last executing test programs: 13.249827949s ago: executing program 0 (id=12915): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff0000", @ANYRES32, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001380)={0x6, 0x0, 0x0, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x9e, &(0x7f0000000980)=""/158, 0x40f00, 0x5a, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0x1000, 0x1}, 0x8, 0x10, &(0x7f0000000ec0)={0x4, 0x6, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000f00)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000f40)=[{0x3, 0x1, 0x7}], 0x10, 0x10001}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x21, &(0x7f0000000540), 0x4) sendmsg$tipc(r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004000000000000000002000000000000000000000000000003000000000300000001000000000000000000e1432cbd4802d2366cf2c03d75a3c01b5ac168e5e9895bda4d508fca73e78ad4060c521aac39f82dab2e8b4f84b4b49b8aab693d1d0c9ac8014e81f5b7f20fae4b4cff715b58688354d506e80c6b39960cc967c2481f7a410eb98a585ec9dc286bbf5e21c6038cf841334e03c5f671f461130fd2ba8d56092f0990f2fe8271be70e275b6a0dc9dc1d6516893f2cdf5f83aec"], 0x0, 0x4a}, 0x28) perf_event_open(&(0x7f00000006c0)={0x0, 0x80, 0x9, 0x8d, 0x16, 0x4, 0x0, 0x5, 0x94ba0, 0x48cf3dc79f55ac95, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x6}, 0x100000, 0x0, 0x2, 0x8, 0x0, 0x0, 0xc, 0x0, 0xc7a8, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x2) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0e00000004000000040000000200020000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03090000020000000000000000000000000000000000000000000000c6deba5a21a0d179a36aaae8ba02d301eebc5cab25b34842802f94db92d20cfd0be12cee718954a8b55775e1c4af78fbaa0d00000000000000972e8fc86808570e56f601fee668"], 0x50) 12.371242052s ago: executing program 2 (id=12920): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x1}, 0x50) close(r1) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f00000002c0), 0x20000000}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) syz_clone(0x410e6080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)="2fd0ff0006094f492faff2f173e1ac871d48eef87bb90a19da77ed4bb5ae2e86f7b0cf112203043f022f05c93af58dc47d13e4ed9d9426f7db4e53422cbc58b6b2e48d2a7570b19a5bdcded6dfa976c4bce46e30294d29a8f2bbfa35a756c52f5861fc73de3cd1c8f287a49685e7518b86f45801c10da574d850fd5c2ad8f247") 12.346741922s ago: executing program 0 (id=12921): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r1) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f00000002c0), 0x20000000}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) syz_clone(0x410e6080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)="2fd0ff0006094f492faff2f173e1ac871d48eef87bb90a19da77ed4bb5ae2e86f7b0cf112203043f022f05c93af58dc47d13e4ed9d9426f7db4e53422cbc58b6b2e48d2a7570b19a5bdcded6dfa976c4bce46e30294d29a8f2bbfa35a756c52f5861fc73de3cd1c8f287a49685e7518b86f45801c10da574d850fd5c2ad8f247") 8.905624062s ago: executing program 0 (id=12925): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x6, 0x7, 0x9, 0x34908, 0xffffffffffffffff, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x100001, 0x0, 0xb}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r2) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r4) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 8.879003033s ago: executing program 4 (id=12926): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), 0x0}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') ioctl$TUNSETIFF(r2, 0xb701, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000", @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x13, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000480)='syzkaller\x00'}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r4}, 0x10) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 8.845779253s ago: executing program 1 (id=12927): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), 0x0}, 0x20) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') ioctl$TUNSETIFF(r2, 0xb701, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000", @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x13, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000480)='syzkaller\x00'}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r4}, 0x10) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 8.549479277s ago: executing program 3 (id=12928): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x1}, 0x50) close(r1) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f00000002c0), 0x20000000}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, 0x0, 0x0) syz_clone(0x410e6080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)="2fd0ff0006094f492faff2f173e1ac871d48eef87bb90a19da77ed4bb5ae2e86f7b0cf112203043f022f05c93af58dc47d13e4ed9d9426f7db4e53422cbc58b6b2e48d2a7570b19a5bdcded6dfa976c4bce46e30294d29a8f2bbfa35a756c52f5861fc73de3cd1c8f287a49685e7518b86f45801c10da574d850fd5c2ad8f247") 8.446875128s ago: executing program 2 (id=12929): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000009b, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r2, 0x0, 0x0, 0x0}, 0x30) syz_clone(0x2a020600, &(0x7f0000000300)="4e159d92ce4e466744ae3704fbcbecdf6d177309d6887a9d4f6083f01ff4b38bc7e0302ffc3a39d616b8f204f4e6067102b40bf64b442dedd91fed311fefd48b50ae9b46d11c86ae78e3f153dacb1199b2571171df725d2ec1048be9f8fdf137cdd907342f06a2943b9338ccc1477223fd60082c2fa879c1b419eb567cfc2d6b1cbef6b22c9ad3910b62a564ca93c66b38d442893508c6daf8a3537fe54b130ec3d9d6ea10aba5b7f5c2d4", 