last executing test programs: 1.584682421s ago: executing program 2 (id=5177): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x7, 0xfff, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r4}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{r2}, &(0x7f0000000580), &(0x7f00000005c0)='%pi6 \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000004c0)={r1, 0x0, 0xfb, 0x0, &(0x7f0000000280)="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", 0x0, 0x4, 0x0, 0x8e, 0x0, &(0x7f0000000380)="1ec34ebd5e0065f78a57950402478011a8bad032fe11594a4a913155cb49e034db431c858f30ca42497c5bc2e4629cb26f3d68b6c1bf4f1839e67838c9ba051d6d2007e0360665a36d152a0f6e9739882c8abbd54172b81113319f87f505ebe8f8840d95688314e6e099a4f3622c7cd58ebbe5e5a1871b441d672591c9e01acbe1c1bd5dd3068aff9177c9ec8991", 0x0, 0x2, 0x0, 0x3}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.520829576s ago: executing program 3 (id=5178): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000ffffffff000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) syz_clone(0x24001100, 0x0, 0x41, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x18, 0x209, 0xff, 0x1, 0x2703, 0xffffffffffffffff, 0x1, '\x00', 0x0, r2, 0x3, 0x1, 0x4}, 0x61) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa2000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x0, 0x2}, 0x48) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r5, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000004c0)=[0x0], 0x0, 0x0, 0x8a, 0x0, 0x0, 0x10, &(0x7f0000000940), 0x0, 0x0, 0x99, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f00000009c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000030000007b8af8ff00000000bfa200000200000007020000f8ff000000b70400000000000085000000030000009500000000000004f83ad5357e9ce341e393491b1b17cd55e2c2cd676b1f4c7d6b2b83970dea8e7f1120f52cde04d540da8d25351211cd7b4e76c6942b22519a010cac1de7a679622b970bfa89cb796c7d4a82407c906310055e0f232d0af14680684bb1e350661a62df2d0118ef7c2bbceafface03d5a0baa0a082458255c2cebe981024e085f4ed355ef1e939d0076309205fa0e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x0, 0x8, 0xcd, 0x4, 0xffffffffffffffff, 0x63, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4}, 0x48) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000dfffffffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x7}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0xd, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b5af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000015000000850000000700000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r9, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r10, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r11}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.395079986s ago: executing program 2 (id=5180): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x9, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x2b, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0xb, 0x8400, 0x1}, 0x48) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1a, 0x1c, &(0x7f0000000680)=ANY=[@ANYRESDEC=r7, @ANYRES8=r5, @ANYRESOCT=r4, @ANYRES64=0x0, @ANYRESHEX=r8, @ANYRESDEC=r1, @ANYRES32=r3, @ANYRES8=r3], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.369044958s ago: executing program 3 (id=5183): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB='<'], 0x0}, 0x90) ioctl$SIOCSIFHWADDR(r2, 0x8946, &(0x7f0000000900)={'veth1_to_hsr\x00', @random='\x00\x00\x00 \x00'}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r4}, &(0x7f0000000080), &(0x7f0000000200)='%-010d \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1a, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xbd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x8, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r6}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 1.21857335s ago: executing program 3 (id=5186): r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, 'rlimit'}, {0x6, 'net'}, {0x2d, 'cpu'}, {0x2b, 'perf_event'}, {0x2d, 'cpuset'}, {0x2b, 'pids'}, {0x2b, 'memory'}]}, 0x34) r1 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x7f, 0x10, 0x2, 0xd, 0x0, 0x8, 0x20, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x10000, 0x100000000}, 0x100, 0x6a0, 0x9, 0x4, 0x18cfd5b6, 0x80, 0x3b8, 0x0, 0x1, 0x0, 0x2}, 0x0, 0x5, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000100)=0x9) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000000140)=@id={0x1e, 0x3, 0x1, {0x4e24, 0x4}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000180)="faa99f9f55c3fd24b4ff119e6965ff6fd53a8604b2121f58ac1c65d98c2945a30e028beaed63d8f7011fe6e419027e756e597fd05f70c38338ba52960661b83b1af89d2a7118e0ccea297bbd70418503e38400fe0bbfd78fd32781227b5e004e7b9c6c9c8445566e10e9139810685a63ddbc2c3c9aa62c90c9b8dd59179acf79a274c677bc789cb489418f6b9529f1c6010754c7f5ab550a4d5dec2f57b04a", 0x9f}, {&(0x7f0000000240)="cad12bcec6dc6774b2249a707f70adc99c51448121706743a534f5f2b2dc086aa09b0fd0259a3f43ccf3e885d9d7a9d578ca6877235a4dcfde6c7596ff4af80f17748529e9f515305d356516e652d8b0f85707f2b7d3d6c317b2c3474f700311c28727654e9449d35ec05bbe968fbcf687ce7d7e1a36e549db6bd02bb91fe13a26bf871d51a8948546badf85924f4af6cbcddb8c7d77b8f65dbc77aa2c38f033f780521c05b1d7ebdca9f6ad8030aa56f162045552797b01420c67f4c0de14398c5e99ea5e7aacad96a8906b5f5cc42eedbf165af0f5b11421e1", 0xda}, {&(0x7f0000000340)="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", 0xfa}, {&(0x7f0000000440)="d1d60f6d5e4f18db22ee51f11597f83be494c5699af8394d4ab2e2a020679e914372", 0x22}], 0x4, &(0x7f00000004c0)="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", 0x1000, 0x1}, 0x0) write$cgroup_subtree(r0, &(0x7f0000001500)={[{0x2d, 'io'}, {0x0, 'cpuacct'}, {0x2b, 'cpu'}, {0x2b, 'cpuset'}]}, 0x1a) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000015c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001540), &(0x7f0000001580)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001600)={r2, 0xffffffffffffffff}, 0x4) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001640), 0x159001, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000001680)={'ip6gre0\x00', @multicast}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f00000018c0)={&(0x7f0000001700), 0x6e, &(0x7f0000001840)=[{&(0x7f0000001780)=""/42, 0x2a}, {&(0x7f00000017c0)=""/95, 0x5f}], 0x2, &(0x7f0000001880)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001b00)={r9, &(0x7f0000001900)="333143dd6249b02d8dc7fea82f8350732ce123096ae4edf6f3a1800b5a19e2f371a9eacc4d361f2b8a3c4b06461bfe44b062754f43ed71b9d1095b33ad0c04138c2c49df9b5ddf777ed3e76df9b305985df1e57da944d6b4b5dab29269c656aa01f46a7d5d22771e23ed81e2d5133a8d9e8225fd137ca68bb318678b159eb1a94c09186833d9680b8a25da154b8e3f842aea3c669e69e72b433312f89146d5bd6db6476f2aa28aa40cdbbc7a38becc7801c9d0df088e24b5a6307a912ea365f0cdc38f21b81e90679f26cb7cda8e5d7ceaac8f248e4e", &(0x7f0000001a00)=""/236}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r12, 0x40082404, &(0x7f0000001b40)=0x7) r13 = syz_clone(0x108000, &(0x7f0000001c00)="a2744ef47d5450d56165579eb9d30fe94d9c7ecb7253f164a8e9a1624dc6955933b272b9974486ecd86d16c9b7164c6f9e2592dc114f67cbf78e8a8c55c7f913f1f183df54a4abd3cbc6f70755aa004ab4572b0a1b806b3a5015f5e0c443bf755bdd7b9471e8ce4b4d4522f8c37aadfbab347af3a2518ceeb48675c892d0d167b17c31811623d9728b58ac53f4430a7ab6fb496f1e52754d965be39c5708dbc25bc537ef921d2eed5d208f592718dc34cc48df16238e39786c7d968a79934584b34b81baaff80490f91bd67eb2dd9118d5b27c64060005abf5e63b", 0xdb, &(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)="849c19ea8b4c9d5e1f9f9edbf82673ae348be8079821a827b1a2fab985efcc8fbec32cc076ba6b317b3a46a942aa2145ccf682b9d6312cd6e9d0c0dc352c3afd6d943881") perf_event_open(&(0x7f0000001b80)={0x4, 0x80, 0x8, 0x4, 0x0, 0x3, 0x0, 0x1, 0x8, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x8, 0x3}, 0x0, 0x200, 0x26bb7e94, 0x8, 0x7, 0x9, 0xf, 0x0, 0x8, 0x0, 0x2}, r13, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002000)={r8, 0x58, &(0x7f0000001f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000002100)={0xb, 0x7, &(0x7f0000001e00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd47}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r8}}]}, &(0x7f0000001e40)='GPL\x00', 0x5, 0xd6, &(0x7f0000001e80)=""/214, 0x41000, 0x3, '\x00', r14, 0x31, r9, 0x8, &(0x7f0000002040)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r7, 0x3, &(0x7f0000002080)=[r2, r10, r2, r9, r12, r3, r11, r7, r3], &(0x7f00000020c0)=[{0x1, 0x3, 0x2, 0x5}, {0x0, 0x2, 0x6, 0xb}, {0x4, 0x2, 0x0, 0x5}], 0x10, 0x6}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002200)={&(0x7f00000021c0)='cpuhp_exit\x00', r10}, 0x10) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000002240)={'pimreg0\x00', 0x1}) socketpair(0x1d, 0x80000, 0x9, &(0x7f0000002280)) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002340)={{r11}, &(0x7f00000022c0), &(0x7f0000002300)='%+9llu \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000023c0)={&(0x7f0000002380)='neigh_create\x00', r12}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002480)={r8, 0x58, &(0x7f0000002400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000024c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x9, '\x00', r15, r6, 0x5, 0x0, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000002540)={r11}, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002580)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x4, '\x00', r15, r12, 0x0, 0x4, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002680)={{r8, 0xffffffffffffffff}, &(0x7f0000002600), &(0x7f0000002640)=r10}, 0x20) r17 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002900)={&(0x7f0000002800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x4, [@restrict={0x1, 0x0, 0x0, 0xb, 0x2}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xb, 0x4}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x57ed3bb8}}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000002880)=""/94, 0x54, 0x5e, 0x0, 0x8}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002a00)=@bpf_tracing={0x1a, 0x7, &(0x7f00000026c0)=@raw=[@ldst={0x2, 0x0, 0x3, 0xa, 0x0, 0x50, 0xfffffffffffffffc}, @alu={0x4, 0x0, 0x2, 0x6, 0xb, 0x100, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r16}}], &(0x7f0000002700)='GPL\x00', 0x1, 0x88, &(0x7f0000002740)=""/136, 0x41000, 0x58, '\x00', r14, 0x17, r17, 0x8, &(0x7f0000002940)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x4014, 0xffffffffffffffff, 0x3, &(0x7f0000002980)=[r3], &(0x7f00000029c0)=[{0x2, 0x5, 0xb, 0x9}, {0x1, 0x4, 0xa, 0x1}, {0x0, 0x2, 0x6, 0x2}], 0x10, 0x9}, 0x90) 1.140040997s ago: executing program 2 (id=5192): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095a30a4b7a40d1e17b7d8849e7ce7768fe04b6ded4729c6f303c4e4e9818ff2f6b3228149b4ab7a1bfb7d8d2e9c9308226830dc7713e7105761b6aed0cae65e9d684f4fa0ccb231c59ac701a70da848caa8b0253468ee96ebc14eea3e0480bcbb7b2f510766ecb652eb82674f6ec5805c40e8dfa"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='global_dirty_state\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffe0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x6, 0x17, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0x0, 0x0, &(0x7f0000001340)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000001afc180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 969.222451ms ago: executing program 4 (id=5196): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 32) perf_event_open(&(0x7f00000000c0)={0x2, 0xfffffffffffffdbe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffbfffd, 0x4, @perf_config_ext={0x4}, 0x0, 0x0, 0x4, 0x0, 0x6, 0x7d, 0x0, 0x0, 0xfffffbff}, 0x0, 0x4, 0xffffffffffffffff, 0x7) (rerun: 32) 966.654651ms ago: executing program 4 (id=5198): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000dfff170100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000838500000071000000950000000000000009"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='fib6_table_lookup\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x31, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059000000"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000740)='ext4_allocate_blocks\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='ext4_allocate_blocks\x00', r2}, 0x10) mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0x90) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'veth1_to_bridge\x00'}) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001400) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8f41c288d409ef0e169a340295f36d4b4", &(0x7f0000000380), 0x5, r5}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) ioctl$TUNSETOFFLOAD(r4, 0x40047451, 0x2000000c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000003c0)=@o_path={&(0x7f0000000340)='./file0\x00', r3, 0x4000, r2}, 0x18) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00'}, 0x10) 868.355319ms ago: executing program 0 (id=5203): close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x3, 0x0, &(0x7f00000031c0)) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'team0\x00', 0x800}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000072000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000600)={'pimreg\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) close(r4) ioctl$SIOCSIFHWADDR(r4, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000005c0)={'lo\x00', 0x400}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) 866.78582ms ago: executing program 4 (id=5205): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{r3}, &(0x7f0000000040), &(0x7f0000000380)='%ps \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 846.389431ms ago: executing program 4 (id=5206): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0x6}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[], 0xfdef) 705.714733ms ago: executing program 0 (id=5207): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x5, 0x6}, 0x48) mkdir(&(0x7f0000000080)='./file0\x00', 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffddf, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffddf, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000040)=ANY=[@ANYRESHEX=r2], &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000000140)=""/192}, 0x90) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000040)=ANY=[@ANYRESHEX=r2], &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000000140)=""/192}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200f1ff8500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200f1ff8500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r7}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000004440)={&(0x7f0000000ec0)=@name={0x1e, 0x2, 0x0, {{}, 0x2}}, 0x10, 0x0}, 0x0) (async) sendmsg$tipc(r8, &(0x7f0000004440)={&(0x7f0000000ec0)=@name={0x1e, 0x2, 0x0, {{}, 0x2}}, 0x10, 0x0}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r7, @ANYRES32=r9], 0x0, 0xd4a, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x0, 0x2c, 0x2a, &(0x7f00000003c0)="a2baf6506a97be64f416476a887f1b1e09d68f9248eb69c03f6cd96c19d135d54c8b8cb8d864373e49db3712", &(0x7f0000000400)=""/42, 0x90, 0x0, 0xab, 0xf, &(0x7f0000000500)="3337f7d1901c2dacba806b3b64e87b18ca77b1dcf5444cebb5b87175bce539d585a52e8077cfab87d69f5fbc8a54b7156723525279644fcd8f1e02225f23392f0ceba51089f3b4a4e19e685fe1b20a854a4d7765429109a52518cf2ac801d8eca74a77a931577c5b726ff37c33d9b4d8264571a187b08d82a101b710af517f0a1386be16cbedda7d5dc2f6812a263e81e4d835725b529b2a37cd0e1d7c53fbb45c9b7a114adbdb699ba389", &(0x7f00000005c0)="f3bfcdb6d8f0153c87c0402a0c05e3", 0x1, 0x0, 0xefd5}, 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000006c0)=ANY=[@ANYRES64=r10, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000680)=ANY=[@ANYRES64=r5, @ANYRES32=r11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r12}, 0x3d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r10}, 0x3d) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r10}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000380)=ANY=[@ANYRESOCT=r3], &(0x7f0000000200)='GPL\x00', 0x6, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r13}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r13}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x28, 0xa, 0x0, &(0x7f0000000040)) bpf$ENABLE_STATS(0x20, &(0x7f0000000340), 0x4) 704.928162ms ago: executing program 0 (id=5208): openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0b32a5b9f844a4610c75256509e3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f30c119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069ed", 0x57}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x16}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf090000000000005509010000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{}, &(0x7f0000000180), &(0x7f0000000600)}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xe, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$unix(0x1, 0x0, 0x0, 0x0) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0b32a5b9f844a4610c75256509e3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f30c119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069ed", 0x57}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x16}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) (async) close(0xffffffffffffffff) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf090000000000005509010000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{}, &(0x7f0000000180), &(0x7f0000000600)}, 0x20) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xe, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) (async) 694.270703ms ago: executing program 4 (id=5209): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000ecff0000000000000018110000", @ANYRES32, @ANYRESHEX=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c40)={r0, 0xe0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1, &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000008c0)=[0x0], 0x0, 0x78, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000a80), &(0x7f0000000ac0), 0x8, 0x1f, 0x8, 0x8, &(0x7f0000000b00)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000900)=ANY=[@ANYBLOB="181df200000000000000000000000000181100006b042ac2330cd21366ff8887c540e550ede102150466ff0f9626b2f9bf23bdddb8f60f1e31e4616ab8d112557d2e3424e95feb2c31790b3b3bb8016f12cf83e7a013fcb6f59edeb5e170dbee3a40", @ANYRES32=r0, @ANYRES8=r1, @ANYRESHEX=0x0], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r1, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r5, 