last executing test programs: 8.596535527s ago: executing program 4 (id=4690): perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00'}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) 7.480081298s ago: executing program 4 (id=4696): bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43451) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000001c0)='btrfs_qgroup_account_extent\x00', r3, 0x0, 0x1}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000340)='timer_start\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r6, 0x8004745a, &(0x7f0000000180)) 6.568280397s ago: executing program 4 (id=4700): openat$tun(0xffffffffffffff9c, 0x0, 0x101100, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x5005, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) 4.821307084s ago: executing program 2 (id=4709): bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x5, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 4.565429667s ago: executing program 3 (id=4711): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0e0000000400000008000000080000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0], 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0600000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB="0000000000000800f69d5d45578f400000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/18], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f00000002c0)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f00000007c0)=ANY=[], 0x6) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x4, 0x599, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r6, 0x0, 0x1ba8847c99}, 0x38) 4.260194319s ago: executing program 1 (id=4712): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES16=r1, @ANYRES32=0x0, @ANYRES32, @ANYRES64=r0], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000cba85cc719250061b33bd59400"/34], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="02fc46d6ae52a4276fc6a635a4189be3265418200417cc2280e822863df52ccea625f1d48ac9ebfc237f8e14230fe6ab55fd3c276e3d8b1425caca", @ANYBLOB="18000000000000000000000000ffff0018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000080)) 4.13960925s ago: executing program 0 (id=4713): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES16=r1, @ANYRES32=0x0, @ANYRES32, @ANYRES64=r0], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000cba85cc719250061b33bd59400"/34], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="02fc46d6ae52a4276fc6a635a4189be3265418200417cc2280e822863df52ccea625f1d48ac9ebfc237f8e14230fe6ab55fd3c276e3d8b1425caca", @ANYBLOB="18000000000000000000000000ffff0018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000080)) 4.037616982s ago: executing program 3 (id=4714): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000b00000000000000", @ANYRES32, @ANYBLOB="0096000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d00)={r2, 0xf, 0x0, 0x0, 0x0, 0x0, 0xc00d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000040000000000000eead0a00", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r3}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) 3.16608502s ago: executing program 2 (id=4715): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYRES64=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x2000000000000000, 0x0, 0x0) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e0000000100000009000000b8000000012000000113", @ANYRES32=r1, @ANYBLOB="f7ffffff00"/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="0000000005000000000000000900"/25], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="2b6370752047714f2845c87fb0e60b74e6a66cbe20bb7c9807d2f0907bd122f6aa3547725cf71d2296bac6ee1ef5cc88b8be8a7ff396ae13646ba7842d"], 0x5) write$cgroup_subtree(r6, &(0x7f00000001c0)={[{0x2d, 'cpu'}]}, 0x5) r7 = openat$cgroup_type(r4, &(0x7f0000000040), 0x2, 0x0) write$cgroup_type(r7, &(0x7f0000000080), 0x9) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 3.16564831s ago: executing program 3 (id=4716): perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd020f4c0c8c56147d66527da307bf731fef97861750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3665f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447c2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0000000000000003629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d7b90dfae158b94f50adab988dd8e12b1b56073d0d10f7067c881434af5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf77bfc95769a9294df517d90bdc01e73835efd98ad5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b31592479ecf2392548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbe1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5646ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4766e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec859c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f250057931d828ec78e116ae46c4897e2795b6ff92e9a1f63a6ed8fb4f8f3a6ec4e76f8621e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403f02734137ff47257f164391c673b6071b6ad0f05eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f5589829b6b0679b5d65a81826fc9b38f791c8f1892b51ad65a89bc84646ebf78f5d5d4804d9abb071fd711b5e7cc163b42a6510b8f5ee6747df0b560eabe0499bf1fef7c18bb9f55effa018679845c6598fb78bf1b8d9d9f04a5f6062c2bbb91952755b3f7c948268cb647d0a0bb1286480615941154a01d23734bcafe3b164474e2f2efa77850686ee4541f3e79efa63545a7ae53d5f0c40cc86473f7eb093980bd0d97bb4750128d9c519984c5f731ea259e71b2f12d67ce12e52c283e74594dfc933e625737ed231d61263721d46daf093f770357cd78fe1431aef52b4a0a933f1a5334ad03f3876fc8a8e187f80318427b4c922075cf829e3cc49d71d52137b48e1fb6b05dd1c7b251a7059f0a4b4f3431f67fc65b75c202e43816e34ff41db85bacd77b25242830b788ae1e00"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) 3.16067037s ago: executing program 0 (id=4725): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES16=r1, @ANYRES32=0x0, @ANYRES32, @ANYRES64=r0], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000cba85cc719250061b33bd59400"/34], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="02fc46d6ae52a4276fc6a635a4189be3265418200417cc2280e822863df52ccea625f1d48ac9ebfc237f8e14230fe6ab55fd3c276e3d8b1425caca", @ANYBLOB="18000000000000000000000000ffff0018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000080)) 3.15986833s ago: executing program 1 (id=4717): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES16=r1, @ANYRES32=0x0, @ANYRES32, @ANYRES64=r0], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000cba85cc719250061b33bd59400"/34], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="02fc46d6ae52a4276fc6a635a4189be3265418200417cc2280e822863df52ccea625f1d48ac9ebfc237f8e14230fe6ab55fd3c276e3d8b1425caca", @ANYBLOB="18000000000000000000000000ffff0018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000080)) 2.585373316s ago: executing program 1 (id=4718): r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x0, 0x8}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r0}, &(0x7f00000005c0), &(0x7f0000000600)}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sk_lookup, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffef0, 0x0, 0xffffffffffffffff, 0xfffffe39, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000008c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='fib6_table_lookup\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) 2.528225106s ago: executing program 2 (id=4719): openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x3) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x3) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @void, @value, @void, @value}, 0x50) sendmsg$unix(r1, 0x0, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f00000000c0)={&(0x7f0000000540)=@llc={0x1a, 0x321, 0x1, 0x1, 0x9, 0x6}, 0x80, &(0x7f0000000cc0)}, 0x0) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 2.463640227s ago: executing program 0 (id=4720): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000400000041000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB], 0x48) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) socketpair(0x2c, 0x3, 0x6, &(0x7f0000000000)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x1, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r4}, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010100)={0xffffffffffffffff, &(0x7f00000102c0)="5c192bb7e2e68cf06dcc778524a149ad61c9b45640f1d346076ea5bc0bedbefb368c20f9f82a6b4b8c5d17ce647fee24158a57f6f74eed60ec24176b1ccc1bd87334419b368d1a799fcfd3bb391e8881cba0a570535dac68c7a34c19a7ae9356b1f65dd6ed18e633cb232ca012da179780719a2d19faf61e5760942d2e58efea45eb2c3e0000", &(0x7f0000010440)=""/198}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 2.369966088s ago: executing program 1 (id=4721): perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd020f4c0c8c56147d66527da307bf731fef97861750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3665f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447c2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0000000000000003629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d7b90dfae158b94f50adab988dd8e12b1b56073d0d10f7067c881434af5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf77bfc95769a9294df517d90bdc01e73835efd98ad5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b31592479ecf2392548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbe1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5646ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4766e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec859c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f250057931d828ec78e116ae46c4897e2795b6ff92e9a1f63a6ed8fb4f8f3a6ec4e76f8621e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403f02734137ff47257f164391c673b6071b6ad0f05eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f5589829b6b0679b5d65a81826fc9b38f791c8f1892b51ad65a89bc84646ebf78f5d5d4804d9abb071fd711b5e7cc163b42a6510b8f5ee6747df0b560eabe0499bf1fef7c18bb9f55effa018679845c6598fb78bf1b8d9d9f04a5f6062c2bbb91952755b3f7c948268cb647d0a0bb1286480615941154a01d23734bcafe3b164474e2f2efa77850686ee4541f3e79efa63545a7ae53d5f0c40cc86473f7eb093980bd0d97bb4750128d9c519984c5f731ea259e71b2f12d67ce12e52c283e74594dfc933e625737ed231d61263721d46daf093f770357cd78fe1431aef52b4a0a933f1a5334ad03f3876fc8a8e187f80318427b4c922075cf829e3cc49d71d52137b48e1fb6b05dd1c7b251a7059f0a4b4f3431f67fc65b75c202e43816e34ff41db85bacd77b25242830b788ae1e00"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000}, 0x1e) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) 2.220096759s ago: executing program 3 (id=4722): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000b00000000000000", @ANYRES32, @ANYBLOB="0096000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d00)={r2, 0xf, 0x0, 0x0, 0x0, 0x0, 0xc00d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000040000000000000eead0a00", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r3}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.997260741s ago: executing program 4 (id=4723): bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) close(r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_type(r2, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r3, &(0x7f0000000280), 0x9) r4 = openat$cgroup_procs(r2, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) mkdir(&(0x7f0000000180)='./file0\x00', 0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r6, &(0x7f00000000c0), 0x12) bpf$MAP_CREATE(0x8001000000000000, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000500000002000000", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000001000000000000000000"], 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="020000000400080000080000000000008000000010529394390cd1e05080a0f2769f78f1151d692b7598ab5d446daac75dc7a4e0621671d3b847cb27ec54faa08eb920c727aeb30e1adeb98a0e7820193ce574e6825f3f6ce395bdb5ee9a4b25ed39f8ef929b8c86a0b63464908742c5320aff6fbf9a42c8780ed49f5822703d19d0599c848e6e77606d931c04ad95c0912e66", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0xf, &(0x7f0000000d80)=ANY=[@ANYBLOB="18080000000000000000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000054000000bf0910000000000035090100000000009500000000000000bd9800000005000000b70000000000000095009100000000005703683e45775bce67a0"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.991870391s ago: executing program 0 (id=4734): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r2) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x20}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x3e000000}}]}}, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x52) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x20001400) syz_clone(0x4eb82100, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x8004745a, 0x2000000c) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfe33) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) write$cgroup_subtree(r7, &(0x7f0000000040)={[{0x2b, 'cpu'}, {0x2d, 'pids'}]}, 0xb) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xa458, 0x5}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) 1.641543815s ago: executing program 4 (id=4724): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000006100000054000000000000009500000000000000b4a8b1541206000000e9c79077fa15ba36eca61299de54cf77c9062430bc068829afff36b31fa7e35ce95d04"], &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r3, 0x2000000, 0x20, 0x0, &(0x7f0000000240)="5cdd3086ddff0066b3c9bbac88a8862c00dffd0013dd00000000000000008100", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, 0x0, 0x305500, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r1, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86, &(0x7f0000000080)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0xe3, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000001000)="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", 0x2d5}], 0x1, 0x0, 0x0, 0xc0}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x21, &(0x7f0000000540), 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r6}, 0x18) sendmsg$tipc(r5, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000640)={'dummy0\x00', @local}) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0e00000004000000040000000200020000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03090000020000000000000000000000000000000000000000000000c6deba5a21a0d179a36aaae8ba02d301eebc5cab25b34842802f94db92d20cfd0be12cee718954a8b55775e1c4af78fbaa0d00000000000000972e8fc86808570e56f601fee668"], 0x50) syz_open_procfs$namespace(0x0, &(0x7f0000000940)='ns/pid\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=@bloom_filter={0x1e, 0x1, 0x0, 0x6, 0x80, 0x1, 0x69, '\x00', 0x0, r2, 0x2, 0x4, 0x5, 0xa, @void, @value, @void, @value}, 0x50) 1.488934216s ago: executing program 3 (id=4726): perf_event_open(0x0, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r1}, 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x8, 0xc, 0xffffbffb, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000200)=0x1, 0x12) mkdir(0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.391890117s ago: executing program 1 (id=4727): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000008c0)={r4, 0x0, 0x83, 0x0, &(0x7f0000000680)="a8bf38f367fa179bf4174d0e959303fb4a2c6959687a02da24cb39327e693b868160ee12cbd1e3f261fcb512cd2aa006927f461a6f0ac0a075510d38b6beb79ef79f111c40337724ff4ce871356ac380261a7e428854e9455aa31a03451b525e0edbd3bf11ed9d4eb0c827b3e99ca78f5e5cd272aef75c7859b1a93377da3d98d53dce", 0x0, 0xc, 0x0, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x2, 0x0, 0x7f}, 0x50) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r5 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r5, &(0x7f00000000c0)=ANY=[], 0x4) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 1.13722463s ago: executing program 2 (id=4728): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{}, 0x0, &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) sendmsg$unix(r4, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="14"], 0x18}, 0x0) close(r3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mkdir(&(0x7f0000000880)='./file0\x00', 0x8) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r6 = syz_clone(0x10000000, &(0x7f0000000680)="bf53afb9583322172436e43627efc32f5f5ca9ded11e9e6d1c82d8605311a1a467ea64a3d88ca9438ea852c548c8ee85c7ed32bbd81521e39d8a0fd70acf33516846cd52df490deff21f5b83c46e5be6d5f10a7d10523db9743a49c1bef7275e221aea05b0abe3fd", 0x68, &(0x7f00000002c0), &(0x7f0000000580), &(0x7f0000000780)="f43ed3c591c0157da591fee3a0b5a11d7cefe13f3201447dc4f2347f077dd71236c46520b71234b0f5a1f164c7ee4ae427e9152697ead241d0b94d0c08d20d99a305fce01b0e56b69ae39638effa5235df9faa09785b51a83ee8ad5ce1eb61e40aaba00e35c14182c841fe8bd7947cf285347be2f65fb7171baac4694acda898b72008514fa37f2df53a01f1a3abad11b039bc47c3e4b3bc3ce2faac9e7748ce44cda695ad0de2fe18268506ce17a9a85673b355c199f9aed172e2d6a23d6859b9417cfe3d21791086085962e18582100647751fb03189c4c44156ddbce5fd1c4f7e406de82610dc3c") perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x4, 0xce, 0x27, 0xff, 0x0, 0xffffffff, 0x8000, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x4, 0x9, 0x2, 0x4e0c, 0xfffffb6f, 0x0, 0x0, 0x91, 0x0, 0x1}, r6, 0xb, r2, 0x1) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r7) 979.850371ms ago: executing program 0 (id=4729): perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000}, 0x1e) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) 508.846896ms ago: executing program 1 (id=4730): bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x80086601, 0x0) r2 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0), 0x8) close(r2) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x63d6a836}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) 493.060376ms ago: executing program 2 (id=4731): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1808000000000000000000000000000285"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={0x0, 0x0, 0x27, 0x0, 0x1, 0xf3, 0x0, @void, @value}, 0x28) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000000340)=ANY=[], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 403.370717ms ago: executing program 4 (id=4732): r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x0, 0x8}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r0}, &(0x7f00000005c0), &(0x7f0000000600)}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sk_lookup, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffef0, 0x0, 0xffffffffffffffff, 0xfffffe39, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000008c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='fib6_table_lookup\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) 293.450658ms ago: executing program 2 (id=4733): perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) 93.44276ms ago: executing program 3 (id=4735): openat$tun(0xffffffffffffff9c, 0x0, 0x101100, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x5005, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) 0s ago: executing program 0 (id=4736): bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b700000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff000000820c0200", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00a300"/21], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000380), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.28' (ED25519) to the list of known hosts. [ 19.618800][ T30] audit: type=1400 audit(1741484330.751:66): avc: denied { integrity } for pid=278 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 19.635132][ T30] audit: type=1400 audit(1741484330.771:67): avc: denied { mounton } for pid=278 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.636697][ T278] cgroup: Unknown subsys name 'net' [ 19.643796][ T30] audit: type=1400 audit(1741484330.771:68): avc: denied { mount } for pid=278 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.670733][ T30] audit: type=1400 audit(1741484330.781:69): avc: denied { unmount } for pid=278 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.670921][ T278] cgroup: Unknown subsys name 'devices' [ 19.874279][ T278] cgroup: Unknown subsys name 'hugetlb' [ 19.879724][ T278] cgroup: Unknown subsys name 'rlimit' [ 20.020598][ T30] audit: type=1400 audit(1741484331.151:70): avc: denied { setattr } for pid=278 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.043686][ T30] audit: type=1400 audit(1741484331.151:71): avc: denied { mounton } for pid=278 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.068176][ T30] audit: type=1400 audit(1741484331.151:72): avc: denied { mount } for pid=278 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.095793][ T281] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 20.104441][ T30] audit: type=1400 audit(1741484331.241:73): avc: denied { relabelto } for pid=281 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.129882][ T30] audit: type=1400 audit(1741484331.241:74): avc: denied { write } for pid=281 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.167697][ T30] audit: type=1400 audit(1741484331.301:75): avc: denied { read } for pid=278 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.168198][ T278] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.657046][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.663968][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.671116][ T288] device bridge_slave_0 entered promiscuous mode [ 20.679439][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.686337][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.693823][ T288] device bridge_slave_1 entered promiscuous mode [ 20.766451][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.773560][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.780794][ T289] device bridge_slave_0 entered promiscuous mode [ 20.788497][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.795384][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.802677][ T289] device bridge_slave_1 entered promiscuous mode [ 20.903653][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.910508][ T288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.917647][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.924415][ T288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.942887][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.949743][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.956880][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.963676][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.987560][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.994464][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.001766][ T290] device bridge_slave_0 entered promiscuous mode [ 21.017833][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.024772][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.032470][ T290] device bridge_slave_1 entered promiscuous mode [ 21.055632][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.062606][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.069659][ T291] device bridge_slave_0 entered promiscuous mode [ 21.083873][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.090818][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.098195][ T292] device bridge_slave_0 entered promiscuous mode [ 21.109206][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.116107][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.123359][ T291] device bridge_slave_1 entered promiscuous mode [ 21.133390][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.140238][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.147654][ T292] device bridge_slave_1 entered promiscuous mode [ 21.249310][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.256770][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.264248][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.271678][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.279124][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.302855][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.310812][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.317669][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.341089][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.349222][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.356083][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.378633][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.385991][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.395474][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.433733][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.441479][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.449700][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.456594][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.463964][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.471916][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.478794][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.486067][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.493997][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.527404][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.549657][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.557720][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.565259][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.572798][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.582430][ T288] device veth0_vlan entered promiscuous mode [ 21.596228][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.604814][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.612603][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.619818][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.628073][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.635053][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.642477][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.650425][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.657382][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.664665][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.677048][ T289] device veth0_vlan entered promiscuous mode [ 21.689637][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.697696][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.705131][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.713875][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.722184][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.730383][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.737418][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.744801][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.753221][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.760049][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.767480][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.782686][ T288] device veth1_macvtap entered promiscuous mode [ 21.791691][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.799283][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 21.807654][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.815809][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.822685][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.830109][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.838450][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.846654][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.853516][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.860756][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.868846][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.876727][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.884726][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.892678][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.910040][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.918174][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.926300][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.934637][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.942948][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.950964][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.959291][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.967531][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.979985][ T289] device veth1_macvtap entered promiscuous mode [ 21.992659][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.000338][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.008914][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.016942][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.025220][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.039995][ T288] request_module fs-gadgetfs succeeded, but still no fs? [ 22.054267][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.062898][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.071245][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.079680][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.088335][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.096760][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.105418][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.113227][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.121143][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.129420][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.137598][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.144999][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.161522][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.169612][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.177998][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.185669][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.193906][ T291] device veth0_vlan entered promiscuous mode [ 22.203804][ T292] device veth0_vlan entered promiscuous mode [ 22.229338][ T292] device veth1_macvtap entered promiscuous mode [ 22.251410][ T290] device veth0_vlan entered promiscuous mode [ 22.258234][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.266628][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.274973][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.282230][ C1] hrtimer: interrupt took 31783 ns [ 22.283841][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.306195][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.323067][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.344936][ T291] device veth1_macvtap entered promiscuous mode [ 22.365259][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.373468][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.385165][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.398811][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.417533][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.431684][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.445681][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.458525][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.472466][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.509104][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.524917][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.539718][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.551531][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.568824][ T290] device veth1_macvtap entered promiscuous mode [ 22.586265][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.603454][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.616400][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.656537][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.672696][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.685574][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.698267][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.359147][ T338] device sit0 entered promiscuous mode [ 23.491642][ T351] ------------[ cut here ]------------ [ 23.547697][ T351] trace type BPF program uses run-time allocation [ 23.559752][ T353] device pim6reg1 entered promiscuous mode [ 23.572616][ T351] WARNING: CPU: 1 PID: 351 at kernel/bpf/verifier.c:11701 check_map_prog_compatibility+0x6f1/0x890 [ 23.627394][ T351] Modules linked in: [ 23.631133][ T351] CPU: 1 PID: 351 Comm: syz.4.14 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 23.710120][ T351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 23.769074][ T351] RIP: 0010:check_map_prog_compatibility+0x6f1/0x890 [ 