0xab, &(0x7f0000000280), &(0x7f00000003c0), &(0x7f00000004c0)="df2239a5abfe7f736463aa3ae5541525d85b9df771aae02a28043c0e57aead8f2a4b3a139507dd43ac6862d4dca5877e23f4111791863277a703b41bea7d69d3a8a7ca074f8c3f27cffde6d291cb265ddfc009e96d29") ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, 0x0) 8.237694071s ago: executing program 1 (id=12930): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r3) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r5) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 8.164838962s ago: executing program 2 (id=12931): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/14, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000240)="85fd527d4c59b87897cdcfbe128bbbb2b9f7f5c4965ba7547bfb8b464e3eb59ccadaa65eeab4d322195c7033b957234d612a71cf2a7b79aaa9031378dbc0c203166eba3179161ebee6b8356c9e75e0e7317e7ec52a846ec88e049cf4d83f851e3b5111e3fe6f86b508746e0927de31973e287ba13c706cd77bba15ff9763711e918f7ca1aea834f0a1b1da1f29e9585a478eaa02fce09a8db3e9e373aa01f74adf91790ede6073991a621e2849bcca79c9612db329f48efa8045c82d1ba68ef031730d4aa0a95cf32bdb3aa5e5131535e7ab6f107898b689355cb4b9a91d8aba1ccb46b251d61e885e528085d57069083f386edb8549", 0xf6}, {&(0x7f0000001340)="c8cebe010d397800b8e79d434c404c68ae6e0216bf048041b41753ca5f057b00351cd27f9e4c75cac5e4ba25d9c686b72e6e138a3bacff917958a749060653846b7a19505fc7b8229b74e87daceedefb7e3e6d06d491d326271eb5cb98732b632fdebb5879e095f2f6227768db4b7d13d701bbe8a13bef6fb25677fa9bd5f650125b1e0222f05c2c68d0d13e5fec534106e417d8b05aaaa53f97ed074ff96aaa480aa6f6b30cbc9ff5eccd223909fa4d02ed1a190bc3caf2a40a03e25bc86ef96ba4ffbb838d0500804c5f17ee6ee4eac7bb8dddc3f991e4ffdc38969334a1b2b01e6ac9c0647d3994dabe1a0367a238929fd649b3f708d14f307ec9d5ffcdcfb7a32c45d3f0ad300187262018bd33983037e3e1a15db9b94b27e91d01528326a30653387c795df5d346f7305740a2f249db69c2df1f3fdd923e0a6c5f77bb76bb5cad4dc4a26fd0f37658fe5cc757b35564af7ecd5fa867a0b30f4422afbf7a3833684147ca17d178a56a0f83100bf832eef147142b998ce8bbb8d30f30c7799e1d50f99e3d06ca1610402ccebeef53c0451575257051869d38fb4cb8099657557ebfd89ab370195f701004250ee022dfb4a81cd69b3e3a1ebb1752900298fee9f6c55a9e2afe1b038709736911d1e36874ccdeec1bcb2e7c2288cf84c6ea9f00c752f04ee28b2161a18be1cb84d6538dd04753211bac0ce396d69fb5901a8b1b0549d840fed79a4b5d0fde3d6e1a2feee0ede90f4db90e5eb5b11aae123d78615e52896f918f2cc695c79279f57d5e6049eb664db1600865e3bf8fe7e175fea70284874d9a3c0a24448fe18ae8d60ef741321eb7cde1a83fcffca28920d720821466bdb84660614f3df65b856f186ee93a492846c80ccbe8cb6fc914ff114114056d8f9389f65e71a2e1929996e7f6e8b2a88ca69dcf7f23bd59473222435bceda96743cde92ecfb85b5a83b97051495c38593696ed99837153ca97750710f019b0d22fc6c8d355c9524f29d0e156f00a5df67958e9ab0717b82a5496061e33e8776eece494734ff4e60e8bcd708f08318a0024af987cab84fa8dadb352e1f5e34c6fb60debaa1f8b1b910a8afdd1c78361f559b0af07ba54e406ba6ab6885d4ed9b7176154d3a5abdcd9f8993fd0434ef3b168301768f09ff2c5bc71aa82e7dca12accbcbebf5e223fec2f6891a089e7e4c377f556c8b3ba20d64e158b78db22486050e64fde32f65ef145fbcb9085765f5071b71ffab88385af8ae0895bb753c72c5a1a3bddf12dffcc70ab6f25a1c7ec84dafd267889d7c0e400a550da35295ff6d2e166ec2f67bbcb60f8ad599bf7e5863d4e54533a00acad857fb113d47fe05cc5d803f523da225bfb98349a4fdf2e2214d96f876f1156933226587b48d509f7da49c58b0c0b2a7516338b4222953fd9c5e1fcfe46cfa9b19f1522e5d6f42f03ab6bb12e73bc953cee9bb570ed307509c969f18d85d0f04491240aec7133e90be7f9925f402aec2aa7c788ed1faa1cb888c4143ca5ce38d51667332fecc87df8af80e22d83095e0f7df9d6d35fec41e34c777d7ce8cb8c2b3521014350de8568c3556efb7e94b804ad3fb88a56d9f0d9652c8725b99e0809e279c351b66aaef6498aa9ec54150cad4ed2b66f50460a3c07702ab22c3d16fe3a880b5995da00615e7ebdd8bcd2c5d9928e06305e484b4b73a0fbead92f21d45d7e7aa58ad253b10aa3447947097654f477069fb7791264b946a4c281eac6c3abfcac55eaa6b8275ab44f46a18d2a703ca095b6f6635dc461b741c7c6e1af9da73a69482fcbfc83a7af10cca6a22a2d7b0f766c420f4d55aa990534afd7772cb1f5acb58a9e1294d0824d5756e8102a25828b0ae6cf2a5264d194a977085530b0bdd5bcd58708f99d1d3764319bdcb49296e64b5176c8a2a8480d8db27d96fbb2c0ebccc69c4bf7f128219cf8045c96b63302d8d6c2d3df19626d295062ab627f63b815c93091083aca002cc196680093125a1690ba1c072660f39a7c56dab91ee955ae4c0170d6f8b62f78e46c193666cc2885317a9d8856b5477182ddb913ef1e06d15296b89c21b37f2ed1381077c0191ef02bda22c5682a9dfcfccca8f1458dd2cde38ea56c7ee524a5e081b7376f1b125e1dd72b8324812cc91e62713b258d7acad0566a30b5c893612f72ad108644940530154239c1fc024add534fafad2c234aec225c133dae8e291ec23372c4f68ffc94b8b0277e3019ac68ad7b52407e0dd3dff0b6f4ac2a6c90b4918d6b744bfff8420550deeb9a1b7e23db4d6bd9b58ccd3f808a740e6966813a47ba75977831c90d3ba61561f2b5b76df848fdcab11f740cbfcebbc8bbc1bd443c8d5329f850c7bfd5f919dc5f06a5fb0a6b8e67c64246ef0eb2cb98088e76a3ca6648b2f5ccb58a8df4bd4e7633183470875e67781f8953c6e360edc5b0c6163ad26643a7986dbb53602dc8b8d938cce93202e1936ad55adad07c501206f2020979f7c40bfd3313fdcaacec99a750d3078fe1cf6a74a8382e388a01d259d9abe43c03c92bbdc9131b91ddd1a1a37c8051470a8f00ea1ed783c65cdd0675494443a84426b3cbdac40e870569d2611013e585df6f614c7a935ce01aebbd86bb39932db7f2e62504373dc518abede22372643f2495ed842fb43e88f87dfc66c2205e08c86b4021cecc8cd6251d039e1658a1746c6b443dcc671fc076a7af4a0c9f8e127e7055cc06433702238d6d6548b5997d4e00ffa5265ec8df963703b33841c7befe154e11a3bda7a15b03a59640f43ac629199ec28341d685e5d560032b2c81074d816a40f64c27960cc35aef0128b19d41ca0bcd61ae5c5baae7c8d5aadf24e9d5254baa0b8f76d206dd43bc7348dcc298d129aa394484c4b3630c128bbcfc4de6bde7ffb622c5b68f4f5943eca755082b21c00d105fdbb7c38150d084b4a0c917239df115f8fa593e876af37215fd34edc20971bf69796b05fa9e885191cb2cf4fa71cf6a41ced004