0x58, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0xe, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, [@generic={0xff, 0xd, 0x7, 0x6, 0xfdd2}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3ff}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x6}]}, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x72, &(0x7f00000003c0)=""/114, 0x41000, 0x40, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x2, 0xe, 0x8, 0xe9}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000500)=[r1, r1, r1, r1, r1], &(0x7f0000000680)=[{0x1, 0x2, 0xe}, {0x5, 0x4, 0x6, 0x1}, {0x0, 0x4, 0x1, 0xc}, {0x2, 0x4, 0x0, 0x4}, {0x4, 0x4, 0xf}], 0x10, 0xdf58}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f00000002c0)='nilfs2_segment_usage_freed\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x28, 0x0, 0x0, 0x36, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r8}, 0x10) syz_clone(0x640c7000, 0x0, 0x2020000000000, 0x0, 0x0, 0x0) 691.849064ms ago: executing program 1 (id=5210): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000100)) (async) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000280)=0x1) close(r0) 612.45801ms ago: executing program 1 (id=5211): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x7, 0xfff, 0x9}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x0, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="1802000001000017000000008bb800008500000027000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000"], 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="6112300000ff000061134c0000000000bf2000000000000015000500511b48013d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702000003000000360600000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a83683d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf5fe7030586162c17600674290ca9d8d6413b8199e34f67ceaaa78710f9f8aba4765c91382f497585ca39c595b21afa6bce62b5ab0d44e9c32ad6f0349d92962a58d39494a19a9183362382792ac85578d3de07b7e155cf4ee5e3dd51212d2831bd8e2655b2fbd88791e4c66c832a774919b28b8a62711f0f156e636804e1d3f44a5ff3d63a3a51f0c7ec0c8c25e072194ddd83aa155a537e15c0d91f502deef03f83e826718705c9aef9613ac4a325a428d147c1749196e94226671fd9573ab0d079d44b13b56f793e98ab571c58e98e022f18a3be3f318e0690fff93f44f22473dc8004fc758218349bd3f0516a72a7ea913bfa7603063ed3118b2d680cbc"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000040), 0x4) sendmsg$inet(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000340)="25b096f681cd731c3f3a9badc4e3cf5edeae1f3b5082d7ab3a97c053df68744e7c7e24d0b59997bab4bccff8363b275de3510b0ebe4275d8d2f153395668e3d608e358fc2294263c03f8dc4f8bf194e4fde4600a2dec2f483a914e2fde0cbc344a2b9fc18dd198966045a6d4d4eb8571e8bb69e6724e37fcbaa6e4c64050b47256b9bb17f5c0aa5101e015ecdcb62fec46fc0205512535", 0x97}, {&(0x7f0000000280)="d3a88bea5916e313729a3989393caca70c74cd74e62e524bdd37be131ad827f911027e70ccf679d8e7c0cd3333095f83d6d473db345ded2ac8acaa87503de74c82431758e8e11e3ecb7bce02d6cd65f4eb88cc49ceb9e39f7117eb0f62323dc9b80dea447b0c96a383f14281bb87b09de0a6153ceeaae2b50a2b0f0f41810f379f9c3a1f3938461829d716a4bda86ab11b41f754bc15d71b", 0xfed0}], 0x2}, 0x0) 370.99758ms ago: executing program 1 (id=5212): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x17, &(0x7f00000007c0)=ANY=[@ANYRESDEC=r0], 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x90) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000540), 0x6e, &(0x7f00000005c0)=[{&(0x7f0000001240)=""/4096, 0x1000}], 0x1, &(0x7f0000000700)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x88}, 0x1) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, r3, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7910185752d922ba2a05dd42"], 0xfdef) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfdef) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r8, @ANYRESDEC], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYRES16=r1], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r9, 0x0, 0x0}, 0x20) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x48) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x8, 0x9, 0x0, r10, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r11, &(0x7f0000000300), 0x20000000}, 0x20) close(r9) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 369.59252ms ago: executing program 0 (id=5213): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/249, 0xf9}], 0x1}, 0x0) close(r0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x20000000000001e9, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000000000008500000086000000b70800eb17a03d454d439af4d662cb00000000007b8af8ff00000000b708000000000000f0ffef63f981338d1bd9d2a692ea057b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x90) (async) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r4, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r5, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {0x85, 0x0, 0x0, 0x2a}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 359.809891ms ago: executing program 3 (id=5214): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r1}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x2d) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@int]}, {0x0, [0x61, 0x0]}}, &(0x7f0000000480)=""/231, 0x2c, 0xe7}, 0x20) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000080)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x8a}, [@ldst={0x6, 0x0, 0x3}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='blkio.bfq.io_service_bytes_recursive\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r7, 0x58, &(0x7f0000000340)}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x135403, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6, 0x2, 0x0, r8}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/249, 0xf9}], 0x1}, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x7}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000003c0)=ANY=[@ANYRES32=r5, @ANYRESOCT=r2], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) close(r9) 343.538192ms ago: executing program 1 (id=5215): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r1, &(0x7f0000001000)={0x0, 0x0, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/90, 0x5a}], 0x1, &(0x7f0000000380)=""/207, 0xcf}, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f0000000000)='/proc/t/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x100, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r4, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) 218.908332ms ago: executing program 2 (id=5216): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{r3}, &(0x7f0000000040), &(0x7f0000000380)='%ps \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 218.087082ms ago: executing program 2 (id=5217): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000080)=r0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000004c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0xe, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x5}, 0x48) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540)={0x0, 0x0, 0x10}, 0xc) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000740)={0x7}, 0x8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='net_prio.prioidx\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0xa, &(0x7f00000001c0)=@raw=[@map_val={0x18, 0xa, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x81}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x4}], &(0x7f0000000280)='GPL\x00', 0x3, 0xf0, &(0x7f0000000300)=""/240, 0x41100, 0x0, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x4, 0x8, 0x5, 0x2}, 0x10, 0x16a4b, r0, 0x5, &(0x7f00000005c0)=[r1, r2, r1, r1, r3, r1, r1, r4, r1], &(0x7f0000000600)=[{0x5, 0x4, 0xe, 0x8}, {0x2, 0x5, 0xf, 0x6}, {0x5, 0x5, 0x6, 0x3}, {0x4, 0x2, 0xb, 0x5}, {0x4, 0x5, 0xa, 0xa}], 0x10, 0xa}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000180)={'pimreg0\x00', 0x1}) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x14, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000000008c6100000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={@cgroup, r8, 0x10, 0x2}, 0x14) ioctl$TUNSETOFFLOAD(r7, 0x400454ce, 0xa) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f7535f7866907dc6751dfb265a0e3ccae669e17fd6587d452d6453559c3421eed73d56615fe6c54c3b3ffe1b4ce25d7c983c044c03bf3a48dfe47ec9dd6c091c30b93bfae76d9ebacd3ed3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff9af2551ce935b0f327cb3f011a7d06602e2fd52347125907000000000000003ed38ae89d24e1cebfba2f87925bfacba83109751fe6c05405d027edd68149ee99eef6a6992308a4fc0b7c70bc677d6dd4aed4af7500d7900a820b6347184e9a217b5614cd50cbe43a1ed2526814bc0000e9e086ce48e90defb6670c3df262ad0a97aec7291c25447c106a99893e10db21901eb397b2f5fd71d20fa7a050fbbef9e326ea27e513e96068fd1e8a43e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e49ee52b59d13182e1f24ed200ada12f7a1525320e716660000000000b02b001500a710eb1affb87ba55b2d72078e9f40b4ae7d01000000d11cd22c35d3294000000000000000000000000000000000000000000000000000000000000000000000000c52f4ebd2c893bb97a068bd10734a83584898eccb26f7b789cfc4cd995fa3e11a5c74c85404e2df3ad37b729ac83b0dcb4f48f3c3356b9997fc455a17690b6f7f9ccbe4b1701941b18a904c0e585a66c3b84b138efc20a546d3d5227e23b03f2a834391ad24fe7d9b20cf92cb151763d41f5c76e2ff3e93ee296c4082ee73e7e197253a2b66c353312c9d75711ce1623e9c54bdff59d2a69dcb7d84c235b23a4480c2461b405cfd1a38992f295ad3adc94cd07c850d1c77a211bfa02c24e9280333152fb794e4ddea02017a6c139b50101caecaf2abc0843b99a96fc4275ad107274e2934a87a4ddcdb112754ca5bdec0ead14b6c0f19a43a2f04c7f0be31491eb8c9ff68236c8600000000000000000000000066e034c81c3cab4e33fc8dc55ce0ada18dcbf31c6e82893add3bee3e10fc873d1d922b0877cbcd95b839d3059d5140a1f742f6e75741e39e5cb6a193e06a1043375b0f61b5d4e17c81baa31b924d84f2243471221c15fa12313ffbfa7c2730302b66a99f66705b71e6205e7cbf3643561eabb9a63fcd604d5cc27e1317ad94cf438d71873e540be16b6ca20508"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r10, 0x34}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r11, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000180)={'pimreg0\x00', 0x1}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 159.056207ms ago: executing program 2 (id=5218): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000bc0)="3d0c308aea321dcdd875a89d863599", 0x20000000}, 0xfffffffffffffff1) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) close(r2) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1282, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000003e8c00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r4}, 0x10) write$cgroup_int(r2, &(0x7f0000000040), 0x12) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xffffffffffffffff, 0x100000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="00000000eaffffffb6080000000000000000f8ff00000000bfa200400000000007020000f8ffffffb703000008000000b70400000000000085000000030000950000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x6, 0x4, 0x4, 0x203, 0x4a0}, 0x48) r7 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r7, &(0x7f00000003c0)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) 158.613887ms ago: executing program 4 (id=5219): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000e8f70000000000ff000044850000000e000000650000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3832, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10048, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x5, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 157.595687ms ago: executing program 3 (id=5220): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0x0, 0x0, 0x0, 0x0, 0x31, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, 0x0, 0xfffffdda) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000200)=ANY=[], &(0x7f0000000400)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x40f00, 0x64, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0xc4, 0x8, &(0x7f0000001740)="00000000000000fd646330057045ee558777a0161634e8d914dbfd478187ef33094095223544e66bab6b9d76d165cbaae2baa3cf4378502fa1303ece5f00e90d195a029e7a41ee8aa94aeac07983274ee491d20d50de2a91f33e4d24148cb112394582896da55c4ebf981f679ab4547188006beedf958a68a0b0d398b20039ee604a562f6f4ebafbb56ae7fff0a4cee25d8d55a87ec8f4c79aa15f65735f0600b592505fd0fb4316f7c9984d9d6230acb7fd865dc59668749281793aca188219b097f8a3", &(0x7f00000001c0)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x1be2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xa, 0x2, 0x0, &(0x7f0000000180)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x8001, 0x0, 0x6, 0x17c6, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1, 0xc}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x8001, 0x0, 0x6, 0x17c6, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1, 0xc}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001840)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x5}, 0x48) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000004c0)=0xffffffffffffffff, 0x4) socketpair$tipc(0x1e, 0x66e1d6fa657d2ef2, 0x0, &(0x7f0000000140)) (async) socketpair$tipc(0x1e, 0x66e1d6fa657d2ef2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x100}, 0x0) (async) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x40040) (async) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x40040) recvmsg$unix(r8, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x100}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/4099, 0x1003}, 0x0) close(r3) (async) close(r3) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) 108.760791ms ago: executing program 0 (id=5221): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffe00}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r4, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7f}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x8}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r6}, &(0x7f0000001c00), &(0x7f0000001c40)=r7}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={0x0, r8}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc$j\xfef;q1\xff\xd3r\xa3\xc81U\x8ez.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcd\x01t\r=\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') 95.036633ms ago: executing program 1 (id=5222): close(0x3) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x2f, 0x19, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, [@map_idx_val={0x18, 0x2, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0x5}, @ldst={0x3, 0x2, 0x0, 0x0, 0x5, 0x30, 0xffffffffffffffff}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @generic={0x6, 0x4, 0x0, 0x9, 0xbd}, @ldst={0x0, 0x3, 0x0, 0x7, 0x4, 0x0, 0x8000000000000010}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000500)='GPL\x00', 0x6, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x0, 0xd, 0x5, 0xff}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000380)='nilfs2_segment_usage_freed\x00', r0}, 0x10) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r2}, 0x10) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000002500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200000a000000b703000000000000850000006d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000001c0)='netfs_sreq\x00', r3}, 0x10) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r4 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40010) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x2, 0x7, 0x7, 0x0, r4, 0xfffffffc, '\x00', 0x0, r1, 0x2, 0x2, 0x1, 0xb}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) (async) close(0xffffffffffffffff) 3.03381ms ago: executing program 3 (id=5223): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa1000000000000070c0000f8ffffffb702000008000000b703000000000000850000002d00000095000000000000003ff2b483c9f693f5a9a10e04ca299e46ff7946c49e44c631e8b41fc42717f2c06d337d5fbca50d72c617154b01f93fc29110d5169e62b6f2d033475dde353efc7d52207800cc3e62ef379f09a0432c0bda57c9bcbe52"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b708000002000b3935a000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000ea9ec0aa84ff82"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffebc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000000000000701000003ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106682010ff"}) 982.41µs ago: executing program 0 (id=5225): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180100000000200000000000000000001819", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x7, 0xfff, 0x9}, 0x18) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x0, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="1802000001000017000000008bb800008500000027000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000"], 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x8204) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00'}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0x3) sendmsg$inet(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000340)="25b096f681cd731c3f3a9badc4e3cf5edeae1f3b5082d7ab3a97c053df68744e7c7e24d0b59997bab4bccff8363b275de3510b0ebe4275d8d2f153395668e3d608e358fc2294263c03f8dc4f8bf194e4fde4600a2dec2f483a914e2fde0cbc344a2b9fc18dd198966045a6d4d4eb8571e8bb69e6724e37fcbaa6e4c64050b47256b9bb17f5c0aa5101e015ecdcb62fec46fc0205512535", 0x97}, {&(0x7f0000000280)="d3a88bea5916e313729a3989393caca70c74cd74e62e524bdd37be131ad827f911027e70ccf679d8e7c0cd3333095f83d6d473db345ded2ac8acaa87503de74c82431758e8e11e3ecb7bce02d6cd65f4eb88cc49ceb9e39f7117eb0f62323dc9b80dea447b0c96a383f14281bb87b09de0a6153ceeaae2b50a2b0f0f41810f379f9c3a1f3938461829d716a4bda86ab11b41f754bc15d71b", 0xfed0}], 0x2}, 0x0) 0s ago: executing program 1 (id=5226): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"/721], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r1}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x1100}]}}, &(0x7f00000004c0)=""/220, 0x32, 0xdc, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0xa5, 0x7ffb, 0xcc}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x17, &(0x7f0000000a80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000002bb40d3472d455d5799634e3698583000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000000800000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000000000008500000086000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000480)={{0x1}, 0x0, &(0x7f0000000440)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r6) kernel console output (not intermixed with test programs): t(1720136872.520:120): avc: denied { create } for pid=811 comm="syz.4.