23.790326][ T351] Code: db e9 f9 fc ff ff e8 de 29 ed ff 31 db e9 ed fc ff ff e8 d2 29 ed ff c6 05 b0 52 a3 05 01 48 c7 c7 a0 f5 87 85 e8 2f 6f be ff <0f> 0b e9 5a fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 84 f9 ff [ 23.814348][ T351] RSP: 0018:ffffc900078d7328 EFLAGS: 00010246 [ 23.820424][ T351] RAX: 266ea22c75a07f00 RBX: 0000000000000001 RCX: 0000000000080000 [ 23.821180][ T344] syz.0.11 (344) used greatest stack depth: 20632 bytes left [ 23.871190][ T351] RDX: ffffc90002f72000 RSI: 0000000000000f91 RDI: 0000000000000f92 [ 23.882700][ T351] RBP: ffffc900078d7370 R08: ffffffff8157a585 R09: ffffed103ee265e8 [ 23.896103][ T351] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 23.940546][ T351] R13: ffff888110549800 R14: ffffc9000009b000 R15: dffffc0000000000 [ 23.948892][ T351] FS: 00007fad08a206c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 23.958165][ T351] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 23.968931][ T351] CR2: 0000000100000000 CR3: 000000012828f000 CR4: 00000000003506a0 [ 23.981547][ T351] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 24.004292][ T351] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 24.022018][ T351] Call Trace: [ 24.026586][ T351] [ 24.055725][ T351] ? show_regs+0x58/0x60 [ 24.060822][ T351] ? __warn+0x160/0x2f0 [ 24.068350][ T351] ? check_map_prog_compatibility+0x6f1/0x890 [ 24.081087][ T351] ? report_bug+0x3d9/0x5b0 [ 24.089995][ T351] ? check_map_prog_compatibility+0x6f1/0x890 [ 24.130169][ T351] ? handle_bug+0x41/0x70 [ 24.152606][ T351] ? exc_invalid_op+0x1b/0x50 [ 24.176330][ T351] ? asm_exc_invalid_op+0x1b/0x20 [ 24.202658][ T351] ? __wake_up_klogd+0xd5/0x110 [ 24.224639][ T351] ? check_map_prog_compatibility+0x6f1/0x890 [ 24.252484][ T351] ? check_map_prog_compatibility+0x6f1/0x890 [ 24.284561][ T351] resolve_pseudo_ldimm64+0x682/0x1240 [ 24.302278][ T351] ? check_attach_btf_id+0xef0/0xef0 [ 24.314302][ T351] ? __mark_reg_known+0x1b0/0x1b0 [ 24.340434][ T351] ? security_capable+0x87/0xb0 [ 24.359925][ T351] bpf_check+0x3190/0x12c60 [ 24.376438][ T351] ? bpf_prog_67a7f92a6a5e5f13+0x5f8/0xe44 [ 24.428479][ T351] ? is_bpf_text_address+0x172/0x190 [ 24.472811][ T351] ? stack_trace_save+0x1c0/0x1c0 [ 24.505892][ T351] ? __kernel_text_address+0x9b/0x110 [ 24.539439][ T351] ? unwind_get_return_address+0x4d/0x90 [ 24.582247][ T351] ? bpf_get_btf_vmlinux+0x60/0x60 [ 24.609658][ T351] ? arch_stack_walk+0xf3/0x140 [ 24.634314][ T351] ? stack_trace_save+0x113/0x1c0 [ 24.654054][ T351] ? stack_trace_snprint+0xf0/0xf0 [ 24.689758][ T351] ? stack_trace_snprint+0xf0/0xf0 [ 24.738264][ T351] ? __stack_depot_save+0x34/0x470 [ 24.786067][ T351] ? ____kasan_kmalloc+0xed/0x110 [ 24.824725][ T383] device syzkaller0 entered promiscuous mode [ 24.826412][ T351] ? ____kasan_kmalloc+0xdb/0x110 [ 24.886361][ T351] ? __kasan_kmalloc+0x9/0x10 [ 24.905389][ T351] ? kmem_cache_alloc_trace+0x11a/0x270 [ 24.928614][ T351] ? selinux_bpf_prog_alloc+0x51/0x140 [ 24.951899][ T351] ? security_bpf_prog_alloc+0x62/0x90 [ 24.974572][ T351] ? bpf_prog_load+0x9ee/0x1b50 [ 24.985874][ T351] ? __sys_bpf+0x4bc/0x760 [ 24.998138][ T351] ? __x64_sys_bpf+0x7c/0x90 [ 25.017720][ T351] ? x64_sys_call+0x87f/0x9a0 [ 25.029883][ T351] ? do_syscall_64+0x3b/0xb0 [ 25.043274][ T351] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 25.062366][ T351] ? __kasan_kmalloc+0x9/0x10 [ 25.075805][ T351] ? memset+0x35/0x40 [ 25.086253][ T351] ? bpf_obj_name_cpy+0x196/0x1e0 [ 25.111332][ T351] bpf_prog_load+0x12ac/0x1b50 [ 25.132170][ T351] ? map_freeze+0x370/0x370 [ 25.151043][ T351] ? selinux_bpf+0xcb/0x100 [ 25.182744][ T351] ? security_bpf+0x82/0xb0 [ 25.187107][ T351] __sys_bpf+0x4bc/0x760 [ 25.222365][ T351] ? bpf_link_show_fdinfo+0x300/0x300 [ 25.222717][ T30] kauditd_printk_skb: 40 callbacks suppressed [ 25.222731][ T30] audit: type=1400 audit(1741484336.361:116): avc: denied { write } for pid=387 comm="syz.3.26" name="cgroup.subtree_control" dev="cgroup2" ino=174 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 25.227593][ T351] ? __kasan_check_write+0x14/0x20 [ 25.227626][ T351] ? switch_fpu_return+0x15f/0x2e0 [ 25.264450][ T30] audit: type=1400 audit(1741484336.371:117): avc: denied { open } for pid=387 comm="syz.3.26" path="" dev="cgroup2" ino=174 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 25.522347][ T351] __x64_sys_bpf+0x7c/0x90 [ 25.554514][ T351] x64_sys_call+0x87f/0x9a0 [ 25.565639][ T351] do_syscall_64+0x3b/0xb0 [ 25.595190][ T397] device syzkaller0 entered promiscuous mode [ 25.613128][ T351] ? clear_bhb_loop+0x35/0x90 [ 25.617662][ T351] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 25.716054][ T351] RIP: 0033:0x7fad0a3b6169 [ 25.724887][ T351] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 25.750954][ T30] audit: type=1400 audit(1741484336.881:118): avc: denied { setopt } for pid=398 comm="syz.3.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 25.801732][ T351] RSP: 002b:00007fad08a20038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 25.830818][ T351] RAX: ffffffffffffffda RBX: 00007fad0a5cefa0 RCX: 00007fad0a3b6169 [ 25.848179][ T351] RDX: 0000000000000090 RSI: 00004000000000c0 RDI: 0000000000000005 [ 25.862072][ T351] RBP: 00007fad0a4372a0 R08: 0000000000000000 R09: 0000000000000000 [ 25.889871][ T351] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 25.898693][ T351] R13: 0000000000000000 R14: 00007fad0a5cefa0 R15: 00007fff8d623af8 [ 25.974522][ T351] [ 26.014594][ T351] ---[ end trace 0efc97380dd32ffb ]--- [ 26.141714][ T408] device pim6reg1 entered promiscuous mode [ 26.531167][ T417] device veth0_vlan left promiscuous mode [ 26.559902][ T417] device veth0_vlan entered promiscuous mode [ 26.756495][ T427] device syzkaller0 entered promiscuous mode [ 26.790698][ T425] device syzkaller0 entered promiscuous mode [ 27.237942][ T30] audit: type=1400 audit(1741484338.371:119): avc: denied { read } for pid=439 comm="syz.3.45" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.342793][ T30] audit: type=1400 audit(1741484338.411:120): avc: denied { open } for pid=439 comm="syz.3.45" path="/dev/ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.367521][ T30] audit: type=1400 audit(1741484338.411:121): avc: denied { ioctl } for pid=439 comm="syz.3.45" path="/dev/ppp" dev="devtmpfs" ino=150 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.405047][ T30] audit: type=1400 audit(1741484338.501:122): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 27.620205][ T452] device syzkaller0 entered promiscuous mode [ 27.814444][ T442] bond_slave_1: mtu less than device minimum [ 27.911917][ T460] device sit0 entered promiscuous mode [ 28.054110][ T466] device syzkaller0 entered promiscuous mode [ 28.089001][ T464] device syzkaller0 entered promiscuous mode [ 29.577148][ T488] device veth1_macvtap left promiscuous mode [ 29.651974][ T488] device veth1_macvtap entered promiscuous mode [ 29.687877][ T488] device macsec0 entered promiscuous mode [ 29.840566][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 30.145657][ T508] syz.2.71[508] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.145754][ T508] syz.2.71[508] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.736747][ T519] device syzkaller0 entered promiscuous mode [ 33.032211][ C0] sched: RT throttling activated [ 33.682741][ T30] audit: type=1400 audit(1741484344.811:123): avc: denied { ioctl } for pid=558 comm="syz.3.89" path="socket:[16174]" dev="sockfs" ino=16174 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 34.517804][ T568] device syzkaller0 entered promiscuous mode [ 35.217069][ T579] device veth1_macvtap left promiscuous mode [ 35.256893][ T581] device veth1_macvtap entered promiscuous mode [ 35.288234][ T581] device macsec0 entered promiscuous mode [ 35.731619][ T594] device syzkaller0 entered promiscuous mode [ 36.439872][ T617] device veth1_macvtap left promiscuous mode [ 36.571566][ T618] device veth1_macvtap entered promiscuous mode [ 36.601667][ T618] device macsec0 entered promiscuous mode [ 38.419696][ T653] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.709850][ T661] device pim6reg1 entered promiscuous mode [ 40.766535][ T668] device veth1_macvtap left promiscuous mode [ 40.826801][ T669] device syzkaller0 entered promiscuous mode [ 40.833580][ T671] device veth1_macvtap entered promiscuous mode [ 40.839765][ T671] device macsec0 entered promiscuous mode [ 41.305899][ T39] syzkaller0: tun_net_xmit 76 [ 41.310601][ T39] syzkaller0: tun_net_xmit 48 [ 41.334935][ T39] syzkaller0: tun_net_xmit 76 [ 41.362510][ T39] syzkaller0: tun_net_xmit 76 [ 41.412611][ T684] device syzkaller0 entered promiscuous mode [ 41.531891][ T692] device syzkaller0 entered promiscuous mode [ 42.546465][ T716] device syzkaller0 entered promiscuous mode [ 42.580677][ T718] device veth1_macvtap left promiscuous mode [ 42.717764][ T718] device veth1_macvtap entered promiscuous mode [ 42.725470][ T718] device macsec0 entered promiscuous mode [ 43.150927][ T743] device pim6reg1 entered promiscuous mode [ 43.635089][ T753] syz.0.164[753] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.635167][ T753] syz.0.164[753] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.934431][ T758] device veth0_vlan left promiscuous mode [ 44.102641][ T758] device veth0_vlan entered promiscuous mode [ 44.154131][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.162540][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 44.176488][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 44.271679][ T763] device syzkaller0 entered promiscuous mode [ 46.337188][ T810] syz.1.181[810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.337292][ T810] syz.1.181[810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.079495][ T816] device syzkaller0 entered promiscuous mode [ 47.267144][ T829] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.380552][ T30] audit: type=1400 audit(1741484358.511:124): avc: denied { ioctl } for pid=836 comm="syz.0.200" path="uts:[4026532458]" dev="nsfs" ino=4026532458 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 47.406267][ T829] O: renamed from bridge_slave_0 [ 49.705064][ T875] device syzkaller0 entered promiscuous mode [ 50.832079][ T900] syz.2.215[900] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.832153][ T900] syz.2.215[900] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.079834][ T907] device veth1_macvtap left promiscuous mode [ 51.119431][ T907] device macsec0 left promiscuous mode [ 51.173699][ T908] device veth1_macvtap entered promiscuous mode [ 51.192362][ T908] device macsec0 entered promiscuous mode [ 51.221440][ T913] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.256925][ T910] device veth0_vlan left promiscuous mode [ 51.271603][ T910] device veth0_vlan entered promiscuous mode [ 51.279686][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 51.290727][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 51.298240][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.339785][ T913] O: renamed from bridge_slave_0 [ 52.125601][ T930] device veth0_vlan left promiscuous mode [ 52.148029][ T30] audit: type=1400 audit(1741484363.281:125): avc: denied { write } for pid=935 comm="syz.3.228" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 52.217876][ T930] device veth0_vlan entered promiscuous mode [ 52.414118][ T947] device pim6reg1 entered promiscuous mode [ 52.511562][ T950] device veth1_macvtap left promiscuous mode [ 52.524168][ T950] device macsec0 left promiscuous mode [ 52.637658][ T958] device veth1_macvtap entered promiscuous mode [ 52.663436][ T958] device macsec0 entered promiscuous mode [ 53.021242][ T968] device sit0 entered promiscuous mode [ 53.441569][ T30] audit: type=1400 audit(1741484364.571:126): avc: denied { create } for pid=977 comm="syz.1.253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 53.517101][ T30] audit: type=1400 audit(1741484364.601:127): avc: denied { create } for pid=976 comm="syz.4.242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 53.655168][ T30] audit: type=1400 audit(1741484364.611:128): avc: denied { create } for pid=977 comm="syz.1.253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 53.729138][ T975] device syzkaller0 entered promiscuous mode [ 53.777662][ T30] audit: type=1400 audit(1741484364.701:129): avc: denied { tracepoint } for pid=984 comm="syz.0.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 54.314591][ T995] device veth1_macvtap left promiscuous mode [ 54.321039][ T995] device macsec0 left promiscuous mode [ 54.469682][ T996] device veth1_macvtap entered promiscuous mode [ 54.492489][ T996] device macsec0 entered promiscuous mode [ 54.541955][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 54.728684][ T1001] device syzkaller0 entered promiscuous mode [ 55.105781][ T522] syzkaller0: tun_net_xmit 76 [ 55.110457][ T522] syzkaller0: tun_net_xmit 48 [ 55.123149][ T1014] syzkaller0: create flow: hash 4137009679 index 2 [ 55.135934][ T522] syzkaller0: tun_net_xmit 76 [ 55.199825][ T1014] syzkaller0: delete flow: hash 4137009679 index 2 [ 55.213745][ T522] syzkaller0: tun_net_xmit 76 [ 57.080095][ T1046] device veth0_vlan left promiscuous mode [ 57.161107][ T1046] device veth0_vlan entered promiscuous mode [ 57.925626][ T1058] device syzkaller0 entered promiscuous mode [ 58.183329][ T1062] syz.1.277[1062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.183399][ T1062] syz.1.277[1062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.819986][ T1124] syz.3.297[1124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.831628][ T1119] device veth0_vlan left promiscuous mode [ 61.850292][ T1124] syz.3.297[1124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.879034][ T1119] device veth0_vlan entered promiscuous mode [ 62.041410][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 62.050049][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 62.093876][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 62.200778][ T1131] device syzkaller0 entered promiscuous mode [ 62.916063][ T1138] device syzkaller0 entered promiscuous mode [ 62.981164][ T1141] device veth0_vlan left promiscuous mode [ 63.026047][ T1141] device veth0_vlan entered promiscuous mode [ 63.774178][ T30] audit: type=1400 audit(1741484374.901:130): avc: denied { create } for pid=1169 comm="syz.1.