ac0886a52daace53356db1055aa16e7ae14f4f11962f74c56929e2b43506784af4704734156ffdb5f48e9b1de128a013c3ab3cbce89c143952fb30c27527473ea6b15ba2ba1ad052ec7e299c06fa3bbe4dea0e19da3304f18a00f7f72bbf97cb305281e7139f2398b3920b4124382bafb47a26d088aeb05d914b67cfbef7ebf7e88b177113757ec1fea0ee5da60ae36eb89508334db604c73a2ad38d47977637f9fe7ed0b53aa341ab6782890a32327a1f6bca504dbf25758eaddf24c739320329962446fc445aa55edd61537d0626a454f01f6a1789bb5bd2ca3dc863cff9707c6a899d6de6a3baaa9e635be0d976b9508e6d057b9fe508e9cf3c85bd242657afa1ef6b6911bcec6f6f29f7888a58e1d6f5e2228969be877ef326d420fc8f302c84cbdf62ed2a03c65348ba480b63455169c99b77cdb42469c0695f1c683e09e634bb40927e7b83aa9f65d41f653222ec2d7c8545e7c2c349118260c9cc12e79c300d807e19579adf1e20bc35b4b815b79714a2352c579ed8d550d7de0a5d48a352807f71fd0b2b91cf17ceef8f6e83972297b6ff35e3ff17bab72194b82e60cc2dddcddccaf415b6ef413246272dad3bbd26b0987438c89fbd1b3030bb8d361fa5acbe9b03d83f145131210b5d2f17733cc140d7f381ec1fafc3bd7b0302f9ff33f1481bb4db8557903bdc14cf6ae149521558c247cbd8f65499f2c2c2d0540d0d01b5d23e28c62293f8711a71e78963b22d9c57a7086ad45f155ccd4f19983b2ad299779184e0578c0386afd8c00080fd1970802c045d91b76931b4a149eab054dbdf88bcbb862deb7fd2d8876e38a87e964d1bbf63660569f9b792ff69de3b62d29a30043b0830fa16ed023846f426eb51a3aff2dec0c4c1d265b2ae0fbc960edb2a1232d25c1d73f331f07e1e20e3e00f691b96266e16d2919ce626ce1544f2d551d1df98c07d3156be2bc0767c5ada37b7f0d1bc8e16bed67ce1ede25dffcda44a4fcc0cec5aab0e3f786c6b41b03676355d5b61798a8c10f018e74507a29aade4c656c5808d0e0d79b86e71cb9ef7674efe207c15a03b1d83738af764dfb822ca936599673088eda425053cffcfc76d4f64f7b3b77401c8bfba4c85112f880929e0b25c574845a29262f3e36e885a84fa1332ed57ba9544674699593c7b1a8a776733e6aeec05134a0b3b5a9a791d5a577f7db5a5456a713cf6fedf1dda87da0f6ec8abd2d52f518231ebe140d42d955bf3fe9bb9fb57ce37d981686388f2cab480d9f695140d8c1a6125e351266f9a42f7c6674c1c86c30faa3e8804659f20a1e78729d0fd8ca6a0f22859aa42b1781b399492d1d1ff92207a4ea802bc685ab5c1586c9b9c376b0c21aa03a9f5147fe966a75ae5c1bb72dc39d5a51e9430b5f83268770348924af08f776aec2a3a41ad1aaa45dd4b443f9231e6df4de97cb53409f23632f4f16d63aa913833120678bb3edc3e29144bc91e6fb24b5c956c7608533d36c808b532c40cd964084de0d8d12d629e7c070bf32d9565ede2928992a0beeec844f7e6616936a18a929e80735ccf230ced038607d61ceb8f57a77ac32c859843e8393deb8baeee8842c0082431a667337021fa8c1ed14b742c6bb6b70cfd88def335feee7e009991f95092634ae09527985c8d4f40cbbb1093a6024f22ffa34c95279c59ab87186720730bec3c514afd2f3af74439a05c06951d155ba82f749cc3dbf8dca458c142deee0e0bfaa8a019315d6e9d2daa2156a9a8c04e821c48f36859b4ed735a480688fea3a9c19e68c69de5da2f31274d9cafdf0f9c137ca37ab31e91f26b52a8632a182124b605b6804ce1db6e5f518cff37f0c650b8774bc888c4228b318acaf3fb931ba1d353c4b6b14419a54bab51d10692fbd59f27e2e32b7a0475bb8c17318cda09c880c12b0468700569d4f42e066a4ab15b16b2689a3d65e13a2ceb59db4f2f14ca2824394fb7e9f1fd95d833ffa7cad93204e402ce7bb5d48cef02b4aa0c76f0a0ca4fdae089888a66251769d61d13eb19da7ed73413ad6fc74a7c164589b0f059be90b548920f98c9509a662631b84d0b4b050d2dc25e8c898625819cdab2b2715fa6cb2e982baa20b635b124cbc1b8c29cd4af353d3ee9890e439d727d093313365883851fff2cc487a1e24c6c281f458158b839c42a8c8b116970f7df61471ac5b81f855cb2a0b27ca9faab2f8262e6f61e72522c845cd78ff96526f45c70afc76fc2218a3446feb5072fd9982c5913e44bdac7ff539f1a24c3163e0b40e498f0497db02e6fb996a7925b552af99f4dd282f76df959ed7904762c612870b37c99e2e091be893f0f99df26a670bba51d2d656b01586d2cc60a6f3c3c4d98a3ba5f67827ec587b8f22254f0974c8609a16fb9082fd86ff9e39cd691fc64ad9737e8fd7bb44799a545e425fb7dfd04742cef46d49d81cfeb14683f12a8f639dc7eb1b2487d4fbcdaab5ac1a9ae089169cf6ee875ce54870a18315fd7ba856e24f3b3220c3791ba8e2a54b95431288f486612d9a518bcac48c85b900902cf78045ba6dc45e764bb7ec62b7d601614e4ccff4a3a54d351458f550b3decd9993d9e6d8f9627b3af8b117a81a1500edfb49af2cc00633a8b4f21ba590d1db8c83bd62ab24d0278adc972c031725fc60d0add081593b420dec06214f95005856d4c1e55438903445fc4b83cca91756461fec17bf3d5ab7955d114608a54d312499c5d7870e21c1c55721268715c4032cf396e42e2325aadf8c9fd648e3", 0x1000}, {&(0x7f00000004c0)="1565e9a629abd709fedd9ded7cadd0c4715f8adfa5197b92a28c3d2213e014a9d01ce9c5118969c8783cd70ecac3eba73cf6bd152c470b4332449b9ae1f7ba6250942340f49c90f46deed2f2f9b25e4ce7077ff728a661fd4f181c8967b0eede228d8f6f6c82237184565a952b1c64abb0c835f60a3fa0835f144f4ebbd0a4ac8c7561c960568ed0efb76458acc52b89b41f03b323ecb64f299142fce2f23dd0812d7c15b4f957329a813a96c3b5979d0e78157737a76c6a33a549429b26a2f37542592b0251900d37f72debef3fb2517d0231463c5eb2", 0xd7}, {&(0x7f00000005c0)="c48362fc869b0d29e88ebc60735bdacdfc977aa2e7b4e92a031c44bba1b6fe48c473b878a4b73b3d26e8c5ff2891da260a506d98ea1771094212d69f8b6da8d56ee45042c057d0a929290eae3464259285db157e471f6421efc01bc29eef9a449c7e018d87c532789cb48e533463bfc166c0eaeb6c83c2eaaa1fd1769916f40c289f5c1978a8255a860fcee3eadb98a4765fe91e8fbe25655c84ddb55a4070369ddd8756abc74877b4501a92149c5009cafb6956b12dc3286c5051bc3cd740913a7956276e816c045a36", 0xca}, {&(0x7f0000000140)="d1f70b368d922505c5c5078eaaaf068421f72706f49754e18f1d5332833b951eb8211f0800199c87f13f4536fdd15087a5662d48e0cabcd9462a63db2aa9b798abada172df9863e982e5bd56a994ef08284df6728d68562e6b714bd628ec6c467e4e2b4cdb98", 0x66}], 0x5, 0x0, 0x0, 0x20000050}, 0x8004) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000500) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000d03"], 0x0, 