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 29.684026][ T24] audit: type=1400 audit(1720136872.830:121): avc: denied { ioctl } for pid=848 comm="syz.4.152" path="mnt:[4026532360]" dev="nsfs" ino=4026532360 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 29.717758][ T847] device pim6reg1 entered promiscuous mode [ 29.928427][ T24] audit: type=1400 audit(1720136873.080:122): avc: denied { relabelfrom } for pid=857 comm="syz.4.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 29.949500][ T24] audit: type=1400 audit(1720136873.100:123): avc: denied { relabelto } for pid=857 comm="syz.4.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 29.983314][ T24] audit: type=1400 audit(1720136873.120:124): avc: denied { create } for pid=862 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 30.023007][ T872] bpf_get_probe_write_proto: 1 callbacks suppressed [ 30.023018][ T872] syz.2.159[872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.028102][ T873] syz.4.158[873] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.029893][ T872] syz.2.159[872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.040815][ T873] syz.4.158[873] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.065140][ T872] syz.2.159[872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.082382][ T872] syz.2.159[872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.112877][ T872] syz.2.159[872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.158234][ T872] syz.2.159[872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.212061][ T24] audit: type=1400 audit(1720136873.360:125): avc: denied { create } for pid=884 comm="syz.0.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 30.275162][ T881] syz.4.158[881] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.275215][ T881] syz.4.158[881] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.724273][ T24] audit: type=1400 audit(1720136873.870:126): avc: denied { tracepoint } for pid=905 comm="syz.2.167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.806002][ T912] device syzkaller0 entered promiscuous mode [ 30.848891][ T24] audit: type=1400 audit(1720136874.000:127): avc: denied { read } for pid=75 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 30.912049][ T24] audit: type=1400 audit(1720136874.060:128): avc: denied { create } for pid=925 comm="syz.2.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.073180][ T24] audit: type=1400 audit(1720136874.220:129): avc: denied { write } for pid=957 comm="syz.3.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.113374][ T958] device veth0_vlan left promiscuous mode [ 31.150755][ T958] device veth0_vlan entered promiscuous mode [ 31.163449][ T24] audit: type=1400 audit(1720136874.310:130): avc: denied { read } for pid=957 comm="syz.3.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.262875][ T24] audit: type=1400 audit(1720136874.390:131): avc: denied { create } for pid=971 comm="syz.1.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 31.321793][ T965] device syzkaller0 entered promiscuous mode [ 31.400668][ T24] audit: type=1400 audit(1720136874.550:132): avc: denied { create } for pid=991 comm="syz.3.191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 31.465810][ T24] audit: type=1400 audit(1720136874.610:133): avc: denied { create } for pid=1006 comm="syz.1.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 31.667958][ T1013] device veth0_vlan left promiscuous mode [ 31.716070][ T1013] device veth0_vlan entered promiscuous mode [ 31.769234][ T24] audit: type=1400 audit(1720136874.920:134): avc: denied { setopt } for pid=1019 comm="syz.2.201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 32.622502][ T1043] device syzkaller0 entered promiscuous mode [ 32.809787][ T1061] : renamed from vlan0 [ 32.877436][ T1063] device syzkaller0 entered promiscuous mode [ 33.032832][ T1105] device syzkaller0 entered promiscuous mode [ 33.093809][ T1111] device wg2 entered promiscuous mode [ 33.338507][ T1155] device lo entered promiscuous mode [ 33.686616][ T1187] bridge0: port 3(veth1_macvtap) entered blocking state [ 33.696773][ T1187] bridge0: port 3(veth1_macvtap) entered disabled state [ 33.915034][ T1222] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.925092][ T1222] O3c: renamed from bridge_slave_0 [ 33.943385][ T1224] device syzkaller0 entered promiscuous mode [ 34.001997][ T1229] device pim6reg1 entered promiscuous mode [ 34.119889][ T1288] device syzkaller0 entered promiscuous mode [ 34.126557][ T1292] lo: mtu less than device minimum [ 34.915979][ T1415] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.939852][ T1415] O3c: renamed from bridge_slave_0 [ 35.604928][ T1427] device veth1_macvtap left promiscuous mode [ 35.612285][ T1427] device macsec0 entered promiscuous mode [ 35.638165][ T1427] device veth1_macvtap entered promiscuous mode [ 35.691672][ T1435] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 35.898608][ T24] kauditd_printk_skb: 4 callbacks suppressed [ 35.898621][ T24] audit: type=1400 audit(1720136879.050:139): avc: denied { create } for pid=1447 comm="syz.3.334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 36.267647][ T1486] device syzkaller0 entered promiscuous mode [ 36.324454][ T1493] device syzkaller0 entered promiscuous mode [ 36.784451][ T24] audit: type=1400 audit(1720136879.930:140): avc: denied { create } for pid=1520 comm="syz.1.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 37.119871][ T1545] bpf_get_probe_write_proto: 8 callbacks suppressed [ 37.119881][ T1545] syz.3.365[1545] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.748914][ T1677] device syzkaller0 entered promiscuous mode [ 39.785675][ T1679] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.796624][ T1679] device bridge_slave_1 left promiscuous mode [ 39.805362][ T1679] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.813391][ T1679] device O3c left promiscuous mode [ 39.818899][ T1679] bridge0: port 1(O3c) entered disabled state [ 40.147271][ T24] audit: type=1400 audit(1720136883.300:141): avc: denied { attach_queue } for pid=1728 comm="syz.2.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 40.270583][ T1733] device veth0_vlan left promiscuous mode [ 40.276863][ T1733] device veth0_vlan entered promiscuous mode [ 40.558218][ T24] audit: type=1400 audit(1720136883.710:142): avc: denied { create } for pid=1751 comm="syz.1.426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 41.025413][ T1783] device syzkaller0 entered promiscuous mode [ 41.342884][ T1810] syz.3.439[1810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.342936][ T1810] syz.3.439[1810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.734968][ T1822] syz.0.445[1822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.918518][ T1830] device veth0_vlan left promiscuous mode [ 41.935937][ T1830] device veth0_vlan entered promiscuous mode [ 41.984671][ T1294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.993073][ T1294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 42.000464][ T1294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 42.119552][ T1858] device syzkaller0 entered promiscuous mode [ 42.151878][ T1294] syzkaller0: tun_net_xmit 48 [ 42.157384][ T1858] syzkaller0: create flow: hash 3056074020 index 2 [ 42.189519][ T1858] syzkaller0: delete flow: hash 3056074020 index 2 [ 43.552347][ T1896] device syzkaller0 entered promiscuous mode [ 43.773535][ T24] audit: type=1400 audit(1720136886.920:143): avc: denied { create } for pid=1906 comm="syz.1.472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 44.406169][ T1950] syz.4.484[1950] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.406218][ T1950] syz.4.484[1950] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.436814][ T1950] syz.4.484[1950] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.455810][ T1950] syz.4.484[1950] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.486433][ T1950] device pim6reg1 entered promiscuous mode [ 44.622522][ T1950] syz.4.484[1950] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.622585][ T1950] syz.4.484[1950] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.447201][ T1992] syz.0.496[1992] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.541561][ T1996] FAULT_INJECTION: forcing a failure. [ 45.541561][ T1996] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 45.617540][ T1998] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 45.688061][ T1995] syz.0.496[1995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.688113][ T1995] syz.0.496[1995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.753957][ T1992] syz.0.496[1992] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.785887][ T1996] CPU: 0 PID: 1996 Comm: syz.0.496 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 45.807924][ T1996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 45.817811][ T1996] Call Trace: [ 45.820946][ T1996] dump_stack_lvl+0x1e2/0x24b [ 45.825466][ T1996] ? bfq_pos_tree_add_move+0x43b/0x43b [ 45.830757][ T1996] ? __vmalloc_node_range+0x2a9/0x7c0 [ 45.835963][ T1996] ? __se_sys_bpf+0x9856/0x11cb0 [ 45.840737][ T1996] ? do_syscall_64+0x34/0x70 [ 45.845159][ T1996] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 45.851061][ T1996] dump_stack+0x15/0x17 [ 45.855055][ T1996] should_fail+0x3c6/0x510 [ 45.859318][ T1996] should_fail_alloc_page+0x52/0x60 [ 45.864343][ T1996] __alloc_pages_nodemask+0x1b3/0xaf0 [ 45.869560][ T1996] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 45.874935][ T1996] ? __kasan_kmalloc+0x9/0x10 [ 45.879453][ T1996] ? __vmalloc_node_range+0x2a9/0x7c0 [ 45.884655][ T1996] __vmalloc_node_range+0x36c/0x7c0 [ 45.889692][ T1996] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 45.895068][ T1996] __vmalloc+0x7a/0x90 [ 45.898973][ T1996] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 45.904354][ T1996] bpf_prog_alloc_no_stats+0x39/0x2a0 [ 45.909569][ T1996] bpf_prog_alloc+0x21/0x1e0 [ 45.913993][ T1996] __se_sys_bpf+0x9856/0x11cb0 [ 45.918597][ T1996] ? __irq_exit_rcu+0x40/0x150 [ 45.923188][ T1996] ? irq_exit_rcu+0x9/0x10 [ 45.927449][ T1996] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 45.933080][ T1996] ? __x64_sys_bpf+0x90/0x90 [ 45.937512][ T1996] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 45.943504][ T1996] ? _kstrtoull+0x3a0/0x4a0 [ 45.947847][ T1996] ? memset+0x35/0x40 [ 45.951665][ T1996] ? __fsnotify_parent+0x4b9/0x6c0 [ 45.956611][ T1996] ? kvm_sched_clock_read+0x18/0x40 [ 45.961641][ T1996] ? sched_clock+0x3a/0x40 [ 45.965889][ T1996] ? sched_clock_cpu+0x1b/0x3b0 [ 45.970575][ T1996] ? sched_clock+0x3a/0x40 [ 45.974836][ T1996] ? __irq_exit_rcu+0x40/0x150 [ 45.979430][ T1996] ? irq_exit_rcu+0x9/0x10 [ 45.983777][ T1996] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 45.989458][ T1996] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 45.995408][ T1996] ? flush_delayed_fput+0x71/0x80 [ 46.000268][ T1996] ? fput_many+0x28/0x1b0 [ 46.004434][ T1996] ? fput_many+0x2f/0x1b0 [ 46.008598][ T1996] ? fput_many+0x160/0x1b0 [ 46.012861][ T1996] ? debug_smp_processor_id+0x17/0x20 [ 46.018055][ T1996] __x64_sys_bpf+0x7b/0x90 [ 46.022307][ T1996] do_syscall_64+0x34/0x70 [ 46.026561][ T1996] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 46.032296][ T1996] RIP: 0033:0x7f8401b0fbd9 [ 46.036547][ T1996] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 46.055990][ T1996] RSP: 002b:00007f8400d4f048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 46.064225][ T1996] RAX: ffffffffffffffda RBX: 00007f8401c9e110 RCX: 00007f8401b0fbd9 [ 46.072037][ T1996] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 46.079941][ T1996] RBP: 00007f8400d4f0a0 R08: 0000000000000000 R09: 0000000000000000 [ 46.087751][ T1996] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 46.095556][ T1996] R13: 000000000000006e R14: 00007f8401c9e110 R15: 00007ffd783eb4a8 [ 46.192954][ T2008] device syzkaller0 entered promiscuous mode [ 46.241463][ T2008] ip6_tunnel: non-ECT from db5b:6861:58bb:cfc8:875a:6596:9ff5:7b00 with DS=0x31 [ 47.226225][ T2037] device syzkaller0 entered promiscuous mode [ 47.329001][ T2048] device pim6reg1 entered promiscuous mode [ 47.464764][ T2052] device syzkaller0 entered promiscuous mode [ 47.683317][ T2070] device pim6reg1 entered promiscuous mode [ 48.093349][ T2086] device veth0_vlan left promiscuous mode [ 48.109318][ T2086] device veth0_vlan entered promiscuous mode [ 48.133483][ T1273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.141783][ T1273] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 48.149332][ T1273] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.372176][ T2107] device pim6reg1 entered promiscuous mode [ 49.355888][ T2196] device wlan0 entered promiscuous mode [ 49.553208][ T2225] device pim6reg1 entered promiscuous mode [ 49.569211][ T2237] bpf_get_probe_write_proto: 6 callbacks suppressed [ 49.569221][ T2237] syz.2.574[2237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.577975][ T2237] syz.2.574[2237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.593844][ T2237] syz.2.574[2237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.607611][ T2237] syz.2.574[2237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.876884][ T2277] syz.1.587[2277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.888387][ T2277] syz.1.587[2277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.904841][ T2277] syz.1.587[2277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.924393][ T2277] syz.1.587[2277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.180457][ T2286] device syzkaller0 entered promiscuous mode [ 50.258844][ T2288] device syzkaller0 entered promiscuous mode [ 50.568983][ T2301] device syzkaller0 entered promiscuous mode [ 50.624095][ T2303] syz.2.598[2303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.624160][ T2303] syz.2.598[2303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.153765][ T24] audit: type=1400 audit(1720136895.300:144): avc: denied { create } for pid=2406 comm="syz.4.629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 53.205210][ T2467] device pim6reg1 entered promiscuous mode [ 53.764315][ T2505] device syzkaller0 entered promiscuous mode [ 54.218827][ T2532] device wg2 entered promiscuous mode [ 54.320768][ T24] audit: type=1400 audit(1720136897.470:145): avc: denied { create } for pid=2533 comm="syz.0.666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 54.432088][ T2551] device syzkaller0 entered promiscuous mode [ 54.995070][ T2576] bpf_get_probe_write_proto: 8 callbacks suppressed [ 54.995096][ T2576] syz.4.681[2576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.017714][ T2576] syz.4.681[2576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.476293][ T2634] device syzkaller0 entered promiscuous mode [ 55.840806][ T24] audit: type=1400 audit(1720136898.990:146): avc: denied { create } for pid=2650 comm="syz.1.701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 55.860824][ T2651] syz.1.701[2651] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.860881][ T2651] syz.1.701[2651] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.303657][ T2673] : renamed from pim6reg1 [ 56.539653][ T2689] syz.1.712[2689] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.539711][ T2689] syz.1.712[2689] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.565643][ T2689] syz.1.712[2689] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.600997][ T2689] syz.1.712[2689] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.861520][ T2705] device syzkaller0 entered promiscuous mode [ 57.096658][ T2712] syz.0.719[2712] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.104098][ T2712] syz.0.719[2712] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.449886][ T2728] device pim6reg1 entered promiscuous mode [ 58.543556][ T24] audit: type=1400 audit(1720136901.690:147): avc: denied { create } for pid=2792 comm="syz.2.745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 58.592776][ T24] audit: type=1400 audit(1720136901.740:148): avc: denied { create } for pid=2796 comm="syz.4.746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 58.624546][ T24] audit: type=1400 audit(1720136901.770:149): avc: denied { create } for pid=2802 comm="syz.2.748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 59.033045][ T2853] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.500911][ T2911] device syzkaller0 entered promiscuous mode [ 59.817133][ T2944] device macsec0 entered promiscuous mode [ 60.973865][ T24] audit: type=1400 audit(1720136904.120:150): avc: denied { create } for pid=3016 comm="syz.1.806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 62.539748][ T3105] device macsec0 entered promiscuous mode [ 63.911117][ T3190] device syzkaller0 entered promiscuous mode [ 64.040482][ T24] audit: type=1400 audit(1720136907.190:151): avc: denied { create } for pid=3198 comm="syz.4.852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 64.117473][ T3199] device veth0_vlan left promiscuous mode [ 64.176559][ T3199] device veth0_vlan entered promiscuous mode [ 64.291097][ T1276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 64.301498][ T1276] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 64.311153][ T1276] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 64.997194][ T3281] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.004182][ T3281] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.194760][ T3319] device syzkaller0 entered promiscuous mode [ 67.319585][ T3353] device wg2 left promiscuous mode [ 67.353805][ T3353] device wg2 entered promiscuous mode [ 67.464585][ T3370] bpf_get_probe_write_proto: 4 callbacks suppressed [ 67.464595][ T3370] syz.1.898[3370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.473186][ T3370] syz.1.898[3370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.740256][ T3398] tap0: tun_chr_ioctl cmd 1074025677 [ 67.756778][ T3398] tap0: linktype set to 805 [ 68.739588][ T3477] device syzkaller0 entered promiscuous mode [ 69.026905][ T3528] device wg2 entered promiscuous mode [ 69.165627][ T3559] device syzkaller0 entered promiscuous mode [ 69.283718][ T24] audit: type=1400 audit(1720136912.430:152): avc: denied { append } for pid=3600 comm="syz.4.961" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 69.379084][ T3616] bridge0: port 3(veth0_to_batadv) entered blocking state [ 69.386093][ T3616] bridge0: port 3(veth0_to_batadv) entered disabled state [ 69.393810][ T3616] device veth0_to_batadv entered promiscuous mode [ 69.406135][ T3616] bridge0: port 3(veth0_to_batadv) entered blocking state [ 69.413097][ T3616] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 69.948777][ T3681] syz.4.980[3681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.948832][ T3681] syz.4.980[3681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.057383][ T3684] syz.4.980[3684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.077245][ T3684] syz.4.980[3684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.292480][ T3697] tap0: tun_chr_ioctl cmd 1074025678 [ 70.310821][ T3697] tap0: group set to 0 [ 70.329186][ T3700] device pim6reg1 entered promiscuous mode [ 70.557931][ T3728] syz.1.997[3728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.557992][ T3728] syz.1.997[3728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.637421][ T3730] syz.1.997[3730] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.677465][ T3730] syz.1.997[3730] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.801887][ T3732] device syzkaller0 entered promiscuous mode [ 70.823473][ T3735] device veth1_macvtap left promiscuous mode [ 70.840362][ T3735] device veth1_macvtap entered promiscuous mode [ 71.835836][ T3776] device wg2 left promiscuous mode [ 73.541017][ T3837] device syzkaller0 entered promiscuous mode [ 73.788764][ T3878] device syzkaller0 entered promiscuous mode [ 75.063505][ T3943] device syzkaller0 entered promiscuous mode [ 75.174909][ T3951] device pim6reg1 entered promiscuous mode [ 75.330798][ T3967] device veth1_macvtap left promiscuous mode [ 75.339985][ T3967] device macsec0 entered promiscuous mode [ 75.360138][ T3969] geneve1: tun_chr_ioctl cmd 35111 [ 76.476140][ T4015] device syzkaller0 entered promiscuous mode [ 77.162264][ T4056] device wg2 left promiscuous mode [ 77.506790][ T4073] device sit0 entered promiscuous mode [ 78.679584][ T4128] device wg2 left promiscuous mode [ 78.713033][ T4129] device wg2 entered promiscuous mode [ 80.786115][ T4278] tap0: tun_chr_ioctl cmd 1074025675 [ 80.794081][ T4278] tap0: persist enabled [ 80.804788][ T4278] tap0: tun_chr_ioctl cmd 1074025675 [ 80.817054][ T4278] tap0: persist enabled [ 80.855522][ T24] audit: type=1400 audit(1720136924.000:153): avc: denied { ioctl } for pid=4280 comm="syz.3.1154" path="socket:[26308]" dev="sockfs" ino=26308 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 80.900077][ T4281] device syzkaller0 entered promiscuous mode [ 82.244673][ T4332] device pim6reg1 entered promiscuous mode [ 82.278129][ T4334] device vxcan1 entered promiscuous mode [ 82.364597][ T4342] syz.0.1175[4342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.364654][ T4342] syz.0.1175[4342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.471116][ T4342] syz.0.1175[4342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.471750][ T4349] device veth0_vlan left promiscuous mode [ 82.511941][ T4349] device veth0_vlan entered promiscuous mode [ 82.553099][ T1278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 82.561375][ T1278] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 82.569792][ T1278] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 82.578685][ T4342] syz.0.1175[4342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.932388][ T4380] syz.1.1189[4380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.943683][ T4380] syz.1.1189[4380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.958049][ T4380] syz.1.1189[4380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.977846][ T4380] syz.1.1189[4380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.304468][ T4414] syz.1.1202[4414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.315854][ T4414] syz.1.1202[4414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.369213][ T4419] device pim6reg1 entered promiscuous mode [ 83.569836][ T4452] device syzkaller0 entered promiscuous mode [ 83.857882][ T4465] device pim6reg1 entered promiscuous mode [ 84.925301][ T4527] device syzkaller0 entered promiscuous mode [ 85.061451][ T4536] device syzkaller0 entered promiscuous mode [ 85.499009][ T4566] device syzkaller0 entered promiscuous mode [ 85.695880][ T24] audit: type=1400 audit(1720136928.840:154): avc: denied { create } for pid=4582 comm="syz.2.1256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 85.851217][ T4591] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 85.867867][ T4591] device syzkaller0 entered promiscuous mode [ 86.056788][ T4596] device veth0_vlan left promiscuous mode [ 86.084343][ T4596] device veth0_vlan entered promiscuous mode [ 87.016361][ T4681] device pim6reg1 entered promiscuous mode [ 87.183736][ T3039] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 87.399847][ T4712] device syzkaller0 entered promiscuous mode [ 87.407889][ T4714] device wg2 entered promiscuous mode [ 87.773513][ T4742] bpf_get_probe_write_proto: 10 callbacks suppressed [ 87.773523][ T4742] syz.1.1308[4742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.807788][ T4742] syz.1.1308[4742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.017374][ T4763] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.062556][ T4763] device bridge_slave_1 left promiscuous mode [ 88.068560][ T4763] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.075867][ T4763] device bridge_slave_0 left promiscuous mode [ 88.109640][ T4763] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.168184][ T4761] device pim6reg1 entered promiscuous mode [ 88.206410][ T4775] device syzkaller0 entered promiscuous mode [ 88.214355][ T4777] device veth0_vlan left promiscuous mode [ 88.234010][ T4777] device veth0_vlan entered promiscuous mode [ 88.250207][ T3041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 88.260254][ T3041] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 88.268496][ T3041] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 88.651077][ T4804] syz.2.1325[4804] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.651137][ T4804] syz.2.1325[4804] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.680190][ T4804] syz.2.1325[4804] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.694890][ T4804] syz.2.1325[4804] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.749257][ T4804] device pim6reg1 entered promiscuous mode [ 88.875254][ T4833] device syzkaller0 left promiscuous mode [ 89.139537][ T4852] geneve1: tun_chr_ioctl cmd 1074025698 [ 90.179251][ T4905] device syzkaller0 entered promiscuous mode [ 90.739097][ T5011] syz.1.1379[5011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.739155][ T5011] syz.1.1379[5011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.762214][ T5011] syz.1.1379[5011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.785178][ T5011] syz.1.1379[5011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.878865][ T5019] device pim6reg1 entered promiscuous mode [ 92.008108][ T24] audit: type=1400 audit(1720136935.160:155): avc: denied { create } for pid=5086 comm="syz.0.1405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 92.031314][ T5098] device wg2 left promiscuous mode [ 92.037589][ T24] audit: type=1400 audit(1720136935.190:156): avc: denied { append } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 92.060595][ T24] audit: type=1400 audit(1720136935.190:157): avc: denied { open } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 92.082837][ T24] audit: type=1400 audit(1720136935.190:158): avc: denied { getattr } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 93.045317][ T5163] bpf_get_probe_write_proto: 12 callbacks suppressed [ 93.045327][ T5163] syz.0.1429[5163] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.052405][ T5163] syz.0.1429[5163] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.075513][ T5163] syz.0.1429[5163] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.088073][ T5163] syz.0.1429[5163] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.696763][ T5217] syz.1.1443[5217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.729924][ T5217] syz.1.1443[5217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.747119][ T5217] syz.1.1443[5217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.760352][ T5217] syz.1.1443[5217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.986803][ T5231] device pim6reg1 entered promiscuous mode [ 94.158292][ T24] audit: type=1400 audit(1720136937.310:159): avc: denied { create } for pid=5238 comm="syz.2.1451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 94.181776][ T5235] device veth1_macvtap left promiscuous mode [ 94.194092][ T5235] device macsec0 left promiscuous mode [ 94.891467][ T5279] : renamed from pim6reg1 [ 95.385265][ T5322] syz.4.1480[5322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.385317][ T5322] syz.4.1480[5322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.218233][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! [ 96.582193][ T5425] device syzkaller0 entered promiscuous mode [ 97.604523][ T5504] device syzkaller0 entered promiscuous mode [ 97.633944][ T24] audit: type=1400 audit(1720136940.780:160): avc: denied { create } for pid=5505 comm="syz.0.1536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 98.960224][ T5577] bpf_get_probe_write_proto: 4 callbacks suppressed [ 98.960236][ T5577] syz.1.1558[5577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.966857][ T5577] syz.1.1558[5577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.984639][ T5574] device syzkaller0 entered promiscuous mode [ 99.016099][ T5577] syz.1.1558[5577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.016776][ T5577] syz.1.1558[5577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.675270][ T5632] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 99.706241][ T5632] device syzkaller0 entered promiscuous mode [ 100.061817][ T5668] device wg2 entered promiscuous mode [ 100.074947][ T5668] device pim6reg1 entered promiscuous mode [ 100.177955][ T24] audit: type=1400 audit(1720136943.330:161): avc: denied { create } for pid=5677 comm="syz.0.1582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 100.308581][ T5697] device wg2 left promiscuous mode [ 100.445072][ T5702] device veth0_vlan left promiscuous mode [ 100.463602][ T5702] device veth0_vlan entered promiscuous mode [ 100.519281][ T1259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.528300][ T1259] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.535819][ T1259] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.633176][ T5722] device pim6reg1 entered promiscuous mode [ 101.418167][ T5784] device veth0_vlan left promiscuous mode [ 101.504448][ T5784] device veth0_vlan entered promiscuous mode [ 101.953069][ T5814] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.967754][ T5814] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.975079][ T5814] device bridge_slave_0 entered promiscuous mode [ 102.006925][ T5814] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.016072][ T5814] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.026024][ T5814] device bridge_slave_1 entered promiscuous mode [ 102.045539][ T5813] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.052637][ T5813] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.067585][ T5813] device bridge_slave_0 entered promiscuous mode [ 102.098462][ T5813] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.105455][ T5813] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.114826][ T5813] device bridge_slave_1 entered promiscuous mode [ 102.165688][ T24] audit: type=1400 audit(1720136945.310:162): avc: denied { create } for pid=5814 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 102.204597][ T5814] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.211471][ T5814] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.218618][ T5814] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.225443][ T5814] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.247323][ T24] audit: type=1400 audit(1720136945.350:163): avc: denied { write } for pid=5814 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 102.288509][ T24] audit: type=1400 audit(1720136945.350:164): avc: denied { read } for pid=5814 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 102.346101][ T1259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.355470][ T1259] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.366318][ T1259] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.409790][ T1259] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 102.419433][ T1259] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.426277][ T1259] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.434988][ T1259] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 102.449403][ T1259] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.456250][ T1259] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.464241][ T1259] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 102.477638][ T1259] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 102.510250][ T1278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 102.533923][ T5814] device veth0_vlan entered promiscuous mode [ 102.540514][ T1259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.549212][ T1259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 102.557428][ T1259] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 102.564716][ T1259] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 102.573510][ T1259] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 102.582160][ T1259] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.589029][ T1259] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.596891][ T1259] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 102.605021][ T1259] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.611890][ T1259] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.630592][ T1270] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 102.639737][ T1270] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 102.656217][ T1270] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 102.678500][ T5813] device veth0_vlan entered promiscuous mode [ 102.688101][ T1259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 102.696145][ T1259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 102.705434][ T1259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 102.715209][ T1259] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 102.723577][ T1259] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 102.739387][ T5813] device veth1_macvtap entered promiscuous mode [ 102.748458][ T1278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 102.757481][ T5814] device veth1_macvtap entered promiscuous mode [ 102.767860][ T24] audit: type=1400 audit(1720136945.920:165): avc: denied { remove_name } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 102.807197][ T24] audit: type=1400 audit(1720136945.920:166): avc: denied { rename } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 102.835957][ T1270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 102.837194][ T24] audit: type=1400 audit(1720136945.920:167): avc: denied { create } for pid=75 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 102.844698][ T1270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 102.878851][ T1270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 102.892994][ T1258] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 102.901862][ T1258] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 102.925371][ T24] audit: type=1400 audit(1720136946.070:168): avc: denied { mounton } for pid=5814 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=357 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 102.956842][ T5862] device ip6tnl0 entered promiscuous mode [ 102.999367][ T5868] syz.0.1637[5868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.999418][ T5868] syz.0.1637[5868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.145338][ T531] device bridge_slave_1 left promiscuous mode [ 103.189891][ T531] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.200263][ T531] device bridge_slave_0 left promiscuous mode [ 103.206420][ T531] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.215753][ T531] device veth1_macvtap left promiscuous mode [ 103.224151][ T531] device veth0_vlan left promiscuous mode [ 103.231405][ T531] device veth0_vlan left promiscuous mode [ 103.422339][ T5895] device veth0_vlan left promiscuous mode [ 103.429725][ T5895] device veth0_vlan entered promiscuous mode [ 103.555167][ T5898] device veth0_vlan left promiscuous mode [ 103.567927][ T5898] device veth0_vlan entered promiscuous mode [ 103.794077][ T5966] syzkaller0: mtu greater than device maximum [ 104.614132][ T6036] syz.0.1682[6036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.614194][ T6036] syz.0.1682[6036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.902921][ T6000] cgroup: fork rejected by pids controller in /syz4 [ 105.170554][ T6081] syz.0.1688[6081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.170611][ T6081] syz.0.1688[6081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.554247][ T6101] bridge0: port 3(veth0_to_batadv) entered disabled state [ 105.572453][ T6101] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.579350][ T6101] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.618133][ T6102] bridge0: port 3(veth0_to_batadv) entered blocking state [ 105.625180][ T6102] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 105.632402][ T6102] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.639243][ T6102] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.646302][ T6102] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.653144][ T6102] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.660656][ T6102] device bridge0 entered promiscuous mode [ 105.969459][ T6119] device syzkaller0 entered promiscuous mode [ 105.975912][ T1265] syzkaller0: tun_net_xmit 48 [ 105.983923][ T6119] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 105.989649][ T6119] syzkaller0: Linktype set failed because interface is up [ 106.425305][ T6150] device pim6reg1 entered promiscuous mode [ 108.134662][ T6231] syz.3.1732[6231] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.134717][ T6231] syz.3.1732[6231] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.484188][ T6374] syz.0.1780[6374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.543657][ T6374] syz.0.1780[6374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.950233][ T6396] device pim6reg1 entered promiscuous mode [ 110.444086][ T6413] device syzkaller0 entered promiscuous mode [ 110.691712][ T6443] device pim6reg1 entered promiscuous mode [ 111.427968][ T6461] device pim6reg1 entered promiscuous mode [ 111.895044][ T6509] device veth0_vlan left promiscuous mode [ 111.950411][ T6509] device veth0_vlan entered promiscuous mode [ 112.105347][ T3435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.127474][ T3435] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 112.134667][ T3435] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.274720][ T6538] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.319910][ T6553] ʮ}p: renamed from pim6reg1 [ 112.618897][ T6578] device veth0_vlan left promiscuous mode [ 112.624822][ T6578] device veth0_vlan entered promiscuous mode [ 112.648266][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.656431][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 112.675765][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.972481][ T6597] device syzkaller0 entered promiscuous mode [ 113.883721][ T24] audit: type=1400 audit(1720136957.030:169): avc: denied { create } for pid=6661 comm="syz.3.1871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 114.346653][ T6679] device syzkaller0 entered promiscuous mode [ 114.698909][ T6693] device veth0_vlan left promiscuous mode [ 114.705203][ T6693] device veth0_vlan entered promiscuous mode [ 115.003327][ T6700] device syzkaller0 entered promiscuous mode [ 115.571013][ T6743] device syzkaller0 entered promiscuous mode [ 117.908631][ T6897] syz.1.1941[6897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.908689][ T6897] syz.1.1941[6897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.387100][ T6931] : renamed from vlan0 [ 118.717432][ T6960] syzkaller0: refused to change device tx_queue_len [ 119.107234][ T6974] device wg2 entered promiscuous mode [ 119.324887][ T7017] device syzkaller0 entered promiscuous mode [ 120.805805][ T7106] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 120.812187][ T7104] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 120.826275][ T7104] syzkaller0: Linktype set failed because interface is up [ 120.851783][ T7125] device pim6reg1 entered promiscuous mode [ 121.088933][ T7141] device syzkaller0 entered promiscuous mode [ 121.985013][ T7174] device syzkaller0 entered promiscuous mode [ 122.478590][ T7207] device wg2 entered promiscuous mode [ 124.834538][ T7355] device syzkaller0 entered promiscuous mode [ 128.041211][ T7537] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.048257][ T7537] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.055489][ T7537] device bridge_slave_0 entered promiscuous mode [ 128.064438][ T7537] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.071327][ T7537] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.078553][ T7537] device bridge_slave_1 entered promiscuous mode [ 128.122328][ T7539] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.129258][ T7539] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.136399][ T7539] device bridge_slave_0 entered promiscuous mode [ 128.145465][ T7539] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.152543][ T7539] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.159851][ T7539] device bridge_slave_1 entered promiscuous mode [ 128.214112][ T7537] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.220995][ T7537] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.228116][ T7537] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.234944][ T7537] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.250145][ T7539] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.257009][ T7539] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.264075][ T7539] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.270906][ T7539] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.295130][ T3448] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 128.302793][ T3448] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.309942][ T3448] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.317571][ T3448] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.324710][ T3448] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.337603][ T1259] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 128.345732][ T1259] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.352608][ T1259] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.360186][ T1259] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 128.368258][ T1259] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.375085][ T1259] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.389186][ T1264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 128.396576][ T1264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 128.404590][ T1264] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.411452][ T1264] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.418934][ T1264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 128.426879][ T1264] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.433728][ T1264] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.455082][ T7537] device veth0_vlan entered promiscuous mode [ 128.462521][ T4892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 128.471645][ T4892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 128.479505][ T4892] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 128.486681][ T4892] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 128.494048][ T4892] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 128.501832][ T4892] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 128.519717][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 128.527538][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 128.536725][ T3448] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 128.551003][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 128.560417][ T7537] device veth1_macvtap entered promiscuous mode [ 128.572014][ T3448] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 128.580122][ T3448] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 128.587636][ T3448] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 128.596991][ T7539] device veth0_vlan entered promiscuous mode [ 128.603982][ T3448] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 128.615989][ T3448] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 128.639837][ T1264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 128.668041][ T7550] device syzkaller0 entered promiscuous mode [ 128.675686][ T7539] device veth1_macvtap entered promiscuous mode [ 128.686696][ T3448] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 128.713114][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 128.841673][ T7569] device wg2 entered promiscuous mode [ 129.179486][ T7602] syz.2.2157[7602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.179549][ T7602] syz.2.2157[7602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.211025][ T7602] syz.2.2157[7602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.226898][ T7602] syz.2.2157[7602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.309623][ T7605] device veth0_vlan left promiscuous mode [ 129.338887][ T7605] device veth0_vlan entered promiscuous mode [ 129.401579][ T531] device bridge_slave_1 left promiscuous mode [ 129.407674][ T531] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.415071][ T531] device bridge_slave_0 left promiscuous mode [ 129.428179][ T531] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.438439][ T531] device veth0_to_batadv left promiscuous mode [ 129.444477][ T531] bridge0: port 3(veth0_to_batadv) entered disabled state [ 129.452576][ T531] device bridge_slave_1 left promiscuous mode [ 129.459496][ T531] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.473235][ T531] device bridge_slave_0 left promiscuous mode [ 129.479376][ T531] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.488749][ T531] device veth1_macvtap left promiscuous mode [ 129.497257][ T531] device veth0_vlan left promiscuous mode [ 129.794433][ T7640] syz.3.2170[7640] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.794493][ T7640] syz.3.2170[7640] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.841205][ T7640] syz.3.2170[7640] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.878152][ T7640] syz.3.2170[7640] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.753543][ T7687] ʮ}p: renamed from pim6reg1 [ 130.899639][ T7696] syz.3.2186[7696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.899692][ T7696] syz.3.2186[7696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.124845][ T7735] device veth1_macvtap left promiscuous mode [ 131.146657][ T7735] device macsec0 entered promiscuous mode [ 131.156291][ T7735] device veth1_macvtap entered promiscuous mode [ 131.456448][ T7755] device pim6reg1 entered promiscuous mode [ 133.511458][ T7883] device veth1_macvtap left promiscuous mode [ 133.526514][ T7886] device veth1_macvtap entered promiscuous mode [ 133.579475][ T7886] device macsec0 entered promiscuous mode [ 134.231476][ T7939] device syzkaller0 entered promiscuous mode [ 134.315756][ T7941] device syzkaller0 entered promiscuous mode [ 134.518285][ T7961] bpf_get_probe_write_proto: 18 callbacks suppressed [ 134.518307][ T7961] syz.3.2269[7961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.540167][ T7961] syz.3.2269[7961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.565653][ T7961] syz.3.2269[7961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.578102][ T7961] syz.3.2269[7961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.735253][ T7978] device pim6reg1 entered promiscuous mode [ 135.608316][ T8003] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.615328][ T8003] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.806882][ T8008] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.813758][ T8008] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.820854][ T8008] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.827631][ T8008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.834911][ T8008] device bridge0 entered promiscuous mode [ 136.498509][ T8045] device syzkaller0 entered promiscuous mode [ 136.672081][ T8054] device syzkaller0 entered promiscuous mode [ 137.357158][ T8068] device veth0_vlan left promiscuous mode [ 137.453012][ T8068] device veth0_vlan entered promiscuous mode [ 137.604253][ T4889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 137.615105][ T4889] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 137.677433][ T4889] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 139.353433][ T8147] device sit0 entered promiscuous mode [ 140.171458][ T8202] : renamed from vlan0 [ 141.554919][ T8270] device pim6reg1 entered promiscuous mode [ 142.384291][ T8330] syz.4.2386[8330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.384361][ T8330] syz.4.2386[8330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.504026][ T8330] syz.4.2386[8330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.517938][ T8335] : renamed from vlan0 [ 142.559961][ T8330] syz.4.2386[8330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.421645][ T8382] syz.1.2401[8382] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.447543][ T8382] syz.1.2401[8382] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.465574][ T8382] syz.1.2401[8382] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.488221][ T8382] syz.1.2401[8382] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.704627][ T8402] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.393180][ T8426] syz.3.2415[8426] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.393235][ T8426] syz.3.2415[8426] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.453588][ T8468] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.472264][ T8468] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.480163][ T8468] device bridge_slave_0 entered promiscuous mode [ 145.549413][ T8468] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.556270][ T8468] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.563850][ T8468] device bridge_slave_1 entered promiscuous mode [ 145.753771][ T8481] device pim6reg1 entered promiscuous mode [ 145.898526][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 145.905914][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 145.927957][ T1264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 145.936076][ T1264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 145.946962][ T1264] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.953824][ T1264] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.961131][ T1264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 145.970704][ T1264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 145.979120][ T1264] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.985979][ T1264] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.993275][ T1264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 146.001180][ T1264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 146.064943][ T1264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 146.073816][ T531] device bridge_slave_1 left promiscuous mode [ 146.079892][ T531] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.087137][ T531] device O3c left promiscuous mode [ 146.092428][ T531] bridge0: port 1(O3c) entered disabled state [ 146.101068][ T531] device veth0_vlan left promiscuous mode [ 146.343250][ T8468] device veth0_vlan entered promiscuous mode [ 146.398190][ T1264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 146.406442][ T1264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 146.422655][ T1264] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 146.437361][ T1264] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 146.463889][ T8468] device veth1_macvtap entered promiscuous mode [ 146.567691][ T1264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 146.588785][ T1264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 146.606782][ T1264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 147.486373][ T8546] device pim6reg1 entered promiscuous mode [ 147.607460][ T8558] device wg2 entered promiscuous mode [ 147.888425][ T8579] bpf_get_probe_write_proto: 2 callbacks suppressed [ 147.888435][ T8579] syz.0.2461[8579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.894941][ T8579] syz.0.2461[8579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.935922][ T8579] syz.0.2461[8579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.948528][ T8579] syz.0.2461[8579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.127512][ T8586] device syzkaller0 left promiscuous mode [ 148.463042][ T8601] device syzkaller0 entered promiscuous mode [ 148.479536][ T8601] syz.0.2469[8601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.479593][ T8601] syz.0.2469[8601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.625531][ T8601] syz.0.2469[8601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.790779][ T8601] syz.0.2469[8601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.849120][ T8620] syz.1.2474[8620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.866370][ T8620] syz.1.2474[8620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.327781][ T8714] device pim6reg1 entered promiscuous mode [ 153.537517][ T8883] device pim6reg1 entered promiscuous mode [ 153.657619][ T8889] device sit0 left promiscuous mode [ 154.236563][ T8959] device vxcan1 entered promiscuous mode [ 154.349909][ T8965] bpf_get_probe_write_proto: 20 callbacks suppressed [ 154.349920][ T8965] syz.0.2574[8965] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.356591][ T8965] syz.0.2574[8965] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.375463][ T8965] syz.0.2574[8965] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.394205][ T8965] syz.0.2574[8965] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.710505][ T9003] syz.0.2586[9003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.722110][ T9003] syz.0.2586[9003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.738150][ T9003] syz.0.2586[9003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.750796][ T9001] device pim6reg1 entered promiscuous mode [ 154.752005][ T9003] syz.0.2586[9003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.964098][ T9064] syz.4.2597[9064] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.976092][ T9064] syz.4.2597[9064] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.998562][ T9060] device syzkaller0 entered promiscuous mode [ 155.056179][ T9066] device syzkaller0 entered promiscuous mode [ 156.702883][ T9182] device vxcan1 entered promiscuous mode [ 156.999296][ T9220] device pim6reg1 entered promiscuous mode [ 157.597651][ T9261] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.604673][ T9261] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.637624][ T9261] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.644526][ T9261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 157.651631][ T9261] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.658486][ T9261] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.683589][ T9261] device bridge0 entered promiscuous mode [ 157.803885][ T9266] tun0: tun_chr_ioctl cmd 1074025673 [ 157.810703][ T9265] tun0: tun_chr_ioctl cmd 35108 [ 157.815577][ T9265] tun0: tun_chr_ioctl cmd 1074812117 [ 157.823149][ T9264] tun0: tun_chr_ioctl cmd 35108 [ 157.987416][ T9281] device syzkaller0 entered promiscuous mode [ 157.996889][ T9283] device pim6reg1 entered promiscuous mode [ 158.044071][ T9289] device veth0_vlan left promiscuous mode [ 158.064017][ T9289] device veth0_vlan entered promiscuous mode [ 158.104331][ T1277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.112554][ T1277] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 158.120515][ T1277] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 159.832545][ T9399] bpf_get_probe_write_proto: 10 callbacks suppressed [ 159.832555][ T9399] syz.3.2691[9399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.839374][ T9399] syz.3.2691[9399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.858044][ T9399] syz.3.2691[9399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.870991][ T9399] syz.3.2691[9399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.991343][ T9415] device pim6reg1 entered promiscuous mode [ 160.083517][ T9419] device sit0 entered promiscuous mode [ 160.384774][ T9424] bridge0: port 3(veth1_macvtap) entered blocking state [ 160.430364][ T9424] bridge0: port 3(veth1_macvtap) entered disabled state [ 160.521090][ T9438] bridge0: port 3(veth0_to_batadv) entered blocking state [ 160.528513][ T9436] syz.0.2702[9436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.528597][ T9436] syz.0.2702[9436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.540727][ T9438] bridge0: port 3(veth0_to_batadv) entered disabled state [ 160.559720][ T9438] device veth0_to_batadv entered promiscuous mode [ 160.566141][ T9438] bridge0: port 3(veth0_to_batadv) entered blocking state [ 160.573118][ T9438] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 160.583179][ T9439] device veth0_to_batadv left promiscuous mode [ 160.586086][ T9436] syz.0.2702[9436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.592272][ T9439] bridge0: port 3(veth0_to_batadv) entered disabled state [ 160.616708][ T9436] syz.0.2702[9436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.844032][ T9480] syz.4.2715[9480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.855358][ T9480] syz.4.2715[9480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.953281][ T9486] cgroup: fork rejected by pids controller in /syz1 [ 161.152582][ T9542] device sit0 entered promiscuous mode [ 161.252046][ T9551] device syzkaller0 entered promiscuous mode [ 161.387172][ T9563] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.394038][ T9563] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.404341][ T9563] device bridge_slave_0 entered promiscuous mode [ 161.411406][ T9563] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.418448][ T9563] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.429019][ T9563] device bridge_slave_1 entered promiscuous mode [ 161.539264][ T9563] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.546137][ T9563] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.553261][ T9563] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.560019][ T9563] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.588788][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.596466][ T3215] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.605198][ T3215] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.622496][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.631316][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.638182][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.651097][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.659262][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.666091][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.697232][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 161.705074][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.717962][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 161.727653][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.735396][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 161.756095][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 161.770670][ T9563] device veth0_vlan entered promiscuous mode [ 161.796307][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 161.805692][ T291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 161.814367][ T9600] device macsec0 left promiscuous mode [ 161.825737][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 161.833827][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 161.848042][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 161.857830][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 161.874333][ T9563] device veth1_macvtap entered promiscuous mode [ 161.898416][ T4889] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 161.905868][ T4889] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 161.926542][ T4889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 161.958033][ T4889] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 161.971193][ T4889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 162.040408][ T9623] tap0: tun_chr_ioctl cmd 1074025677 [ 162.045600][ T9623] tap0: linktype set to 776 [ 162.469049][ T9709] : renamed from veth0_vlan [ 162.651332][ T9735] IPv6: : Disabled Multicast RS [ 162.875466][ T110] device bridge_slave_1 left promiscuous mode [ 162.881665][ T110] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.889245][ T110] device bridge_slave_0 left promiscuous mode [ 162.895292][ T110] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.903948][ T110] device veth1_macvtap left promiscuous mode [ 162.910103][ T110] device veth0_vlan left promiscuous mode [ 163.070019][ T9763] device syzkaller0 entered promiscuous mode [ 165.276727][ T9910] bpf_get_probe_write_proto: 26 callbacks suppressed [ 165.276737][ T9910] syz.2.2825[9910] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.325531][ T9910] syz.2.2825[9910] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.382180][ T9910] syz.2.2825[9910] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.408246][ T9910] syz.2.2825[9910] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.539760][ T9918] device pim6reg1 entered promiscuous mode [ 165.878200][ T9952] syz.4.2835[9952] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.878270][ T9952] syz.4.2835[9952] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.410750][ T24] audit: type=1400 audit(1720137011.550:170): avc: denied { create } for pid=10114 comm="syz.2.2876" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 168.486239][T10120] syz.3.2877[10120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.486294][T10120] syz.3.2877[10120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.525474][T10120] syz.3.2877[10120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.552051][T10120] syz.3.2877[10120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.407171][T10185] device pim6reg1 entered promiscuous mode [ 169.864472][T10191] device syzkaller0 entered promiscuous mode [ 170.325519][ T24] audit: type=1400 audit(1720137013.470:171): avc: denied { write } for pid=10236 comm="syz.3.2915" name="task" dev="proc" ino=45565 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 170.395172][ T24] audit: type=1400 audit(1720137013.470:172): avc: denied { add_name } for pid=10236 comm="syz.3.2915" name="cgroup.stat" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 170.444684][ T24] audit: type=1400 audit(1720137013.470:173): avc: denied { create } for pid=10236 comm="syz.3.2915" name="cgroup.stat" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 170.469398][ T24] audit: type=1400 audit(1720137013.470:174): avc: denied { associate } for pid=10236 comm="syz.3.2915" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 170.737595][T10259] : renamed from pim6reg1 [ 170.809925][T10269] bpf_get_probe_write_proto: 6 callbacks suppressed [ 170.809936][T10269] syz.3.2925[10269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.816711][T10269] syz.3.2925[10269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.837970][T10269] syz.3.2925[10269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.849996][T10269] syz.3.2925[10269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.879867][T10274] syz.3.2926[10274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.967414][T10277] syz.3.2927[10277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.985165][T10277] syz.3.2927[10277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.169754][T10286] device syzkaller0 entered promiscuous mode [ 171.345808][T10319] device syz_tun entered promiscuous mode [ 172.592238][T10354] device syzkaller0 entered promiscuous mode [ 172.929341][T10391] device pim6reg1 entered promiscuous mode [ 173.966554][T10462] device syzkaller0 left promiscuous mode [ 174.056175][T10470] device pim6reg1 entered promiscuous mode [ 176.553237][T10609] syz.3.3023[10609] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.553295][T10609] syz.3.3023[10609] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.611152][T10609] syz.3.3023[10609] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.643197][T10609] syz.3.3023[10609] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.772941][T10630] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.791080][T10630] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.807154][T10630] device bridge0 left promiscuous mode [ 176.814280][T10630] device bridge_slave_1 left promiscuous mode [ 176.820586][T10630] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.829015][T10630] device bridge_slave_0 left promiscuous mode [ 176.834957][T10630] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.025175][T10639] device syzkaller0 entered promiscuous mode [ 177.244018][T10649] syz.3.3035 uses obsolete (PF_INET,SOCK_PACKET) [ 177.705890][T10680] device pim6reg1 entered promiscuous mode [ 178.253857][T10719] device syzkaller0 entered promiscuous mode [ 178.271525][T10722] cgroup: fork rejected by pids controller in /syz3 [ 178.791428][T10755] device pim6reg1 entered promiscuous mode [ 178.843513][T10744] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.850545][T10744] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.858214][T10744] device bridge_slave_0 entered promiscuous mode [ 178.865087][T10744] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.873123][T10744] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.880741][T10744] device bridge_slave_1 entered promiscuous mode [ 178.955071][T10765] device syzkaller0 entered promiscuous mode [ 179.011572][T10744] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.018451][T10744] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.025550][T10744] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.032334][T10744] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.067874][T10773] device pim6reg1 entered promiscuous mode [ 179.080293][ T4890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 179.088556][ T4890] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.096290][ T4890] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.128470][ T4890] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.136494][ T4890] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.143357][ T4890] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.152729][ T4890] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.161123][ T4890] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.167970][ T4890] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.209415][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 179.221775][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 179.237626][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 179.257300][T10744] device veth0_vlan entered promiscuous mode [ 179.266890][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 179.274796][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 179.282183][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 179.289814][T10779] device pim6reg1 entered promiscuous mode [ 179.305139][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 179.314740][T10744] device veth1_macvtap entered promiscuous mode [ 179.332260][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 179.353771][ T4893] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 179.518716][T10832] syz.1.3094[10832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.518777][T10832] syz.1.3094[10832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.539372][T10832] syz.1.3094[10832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.554951][T10832] syz.1.3094[10832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.908546][T10883] syz.1.3108[10883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.937282][T10883] syz.1.3108[10883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.157678][ T9] device bridge_slave_1 left promiscuous mode [ 180.177266][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.187792][ T9] device bridge_slave_0 left promiscuous mode [ 180.199187][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.217094][ T9] device veth1_macvtap left promiscuous mode [ 180.599253][T10923] device syzkaller0 entered promiscuous mode [ 180.643134][T10921] device veth0_vlan left promiscuous mode [ 180.654179][T10921] device veth0_vlan entered promiscuous mode [ 182.387082][T11037] device syzkaller0 entered promiscuous mode [ 183.371802][T11103] device syzkaller0 entered promiscuous mode [ 183.732250][T11122] bpf_get_probe_write_proto: 2 callbacks suppressed [ 183.732261][T11122] syz.1.3176[11122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.739348][T11122] syz.1.3176[11122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.755829][T11122] syz.1.3176[11122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.768034][T11122] syz.1.3176[11122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.377729][T11143] device syzkaller0 entered promiscuous mode [ 185.674849][T11234] device syzkaller0 entered promiscuous mode [ 187.435962][T11284] device syzkaller0 entered promiscuous mode [ 187.716542][T11321] device pim6reg1 entered promiscuous mode [ 187.831434][T11339] device syzkaller0 entered promiscuous mode [ 188.282319][T11391] device syzkaller0 entered promiscuous mode [ 188.460663][T11394] device wg2 left promiscuous mode [ 188.466485][T11395] device wg2 entered promiscuous mode [ 188.535673][T11406] device sit0 left promiscuous mode [ 189.592258][T11474] device pim6reg1 entered promiscuous mode [ 189.742511][T11478] device sit0 left promiscuous mode [ 189.755366][T11478] device sit0 entered promiscuous mode [ 190.343889][T11509] device pim6reg1 entered promiscuous mode [ 190.903461][T11537] syz.0.3296[11537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.903521][T11537] syz.0.3296[11537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.999206][T11537] syz.0.3296[11537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.059019][T11537] syz.0.3296[11537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.722979][T11563] device pim6reg1 entered promiscuous mode [ 191.821806][T11567] device pim6reg1 entered promiscuous mode [ 192.346346][T11596] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 192.559165][T11604] syz.0.3317[11604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.559226][T11604] syz.0.3317[11604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.610358][T11604] syz.0.3317[11604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.668303][T11604] syz.0.3317[11604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.812282][T11617] device syzkaller0 entered promiscuous mode [ 192.848292][T11614] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.855276][T11614] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.012777][T11632] device wg2 left promiscuous mode [ 193.064956][T11635] device syzkaller0 entered promiscuous mode [ 193.110092][T11646] syz.0.3331[11646] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.110157][T11646] syz.0.3331[11646] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.210225][T11650] device syzkaller0 entered promiscuous mode [ 193.530910][T11690] device syzkaller0 entered promiscuous mode [ 193.634156][T11703] device pim6reg1 entered promiscuous mode [ 193.650927][T11704] device pim6reg1 entered promiscuous mode [ 193.830421][T11728] gretap0: refused to change device tx_queue_len [ 194.395530][ T24] audit: type=1400 audit(1720137037.540:175): avc: denied { create } for pid=11795 comm="syz.0.3382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 194.716408][T11819] device syzkaller0 left promiscuous mode [ 195.026236][T11826] device syzkaller0 entered promiscuous mode [ 195.491892][T11833] device syzkaller0 entered promiscuous mode [ 195.713028][T11863] syzkaller0: tun_chr_ioctl cmd 2147767521 [ 195.723801][T11863] syzkaller0: tun_net_xmit 200 [ 195.737042][ C0] syzkaller0: tun_net_xmit 76 [ 195.782632][T11857] device pim6reg1 entered promiscuous mode [ 196.552406][T11912] device syzkaller0 entered promiscuous mode [ 196.578895][T11915] device syzkaller0 entered promiscuous mode [ 196.805855][T11945] bpf_get_probe_write_proto: 6 callbacks suppressed [ 196.805865][T11945] syz.0.3428[11945] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.909950][T11965] device syzkaller0 left promiscuous mode [ 196.957042][ C1] syzkaller0: tun_net_xmit 76 [ 197.047367][T11990] device sit0 left promiscuous mode [ 197.534870][T12027] device syzkaller0 entered promiscuous mode [ 198.543624][T12076] device syzkaller0 entered promiscuous mode [ 199.534702][T12120] device syzkaller0 entered promiscuous mode [ 200.289282][T12163] device pim6reg1 entered promiscuous mode [ 200.349957][T12165] device syzkaller0 entered promiscuous mode [ 201.083821][T12213] syz.2.3503[12213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.083882][T12213] syz.2.3503[12213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.121319][T12213] syz.2.3503[12213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.140726][T12213] syz.2.3503[12213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.192810][T12222] syz.2.3507[12222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.205344][T12222] syz.2.3507[12222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.306902][T12229] device