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 64.017267][ T1176] device syzkaller0 entered promiscuous mode [ 64.052642][ T1170] device sit0 left promiscuous mode [ 64.129194][ T1179] device sit0 entered promiscuous mode [ 65.721208][ T1212] device syzkaller0 entered promiscuous mode [ 66.087987][ T1221] device syzkaller0 entered promiscuous mode [ 66.605947][ T1234] device veth0_vlan left promiscuous mode [ 66.647685][ T1234] device veth0_vlan entered promiscuous mode [ 66.822455][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 66.843169][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 66.921107][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 67.749240][ T1257] device syzkaller0 entered promiscuous mode [ 67.882585][ T1265] syz.3.350[1265] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.882678][ T1265] syz.3.350[1265] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.398734][ T30] audit: type=1400 audit(1741484379.531:131): avc: denied { create } for pid=1277 comm="syz.0.354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 68.927341][ T1283] device veth0_vlan left promiscuous mode [ 68.984242][ T1283] device veth0_vlan entered promiscuous mode [ 69.071255][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.102885][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 69.162750][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 70.994616][ T1309] syz.4.367[1309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.994692][ T1309] syz.4.367[1309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.429640][ T1320] device syzkaller0 entered promiscuous mode [ 71.464307][ T1318] device veth0_vlan left promiscuous mode [ 71.482917][ T1318] device veth0_vlan entered promiscuous mode [ 71.665725][ T1326] syz.0.369[1326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.665822][ T1326] syz.0.369[1326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.920704][ T1333] device veth0_vlan left promiscuous mode [ 72.062707][ T1333] device veth0_vlan entered promiscuous mode [ 72.081772][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.102982][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.134656][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 72.204008][ T1337] device veth0_vlan left promiscuous mode [ 72.226182][ T1337] device veth0_vlan entered promiscuous mode [ 72.351681][ T30] audit: type=1400 audit(1741484383.481:132): avc: denied { create } for pid=1340 comm="syz.3.376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 73.703228][ T1366] syz.1.388[1366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.703297][ T1366] syz.1.388[1366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.402222][ T1381] device syzkaller0 entered promiscuous mode [ 75.750832][ T1410] device syzkaller0 entered promiscuous mode [ 76.501024][ T1428] device syzkaller0 entered promiscuous mode [ 79.152011][ T1479] device syzkaller0 entered promiscuous mode [ 79.670044][ T1494] device veth1_macvtap left promiscuous mode [ 79.742438][ T1494] device macsec0 left promiscuous mode [ 79.937928][ T1498] device syzkaller0 entered promiscuous mode [ 79.959344][ T1499] device veth1_macvtap entered promiscuous mode [ 79.975898][ T1499] device macsec0 entered promiscuous mode [ 82.127658][ T1538] device syzkaller0 entered promiscuous mode [ 83.732649][ T1574] device veth0_vlan left promiscuous mode [ 83.788606][ T1574] device veth0_vlan entered promiscuous mode [ 83.892049][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.974482][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 84.034340][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 84.143595][ T1580] ªªªªªª: renamed from vlan0 [ 85.225885][ T1602] syz.4.474[1602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.225989][ T1602] syz.4.474[1602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.248197][ T1604] device veth1_macvtap left promiscuous mode [ 85.265231][ T30] audit: type=1400 audit(1741484396.381:133): avc: denied { create } for pid=1598 comm="syz.0.475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 85.372444][ T1604] device macsec0 left promiscuous mode [ 85.453454][ T1604] device veth1_macvtap entered promiscuous mode [ 85.466806][ T1604] device macsec0 entered promiscuous mode [ 86.714413][ T1625] device syzkaller0 entered promiscuous mode [ 87.590494][ T1648] device sit0 entered promiscuous mode [ 87.914885][ T1655] device syzkaller0 entered promiscuous mode [ 89.087267][ T1682] device sit0 left promiscuous mode [ 89.237643][ T1683] device sit0 entered promiscuous mode [ 90.042430][ T1696] device sit0 left promiscuous mode [ 90.165536][ T1696] device sit0 entered promiscuous mode [ 92.593566][ T1754] device sit0 left promiscuous mode [ 92.768369][ T1755] device sit0 entered promiscuous mode [ 96.364264][ T1777] device syzkaller0 entered promiscuous mode [ 97.362766][ T1805] device syzkaller0 entered promiscuous mode [ 97.393118][ T1802] GPL: port 1(ªªªªªª) entered blocking state [ 97.430468][ T1802] GPL: port 1(ªªªªªª) entered disabled state [ 97.503305][ T1802] device ªªªªªª entered promiscuous mode [ 99.952699][ T1844] device veth0_vlan left promiscuous mode [ 100.006858][ T1844] device veth0_vlan entered promiscuous mode [ 102.182784][ T1886] device syzkaller0 entered promiscuous mode [ 108.138877][ T1989] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.146188][ T1989] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.279068][ T1990] device bridge_slave_1 left promiscuous mode [ 108.314132][ T1990] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.372544][ T1990] device bridge_slave_0 left promiscuous mode [ 108.392431][ T1990] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.590886][ T1992] device syzkaller0 entered promiscuous mode [ 110.061744][ T2028] device syzkaller0 entered promiscuous mode [ 110.691887][ T2043] device syzkaller0 entered promiscuous mode [ 113.082311][ T2089] device sit0 left promiscuous mode [ 113.183915][ T2092] device sit0 entered promiscuous mode [ 113.377974][ T2096] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.412612][ T2097] device bridge_slave_1 left promiscuous mode [ 113.465976][ T2097] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.519231][ T2097] device bridge_slave_0 left promiscuous mode [ 113.557109][ T2097] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.885016][ T2127] device sit0 left promiscuous mode [ 114.964781][ T2133] device sit0 entered promiscuous mode [ 115.429849][ T2140] device syzkaller0 entered promiscuous mode [ 115.810936][ T2145] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.882246][ T2154] device sit0 left promiscuous mode [ 115.970747][ T2154] device sit0 entered promiscuous mode [ 116.314837][ T2145] device bridge_slave_1 left promiscuous mode [ 116.322695][ T2145] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.335960][ T2145] device O left promiscuous mode [ 116.368825][ T2145] bridge0: port 1(O) entered disabled state [ 116.572777][ T2159] device sit0 left promiscuous mode [ 116.688751][ T2162] device sit0 entered promiscuous mode [ 117.570231][ T2175] device wg2 entered promiscuous mode [ 118.172562][ T2190] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.232535][ T2193] device bridge_slave_1 left promiscuous mode [ 118.346073][ T2193] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.353558][ T2193] device O left promiscuous mode [ 118.358551][ T2193] bridge0: port 1(O) entered disabled state [ 118.647310][ T2202] device sit0 left promiscuous mode [ 118.672725][ T2202] device sit0 entered promiscuous mode [ 120.272112][ T2238] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.279358][ T2238] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.405542][ T2238] device bridge_slave_1 left promiscuous mode [ 120.462501][ T2238] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.082576][ T2238] device bridge_slave_0 left promiscuous mode [ 125.088614][ T2238] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.184327][ T2281] device syzkaller0 entered promiscuous mode [ 126.225998][ T2273] device wg2 entered promiscuous mode [ 126.556922][ T2283] device pim6reg1 entered promiscuous mode [ 126.647393][ T2291] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 127.802409][ T2315] device sit0 left promiscuous mode [ 127.910456][ T2318] device sit0 entered promiscuous mode [ 129.914875][ T2353] device sit0 left promiscuous mode [ 130.748468][ T2367] device syzkaller0 entered promiscuous mode [ 134.773121][ T2436] device sit0 left promiscuous mode [ 134.911202][ T2436] device sit0 entered promiscuous mode [ 137.460032][ T2479] device pim6reg1 entered promiscuous mode [ 137.523663][ T30] audit: type=1400 audit(1741484448.661:134): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 137.732398][ T30] audit: type=1400 audit(1741484448.661:135): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 142.148759][ T2579] device syzkaller0 entered promiscuous mode [ 142.837986][ T2602] device syzkaller0 entered promiscuous mode [ 143.071779][ T2609] device sit0 left promiscuous mode [ 143.171907][ T2609] device sit0 entered promiscuous mode [ 146.398625][ T2638] device sit0 entered promiscuous mode [ 146.743409][ T2648] device syzkaller0 entered promiscuous mode [ 147.015413][ T2653] device sit0 left promiscuous mode [ 147.121040][ T2658] device sit0 entered promiscuous mode [ 147.569268][ T2661] device syzkaller0 entered promiscuous mode [ 148.760814][ T30] audit: type=1400 audit(1741484459.891:136): avc: denied { create } for pid=2689 comm="syz.1.856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 148.815746][ T2691] device wg2 entered promiscuous mode [ 148.981245][ T2695] device sit0 left promiscuous mode [ 149.042838][ T2695] device sit0 entered promiscuous mode [ 149.855588][ T2715] device sit0 left promiscuous mode [ 149.986281][ T2716] device sit0 entered promiscuous mode [ 151.411913][ T2751] device syzkaller0 entered promiscuous mode [ 151.722079][ T2757] syz.0.880 (2757) used greatest stack depth: 19928 bytes left [ 151.760722][ T2761] device sit0 entered promiscuous mode [ 153.981274][ T2805] device syzkaller0 entered promiscuous mode [ 155.960345][ T2839] device syzkaller0 entered promiscuous mode [ 156.473791][ T2852] device sit0 left promiscuous mode [ 157.895933][ T2890] device sit0 left promiscuous mode [ 158.086325][ T2891] device sit0 entered promiscuous mode [ 158.905611][ T2905] syzkaller: port 1(erspan0) entered blocking state [ 158.956572][ T2905] syzkaller: port 1(erspan0) entered disabled state [ 159.006801][ T2905] device erspan0 entered promiscuous mode [ 159.116285][ T2907] syzkaller: port 1(erspan0) entered blocking state [ 159.122759][ T2907] syzkaller: port 1(erspan0) entered forwarding state [ 159.263052][ T2909] device sit0 left promiscuous mode [ 160.461831][ T2935] device syzkaller0 entered promiscuous mode [ 162.168168][ T2971] device veth0_vlan left promiscuous mode [ 162.191070][ T2971] device veth0_vlan entered promiscuous mode [ 164.256863][ T3018] device syzkaller0 entered promiscuous mode [ 165.254956][ T3037] syz.4.983[3037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.255035][ T3037] syz.4.983[3037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.911111][ T3044] device sit0 left promiscuous mode [ 167.384595][ T3071] device syzkaller0 entered promiscuous mode [ 167.465833][ T30] audit: type=1400 audit(1741484478.601:137): avc: denied { create } for pid=3077 comm="syz.4.996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 167.792496][ T3082] device syzkaller0 entered promiscuous mode [ 168.569742][ T30] audit: type=1400 audit(1741484479.701:138): avc: denied { create } for pid=3088 comm="syz.2.999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 168.589247][ T30] audit: type=1400 audit(1741484479.711:139): avc: denied { read } for pid=3088 comm="syz.2.999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 168.637613][ T30] audit: type=1400 audit(1741484479.761:140): avc: denied { write } for pid=3088 comm="syz.2.999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 170.606126][ T3125] device sit0 entered promiscuous mode [ 172.290422][ T30] audit: type=1400 audit(1741484483.421:141): avc: denied { setopt } for pid=3157 comm="syz.3.1024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 172.666719][ T3167] device sit0 left promiscuous mode [ 172.830866][ T3171] device sit0 entered promiscuous mode [ 176.691895][ T3227] bond_slave_1: mtu less than device minimum [ 178.602495][ T3265] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 178.683327][ T3265] device syzkaller0 entered promiscuous mode [ 182.818283][ T3326] device veth0_vlan left promiscuous mode [ 182.913371][ T3326] device veth0_vlan entered promiscuous mode [ 183.011442][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.046072][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 183.126334][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 183.689302][ T3339] device syzkaller0 entered promiscuous mode [ 183.993063][ T3346] device sit0 entered promiscuous mode [ 184.251626][ T3357] ÿÿÿÿÿÿÿÿ: renamed from vlan1 [ 184.533696][ T3366] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 188.827718][ T3450] device syzkaller0 entered promiscuous mode [ 189.260466][ T3461] device syzkaller0 entered promiscuous mode [ 189.447785][ T3472] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 189.500586][ T3472] device syzkaller0 entered promiscuous mode [ 191.047504][ T3513] device veth1_macvtap left promiscuous mode [ 191.062257][ T3513] device macsec0 left promiscuous mode [ 191.182090][ T3517] device veth1_macvtap entered promiscuous mode [ 191.290689][ T3517] device macsec0 entered promiscuous mode [ 191.721862][ T3530] device sit0 left promiscuous mode [ 191.965064][ T3528] device syzkaller0 entered promiscuous mode [ 192.073030][ T3535] device sit0 entered promiscuous mode [ 193.474992][ T3558] device syzkaller0 entered promiscuous mode [ 193.662757][ T3570] ÿÿÿÿÿÿ: renamed from vlan1 [ 195.643836][ T3606] device veth0_vlan left promiscuous mode [ 195.659194][ T3606] device veth0_vlan entered promiscuous mode [ 195.684304][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 195.697866][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 195.715153][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 195.748512][ T3615] ÿÿÿÿÿÿ: renamed from vlan1 [ 195.825620][ T3609] device sit0 left promiscuous mode [ 195.984914][ T3626] syz.3.1190[3626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.984990][ T3626] syz.3.1190[3626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.023274][ T3655] ÿÿÿÿÿÿ: renamed from vlan1 [ 198.759155][ T3670] device syzkaller0 entered promiscuous mode [ 198.937449][ T3679] syz.1.1205[3679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.937524][ T3679] syz.1.1205[3679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.920682][ T3725] device syzkaller0 entered promiscuous mode [ 203.197407][ T3737] ÿÿÿÿÿÿ: renamed from vlan1 [ 203.239233][ T3734] device bridge_slave_1 entered promiscuous mode [ 203.322866][ T30] audit: type=1400 audit(1741484514.461:142): avc: denied { create } for pid=3740 comm="syz.3.1225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 205.926837][ T3789] device veth0_vlan left promiscuous mode [ 205.974111][ T3789] device veth0_vlan entered promiscuous mode [ 206.089238][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.125857][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 206.194191][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 206.569516][ T3801] device sit0 left promiscuous mode [ 207.534770][ T3808] device sit0 left promiscuous mode [ 207.628108][ T3816] device sit0 entered promiscuous mode [ 208.284195][ T3832] device syzkaller0 entered promiscuous mode [ 209.031786][ T3843] device sit0 left promiscuous mode [ 209.808565][ T3859] device bridge_slave_1 entered promiscuous mode [ 209.999054][ T3868] device sit0 entered promiscuous mode [ 210.353449][ T3880] device lo entered promiscuous mode [ 211.875123][ T3911] device bridge_slave_1 entered promiscuous mode [ 212.345268][ T3928] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 212.457977][ T3928] device syzkaller0 entered promiscuous mode [ 213.648130][ T3959] device syzkaller0 entered promiscuous mode [ 213.670777][ T3957] device veth1_macvtap left promiscuous mode [ 213.687400][ T3957] device macsec0 left promiscuous mode [ 213.715388][ T3962] syz.1.1307[3962] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.715460][ T3962] syz.1.1307[3962] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.751740][ T3960] device veth1_macvtap entered promiscuous mode [ 213.794713][ T3960] device macsec0 entered promiscuous mode [ 214.866384][ T30] audit: type=1400 audit(1741484526.001:143): avc: denied { ioctl } for pid=3982 comm="syz.4.1316" path="socket:[28445]" dev="sockfs" ino=28445 ioctlcmd=0x8943 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 214.895567][ T3983] device syzkaller0 entered promiscuous mode [ 215.184826][ T3998] device veth1_macvtap left promiscuous mode [ 215.191037][ T3998] device macsec0 left promiscuous mode [ 215.220887][ T3998] device veth1_macvtap entered promiscuous mode [ 215.227515][ T3998] device macsec0 entered promiscuous mode [ 216.164767][ T4017] device veth0_vlan left promiscuous mode [ 216.174501][ T4017] device veth0_vlan entered promiscuous mode [ 216.201473][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 216.262878][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 216.362608][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 216.519328][ T30] audit: type=1400 audit(1741484527.651:144): avc: denied { create } for pid=4025 comm="syz.0.1330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 216.918352][ T4037] device syzkaller0 entered promiscuous mode [ 219.021799][ T4043] device syzkaller0 entered promiscuous mode [ 219.051665][ T4047] device