0x4e}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000840)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="1e00004000120000005000002df0acd92e93529179c14230e8269e17d57a82f7df69650ec6c8111e5d20aef880d5d7f2d1cd6fe47bc02e5b08c98b35ca8c9a7964f45f0b427fa1aebf962f2796454c84b41061a29aadd10286941db10bc21cbaf827e43bffb5c0ab13370eb4651e2a00fbcf22fd9b782c4f60eb0b195e520ec1dc55fcc4efe28ba2989037f0f945842c9d0cd5df95c4664ae9617698b6937b0cae46b03053870cd4aa3b4cbc94512c42676ce8f32df2e6302789e65857eb95fd342af4badef2d75c11a3ef2fa2011285e4ec24c0815cd105e289df7418d4a342fdcc425d", @ANYRES64], 0x10) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="2d63707520a2fbfdbd"], 0x5) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) 8.111357434s ago: executing program 4 (id=12932): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), 0x0}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') ioctl$TUNSETIFF(r2, 0xb701, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000", @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x13, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000480)='syzkaller\x00'}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r4}, 0x10) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 7.726811509s ago: executing program 3 (id=12933): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x6, 0x7, 0x9, 0x34908, r0, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x100001, 0x0, 0xb}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r2) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r4) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 7.61309065s ago: executing program 1 (id=12934): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), 0x0}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') ioctl$TUNSETIFF(r2, 0xb701, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000", @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x13, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000480)='syzkaller\x00'}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r4}, 0x10) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 7.207556796s ago: executing program 4 (id=12935): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), 0x0}, 0x20) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') ioctl$TUNSETIFF(r2, 0xb701, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000", @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x13, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000480)='syzkaller\x00'}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r4}, 0x10) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 6.809639052s ago: executing program 3 (id=12936): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='tlb_flush\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x3a, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x498180, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x15) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) close(r3) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) 6.192388311s ago: executing program 4 (id=12937): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), 0x0}, 0x20) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') ioctl$TUNSETIFF(r2, 0xb701, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000", @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x13, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000480)='syzkaller\x00'}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r4}, 0x10) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 5.269809834s ago: executing program 3 (id=12938): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000009b, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r2, 0x0, 0x0, 0x0}, 0x30) syz_clone(0x2a020600, &(0x7f0000000300)="4e159d92ce4e466744ae3704fbcbecdf6d177309d6887a9d4f6083f01ff4b38bc7e0302ffc3a39d616b8f204f4e6067102b40bf64b442dedd91fed311fefd48b50ae9b46d11c86ae78e3f153dacb1199b2571171df725d2ec1048be9f8fdf137cdd907342f06a2943b9338ccc1477223fd60082c2fa879c1b419eb567cfc2d6b1cbef6b22c9ad3910b62a564ca93c66b38d442893508c6daf8a3537fe54b130ec3d9d6ea10aba5b7f5c2d4", 0xab, &(0x7f0000000280), &(0x7f00000003c0), &(0x7f00000004c0)="df2239a5abfe7f736463aa3ae5541525d85b9df771aae02a28043c0e57aead8f2a4b3a139507dd43ac6862d4dca5877e23f4111791863277a703b41bea7d69d3a8a7ca074f8c3f27cffde6d291cb265ddfc009e96d29") ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, 0x0) 5.037168538s ago: executing program 0 (id=12939): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x1}, 0x50) close(r1) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f00000002c0), 0x20000000}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) syz_clone(0x410e6080, 0x0, 0x0, 0x0, 0x0, 0x0) 4.774455821s ago: executing program 3 (id=12940): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xfffffffd, 0x7fe2, 0x2}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x3a, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x498180, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x15) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) close(r3) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.424574596s ago: executing program 4 (id=12941): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x1}, 0x50) close(r1) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f00000002c0), 0x20000000}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) syz_clone(0x410e6080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)="2fd0ff0006094f492faff2f173e1ac871d48eef87bb90a19da77ed4bb5ae2e86f7b0cf112203043f022f05c93af58dc47d13e4ed9d9426f7db4e53422cbc58b6b2e48d2a7570b19a5bdcded6dfa976c4bce46e30294d29a8f2bbfa35a756c52f5861fc73de3cd1c8f287a49685e7518b86f45801c10da574d850fd5c2ad8f247") 4.421173756s