth0_vlan left promiscuous mode [ 483.935548][T21961] device veth0_vlan entered promiscuous mode [ 483.954450][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 483.998275][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 484.108990][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 485.686273][ T24] audit: type=1400 audit(1761253284.340:172): avc: denied { read } for pid=21994 comm="syz.3.6106" name="cgroup.subtree_control" dev="cgroup2" ino=182 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 486.167361][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 486.180374][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 486.209871][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 489.548352][ T24] audit: type=1400 audit(1761253288.200:173): avc: denied { create } for pid=22079 comm="syz.4.6131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 497.090412][T22172] device syzkaller0 left promiscuous mode SYZFAIL: tun: can't open /dev/net/tun (errno 2: No such file or directory) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=0 req=6003 state=3 status=67 (errno 9: Bad file descriptor) [ 502.408567][ T24] audit: type=1400 audit(1761253301.060:174): avc: denied { write } for pid=267 comm="syz-executor" path="pipe:[14433]" dev="pipefs" ino=14433 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 502.817874][T22245] device syz_tun left promiscuous mode [ 502.823542][T22245] : port 1(syz_tun) entered disabled state [ 503.693352][ T296] : port 1(erspan0) entered disabled state [ 503.702583][ T296] device erspan0 left promiscuous mode [ 503.708065][ T296] : port 1(erspan0) entered disabled state [ 504.061055][ T296] Ÿë: port 1(veth0_vlan) entered disabled state [ 504.068908][ T296] device veth1 left promiscuous mode [ 504.074356][ T296] bridge0: port 3(veth1) entered disabled state [ 504.081228][ T296] device bridge_slave_1 left promiscuous mode [ 504.087441][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 504.094952][ T296] device bridge_slave_0 left promiscuous mode [ 504.101544][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 504.110084][ T296] device bridge_slave_1 left promiscuous mode [ 504.116383][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 504.124015][ T296] device bridge_slave_0 left promiscuous mode [ 504.130293][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 504.140191][ T296] device veth1_macvtap left promiscuous mode [ 504.146391][ T296] device veth0_vlan left promiscuous mode [ 504.152577][ T296] device veth1_macvtap left promiscuous mode [ 504.158707][ T296] device veth0_vlan left promiscuous mode [ 504.164880][ T296] device veth1_macvtap left promiscuous mode [ 504.171170][ T296] device veth0_vlan left promiscuous mode