sit0 left promiscuous mode [ 219.290819][ T4059] device sit0 entered promiscuous mode [ 219.666296][ T4070] syz.4.1345[4070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.666365][ T4070] syz.4.1345[4070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.665280][ T4096] device syzkaller0 entered promiscuous mode [ 221.501369][ T4107] device syzkaller0 entered promiscuous mode [ 222.045751][ T4116] device veth0_vlan left promiscuous mode [ 222.087241][ T4116] device veth0_vlan entered promiscuous mode [ 222.160134][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.168771][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.214987][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿÿÿ: link becomes ready [ 222.376990][ T4127] device veth0_vlan left promiscuous mode [ 222.411015][ T4127] device veth0_vlan entered promiscuous mode [ 224.916717][ T4160] device veth0_vlan left promiscuous mode [ 224.951266][ T4160] device veth0_vlan entered promiscuous mode [ 224.986459][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 225.006581][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 225.064148][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 226.009482][ T4185] device syzkaller0 entered promiscuous mode [ 227.147585][ T4187] device sit0 left promiscuous mode [ 229.323834][ T4224] device syzkaller0 entered promiscuous mode [ 229.556864][ T4234] device wg2 left promiscuous mode [ 231.154232][ T4271] device syzkaller0 entered promiscuous mode [ 231.543937][ T4277] device veth0_vlan left promiscuous mode [ 231.557863][ T4277] device veth0_vlan entered promiscuous mode [ 232.314267][ T4302] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 232.346908][ T4302] device syzkaller0 entered promiscuous mode [ 232.437689][ T4305] device veth0_vlan left promiscuous mode [ 232.492472][ T4305] device veth0_vlan entered promiscuous mode [ 233.192712][ T4320] device syzkaller0 entered promiscuous mode [ 233.215160][ T4318] device veth0_vlan left promiscuous mode [ 233.233361][ T4318] device veth0_vlan entered promiscuous mode [ 233.905347][ T4344] device sit0 entered promiscuous mode [ 235.053268][ T4351] device veth0_vlan left promiscuous mode [ 235.090385][ T4351] device veth0_vlan entered promiscuous mode [ 235.128205][ T4356] device veth0_vlan left promiscuous mode [ 235.160854][ T4356] device veth0_vlan entered promiscuous mode [ 236.675512][ T4392] device syzkaller0 entered promiscuous mode [ 236.847740][ T4396] device veth0_vlan left promiscuous mode [ 236.914810][ T4396] device veth0_vlan entered promiscuous mode [ 237.846441][ T4416] device sit0 entered promiscuous mode [ 239.401399][ T4449] device veth0_vlan left promiscuous mode [ 239.530268][ T4449] device veth0_vlan entered promiscuous mode [ 239.863572][ T4455] device sit0 left promiscuous mode [ 239.944469][ T4455] device sit0 entered promiscuous mode [ 241.116860][ T4465] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 241.231893][ T4465] device syzkaller0 entered promiscuous mode [ 241.276192][ T4471] device syzkaller0 entered promiscuous mode [ 243.381837][ T4513] device veth0_vlan left promiscuous mode [ 243.430672][ T4513] device veth0_vlan entered promiscuous mode [ 243.470755][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.486782][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.562259][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 244.991884][ T4549] device veth0_vlan left promiscuous mode [ 245.045851][ T4549] device veth0_vlan entered promiscuous mode [ 247.070604][ T4577] device syzkaller0 entered promiscuous mode [ 247.462892][ T4588] device veth0_vlan left promiscuous mode [ 247.515064][ T4588] device veth0_vlan entered promiscuous mode [ 247.562840][ T4588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.598615][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.622420][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 247.684812][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 248.094347][ T4609] device sit0 left promiscuous mode [ 248.206687][ T4612] device sit0 entered promiscuous mode [ 248.935169][ T4630] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 249.061882][ T4630] device syzkaller0 entered promiscuous mode [ 250.338561][ T4655] device sit0 left promiscuous mode [ 250.447518][ T4655] device sit0 entered promiscuous mode [ 250.643817][ T4667] device veth0_vlan left promiscuous mode [ 250.705064][ T4667] device veth0_vlan entered promiscuous mode [ 250.823921][ T4665] device veth0_vlan left promiscuous mode [ 250.845528][ T4665] device veth0_vlan entered promiscuous mode [ 252.346700][ T4704] syz.0.1573[4704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.346768][ T4704] syz.0.1573[4704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.371919][ T4702] device veth0_vlan left promiscuous mode [ 252.393683][ T4702] device veth0_vlan entered promiscuous mode [ 252.420606][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 252.439205][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 252.463047][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 253.434567][ T4720] device sit0 entered promiscuous mode [ 255.537103][ T4749] device veth0_vlan left promiscuous mode [ 255.585595][ T4749] device veth0_vlan entered promiscuous mode [ 255.687101][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 255.708179][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 255.775516][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 256.624141][ T4762] Â: renamed from pim6reg1 [ 256.744855][ T4767] syz.2.1598[4767] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.744930][ T4767] syz.2.1598[4767] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.776218][ T4770] device sit0 entered promiscuous mode [ 257.233757][ T4781] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 257.312928][ T4781] device syzkaller0 entered promiscuous mode [ 258.118621][ T4792] syz.1.1616[4792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.118697][ T4792] syz.1.1616[4792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.354193][ T4796] device veth0_vlan left promiscuous mode [ 258.385981][ T4796] device veth0_vlan entered promiscuous mode [ 259.473817][ T4807] Â: renamed from pim6reg1 [ 259.599096][ T4811] device sit0 left promiscuous mode [ 261.296663][ T4845] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 261.382266][ T4845] device syzkaller0 entered promiscuous mode [ 261.579600][ T4855] device sit0 left promiscuous mode [ 262.157259][ T4866] device veth0_vlan left promiscuous mode [ 262.247193][ T4866] device veth0_vlan entered promiscuous mode [ 262.298206][ T4866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 262.417890][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 262.442731][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 262.449947][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 263.158542][ T4881] device syzkaller0 entered promiscuous mode [ 263.421782][ T4897] device sit0 left promiscuous mode [ 263.706578][ T4906] device veth0_vlan left promiscuous mode [ 263.767652][ T4906] device veth0_vlan entered promiscuous mode [ 263.890413][ T4906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 263.959157][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 263.992460][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 263.999741][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 264.085867][ T4911] device sit0 entered promiscuous mode [ 264.678781][ T4929] device sit0 entered promiscuous mode [ 266.231885][ T4956] device syzkaller0 entered promiscuous mode [ 266.359965][ T4960] device sit0 left promiscuous mode [ 266.723879][ T4969] device veth1_macvtap left promiscuous mode [ 266.812833][ T4971] device sit0 entered promiscuous mode [ 267.294148][ T4978] device veth0_vlan left promiscuous mode [ 267.306886][ T4978] device veth0_vlan entered promiscuous mode [ 267.343439][ T4978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 267.421047][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 267.431349][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 267.439131][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 267.643117][ T4983] device syzkaller0 entered promiscuous mode [ 267.885791][ T4997] Â: renamed from pim6reg1 [ 268.235565][ T5013] device sit0 left promiscuous mode [ 268.328457][ T5015] device sit0 entered promiscuous mode [ 268.775839][ T5023] device syzkaller0 entered promiscuous mode [ 271.248696][ T5067] device syzkaller0 entered promiscuous mode [ 271.469471][ T30] audit: type=1400 audit(1741484582.601:145): avc: denied { attach_queue } for pid=5070 comm="syz.0.1703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 272.624759][ T5096] device sit0 left promiscuous mode [ 272.696936][ T5099] device sit0 entered promiscuous mode [ 274.306497][ T30] audit: type=1400 audit(1741484585.441:146): avc: denied { create } for pid=5113 comm="syz.3.1720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 274.417984][ T5111] device syzkaller0 entered promiscuous mode [ 275.298280][ T5145] device sit0 left promiscuous mode [ 275.360086][ T5145] device sit0 entered promiscuous mode [ 279.858696][ T5215] device syzkaller0 entered promiscuous mode [ 280.750164][ T5228] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 280.810191][ T5228] device syzkaller0 entered promiscuous mode [ 286.836926][ T5310] device sit0 left promiscuous mode [ 287.030668][ T5310] device sit0 entered promiscuous mode [ 289.009906][ T5364] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 289.060863][ T5364] device syzkaller0 entered promiscuous mode [ 292.746615][ T5416] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 292.794361][ T5416] device syzkaller0 entered promiscuous mode [ 294.904040][ T5471] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 294.944452][ T5471] device syzkaller0 entered promiscuous mode [ 296.988599][ T5518] device sit0 entered promiscuous mode [ 298.772512][ T5548] device sit0 left promiscuous mode [ 298.847251][ T5553] device sit0 entered promiscuous mode [ 299.382784][ T5563] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 299.441738][ T5563] device syzkaller0 entered promiscuous mode [ 301.920998][ T5603] device sit0 left promiscuous mode [ 301.994427][ T5605] device sit0 entered promiscuous mode [ 303.411334][ T5643] device sit0 left promiscuous mode [ 304.216211][ T5649] device sit0 entered promiscuous mode [ 307.452871][ T5721] device syzkaller0 entered promiscuous mode [ 308.034285][ T5736] device syzkaller0 entered promiscuous mode [ 310.733065][ T5752] device veth0_vlan left promiscuous mode [ 310.765829][ T5752] device veth0_vlan entered promiscuous mode [ 310.913212][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 310.936328][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 311.013591][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 312.436770][ T5787] device sit0 left promiscuous mode [ 312.514663][ T5787] device sit0 entered promiscuous mode [ 313.789086][ T5818] device sit0 left promiscuous mode [ 313.935363][ T5823] device sit0 entered promiscuous mode [ 314.534855][ T5836] device sit0 left promiscuous mode [ 314.655418][ T5845] device sit0 entered promiscuous mode [ 316.671590][ T5871] device syzkaller0 entered promiscuous mode [ 319.087771][ T5893] device veth0_vlan left promiscuous mode [ 319.110565][ T5893] device veth0_vlan entered promiscuous mode [ 319.146469][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 319.157236][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 319.170470][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 319.668244][ T5905] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 319.699856][ T5905] device syzkaller0 entered promiscuous mode [ 320.458838][ T5922] device syzkaller0 entered promiscuous mode [ 320.667708][ T5929] syz.0.1993[5929] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.667786][ T5929] syz.0.1993[5929] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.680694][ T5927] device sit0 left promiscuous mode [ 320.943031][ T5932] device sit0 entered promiscuous mode [ 323.743701][ T5965] device syzkaller0 entered promiscuous mode [ 323.772713][ T5975] device sit0 left promiscuous mode [ 323.803322][ T5976] device sit0 entered promiscuous mode [ 325.083471][ T5996] device syzkaller0 entered promiscuous mode [ 325.998345][ T6015] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 326.109541][ T6015] device syzkaller0 entered promiscuous mode [ 326.343913][ T6026] device sit0 left promiscuous mode [ 326.452908][ T6026] device sit0 entered promiscuous mode [ 327.745982][ T6052] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 327.771546][ T6052] device syzkaller0 entered promiscuous mode [ 327.791739][ T6054] device veth0_vlan left promiscuous mode [ 327.803201][ T6054] device veth0_vlan entered promiscuous mode [ 327.827342][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 327.843849][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 327.881332][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 328.280309][ T6069] device sit0 left promiscuous mode [ 328.394318][ T6069] device sit0 entered promiscuous mode [ 329.022171][ T6086] device veth0_vlan left promiscuous mode [ 329.057684][ T6086] device veth0_vlan entered promiscuous mode [ 329.132600][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 329.158513][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 329.201538][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿÿÿ: link becomes ready [ 329.702394][ T6092] device syzkaller0 entered promiscuous mode [ 332.189108][ T6144] device syzkaller0 entered promiscuous mode [ 332.280360][ T6148] device sit0 left promiscuous mode [ 332.348603][ T6150] device sit0 entered promiscuous mode [ 332.645711][ T6162] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 332.685892][ T6164] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 332.726192][ T6164] device syzkaller0 entered promiscuous mode [ 333.774285][ T6186] device pim6reg1 entered promiscuous mode [ 333.823453][ T6191] device sit0 left promiscuous mode [ 333.908139][ T6193] device syzkaller0 entered promiscuous mode [ 333.995956][ T6191] device sit0 entered promiscuous mode [ 334.163571][ T6201] syz.3.2100[6201] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.163649][ T6201] syz.3.2100[6201] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.692253][ T6210] device syzkaller0 entered promiscuous mode [ 336.404735][ T6230] device sit0 left promiscuous mode [ 336.509694][ T6232] device sit0 entered promiscuous mode [ 337.095303][ T6241] device sit0 left promiscuous mode [ 337.209347][ T6241] device sit0 entered promiscuous mode [ 337.293779][ T30] audit: type=1400 audit(1741484648.431:147): avc: denied { create } for pid=6250 comm="syz.0.2106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 339.977829][ T6281] device sit0 left promiscuous mode [ 340.063804][ T6281] device sit0 entered promiscuous mode [ 340.336419][ T6299] device sit0 left promiscuous mode [ 340.454831][ T6299] device sit0 entered promiscuous mode [ 342.336574][ T6347] device sit0 left promiscuous mode [ 342.431574][ T6351] device sit0 entered promiscuous mode [ 344.282159][ T6365] device sit0 left promiscuous mode [ 344.305095][ T6368] device sit0 entered promiscuous mode [ 347.825474][ T6404] syz.4.2153[6404] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.825564][ T6404] syz.4.2153[6404] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.877125][ T30] audit: type=1400 audit(1741484660.011:148): avc: denied { create } for pid=6410 comm="syz.1.2155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 348.885302][ T6412] device veth0_vlan left promiscuous mode [ 348.964151][ T6412] device veth0_vlan entered promiscuous mode [ 349.022537][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 349.030532][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 349.130049][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 350.667124][ T6446] syz.2.2166[6446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.667201][ T6446] syz.2.2166[6446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.823752][ T6451] device sit0 left promiscuous mode [ 350.903491][ T6454] device sit0 entered promiscuous mode [ 351.325513][ T6461] device veth0_vlan left promiscuous mode [ 351.344846][ T6461] device veth0_vlan entered promiscuous mode [ 351.448301][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 351.461027][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 351.514058][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 352.567094][ T6484] device veth0_vlan left promiscuous mode [ 352.586918][ T6484] device veth0_vlan entered promiscuous mode [ 353.268948][ T6504] ªªªªªª: renamed from vlan0 [ 354.070851][ T6510] device veth0_vlan left promiscuous mode [ 354.081958][ T6510] device veth0_vlan entered promiscuous mode [ 354.173742][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 354.181725][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 354.268151][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 354.455530][ T6521] device pim6reg1 entered promiscuous mode [ 355.230129][ T6543] device pim6reg1 entered promiscuous mode [ 355.916050][ T6558] device pim6reg1 entered promiscuous mode [ 356.311450][ T6573] device pim6reg1 entered promiscuous mode [ 356.936949][ T6585] syz.0.2213 uses obsolete (PF_INET,SOCK_PACKET) [ 358.138544][ T6617] device pim6reg1 entered promiscuous mode [ 358.516953][ T6625] device veth0_vlan left promiscuous mode [ 358.600278][ T6625] device veth0_vlan entered promiscuous mode [ 362.660034][ T30] audit: type=1400 audit(1741484673.791:149): avc: denied { create } for pid=6680 comm="syz.4.2247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 362.672715][ T6682] device veth0_vlan left promiscuous mode [ 362.775873][ T6682] device veth0_vlan entered promiscuous mode [ 363.610969][ T6704] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 363.649977][ T6704] device syzkaller0 entered promiscuous mode [ 365.748416][ T6739] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 365.777958][ T6739] device syzkaller0 entered promiscuous mode [ 365.854448][ T6741] device veth0_vlan left promiscuous mode [ 365.866245][ T6741] device veth0_vlan entered promiscuous mode [ 365.902925][ T6741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 365.939025][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 365.957073][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 365.966231][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 366.018039][ T6746] device syzkaller0 entered promiscuous mode [ 366.516593][ T6756] device wg2 entered promiscuous mode [ 366.757316][ T6759] device pim6reg1 entered promiscuous mode [ 371.083941][ T6793] device veth0_vlan left promiscuous mode [ 371.091461][ T6793] device veth0_vlan entered promiscuous mode [ 371.141270][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 371.154896][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 371.162610][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 371.214066][ T6809] device sit0 left promiscuous mode [ 371.247036][ T6812] device sit0 entered promiscuous mode [ 372.157460][ T6849] device syzkaller0 entered promiscuous mode [ 373.111100][ T6869] device veth0_vlan left promiscuous mode [ 373.200327][ T6869] device veth0_vlan entered promiscuous mode [ 373.675016][ T6882] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 373.709845][ T6882] device syzkaller0 entered promiscuous mode [ 375.188582][ T6898] device syzkaller0 entered promiscuous mode [ 375.361198][ T6904] syz.4.2319[6904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.361276][ T6904] syz.4.2319[6904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.124427][ T6925] device pim6reg1 entered promiscuous mode [ 377.600023][ T6961] device sit0 left promiscuous mode [ 377.644982][ T6964] device sit0 entered promiscuous mode [ 377.798551][ T30] audit: type=1400 audit(1741484688.931:150): avc: denied { create } for pid=6965 comm="syz.0.2335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 378.201297][ T6981] device pim6reg1 entered promiscuous mode [ 380.802737][ T7019] device veth0_vlan left promiscuous mode [ 380.826585][ T7019] device veth0_vlan entered promiscuous mode [ 380.834057][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 380.853217][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 380.885188][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿÿÿ: link becomes ready [ 381.161001][ T7031] device pim6reg1 entered promiscuous mode [ 382.796560][ T7052] syz.2.2361[7052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.796634][ T7052] syz.2.2361[7052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.976767][ T7058] device veth1_macvtap left promiscuous mode [ 383.002998][ T7058] device macsec0 left promiscuous mode [ 383.114452][ T7058] device veth1_macvtap entered promiscuous mode [ 383.160533][ T7058] device macsec0 entered promiscuous mode [ 383.202006][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 383.241207][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 387.075924][ T7102] device veth0_vlan left promiscuous mode [ 387.088932][ T7102] device veth0_vlan entered promiscuous mode [ 387.513129][ T7113] device veth0_vlan left promiscuous mode [ 387.529835][ T7113] device veth0_vlan entered promiscuous mode [ 388.508556][ T7128] device sit0 left promiscuous mode [ 388.555223][ T7128] device sit0 entered promiscuous mode [ 391.090405][ T7138] device sit0 left promiscuous mode [ 391.108583][ T7147] device sit0 entered promiscuous mode [ 391.278617][ T7146] device sit0 left promiscuous mode [ 391.305476][ T7152] device sit0 entered promiscuous mode [ 391.425717][ T7160] device veth0_vlan left promiscuous mode [ 391.437620][ T7160] device veth0_vlan entered promiscuous mode [ 391.528838][ T7160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 391.561982][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 391.574679][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 391.582461][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 391.688006][ T7169] syz.3.2396[7169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.688083][ T7169] syz.3.2396[7169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.950731][ T7170] device veth0_vlan left promiscuous mode [ 391.986825][ T7170] device veth0_vlan entered promiscuous mode [ 392.002553][ T7170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 392.028144][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 392.046117][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 392.086367][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 395.219846][ T7205] device sit0 left promiscuous mode [ 395.406170][ T7211] device veth1_macvtap left promiscuous mode [ 395.427499][ T7211] device macsec0 left promiscuous mode [ 395.581691][ T7214] device veth1_macvtap entered promiscuous mode [ 395.619308][ T7214] device macsec0 entered promiscuous mode [ 397.134823][ T7231] device veth1_macvtap left promiscuous mode [ 397.141054][ T7231] device macsec0 left promiscuous mode [ 397.246071][ T7237] device veth1_macvtap entered promiscuous mode [ 397.303785][ T7237] device macsec0 entered promiscuous mode [ 397.338671][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 400.375918][ T7255] device sit0 left promiscuous mode [ 400.480037][ T7254] device sit0 entered promiscuous mode [ 400.869977][ T7276] device macsec0 left promiscuous mode [ 401.120619][ T7281] device veth1_macvtap entered promiscuous mode [ 401.166370][ T7281] device macsec0 entered promiscuous mode [ 401.237185][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 401.984939][ T7301] device syzkaller0 entered promiscuous mode [ 402.413523][ T7310] device syzkaller0 entered promiscuous mode [ 402.526619][ T7319] device sit0 entered promiscuous mode [ 403.684259][ T7344] device veth1_macvtap left promiscuous mode [ 403.736281][ T7344] device macsec0 left promiscuous mode [ 404.030917][ T7345] device veth1_macvtap entered promiscuous mode [ 404.038222][ T7345] device macsec0 entered promiscuous mode [ 404.060169][ T7345] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 404.080146][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 405.291772][ T7371] device veth0_vlan left promiscuous mode [ 405.338801][ T7371] device veth0_vlan entered promiscuous mode [ 405.528112][ T7383] device veth0_vlan left promiscuous mode [ 405.541755][ T7383] device veth0_vlan entered promiscuous mode [ 405.889462][ T7392] device sit0 left promiscuous mode [ 407.121252][ T7411] device sit0 left promiscuous mode [ 407.235963][ T7411] device sit0 entered promiscuous mode [ 407.599608][ T7422] syz.1.2474[7422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.599687][ T7422] syz.1.2474[7422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.897197][ T7428] device veth0_vlan left promiscuous mode [ 407.926858][ T7428] device veth0_vlan entered promiscuous mode [ 408.012735][ T7432] device sit0 left promiscuous mode [ 408.146476][ T7432] device sit0 entered promiscuous mode [ 410.216740][ T7454] device veth1_macvtap left promiscuous mode [ 410.223962][ T7454] device macsec0 left promiscuous mode [ 410.355953][ T7454] device veth1_macvtap entered promiscuous mode [ 410.362641][ T7454] device macsec0 entered promiscuous mode [ 410.391860][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 411.506006][ T7477] device veth0_vlan left promiscuous mode [ 411.536571][ T7477] device veth0_vlan entered promiscuous mode [ 411.569836][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 411.594345][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 411.604569][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 411.716876][ T7490] device veth0_vlan left promiscuous mode [ 411.756511][ T7490] device veth0_vlan entered promiscuous mode [ 411.794124][ T7490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 411.884222][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 411.913322][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 411.934571][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 411.957847][ T7496] device veth1_macvtap left promiscuous mode [ 411.977020][ T7496] device macsec0 left promiscuous mode [ 412.100857][ T7500] device veth1_macvtap entered promiscuous mode [ 412.160166][ T7500] device macsec0 entered promiscuous mode [ 412.190646][ T7500] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 412.347247][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 414.083445][ T7531] device sit0 left promiscuous mode [ 414.115501][ T7531] device sit0 entered promiscuous mode [ 415.682663][ T7570] device sit0 left promiscuous mode [ 415.963795][ T7577] device sit0 entered promiscuous mode [ 416.340338][ T7582] device veth0_vlan left promiscuous mode [ 416.351410][ T7582] device veth0_vlan entered promiscuous mode [ 416.378916][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 416.390512][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 416.447181][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 416.652529][ T7590] device veth1_macvtap left promiscuous mode [ 416.712765][ T7590] device macsec0 left promiscuous mode [ 416.820338][ T7595] device veth1_macvtap entered promiscuous mode [ 416.827234][ T7595] device macsec0 entered promiscuous mode [ 416.833310][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 416.901516][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 417.826256][ T30] audit: type=1400 audit(1741484728.961:151): avc: denied { create } for pid=7611 comm="syz.0.2536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 419.468320][ T7636] device veth0_vlan left promiscuous mode [ 419.557472][ T7636] device veth0_vlan entered promiscuous mode [ 419.674426][ T7636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 419.689433][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 419.698264][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 419.714407][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 422.704013][ T7669] device wg2 left promiscuous mode [ 423.278007][ T7679] device veth0_vlan left promiscuous mode [ 423.319979][ T7679] device veth0_vlan entered promiscuous mode [ 423.366592][ T7679] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 423.385750][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 423.393873][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 423.406395][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 424.286218][ T7712] device sit0 left promiscuous mode [ 424.477857][ T7713] device sit0 entered promiscuous mode [ 424.944396][ T7726] device veth0_vlan left promiscuous mode [ 424.988380][ T7726] device veth0_vlan entered promiscuous mode [ 425.618110][ T7733] device veth0_vlan left promiscuous mode [ 425.637124][ T7733] device veth0_vlan entered promiscuous mode [ 431.106477][ T7801] device veth0_vlan left promiscuous mode [ 431.154139][ T7801] device veth0_vlan entered promiscuous mode [ 437.354895][ T7855] device sit0 left promiscuous mode [ 437.492551][ T7857] device sit0 entered promiscuous mode [ 437.979174][ T7864] device sit0 left promiscuous mode [ 438.052441][ T7864] device sit0 entered promiscuous mode [ 439.947404][ T7896] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 440.083476][ T7896] device syzkaller0 entered promiscuous mode [ 442.021569][ T7901] device sit0 entered promiscuous mode [ 443.213211][ T7927] device veth1_macvtap left promiscuous mode [ 443.219232][ T7927] device macsec0 left promiscuous mode [ 443.344483][ T7927] device veth1_macvtap entered promiscuous mode [ 443.357783][ T7927] device macsec0 entered promiscuous mode [ 443.374293][ T7927] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 443.442216][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 444.297899][ T7956] device sit0 left promiscuous mode [ 444.391404][ T7956] device sit0 entered promiscuous mode [ 447.032114][ T8007] device sit0 left promiscuous mode [ 447.233049][ T8009] device sit0 entered promiscuous mode [ 448.592004][ T8015] device wg2 left promiscuous mode [ 450.252749][ T8058] device sit0 left promiscuous mode [ 450.369971][ T8058] device sit0 entered promiscuous mode [ 451.592494][ T8071] device wg2 entered promiscuous mode [ 451.598523][ T8067] device wg2 left promiscuous mode [ 452.523928][ T8090] device veth1_macvtap left promiscuous mode [ 452.529940][ T8090] device macsec0 left promiscuous mode [ 452.674604][ T8098] device veth1_macvtap entered promiscuous mode [ 452.718072][ T8098] device macsec0 entered promiscuous mode [ 452.751838][ T8098] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 452.792245][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 452.853586][ T8104] device veth1_macvtap left promiscuous mode [ 452.869534][ T8104] device macsec0 left promiscuous mode [ 452.954515][ T8105] device veth1_macvtap left promiscuous mode [ 452.969872][ T8105] device macsec0 left promiscuous mode [ 453.063333][ T8104] device veth1_macvtap entered promiscuous mode [ 453.089614][ T8104] device macsec0 entered promiscuous mode [ 453.114951][ T8104] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 453.169415][ T8110] device veth1_macvtap entered promiscuous mode [ 453.202067][ T8110] device macsec0 entered promiscuous mode [ 453.892096][ T8112] device sit0 left promiscuous mode [ 453.912871][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 453.920645][ T8113] device sit0 entered promiscuous mode [ 454.044728][ T8119] device wg2 entered promiscuous mode [ 454.236886][ T8122] device syzkaller0 entered promiscuous mode [ 458.343537][ T8202] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 458.442675][ T8202] device syzkaller0 entered promiscuous mode [ 459.257136][ T8220] device sit0 left promiscuous mode [ 459.452899][ T8223] device sit0 entered promiscuous mode [ 466.220254][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 468.124286][ T8407] device veth1_macvtap left promiscuous mode [ 468.130254][ T8407] device macsec0 left promiscuous mode [ 468.343848][ T8407] device veth1_macvtap entered promiscuous mode [ 468.357195][ T8407] device macsec0 entered promiscuous mode [ 468.449556][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 