ago: executing program 2 (id=12942): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), 0x0}, 0x20) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') ioctl$TUNSETIFF(r2, 0xb701, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000", @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x13, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000480)='syzkaller\x00'}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r4}, 0x10) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 3.913570844s ago: executing program 1 (id=12943): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/14, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000240)="85fd527d4c59b87897cdcfbe128bbbb2b9f7f5c4965ba7547bfb8b464e3eb59ccadaa65eeab4d322195c7033b957234d612a71cf2a7b79aaa9031378dbc0c203166eba3179161ebee6b8356c9e75e0e7317e7ec52a846ec88e049cf4d83f851e3b5111e3fe6f86b508746e0927de31973e287ba13c706cd77bba15ff9763711e918f7ca1aea834f0a1b1da1f29e9585a478eaa02fce09a8db3e9e373aa01f74adf91790ede6073991a621e2849bcca79c9612db329f48efa8045c82d1ba68ef031730d4aa0a95cf32bdb3aa5e5131535e7ab6f107898b689355cb4b9a91d8aba1ccb46b251d61e885e528085d57069083f386edb8549", 0xf6}, {&(0x7f0000001340)="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", 0x1000}, {&(0x7f00000004c0)="1565e9a629abd709fedd9ded7cadd0c4715f8adfa5197b92a28c3d2213e014a9d01ce9c5118969c8783cd70ecac3eba73cf6bd152c470b4332449b9ae1f7ba6250942340f49c90f46deed2f2f9b25e4ce7077ff728a661fd4f181c8967b0eede228d8f6f6c82237184565a952b1c64abb0c835f60a3fa0835f144f4ebbd0a4ac8c7561c960568ed0efb76458acc52b89b41f03b323ecb64f299142fce2f23dd0812d7c15b4f957329a813a96c3b5979d0e78157737a76c6a33a549429b26a2f37542592b0251900d37f72debef3fb2517d0231463c5eb2", 0xd7}, {&(0x7f00000005c0)="c48362fc869b0d29e88ebc60735bdacdfc977aa2e7b4e92a031c44bba1b6fe48c473b878a4b73b3d26e8c5ff2891da260a506d98ea1771094212d69f8b6da8d56ee45042c057d0a929290eae3464259285db157e471f6421efc01bc29eef9a449c7e018d87c532789cb48e533463bfc166c0eaeb6c83c2eaaa1fd1769916f40c289f5c1978a8255a860fcee3eadb98a4765fe91e8fbe25655c84ddb55a4070369ddd8756abc74877b4501a92149c5009cafb6956b12dc3286c5051bc3cd740913a7956276e816c045a36", 0xca}, {&(0x7f0000000140)="d1f70b368d922505c5c5078eaaaf068421f72706f49754e18f1d5332833b951eb8211f0800199c87f13f4536fdd15087a5662d48e0cabcd9462a63db2aa9b798abada172df9863e982e5bd56a994ef08284df6728d68562e6b714bd628ec6c467e4e2b4cdb98", 0x66}], 0x5, 0x0, 0x0, 0x20000050}, 0x8004) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x7, 0x4, 0x9, 0x7, 0x1000, 0x1, 0x10001, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000500) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000d03"], 0x0, 0x4e}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000840)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="1e00004000120000005000002df0acd92e93529179c14230e8269e17d57a82f7df69650ec6c8111e5d20aef880d5d7f2d1cd6fe47bc02e5b08c98b35ca8c9a7964f45f0b427fa1aebf962f2796454c84b41061a29aadd10286941db10bc21cbaf827e43bffb5c0ab13370eb4651e2a00fbcf22fd9b782c4f60eb0b195e520ec1dc55fcc4efe28ba2989037f0f945842c9d0cd5df95c4664ae9617698b6937b0cae46b03053870cd4aa3b4cbc94512c42676ce8f32df2e6302789e65857eb95fd342af4badef2d75c11a3ef2fa2011285e4ec24c0815cd105e289df7418d4a342fdcc425d", @ANYRES64], 0x10) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="2d63707520a2fbfdbd96"], 0x5) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) 1.43857405s ago: executing program 0 (id=12944): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff0000", @ANYRES32, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001380)={0x6, 0x0, 0x0, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x9e, &(0x7f0000000980)=""/158, 0x40f00, 0x5a, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0x1000, 0x1}, 0x8, 0x10, &(0x7f0000000ec0)={0x4, 0x6, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000f00)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000f40)=[{0x3, 0x1, 0x7}], 0x10, 0x10001}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x21, &(0x7f0000000540), 0x4) sendmsg$tipc(r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB], 0x0, 0x4a}, 0x28) perf_event_open(&(0x7f00000006c0)={0x0, 0x80, 0x9, 0x8d, 0x16, 0x4, 0x0, 0x5, 0x94ba0, 0x48cf3dc79f55ac95, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x6}, 0x100000, 0x0, 0x2, 0x8, 0x0, 0x0, 0xc, 0x0, 0xc7a8, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x2) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0e00000004000000040000000200020000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03090000020000000000000000000000000000000000000000000000c6deba5a21a0d179a36aaae8ba02d301eebc5cab25b34842802f94db92d20cfd0be12cee718954a8b55775e1c4af78fbaa0d00000000000000972e8fc86808570e56f601fee668"], 0x50) 1.41777143s ago: executing program 1 (id=12945): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r1) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f00000002c0), 0x20000000}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) syz_clone(0x410e6080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)="2fd0ff0006094f492faff2f173e1ac871d48eef87bb90a19da77ed4bb5ae2e86f7b0cf112203043f022f05c93af58dc47d13e4ed9d9426f7db4e53422cbc58b6b2e48d2a7570b19a5bdcded6dfa976c4bce46e30294d29a8f2bbfa35a756c52f5861fc73de3cd1c8f287a49685e7518b86f45801c10da574d850fd5c2ad8f247") 1.055070425s ago: executing program 0 (id=12946): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x1}, 