syz_tun left promiscuous mode [ 201.795439][T12239] syz.2.3512[12239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.795501][T12239] syz.2.3512[12239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.849162][T12239] syz.2.3512[12239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.862895][T12239] syz.2.3512[12239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.099820][T12242] device syzkaller0 entered promiscuous mode [ 203.148697][T12301] syz.4.3531[12301] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.148757][T12301] syz.4.3531[12301] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.175908][T12291] device syzkaller0 entered promiscuous mode [ 204.071226][T12345] syz.1.3542[12345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.071286][T12345] syz.1.3542[12345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.101979][T12345] syz.1.3542[12345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.120355][T12345] syz.1.3542[12345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.442322][T12388] syz.3.3553[12388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.491934][T12388] syz.3.3553[12388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.093048][T12403] device syzkaller0 entered promiscuous mode [ 207.788781][T12514] bpf_get_probe_write_proto: 12 callbacks suppressed [ 207.788792][T12514] syz.2.3590[12514] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.843449][T12514] syz.2.3590[12514] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.906872][T12516] device syzkaller0 entered promiscuous mode [ 207.944838][T12518] syz.2.3590[12518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.945662][T12518] syz.2.3590[12518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.523809][T12541] device pim6reg1 entered promiscuous mode [ 208.684197][T12567] syz.2.3602[12567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.684259][T12567] syz.2.3602[12567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.817636][T12573] syz.2.3602[12573] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.933788][T12573] syz.2.3602[12573] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.825115][T12649] device veth1_macvtap left promiscuous mode [ 210.888459][T12651] device pim6reg1 entered promiscuous mode [ 211.069885][T12663] : renamed from veth0_vlan [ 211.220975][T12649] device veth1_macvtap entered promiscuous mode [ 211.881513][T12699] syz.1.3639[12699] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.881574][T12699] syz.1.3639[12699] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.538661][T12760] bpf_get_probe_write_proto: 2 callbacks suppressed [ 213.538672][T12760] syz.0.3660[12760] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.909561][T12768] syz.0.3660[12768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.943624][T12760] syz.0.3660[12760] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.073634][T12768] syz.0.3660[12768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.556581][T12800] device pim6reg1 entered promiscuous mode [ 214.710440][T12823] syz.1.3679[12823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.710497][T12823] syz.1.3679[12823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.014753][T12890] device pim6reg1 entered promiscuous mode [ 218.307042][ C1] syzkaller0: tun_net_xmit 76 [ 219.041356][T12986] device syzkaller0 entered promiscuous mode [ 219.225885][T13009] device wg2 left promiscuous mode [ 219.278527][T13009] device wg2 entered promiscuous mode [ 219.478055][T13013] bridge0: port 3(veth0_vlan) entered blocking state [ 219.484657][T13013] bridge0: port 3(veth0_vlan) entered disabled state [ 220.301766][T13057] device veth1_macvtap left promiscuous mode [ 220.327233][T13057] device macsec0 entered promiscuous mode [ 220.616856][T13069] syz.3.3754[13069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.616918][T13069] syz.3.3754[13069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.731531][T13069] syz.3.3754[13069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.794541][T13069] syz.3.3754[13069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.123017][T13078] device syzkaller0 entered promiscuous mode [ 221.283899][T13085] geneve1: tun_chr_ioctl cmd 1074025672 [ 221.289366][T13085] geneve1: ignored: set checksum enabled [ 221.301006][T13089] syz.0.3759[13089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.301069][T13089] syz.0.3759[13089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.338475][T13089] syz.0.3759[13089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.382040][T13089] syz.0.3759[13089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.359714][T13158] device syzkaller0 entered promiscuous mode [ 222.437413][T13161] device pim6reg1 entered promiscuous mode [ 222.759358][T13170] device pim6reg1 entered promiscuous mode [ 223.428941][T13212] device syzkaller0 entered promiscuous mode [ 223.437045][ C0] syzkaller0: tun_net_xmit 76 [ 223.437284][T13210] device syzkaller0 entered promiscuous mode [ 223.477033][ C1] syzkaller0: tun_net_xmit 76 [ 223.575556][T13233] device syzkaller0 entered promiscuous mode [ 223.589705][T13233] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 223.595555][T13233] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 223.604235][T13233] syzkaller0: Linktype set failed because interface is up [ 223.619082][ T3450] syzkaller0: tun_net_xmit 48 [ 223.648562][T13241] tap0: tun_chr_ioctl cmd 1074025677 [ 223.670117][T13241] tap0: linktype set to 823 [ 223.849822][T13265] device syzkaller0 entered promiscuous mode [ 224.116724][T13292] syz.1.3823[13292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.116779][T13292] syz.1.3823[13292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.757044][ C1] syzkaller0: tun_net_xmit 76 [ 225.135439][T13343] device syzkaller0 entered promiscuous mode [ 225.177035][ C0] syzkaller0: tun_net_xmit 76 [ 225.201037][T13364] : renamed from pim6reg1 [ 225.234382][T13368] device pim6reg1 entered promiscuous mode [ 225.332348][T13381] device lo entered promiscuous mode [ 225.361914][T13386] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 225.370635][T13386] device syzkaller0 entered promiscuous mode [ 225.538754][T13395] device syzkaller0 entered promiscuous mode [ 226.079627][T13439] bpf_get_probe_write_proto: 10 callbacks suppressed [ 226.079638][T13439] syz.2.3869[13439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.118968][T13439] syz.2.3869[13439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.140561][T13439] syz.2.3869[13439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.157761][T13439] syz.2.3869[13439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.383006][T13450] device syzkaller0 entered promiscuous mode [ 226.724064][T13479] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.733299][T13479] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.746685][T13479] device bridge_slave_0 entered promiscuous mode [ 226.787728][T13479] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.794599][T13479] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.818610][T13479] device bridge_slave_1 entered promiscuous mode [ 226.965856][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 226.973839][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.028237][ T1269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.036390][ T1269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.060418][ T1269] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.067300][ T1269] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.105467][ T1269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.113692][ T1269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.121988][ T1269] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.128848][ T1269] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.160925][ T1269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 227.168895][ T1269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 227.191287][T13479] device veth0_vlan entered promiscuous mode [ 227.223274][ T1269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 227.232392][ T1269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 227.257464][ T1269] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 227.264781][ T1269] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 227.272490][ T1269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.303622][T13479] device veth1_macvtap entered promiscuous mode [ 227.328122][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 227.351259][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 227.411137][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 227.486553][T13498] syz.1.3881[13498] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.486624][T13498] syz.1.3881[13498] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.383707][T13610] bridge0: port 3(veth0_to_batadv) entered blocking state [ 229.405299][T13610] bridge0: port 3(veth0_to_batadv) entered disabled state [ 229.413497][T13610] device veth0_to_batadv entered promiscuous mode [ 229.427770][T13610] bridge0: port 3(veth0_to_batadv) entered blocking state [ 229.434765][T13610] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 229.492830][T13611] device veth0_to_batadv left promiscuous mode [ 229.498969][T13611] bridge0: port 3(veth0_to_batadv) entered disabled state [ 230.538142][T13672] syz.1.3935[13672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.538201][T13672] syz.1.3935[13672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.585706][T13671] syz.1.3935[13671] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.635714][T13671] syz.1.3935[13671] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.587489][T13770] device syzkaller0 entered promiscuous mode [ 231.651283][T13776] device macsec0 left promiscuous mode [ 231.661594][T13776] device veth1_macvtap entered promiscuous mode [ 231.673530][T13776] device macsec0 entered promiscuous mode [ 231.700917][ T3445] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 232.051364][T13803] device pim6reg1 entered promiscuous mode [ 232.515109][T13865] device pim6reg1 entered promiscuous mode [ 233.753086][T13932] syz.1.4013[13932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.753147][T13932] syz.1.4013[13932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.808324][T13932] syz.1.4013[13932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.822933][T13932] syz.1.4013[13932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.530630][T13950] device veth1_macvtap left promiscuous mode [ 234.548531][T13950] device macsec0 left promiscuous mode [ 234.601665][ T24] audit: type=1400 audit(1720137077.750:176): avc: denied { setattr } for pid=13953 comm="syz.1.4019" path="pipe:[55624]" dev="pipefs" ino=55624 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 234.683321][T13950] device veth1_macvtap entered promiscuous mode [ 234.707206][T13950] device macsec0 entered promiscuous mode [ 234.778379][T13964] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.139612][T13975] device syzkaller0 entered promiscuous mode [ 235.994955][T14021] device wg2 left promiscuous mode [ 236.051408][T14016] device wg2 entered promiscuous mode [ 236.346013][T14046] device syzkaller0 entered promiscuous mode [ 237.840036][T14156] device syzkaller0 entered promiscuous mode [ 238.786368][T14210] syz.4.4098[14210] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.786429][T14210] syz.4.4098[14210] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.837466][T14210] syz.4.4098[14210] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.859144][T14210] syz.4.4098[14210] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.966989][T14236] device sit0 entered promiscuous mode [ 239.147740][T14248] syz.3.4109[14248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.147804][T14248] syz.3.4109[14248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.157315][T14254] syz.3.4109[14254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.411894][T14273] device veth1_macvtap left promiscuous mode [ 241.183721][T14389] device veth1_macvtap left promiscuous mode [ 241.255385][T14389] device macsec0 left promiscuous mode [ 241.705687][T14412] device sit0 entered promiscuous mode [ 241.937819][T14431] syz.1.4162[14431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.937857][T14431] syz.1.4162[14431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.975756][T14435] device wg2 entered promiscuous mode [ 242.589263][T14454] device syzkaller0 entered promiscuous mode [ 242.892084][T14498] device syzkaller0 left promiscuous mode [ 243.527044][ C0] syzkaller0: tun_net_xmit 76 [ 243.579473][T14555] device syzkaller0 entered promiscuous mode [ 243.587029][ C0] syzkaller0: tun_net_xmit 76 [ 244.105806][T14615] device sit0 entered promiscuous mode [ 244.371951][T14635] syz.0.4210[14635] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.372011][T14635] syz.0.4210[14635] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.402112][T14635] syz.0.4210[14635] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.415453][T14635] syz.0.4210[14635] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.781928][T14651] device syzkaller0 entered promiscuous mode [ 245.796187][ T24] audit: type=1400 audit(1720137088.940:177): avc: denied { create } for pid=14715 comm="syz.4.4238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 245.800542][T14714] device syzkaller0 entered promiscuous mode [ 245.840665][T14722] device pim6reg1 entered promiscuous mode [ 246.800389][T14775] device syzkaller0 entered promiscuous mode [ 247.180785][T14833] FAULT_INJECTION: forcing a failure. [ 247.180785][T14833] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 247.237262][T14833] CPU: 1 PID: 14833 Comm: syz.2.4269 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 247.248456][T14833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 247.258349][T14833] Call Trace: [ 247.261485][T14833] dump_stack_lvl+0x1e2/0x24b [ 247.265992][T14833] ? bfq_pos_tree_add_move+0x43b/0x43b [ 247.271286][T14833] ? wake_up_klogd+0xb8/0xf0 [ 247.275705][T14833] dump_stack+0x15/0x17 [ 247.279697][T14833] should_fail+0x3c6/0x510 [ 247.283950][T14833] should_fail_usercopy+0x1a/0x20 [ 247.288810][T14833] strncpy_from_user+0x24/0x2d0 [ 247.293494][T14833] __se_sys_bpf+0x1389/0x11cb0 [ 247.298094][T14833] ? stack_trace_save+0x113/0x1c0 [ 247.302958][T14833] ? perf_event_output_forward+0x14e/0x1b0 [ 247.308595][T14833] ? perf_prepare_sample+0x1af0/0x1af0 [ 247.313891][T14833] ? sched_clock+0x3a/0x40 [ 247.318354][T14833] ? sched_clock_cpu+0x1b/0x3b0 [ 247.323039][T14833] ? __x64_sys_bpf+0x90/0x90 [ 247.327465][T14833] ? __this_cpu_preempt_check+0x13/0x20 [ 247.332932][T14833] ? __perf_event_account_interrupt+0x18f/0x2c0 [ 247.339008][T14833] ? hrtimer_forward+0x1a6/0x2c0 [ 247.343787][T14833] ? cpu_clock_event_read+0x50/0x50 [ 247.348817][T14833] ? __fsnotify_parent+0x4b9/0x6c0 [ 247.353771][T14833] ? timerqueue_add+0x24c/0x270 [ 247.358452][T14833] ? enqueue_hrtimer+0xad/0x200 [ 247.363134][T14833] ? __hrtimer_run_queues+0x438/0xa50 [ 247.368343][T14833] ? __hrtimer_run_queues+0x9ea/0xa50 [ 247.373642][T14833] ? ktime_get+0x10e/0x140 [ 247.377890][T14833] ? lapic_next_event+0x5f/0x70 [ 247.382582][T14833] ? clockevents_program_event+0x214/0x2c0 [ 247.388221][T14833] ? trie_lookup_elem+0x21c/0x2c0 [ 247.393081][T14833] ? bpf_trace_run2+0xf4/0x280 [ 247.397685][T14833] ? __bpf_trace_sys_enter+0x62/0x70 [ 247.402802][T14833] __x64_sys_bpf+0x7b/0x90 [ 247.407056][T14833] do_syscall_64+0x34/0x70 [ 247.411312][T14833] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 247.417032][T14833] RIP: 0033:0x7f0ed9faabd9 [ 247.421300][T14833] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 247.440728][T14833] RSP: 002b:00007f0ed922c048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 247.448971][T14833] RAX: ffffffffffffffda RBX: 00007f0eda138f60 RCX: 00007f0ed9faabd9 [ 247.456782][T14833] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 247.464595][T14833] RBP: 00007f0ed922c0a0 R08: 0000000000000000 R09: 0000000000000000 [ 247.472407][T14833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 247.480218][T14833] R13: 000000000000000b R14: 00007f0eda138f60 R15: 00007ffeb3fea2a8 [ 247.510659][T14842] syz.0.4273[14842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.510714][T14842] syz.0.4273[14842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.536086][T14842] syz.0.4273[14842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.555333][T14846] syz.4.4274[14846] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.567872][T14842] syz.0.4273[14842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.582863][T14846] syz.4.4274[14846] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.361918][T14922] device syzkaller0 entered promiscuous mode [ 251.013447][T15068] bpf_get_probe_write_proto: 4 callbacks suppressed [ 251.013475][T15068] syz.0.4338[15068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.020396][T15068] syz.0.4338[15068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.058171][T15068] syz.0.4338[15068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.074883][T15068] syz.0.4338[15068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.147286][T15074] device syzkaller0 entered promiscuous mode [ 251.236068][T15096] device syzkaller0 entered promiscuous mode [ 251.257888][T15097] syz.3.4346[15097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.257962][T15097] syz.3.4346[15097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.377244][T15121] syz.3.4352[15121] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.388989][T15121] syz.3.4352[15121] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.467408][T15121] syz.3.4352[15121] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.479465][T15121] syz.3.4352[15121] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.718315][T15168] device pim6reg1 entered promiscuous mode [ 