470.810141][ T8460] device veth1_macvtap left promiscuous mode [ 470.819720][ T8460] device macsec0 left promiscuous mode [ 471.044073][ T8462] device veth1_macvtap entered promiscuous mode [ 471.070322][ T8462] device macsec0 entered promiscuous mode [ 471.176030][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 472.046423][ T8481] device sit0 left promiscuous mode [ 472.392715][ T8489] device sit0 left promiscuous mode [ 472.474260][ T8492] device sit0 entered promiscuous mode [ 474.620639][ T8523] device sit0 left promiscuous mode [ 475.730773][ T8534] ref_ctr_offset mismatch. inode: 0xc22 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 475.933578][ T30] audit: type=1400 audit(1741484787.071:152): avc: denied { create } for pid=8533 comm="syz.4.2844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 478.845375][ T8584] device veth1_macvtap left promiscuous mode [ 478.860257][ T8584] device macsec0 left promiscuous mode [ 479.084560][ T8584] device veth1_macvtap entered promiscuous mode [ 479.186219][ T8584] device macsec0 entered promiscuous mode [ 479.323928][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 484.842360][ T8703] device sit0 left promiscuous mode [ 486.087864][ T8727] ref_ctr_offset mismatch. inode: 0xc1c offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 486.724942][ T8740] device sit0 entered promiscuous mode [ 487.964544][ T8764] ref_ctr_offset mismatch. inode: 0xbb7 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 488.855588][ T30] audit: type=1400 audit(1741484799.991:153): avc: denied { create } for pid=8775 comm="syz.4.2925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 490.124115][ T8795] device veth1_macvtap left promiscuous mode [ 490.175155][ T8795] device macsec0 left promiscuous mode [ 494.419522][ T8846] device veth1_macvtap left promiscuous mode [ 494.545703][ T8846] device macsec0 left promiscuous mode [ 494.645127][ T8850] device veth1_macvtap entered promiscuous mode [ 494.677586][ T8850] device macsec0 entered promiscuous mode [ 494.805736][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 495.303681][ T8863] device lo left promiscuous mode [ 495.553971][ T30] audit: type=1400 audit(1741484806.671:154): avc: denied { create } for pid=8868 comm="syz.2.2953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 495.682307][ T8871] device sit0 left promiscuous mode [ 496.227793][ T8884] device sit0 entered promiscuous mode [ 496.590615][ T8892] device sit0 left promiscuous mode [ 496.768307][ T8895] device sit0 entered promiscuous mode [ 498.042625][ T8905] device pim6reg1 entered promiscuous mode [ 499.585993][ T8939] device wg2 entered promiscuous mode [ 500.763970][ T8955] ref_ctr_offset mismatch. inode: 0xc87 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 502.643104][ T8984] GPL: port 1(erspan0) entered blocking state [ 502.693745][ T8984] GPL: port 1(erspan0) entered disabled state [ 502.756836][ T8984] device erspan0 entered promiscuous mode [ 502.809375][ T8987] GPL: port 1(erspan0) entered blocking state [ 502.815335][ T8987] GPL: port 1(erspan0) entered forwarding state [ 506.803025][ T9043] device pim6reg1 entered promiscuous mode [ 507.035569][ T9048] device sit0 left promiscuous mode [ 508.234905][ T9075] device wg2 entered promiscuous mode [ 509.958371][ T9090] device wg2 entered promiscuous mode [ 513.535496][ T9137] GPL: port 1(erspan0) entered blocking state [ 513.541520][ T9137] GPL: port 1(erspan0) entered disabled state [ 513.637148][ T9137] device erspan0 entered promiscuous mode [ 513.692382][ T9141] GPL: port 1(erspan0) entered blocking state [ 513.698304][ T9141] GPL: port 1(erspan0) entered forwarding state [ 516.054859][ T9165] device pim6reg1 entered promiscuous mode [ 516.510277][ T9176] device veth1_macvtap left promiscuous mode [ 516.608376][ T9177] device pim6reg1 entered promiscuous mode [ 518.024208][ T9198] Â: renamed from pim6reg1 [ 519.732792][ T9217] device pim6reg1 entered promiscuous mode [ 524.180620][ T9289] Â: renamed from pim6reg1 [ 528.153445][ T9343] Â: renamed from pim6reg1 [ 529.198024][ T9361] device pim6reg1 entered promiscuous mode [ 531.902144][ T9387] device sit0 entered promiscuous mode [ 532.709812][ T9395] Â: renamed from pim6reg1 [ 538.392078][ T9476] Â: renamed from pim6reg1 [ 544.446322][ T9528] device syzkaller0 entered promiscuous mode [ 545.236661][ T9543] device veth0_vlan left promiscuous mode [ 545.335931][ T9543] device veth0_vlan entered promiscuous mode [ 545.495818][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 545.535588][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 545.567638][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 548.962162][ T9583] device wg2 left promiscuous mode [ 553.290719][ T9617] device veth0_vlan left promiscuous mode [ 553.432463][ T9617] device veth0_vlan entered promiscuous mode [ 553.589753][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 553.608177][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 553.666488][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 553.692477][ T9625] device wg2 left promiscuous mode [ 554.164887][ T9636] device syzkaller0 entered promiscuous mode [ 557.146898][ T9679] device syzkaller0 entered promiscuous mode [ 557.222418][ T9687] device sit0 left promiscuous mode [ 558.796281][ T9695] device syzkaller0 entered promiscuous mode [ 559.610754][ T9721] device wg2 left promiscuous mode [ 561.397750][ T9744] device syzkaller0 entered promiscuous mode [ 563.864282][ T9780] device sit0 entered promiscuous mode [ 564.664993][ T9793] device veth0_vlan left promiscuous mode [ 564.731730][ T9793] device veth0_vlan entered promiscuous mode [ 564.826903][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 564.835240][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 564.872545][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 564.984140][ T9805] device veth0_vlan left promiscuous mode [ 565.040556][ T9805] device veth0_vlan entered promiscuous mode [ 565.110307][ T9805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 565.307802][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 565.322509][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 565.361582][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 567.065319][ T9835] device sit0 left promiscuous mode [ 567.218948][ T9837] device sit0 entered promiscuous mode [ 567.534930][ T9840] device sit0 entered promiscuous mode [ 567.787973][ T9844] device wg2 left promiscuous mode [ 569.743344][ T9876] device veth0_vlan left promiscuous mode [ 569.805257][ T9876] device veth0_vlan entered promiscuous mode [ 569.932127][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 569.952929][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 569.982538][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿÿÿ: link becomes ready [ 571.139504][ T9893] device sit0 left promiscuous mode [ 571.476816][ T9895] device sit0 left promiscuous mode [ 571.724044][ T9893] device sit0 entered promiscuous mode [ 571.992170][ T9897] device sit0 entered promiscuous mode [ 579.498997][ T9941] device veth0_vlan left promiscuous mode [ 579.550040][ T9941] device veth0_vlan entered promiscuous mode [ 579.670053][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 579.695262][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 579.732501][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 589.106512][T10015] device veth0_vlan left promiscuous mode [ 589.147001][T10015] device veth0_vlan entered promiscuous mode [ 595.182898][T10049] device sit0 entered promiscuous mode [ 595.652396][T10056] device sit0 left promiscuous mode [ 596.004006][T10060] device sit0 entered promiscuous mode [ 598.012413][T10099] device sit0 left promiscuous mode [ 598.703353][T10099] device sit0 entered promiscuous mode [ 599.382304][T10107] device sit0 left promiscuous mode [ 601.013037][T10138] device veth0_vlan left promiscuous mode [ 601.397642][T10138] device veth0_vlan entered promiscuous mode [ 602.442696][T10149] device sit0 entered promiscuous mode [ 609.657924][T10220] device sit0 left promiscuous mode [ 610.104412][T10223] device sit0 entered promiscuous mode [ 612.662032][T10242] device sit0 left promiscuous mode [ 614.875925][T10275] device sit0 left promiscuous mode [ 616.962282][T10310] device sit0 left promiscuous mode [ 617.362846][T10313] device sit0 entered promiscuous mode [ 618.628037][T10334] device syzkaller0 entered promiscuous mode [ 620.012188][T10347] device sit0 left promiscuous mode [ 620.210822][T10348] device sit0 left promiscuous mode [ 620.392706][T10347] device sit0 entered promiscuous mode [ 623.335517][T10389] device sit0 left promiscuous mode [ 624.032091][T10392] device sit0 entered promiscuous mode [ 624.723179][T10406] device veth0_vlan left promiscuous mode [ 624.731851][T10406] device veth0_vlan entered promiscuous mode [ 624.842411][T10406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 624.960395][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 624.978550][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 625.018730][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 626.464485][T10446] device syzkaller0 entered promiscuous mode [ 627.619407][T10466] device sit0 left promiscuous mode [ 628.103553][T10467] device sit0 entered promiscuous mode [ 628.381160][T10476] device sit0 left promiscuous mode [ 628.802384][T10477] device sit0 entered promiscuous mode [ 629.603568][T10494] syz.2.3437[10494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 629.603686][T10494] syz.2.3437[10494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 629.940414][T10495] device sit0 entered promiscuous mode [ 630.590547][T10498] device sit0 entered promiscuous mode [ 633.639920][ T30] audit: type=1400 audit(1741484944.771:155): avc: denied { create } for pid=10548 comm="syz.4.3452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 633.873029][ T30] audit: type=1400 audit(1741484945.011:156): avc: denied { append } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 633.982193][ T30] audit: type=1400 audit(1741484945.011:157): avc: denied { open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 634.186928][ T30] audit: type=1400 audit(1741484945.011:158): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 634.837149][T10561] device veth0_vlan left promiscuous mode [ 634.927456][T10561] device veth0_vlan entered promiscuous mode [ 635.067069][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 635.075544][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 635.112330][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 635.309897][T10570] device syzkaller0 entered promiscuous mode [ 635.981850][T10577] device sit0 left promiscuous mode [ 636.430694][T10582] device sit0 entered promiscuous mode [ 637.973318][T10611] syz.1.3470[10611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 637.973429][T10611] syz.1.3470[10611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 640.743600][T10630] device sit0 left promiscuous mode [ 641.472326][T10631] device sit0 entered promiscuous mode [ 642.353239][T10641] device sit0 left promiscuous mode [ 643.264226][T10646] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 643.372679][T10646] device syzkaller0 entered promiscuous mode [ 644.348472][T10666] device sit0 left promiscuous mode [ 644.475726][T10664] Â: renamed from pim6reg1 [ 644.672957][T10669] device sit0 entered promiscuous mode [ 646.976053][T10717] device sit0 left promiscuous mode [ 647.385564][T10718] device sit0 entered promiscuous mode [ 648.012092][T10726] device sit0 left promiscuous mode [ 648.231528][T10726] device sit0 entered promiscuous mode [ 649.770554][T10750] syz.2.3513[10750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 649.770640][T10750] syz.2.3513[10750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 651.729563][T10777] syz.3.3517[10777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 652.292144][T10777] syz.3.3517[10777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 655.883262][T10846] syz.4.3539[10846] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 656.022259][T10846] syz.4.3539[10846] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 656.613782][T10848] device syzkaller0 entered promiscuous mode [ 657.462263][T10858] device sit0 left promiscuous mode [ 657.618951][T10863] syz.0.3544[10863] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 657.619031][T10863] syz.0.3544[10863] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 657.861297][T10860] device pim6reg1 entered promiscuous mode [ 660.892050][T10902] Â: renamed from pim6reg1 [ 661.461889][T10912] syz.3.3559[10912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 661.473551][T10912] syz.3.3559[10912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 668.370899][T11015] device sit0 entered promiscuous mode [ 669.735975][T11041] device sit0 entered promiscuous mode [ 670.163979][T11037] device pim6reg1 entered promiscuous mode [ 670.582771][T11059] syz.0.3603[11059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 670.582877][T11059] syz.0.3603[11059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 674.066588][T11094] device sit0 left promiscuous mode [ 674.834222][T11099] device sit0 entered promiscuous mode [ 679.493472][ T30] audit: type=1400 audit(1741484990.631:159): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 679.532189][T11147] device bond_slave_1 entered promiscuous mode [ 679.565061][ T30] audit: type=1400 audit(1741484990.631:160): avc: denied { unlink } for pid=83 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 679.603998][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 679.644040][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 679.712032][ T30] audit: type=1400 audit(1741484990.631:161): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 683.392749][T11170] device bond_slave_1 entered promiscuous mode [ 683.399165][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 683.432458][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 684.057475][T11179] device sit0 left promiscuous mode [ 684.423415][T11185] device sit0 entered promiscuous mode [ 685.023220][T11193] device pim6reg1 entered promiscuous mode [ 690.972238][T11271] device sit0 left promiscuous mode [ 691.230081][T11273] device sit0 entered promiscuous mode [ 691.882139][T11279] device bond_slave_1 entered promiscuous mode [ 692.002190][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 692.020497][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 695.638264][T11322] device veth0_vlan left promiscuous mode [ 695.718809][T11322] device veth0_vlan entered promiscuous mode [ 696.804622][T11338] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 697.092582][T11338] device syzkaller0 entered promiscuous mode [ 699.254629][T11366] device pim6reg1 entered promiscuous mode [ 699.521733][ T30] audit: type=1400 audit(1741485010.651:162): avc: denied { read } for pid=11373 comm="syz.0.3692" name="cgroup.subtree_control" dev="cgroup2" ino=139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 701.272411][T11396] : renamed from veth0_vlan [ 702.145256][T11409] device sit0 left promiscuous mode [ 702.423125][T11411] device sit0 entered promiscuous mode [ 703.140357][T11417] device pim6reg1 entered promiscuous mode [ 704.986851][T11448] : renamed from veth0_vlan [ 706.380407][T11473] device pim6reg1 entered promiscuous mode [ 707.343742][T11489] : renamed from veth0_vlan [ 708.346766][T11522] device sit0 entered promiscuous mode [ 708.892332][T11530] device sit0 left promiscuous mode [ 709.272971][T11534] device sit0 entered promiscuous mode [ 714.611950][T11579] device veth0_vlan left promiscuous mode [ 714.832345][T11579] device veth0_vlan entered promiscuous mode [ 714.841195][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 714.862775][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 714.908996][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿÿÿ: link becomes ready [ 716.645881][T11626] device bond_slave_1 entered promiscuous mode [ 717.646111][T11639] device sit0 left promiscuous mode [ 