0x50) close(r1) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x20000000}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) syz_clone(0x410e6080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)="2fd0ff0006094f492faff2f173e1ac871d48eef87bb90a19da77ed4bb5ae2e86f7b0cf112203043f022f05c93af58dc47d13e4ed9d9426f7db4e53422cbc58b6b2e48d2a7570b19a5bdcded6dfa976c4bce46e30294d29a8f2bbfa35a756c52f5861fc73de3cd1c8f287a49685e7518b86f45801c10da574d850fd5c2ad8f247") 1.028166465s ago: executing program 4 (id=12947): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x1}, 0x50) close(r1) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f00000002c0), 0x20000000}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) syz_clone(0x410e6080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)="2fd0ff0006094f492faff2f173e1ac871d48eef87bb90a19da77ed4bb5ae2e86f7b0cf112203043f022f05c93af58dc47d13e4ed9d9426f7db4e53422cbc58b6b2e48d2a7570b19a5bdcded6dfa976c4bce46e30294d29a8f2bbfa35a756c52f5861fc73de3cd1c8f287a49685e7518b86f45801c10da574d850fd5c2ad8f247") 439.755094ms ago: executing program 2 (id=12948): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000009b, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r2, 0x0, 0x0, 0x0}, 0x30) syz_clone(0x2a020600, &(0x7f0000000300)="4e159d92ce4e466744ae3704fbcbecdf6d177309d6887a9d4f6083f01ff4b38bc7e0302ffc3a39d616b8f204f4e6067102b40bf64b442dedd91fed311fefd48b50ae9b46d11c86ae78e3f153dacb1199b2571171df725d2ec1048be9f8fdf137cdd907342f06a2943b9338ccc1477223fd60082c2fa879c1b419eb567cfc2d6b1cbef6b22c9ad3910b62a564ca93c66b38d442893508c6daf8a3537fe54b130ec3d9d6ea10aba5b7f5c2d4", 0xab, &(0x7f0000000280), &(0x7f00000003c0), &(0x7f00000004c0)="df2239a5abfe7f736463aa3ae5541525d85b9df771aae02a28043c0e57aead8f2a4b3a139507dd43ac6862d4dca5877e23f4111791863277a703b41bea7d69d3a8a7ca074f8c3f27cffde6d291cb265ddfc009e96d29") ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000080)) 430.498314ms ago: executing program 1 (id=12949): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='tlb_flush\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xfffffffd, 0x7fe2, 0x2}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x3a, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x498180, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x15) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) close(r3) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) 200.221357ms ago: executing program 3 (id=12950): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff0000", @ANYRES32, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001380)={0x6, 0x0, 0x0, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x9e, &(0x7f0000000980)=""/158, 0x40f00, 0x5a, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0x1000, 0x1}, 0x8, 0x10, &(0x7f0000000ec0)={0x4, 0x6, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000f00)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000f40)=[{0x3, 0x1, 0x7}], 0x10, 0x10001}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x21, &(0x7f0000000540), 0x4) sendmsg$tipc(r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004000000000000000002000000000000000000000000000003000000000300000001000000000000000000e1432cbd4802d2366cf2c03d75a3c01b5ac168e5e9895bda4d508fca73e78ad4060c521aac39f82dab2e8b4f84b4b49b8aab693d1d0c9ac8014e81f5b7f20fae4b4cff715b58688354d506e80c6b39960cc967c2481f7a410eb98a585ec9dc286bbf5e21c603"], 0x0, 0x4a}, 0x28) perf_event_open(&(0x7f00000006c0)={0x0, 0x80, 0x9, 0x8d, 0x16, 0x4, 0x0, 0x5, 0x94ba0, 0x48cf3dc79f55ac95, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x6}, 0x100000, 0x0, 0x2, 0x8, 0x0, 0x0, 0xc, 0x0, 0xc7a8, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x2) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0e00000004000000040000000200020000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03090000020000000000000000000000000000000000000000000000c6deba5a21a0d179a36aaae8ba02d301eebc5cab25b34842802f94db92d20cfd0be12cee718954a8b55775e1c4af78fbaa0d00000000000000972e8fc86808570e56f601fee668"], 0x50) 0s ago: executing program 2 (id=12951): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x6, 0x7, 0x9, 0x34908, r1, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x100001, 0x0, 0xb}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r3) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r5) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.30' (ED25519) to the list of known hosts. [ 26.425866][ T30] audit: type=1400 audit(1752763802.530:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.427484][ T273] cgroup: Unknown subsys name 'net' [ 26.448695][ T30] audit: type=1400 audit(1752763802.530:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.476214][ T30] audit: type=1400 audit(1752763802.560:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.476506][ T273] cgroup: Unknown subsys name 'devices' [ 26.682968][ T273] cgroup: Unknown subsys name 'hugetlb' [ 26.688622][ T273] cgroup: Unknown subsys name 'rlimit' [ 26.949148][ T30] audit: type=1400 audit(1752763803.050:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.972634][ T30] audit: type=1400 audit(1752763803.050:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.997473][ T30] audit: type=1400 audit(1752763803.050:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 27.005325][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 27.029651][ T30] audit: type=1400 audit(1752763803.130:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.055330][ T30] audit: type=1400 