253.019129][T15214] device veth0_vlan left promiscuous mode [ 253.056694][T15214] device veth0_vlan entered promiscuous mode [ 253.186622][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 253.203130][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 253.222031][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 254.235096][T15279] device syzkaller0 entered promiscuous mode [ 254.613639][T15310] device syzkaller0 entered promiscuous mode [ 254.747482][T15318] device sit0 entered promiscuous mode [ 254.990349][T15328] device veth0_vlan left promiscuous mode [ 254.996562][T15328] device veth0_vlan entered promiscuous mode [ 255.154333][T15339] device syzkaller0 entered promiscuous mode [ 255.174207][T15356] device syzkaller0 entered promiscuous mode [ 255.184111][T15358] device pim6reg1 entered promiscuous mode [ 255.394295][T15392] device pim6reg1 entered promiscuous mode [ 256.760485][T15488] device pim6reg1 entered promiscuous mode [ 256.819574][T15503] device syzkaller0 entered promiscuous mode [ 256.828838][T15494] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.852950][T15494] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.859849][T15494] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.891643][T15503] device pim6reg1 entered promiscuous mode [ 257.421155][T15574] bpf_get_probe_write_proto: 2 callbacks suppressed [ 257.421167][T15574] syz.3.4494[15574] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.429674][T15574] syz.3.4494[15574] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.785781][T15614] syz.4.4503[15614] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.086488][T15627] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.104713][T15627] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.143071][T15630] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.149989][T15630] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.157071][T15630] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.163824][T15630] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.237642][T15630] device bridge0 entered promiscuous mode [ 260.183376][T15669] syz.1.4519[15669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.183448][T15669] syz.1.4519[15669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.256033][T15678] syz.1.4519[15678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.308942][T15678] syz.1.4519[15678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.863804][T15700] syz.1.4526[15700] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.897886][T15700] syz.1.4526[15700] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.387035][ C0] syzkaller0: tun_net_xmit 76 [ 261.403332][T15709] device syzkaller0 entered promiscuous mode [ 261.477032][ C0] syzkaller0: tun_net_xmit 76 [ 261.718290][T15719] syz.0.4530[15719] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.199726][T15739] device wg2 left promiscuous mode [ 262.270158][T15746] device wg2 entered promiscuous mode [ 262.935981][T15768] device syzkaller0 entered promiscuous mode [ 263.199119][T15784] device pim6reg1 entered promiscuous mode [ 264.983212][T15842] bpf_get_probe_write_proto: 3 callbacks suppressed [ 264.983225][T15842] syz.3.4558[15842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.199787][T15850] device syzkaller0 entered promiscuous mode [ 265.238009][T15842] syz.3.4558[15842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.799989][T15863] device pim6reg1 entered promiscuous mode [ 266.077454][T15887] device sit0 entered promiscuous mode [ 266.713187][T15962] syz.4.4594[15962] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.713250][T15962] syz.4.4594[15962] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.782952][T15962] syz.4.4594[15962] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.813154][T15962] syz.4.4594[15962] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.830715][T16026] syz.3.4613[16026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.842169][T16026] syz.3.4613[16026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.864066][T16026] syz.3.4613[16026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.883365][T16026] syz.3.4613[16026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.943878][T16031] device wlan0 entered promiscuous mode [ 268.140267][T16052] device syzkaller0 entered promiscuous mode [ 268.780557][T16117] device pim6reg1 entered promiscuous mode [ 268.835394][T16125] device syzkaller0 entered promiscuous mode [ 269.014110][T16137] device syzkaller0 entered promiscuous mode [ 270.701136][T16279] bpf_get_probe_write_proto: 12 callbacks suppressed [ 270.701147][T16279] syz.1.4687[16279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.714805][T16279] syz.1.4687[16279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.750110][T16279] syz.1.4687[16279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.778320][T16279] syz.1.4687[16279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.871370][T16280] device wlan0 entered promiscuous mode [ 271.907482][T16370] device pim6reg1 entered promiscuous mode [ 272.015505][T16392] syz.1.4720[16392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.015564][T16392] syz.1.4720[16392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.089001][T16397] device veth0_vlan left promiscuous mode [ 272.229348][T16397] device veth0_vlan entered promiscuous mode [ 272.236225][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.244587][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 272.305425][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 272.917177][T16426] Y4`Ҙ: renamed from lo [ 273.327339][T16454] : renamed from vlan0 [ 273.564629][T16471] device pim6reg1 entered promiscuous mode [ 274.798593][T16531] device syzkaller0 left promiscuous mode [ 275.081678][T16563] syz.4.4772[16563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.081760][T16563] syz.4.4772[16563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.174753][T16563] syz.4.4772[16563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.209244][T16563] syz.4.4772[16563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.282905][T16571] device syzkaller0 entered promiscuous mode [ 279.217599][T16682] device syzkaller0 entered promiscuous mode [ 281.082417][T16777] device pim6reg1 entered promiscuous mode [ 282.176018][T16874] syz.4.4864[16874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.176078][T16874] syz.4.4864[16874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.465515][T16970] device syzkaller0 entered promiscuous mode [ 283.581504][T16985] syz.3.4898[16985] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.581558][T16985] syz.3.4898[16985] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.598493][T16985] syz.3.4898[16985] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.610685][T16985] syz.3.4898[16985] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.784137][T16994] geneve1: tun_chr_ioctl cmd 19271 [ 284.481908][T17065] syz.2.4921[17065] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.481973][T17065] syz.2.4921[17065] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.532930][T17065] syz.2.4921[17065] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.579621][T17065] syz.2.4921[17065] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.361402][T17233] bridge0: port 3(veth0_to_batadv) entered blocking state [ 288.380232][T17233] bridge0: port 3(veth0_to_batadv) entered disabled state [ 288.388660][T17233] device veth0_to_batadv entered promiscuous mode [ 288.395139][T17233] bridge0: port 3(veth0_to_batadv) entered blocking state [ 288.402110][T17233] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 288.839384][T17277] bpf_get_probe_write_proto: 10 callbacks suppressed [ 288.839395][T17277] syz.2.4988[17277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.846182][T17277] syz.2.4988[17277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.864349][T17277] syz.2.4988[17277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.892187][T17277] syz.2.4988[17277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.084234][T17297] device pim6reg1 entered promiscuous mode [ 289.347869][T17300] bridge0: port 3(veth0_to_batadv) entered disabled state [ 289.354897][T17300] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.072791][T17323] syz.3.5002[17323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.072854][T17323] syz.3.5002[17323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.094390][T17323] syz.3.5002[17323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.110726][T17323] syz.3.5002[17323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.692973][T17359] device syzkaller0 entered promiscuous mode [ 291.148435][T17380] Y4`Ҙ: renamed from lo [ 291.398153][T17383] device syzkaller0 entered promiscuous mode [ 291.792308][T17405] device syzkaller0 entered promiscuous mode [ 292.018485][T17418] syz.0.5034[17418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.018561][T17418] syz.0.5034[17418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.336533][T17439] device vxcan1 entered promiscuous mode [ 292.888685][T17500] FAULT_INJECTION: forcing a failure. [ 292.888685][T17500] name failslab, interval 1, probability 0, space 0, times 1 [ 292.903472][T17500] CPU: 0 PID: 17500 Comm: syz.0.5060 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 292.914655][T17500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 292.924543][T17500] Call Trace: [ 292.927678][T17500] dump_stack_lvl+0x1e2/0x24b [ 292.932200][T17500] ? bfq_pos_tree_add_move+0x43b/0x43b [ 292.937515][T17500] ? kmem_cache_free+0xa9/0x1e0 [ 292.942172][T17500] ? kasan_set_track+0x5d/0x70 [ 292.946945][T17500] ? kasan_set_free_info+0x23/0x40 [ 292.951972][T17500] ? ____kasan_slab_free+0x121/0x160 [ 292.957102][T17500] ? __kasan_slab_free+0x11/0x20 [ 292.961874][T17500] ? kmem_cache_free+0xa9/0x1e0 [ 292.966551][T17500] dump_stack+0x15/0x17 [ 292.970542][T17500] should_fail+0x3c6/0x510 [ 292.974795][T17500] ? dup_task_struct+0x57/0xc30 [ 292.979483][T17500] __should_failslab+0xa4/0xe0 [ 292.984087][T17500] should_failslab+0x9/0x20 [ 292.988422][T17500] kmem_cache_alloc+0x3d/0x2e0 [ 292.993024][T17500] dup_task_struct+0x57/0xc30 [ 292.997535][T17500] ? __kasan_check_write+0x14/0x20 [ 293.002483][T17500] copy_process+0x5c8/0x3340 [ 293.006913][T17500] ? proc_fail_nth_write+0x20b/0x290 [ 293.012028][T17500] ? proc_fail_nth_read+0x210/0x210 [ 293.017067][T17500] ? security_file_permission+0x86/0xb0 [ 293.022444][T17500] ? rw_verify_area+0x1c3/0x360 [ 293.027132][T17500] ? slab_free_freelist_hook+0xc0/0x190 [ 293.032510][T17500] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 293.037456][T17500] ? vfs_write+0x854/0xe70 [ 293.041712][T17500] kernel_clone+0x21e/0x9e0 [ 293.046049][T17500] ? __kasan_check_write+0x14/0x20 [ 293.050995][T17500] ? create_io_thread+0x1e0/0x1e0 [ 293.055862][T17500] __x64_sys_clone+0x23f/0x290 [ 293.060458][T17500] ? __do_sys_vfork+0x130/0x130 [ 293.065148][T17500] ? debug_smp_processor_id+0x17/0x20 [ 293.070355][T17500] do_syscall_64+0x34/0x70 [ 293.074604][T17500] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 293.080334][T17500] RIP: 0033:0x7f8401b0fbd9 [ 293.084589][T17500] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 293.104909][T17500] RSP: 002b:00007f8400d90ff8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 293.113235][T17500] RAX: ffffffffffffffda RBX: 00007f8401c9df60 RCX: 00007f8401b0fbd9 [ 293.121038][T17500] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 293.129975][T17500] RBP: 00007f8400d910a0 R08: 0000000000000000 R09: 0000000000000000 [ 293.137904][T17500] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 293.145703][T17500] R13: 000000000000000b R14: 00007f8401c9df60 R15: 00007ffd783eb4a8 [ 293.538162][T17518] device syzkaller0 entered promiscuous mode [ 293.548642][ C1] syzkaller0: tun_net_xmit 76 [ 295.140729][T17588] bpf_get_probe_write_proto: 6 callbacks suppressed [ 295.140740][T17588] syz.1.5086[17588] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.147357][T17588] syz.1.5086[17588] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.189453][T17588] syz.1.5086[17588] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.217463][T17588] syz.1.5086[17588] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.015300][T17613] device sit0 left promiscuous mode [ 296.344354][T17643] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 296.347470][T17648] syz.1.5102[17648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.352129][T17648] syz.1.5102[17648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.371874][T17643] device syzkaller0 entered promiscuous mode [ 296.396435][T17648] device pim6reg1 entered promiscuous mode [ 296.597959][T17670] device wg2 left promiscuous mode [ 296.689439][T17678] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 296.851910][T17690] device syzkaller0 entered promiscuous mode [ 298.011335][T17764] syzkaller0: tun_chr_ioctl cmd 1074025680 [ 298.037006][ C0] syzkaller0: tun_net_xmit 76 [ 298.124501][T17767] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.131460][T17767] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.139175][T17767] device bridge_slave_0 entered promiscuous mode [ 298.146136][T17767] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.153332][T17767] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.161061][T17767] device bridge_slave_1 entered promiscuous mode [ 298.234649][T17780] device syzkaller0 entered promiscuous mode [ 298.278613][T17767] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.286196][T17767] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.293306][T17767] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.300068][T17767] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.436041][ T4343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 298.448995][ T4343] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.456256][ T4343] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.484244][ T3447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 298.496569][ T3447] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.503685][ T3447] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.521294][ T3447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 298.543328][ T3447] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.550208][ T3447] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.564732][ T3447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 298.572611][ T3447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 298.617449][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 298.629594][T17767] device veth0_vlan entered promiscuous mode [ 298.638830][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 298.647761][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 298.655648][ T3903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 298.682414][T17767] device veth1_macvtap entered promiscuous mode [ 298.692606][ T4343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 298.707555][ T4343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 298.721188][ T4343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 298.891516][T17838] device syzkaller0 entered promiscuous mode [ 298.977301][T17847] syz.3.5160[17847] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.310675][ T334] device bridge_slave_1 left promiscuous mode [ 299.337565][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.365248][ T334] device bridge_slave_0 left promiscuous mode [ 299.371363][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.212817][ T3902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 300.220679][ T3902] bridge0: port 3(veth0_vlan) entered blocking state [ 300.227206][ T3902] bridge0: port 3(veth0_vlan) entered forwarding state [ 300.235047][ T3902] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 300.242509][ T3902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 300.260447][T17913] device pim6reg1 entered promiscuous mode [ 300.598036][ C0] syzkaller0: tun_net_xmit 76 [ 300.930185][T18009] syz.1.5211[18009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.930249][T18009] syz.1.5211[18009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.993932][T18009] syz.1.5211[18009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! SYZFAIL: proc resp pipe read failed n=-1 (errno 11: Resource temporarily unavailable) [ 301.018320][T18009] syz.1.5211[18009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.147944][T13494] bridge0: port 3(veth0_vlan) entered disabled state [ 303.166045][T13494] device bridge_slave_1 left promiscuous mode [ 303.172151][T13494] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.179464][T13494] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.187588][T13494] device veth0_to_batadv left promiscuous mode [ 303.193592][T13494] bridge0: port 3(veth0_to_batadv) entered disabled state [ 303.200958][T13494] device bridge_slave_1 left promiscuous mode [ 303.207036][T13494] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.214079][T13494] device bridge_slave_0 left promiscuous mode [ 303.220040][T13494] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.227622][T13494] device bridge_slave_1 left promiscuous mode [ 303.233539][T13494] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.240883][T13494] device bridge_slave_0 left promiscuous mode [ 303.246790][T13494] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.255666][T13494] device bridge_slave_1 left promiscuous mode [ 303.261660][T13494] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.268846][T13494] device bridge_slave_0 left promiscuous mode [ 303.274747][T13494] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.283333][T13494] device veth0_vlan left promiscuous mode [ 303.289156][T13494] device veth0_vlan left promiscuous mode [ 303.294766][T13494] device veth1_macvtap left promiscuous mode [ 303.300662][T13494] device veth0_vlan left promiscuous mode [ 303.306382][T13494] device veth1_macvtap left promiscuous mode [ 303.312546][T13494] device veth1_macvtap left promiscuous mode [ 303.318422][T13494] device veth0_vlan left promiscuous mode