718.064799][T11638] device sit0 entered promiscuous mode [ 727.697129][ T30] audit: type=1400 audit(1741485038.791:163): avc: denied { create } for pid=11748 comm="syz.2.3809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 731.105436][T11777] syz.2.3826[11777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 731.105548][T11777] syz.2.3826[11777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 734.423334][T11839] syz.3.3834[11839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 734.880823][T11839] syz.3.3834[11839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 737.471747][T11871] device pim6reg1 entered promiscuous mode [ 737.641439][T11875] device sit0 left promiscuous mode [ 738.553048][T11883] device sit0 left promiscuous mode [ 739.033319][T11884] device sit0 entered promiscuous mode [ 745.933576][T11938] syz.0.3861[11938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 745.933661][T11938] syz.0.3861[11938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 748.242865][T11948] device wg2 entered promiscuous mode [ 752.603394][T12021] device sit0 left promiscuous mode [ 752.963381][T12023] device sit0 entered promiscuous mode [ 755.263787][T12059] syz.1.3897[12059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 755.263905][T12059] syz.1.3897[12059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 755.662586][T12064] device pim6reg1 entered promiscuous mode [ 760.663801][T12110] syz.3.3912[12110] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 760.663892][T12110] syz.3.3912[12110] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 762.116192][T12133] device pim6reg1 entered promiscuous mode [ 765.384631][T12173] syz.0.3931[12173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 765.384742][T12173] syz.0.3931[12173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 770.733942][T12215] device wg2 entered promiscuous mode [ 775.913342][T12284] device wg2 left promiscuous mode [ 776.442649][T12288] device wg2 entered promiscuous mode [ 781.399364][ T30] audit: type=1400 audit(1741485092.531:164): avc: denied { create } for pid=12361 comm="syz.2.3990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 781.430426][T12362] device veth1_macvtap left promiscuous mode [ 781.530482][T12362] device macsec0 left promiscuous mode [ 781.658837][T12364] device veth1_macvtap entered promiscuous mode [ 781.693109][T12364] device macsec0 entered promiscuous mode [ 781.872132][T12364] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 781.879575][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 784.372355][T12421] syz.4.4007[12421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 784.372449][T12421] syz.4.4007[12421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 784.392816][T12419] syz.4.4007[12419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 784.603215][T12419] syz.4.4007[12419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 818.621803][T12805] device wg2 entered promiscuous mode [ 832.263316][T12945] ref_ctr_offset mismatch. inode: 0x1085 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 836.581940][T12995] device sit0 left promiscuous mode [ 836.682023][T12998] device sit0 entered promiscuous mode [ 842.134264][T13069] device wg2 left promiscuous mode [ 842.492929][T13070] ªªªªªªl: renamed from vlan0 [ 843.252791][T13094] device syzkaller0 entered promiscuous mode [ 845.339970][T13132] device syzkaller0 entered promiscuous mode [ 845.536014][T13140] ref_ctr_offset mismatch. inode: 0x117a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 848.952709][T13201] device wg2 left promiscuous mode [ 849.049568][T13205] device wg2 entered promiscuous mode [ 849.126243][T13207] device veth0_vlan left promiscuous mode [ 849.202226][T13207] device veth0_vlan entered promiscuous mode [ 849.243081][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 849.251121][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªªl: link becomes ready [ 849.294334][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 851.109563][T13243] device sit0 entered promiscuous mode [ 853.057535][T13265] device syzkaller0 entered promiscuous mode [ 863.292455][T13401] device sit0 left promiscuous mode [ 863.442708][T13403] device sit0 entered promiscuous mode [ 864.121931][T13412] device sit0 left promiscuous mode [ 864.287788][T13415] device sit0 entered promiscuous mode [ 881.517965][T13601] device syzkaller0 entered promiscuous mode [ 887.172829][T13662] device sit0 left promiscuous mode [ 887.677469][T13662] device sit0 entered promiscuous mode [ 890.701384][T13711] device sit0 left promiscuous mode [ 911.424262][T13923] device pim6reg1 entered promiscuous mode [ 912.752130][T13946] device sit0 left promiscuous mode [ 912.825736][T13948] device sit0 entered promiscuous mode [ 914.964412][T13969] device sit0 left promiscuous mode [ 915.288488][T13972] device sit0 entered promiscuous mode [ 922.770121][T14072] device pim6reg1 entered promiscuous mode [ 924.011291][T14086] device sit0 left promiscuous mode [ 924.229980][T14089] device sit0 entered promiscuous mode [ 932.981062][T14240] device sit0 entered promiscuous mode [ 937.622005][T14311] device sit0 left promiscuous mode [ 937.756273][T14314] device sit0 entered promiscuous mode [ 949.867005][T14401] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 949.967938][T14401] device syzkaller0 entered promiscuous mode [ 953.065061][T14443] device veth0_vlan left promiscuous mode [ 953.107466][T14443] device veth0_vlan entered promiscuous mode [ 953.493454][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 953.501429][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªªl: link becomes ready [ 953.562105][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 961.351892][T14523] ªªªªªª: renamed from vlan0 [ 973.790270][T14688] device pim6reg1 entered promiscuous mode [ 983.515426][T14863] ªªªªªª: renamed from vlan0 [ 983.548612][T14854] ================================================================== [ 983.556513][T14854] BUG: KASAN: use-after-free in sk_psock_verdict_data_ready+0xc2/0x1a0 [ 983.564582][T14854] Read of size 8 at addr ffff88812861c820 by task syz.2.4733/14854 [ 983.572304][T14854] [ 983.574488][T14854] CPU: 0 PID: 14854 Comm: syz.2.4733 Tainted: G W 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 983.585671][T14854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 983.595574][T14854] Call Trace: [ 983.598689][T14854] [ 983.601473][T14854] dump_stack_lvl+0x151/0x1c0 [ 983.605984][T14854] ? io_uring_drop_tctx_refs+0x190/0x190 [ 983.611448][T14854] ? panic+0x760/0x760 [ 983.615351][T14854] ? irqentry_exit_cond_resched+0x2a/0x30 [ 983.620910][T14854] print_address_description+0x87/0x3b0 [ 983.626295][T14854] kasan_report+0x179/0x1c0 [ 983.630631][T14854] ? sk_psock_verdict_data_ready+0xc2/0x1a0 [ 983.636358][T14854] ? sk_psock_verdict_data_ready+0xc2/0x1a0 [ 983.642084][T14854] __asan_report_load8_noabort+0x14/0x20 [ 983.647554][T14854] sk_psock_verdict_data_ready+0xc2/0x1a0 [ 983.653109][T14854] ? sk_psock_start_verdict+0xc0/0xc0 [ 983.658312][T14854] ? _raw_spin_lock+0xa4/0x1b0 [ 983.662917][T14854] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 983.668564][T14854] ? skb_queue_tail+0xfb/0x120 [ 983.673158][T14854] unix_stream_sendmsg+0x8fd/0x1060 [ 983.678193][T14854] ? unix_stream_sendmsg+0x8a1/0x1060 [ 983.683403][T14854] ? unix_show_fdinfo+0xa0/0xa0 [ 983.688086][T14854] ? check_stack_object+0x114/0x130 [ 983.693134][T14854] ? security_socket_sendmsg+0x82/0xb0 [ 983.698419][T14854] ? unix_show_fdinfo+0xa0/0xa0 [ 983.703102][T14854] ____sys_sendmsg+0x59e/0x8f0 [ 983.707715][T14854] ? __sys_sendmsg_sock+0x40/0x40 [ 983.712564][T14854] ? import_iovec+0xe5/0x120 [ 983.716992][T14854] ___sys_sendmsg+0x252/0x2e0 [ 983.721510][T14854] ? __sys_sendmsg+0x260/0x260 [ 983.726099][T14854] ? kfree+0xcc/0x270 [ 983.729924][T14854] ? ____kasan_slab_free+0x131/0x160 [ 983.735043][T14854] ? kvfree+0x35/0x40 [ 983.738871][T14854] ? __fdget+0x1bc/0x240 [ 983.742955][T14854] __se_sys_sendmsg+0x19a/0x260 [ 983.747624][T14854] ? __x64_sys_sendmsg+0x90/0x90 [ 983.752402][T14854] ? __kasan_check_write+0x14/0x20 [ 983.757343][T14854] ? switch_fpu_return+0x15f/0x2e0 [ 983.762293][T14854] __x64_sys_sendmsg+0x7b/0x90 [ 983.766895][T14854] x64_sys_call+0x16a/0x9a0 [ 983.771228][T14854] do_syscall_64+0x3b/0xb0 [ 983.775494][T14854] ? clear_bhb_loop+0x35/0x90 [ 983.780091][T14854] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 983.785823][T14854] RIP: 0033:0x7f52b0689169 [ 983.790066][T14854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 983.809512][T14854] RSP: 002b:00007f52aecd2038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 983.817883][T14854] RAX: ffffffffffffffda RBX: 00007f52b08a2080 RCX: 00007f52b0689169 [ 983.825659][T14854] RDX: 0000000000000000 RSI: 0000400000000500 RDI: 0000000000000006 [ 983.833633][T14854] RBP: 00007f52b070a2a0 R08: 0000000000000000 R09: 0000000000000000 [ 983.841444][T14854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 983.849258][T14854] R13: 0000000000000000 R14: 00007f52b08a2080 R15: 00007ffdff895f18 [ 983.857078][T14854] [ 983.859934][T14854] [ 983.862100][T14854] Allocated by task 14852: [ 983.866356][T14854] __kasan_slab_alloc+0xb1/0xe0 [ 983.871041][T14854] slab_post_alloc_hook+0x53/0x2c0 [ 983.875989][T14854] kmem_cache_alloc+0xf5/0x250 [ 983.880600][T14854] sock_alloc_inode+0x1b/0xb0 [ 983.885106][T14854] new_inode_pseudo+0x64/0x220 [ 983.889702][T14854] __sock_create+0x132/0x7e0 [ 983.894127][T14854] __sys_socketpair+0x29f/0x6e0 [ 983.898814][T14854] __x64_sys_socketpair+0x9b/0xb0 [ 983.903677][T14854] x64_sys_call+0x19b/0x9a0 [ 983.908015][T14854] do_syscall_64+0x3b/0xb0 [ 983.912269][T14854] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 983.917996][T14854] [ 983.920163][T14854] Freed by task 11181: [ 983.924073][T14854] kasan_set_track+0x4b/0x70 [ 983.928501][T14854] kasan_set_free_info+0x23/0x40 [ 983.933273][T14854] ____kasan_slab_free+0x126/0x160 [ 983.938219][T14854] __kasan_slab_free+0x11/0x20 [ 983.942818][T14854] slab_free_freelist_hook+0xbd/0x190 [ 983.948029][T14854] kmem_cache_free+0x115/0x330 [ 983.952624][T14854] sock_free_inode+0x20/0x30 [ 983.957057][T14854] i_callback+0x4b/0x70 [ 983.961043][T14854] rcu_do_batch+0x57a/0xc10 [ 983.965382][T14854] rcu_core+0x517/0x1020 [ 983.969464][T14854] rcu_core_si+0x9/0x10 [ 983.973455][T14854] handle_softirqs+0x25e/0x5c0 [ 983.978056][T14854] __irq_exit_rcu+0x52/0xf0 [ 983.982396][T14854] irq_exit_rcu+0x9/0x10 [ 983.986505][T14854] sysvec_apic_timer_interrupt+0xa9/0xc0 [ 983.991939][T14854] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 983.997763][T14854] [ 983.999927][T14854] Last potentially related work creation: [ 984.005505][T14854] kasan_save_stack+0x3b/0x60 [ 984.010095][T14854] __kasan_record_aux_stack+0xd3/0xf0 [ 984.015302][T14854] kasan_record_aux_stack_noalloc+0xb/0x10 [ 984.020943][T14854] call_rcu+0x123/0x10b0 [ 984.025022][T14854] evict+0x87d/0x930 [ 984.028755][T14854] iput+0x63b/0x7e0 [ 984.032410][T14854] dentry_unlink_inode+0x34e/0x430 [ 984.037357][T14854] __dentry_kill+0x447/0x660 [ 984.041773][T14854] dentry_kill+0xc0/0x2a0 [ 984.045941][T14854] dput+0x45/0x80 [ 984.049413][T14854] __fput+0x59d/0x8c0 [ 984.053234][T14854] ____fput+0x15/0x20 [ 984.057048][T14854] task_work_run+0x129/0x190 [ 984.061483][T14854] exit_to_user_mode_loop+0xc4/0xe0 [ 984.066526][T14854] exit_to_user_mode_prepare+0x5a/0xa0 [ 984.071808][T14854] syscall_exit_to_user_mode+0x26/0x160 [ 984.077184][T14854] do_syscall_64+0x47/0xb0 [ 984.081466][T14854] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 984.087164][T14854] [ 984.089332][T14854] Second to last potentially related work creation: [ 984.095759][T14854] kasan_save_stack+0x3b/0x60 [ 984.100270][T14854] __kasan_record_aux_stack+0xd3/0xf0 [ 984.105483][T14854] kasan_record_aux_stack_noalloc+0xb/0x10 [ 984.111117][T14854] call_rcu+0x123/0x10b0 [ 984.115197][T14854] evict+0x87d/0x930 [ 984.118930][T14854] iput+0x63b/0x7e0 [ 984.122664][T14854] dentry_unlink_inode+0x34e/0x430 [ 984.127608][T14854] __dentry_kill+0x447/0x660 [ 984.132036][T14854] dentry_kill+0xc0/0x2a0 [ 984.136202][T14854] dput+0x45/0x80 [ 984.139674][T14854] __fput+0x59d/0x8c0 [ 984.143491][T14854] ____fput+0x15/0x20 [ 984.147312][T14854] task_work_run+0x129/0x190 [ 984.151738][T14854] exit_to_user_mode_loop+0xc4/0xe0 [ 984.156778][T14854] exit_to_user_mode_prepare+0x5a/0xa0 [ 984.162179][T14854] syscall_exit_to_user_mode+0x26/0x160 [ 984.167562][T14854] do_syscall_64+0x47/0xb0 [ 984.171815][T14854] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 984.177544][T14854] [ 984.179712][T14854] The buggy address belongs to the object at ffff88812861c800 [ 984.179712][T14854] which belongs to the cache sock_inode_cache of size 896 [ 984.194032][T14854] The buggy address is located 32 bytes inside of [ 984.194032][T14854] 896-byte region [ffff88812861c800, ffff88812861cb80) [ 984.207141][T14854] The buggy address belongs to the page: [ 984.212621][T14854] page:ffffea0004a18700 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12861c [ 984.222673][T14854] head:ffffea0004a18700 order:2 compound_mapcount:0 compound_pincount:0 [ 984.230835][T14854] flags: 0x4000000000010200(slab|head|zone=1) [ 984.236832][T14854] raw: 4000000000010200 ffffea0004a10500 0000000200000002 ffff8881081aad80 [ 984.245247][T14854] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 984.253664][T14854] page dumped because: kasan: bad access detected [ 984.259924][T14854] page_owner tracks the page as allocated [ 984.265551][T14854] page last allocated via order 2, migratetype Reclaimable, gfp_mask 0x1d20d0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL|__GFP_RECLAIMABLE), pid 291, ts 469857931738, free_ts 465485423914 [ 984.287858][T14854] post_alloc_hook+0x1a3/0x1b0 [ 984.292462][T14854] prep_new_page+0x1b/0x110 [ 984.296804][T14854] get_page_from_freelist+0x3550/0x35d0 [ 984.302176][T14854] __alloc_pages+0x27e/0x8f0 [ 984.306603][T14854] new_slab+0x9a/0x4e0 [ 984.310509][T14854] ___slab_alloc+0x39e/0x830 [ 984.314933][T14854] __slab_alloc+0x4a/0x90 [ 984.319097][T14854] kmem_cache_alloc+0x139/0x250 [ 984.323788][T14854] sock_alloc_inode+0x1b/0xb0 [ 984.328304][T14854] new_inode_pseudo+0x64/0x220 [ 984.332900][T14854] __sock_create+0x132/0x7e0 [ 984.337324][T14854] __sys_socket+0x132/0x370 [ 984.341664][T14854] __x64_sys_socket+0x7a/0x90 [ 984.346178][T14854] x64_sys_call+0x147/0x9a0 [ 984.350520][T14854] do_syscall_64+0x3b/0xb0 [ 984.354773][T14854] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 984.360520][T14854] page last free stack trace: [ 984.365121][T14854] free_unref_page_prepare+0x7c8/0x7d0 [ 984.370419][T14854] free_unref_page+0xe8/0x750 [ 984.374928][T14854] __free_pages+0x61/0xf0 [ 984.379094][T14854] __free_slab+0xec/0x1d0 [ 984.383261][T14854] discard_slab+0x29/0x40 [ 984.387426][T14854] __slab_free+0x205/0x290 [ 984.391684][T14854] ___cache_free+0x109/0x120 [ 984.396112][T14854] qlink_free+0x4d/0x90 [ 984.400102][T14854] qlist_free_all+0x44/0xb0 [ 984.404450][T14854] kasan_quarantine_reduce+0x15a/0x180 [ 984.409732][T14854] __kasan_slab_alloc+0x2f/0xe0 [ 984.414420][T14854] slab_post_alloc_hook+0x53/0x2c0 [ 984.419368][T14854] kmem_cache_alloc+0xf5/0x250 [ 984.423968][T14854] getname_flags+0xba/0x520 [ 984.428307][T14854] __x64_sys_unlinkat+0xb2/0xf0 [ 984.432996][T14854] x64_sys_call+0x6e9/0x9a0 [ 984.437337][T14854] [ 984.439504][T14854] Memory state around the buggy address: [ 984.444975][T14854] ffff88812861c700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 984.452875][T14854] ffff88812861c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 984.460778][T14854] >ffff88812861c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 984.468665][T14854] ^ [ 984.473617][T14854] ffff88812861c880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 984.481512][T14854] ffff88812861c900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 984.489419][T14854] ================================================================== [ 984.497309][T14854] Disabling lock debugging due to kernel taint