audit(1752763803.130:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.095606][ T30] audit: type=1400 audit(1752763803.200:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.121415][ T30] audit: type=1400 audit(1752763803.200:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.121703][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 27.713742][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.720882][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.728330][ T284] device bridge_slave_0 entered promiscuous mode [ 27.735746][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.743197][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.750666][ T284] device bridge_slave_1 entered promiscuous mode [ 27.808614][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.815747][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.823286][ T282] device bridge_slave_0 entered promiscuous mode [ 27.842464][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.849594][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.857581][ T282] device bridge_slave_1 entered promiscuous mode [ 27.870538][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.877615][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.885084][ T283] device bridge_slave_0 entered promiscuous mode [ 27.903281][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.910354][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.917885][ T283] device bridge_slave_1 entered promiscuous mode [ 27.936665][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.943974][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.951516][ T285] device bridge_slave_0 entered promiscuous mode [ 27.970644][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.977742][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.985312][ T285] device bridge_slave_1 entered promiscuous mode [ 27.995815][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.003225][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.010847][ T281] device bridge_slave_0 entered promiscuous mode [ 28.018001][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.025123][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.032573][ T281] device bridge_slave_1 entered promiscuous mode [ 28.240273][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.247451][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.255009][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.262234][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.277590][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.284698][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.292044][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.299349][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.315666][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.322794][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.330391][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.337491][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.349725][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.356991][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.364305][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.371373][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.381715][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.388882][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.396227][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.403291][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.436465][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.444253][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.451743][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.459148][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.466798][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.474324][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.481642][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.489138][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.496580][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.503904][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.512528][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.520184][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.552584][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.561205][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.569356][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.576431][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.584073][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.592646][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.599679][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.607135][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.615383][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.623569][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.631954][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.639070][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.646530][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.655082][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.662144][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.693044][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.705559][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.713715][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.721996][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.730107][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.738631][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.745890][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.753395][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.762083][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.769134][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.776612][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.784908][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.791968][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.799571][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.808087][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.815145][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.822635][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.830057][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.851766][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.859919][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.868239][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.877077][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.885379][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.893818][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.903247][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.911564][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.932550][ T284] device veth0_vlan entered promiscuous mode [ 28.942035][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.950175][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.957894][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.965514][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.974702][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.983138][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.991519][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.999800][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 29.007956][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.016218][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 29.024327][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.032437][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.041017][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.049215][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.056286][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.063882][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.072462][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.080760][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.087880][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.095462][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.103328][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.110984][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.118450][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.126988][ T282] device veth0_vlan entered promiscuous mode [ 29.133404][ T285] device veth0_vlan entered promiscuous mode [ 29.142748][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 29.151149][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.169338][ T285] device veth1_macvtap entered promiscuous mode [ 29.179994][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.188667][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.197073][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.205469][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 29.214063][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.227838][ T284] device veth1_macvtap entered promiscuous mode [ 29.241450][ T282] device veth1_macvtap entered promiscuous mode [ 29.249312][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.257812][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.266423][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.274986][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 29.283368][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.291714][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.317183][ T283] device veth0_vlan entered promiscuous mode [ 29.325337][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.335221][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.343547][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.352425][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.361021][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.369385][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 29.377884][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.386557][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.395181][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.403594][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 29.412116][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.420189][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.428617][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.436976][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.445508][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.454022][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.461647][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.488380][ T282] request_module fs-gadgetfs succeeded, but still no fs? [ 29.496126][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.506126][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.514718][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.522373][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.532094][ T283] device veth1_macvtap entered promiscuous mode [ 29.539946][ T281] device veth0_vlan entered promiscuous mode [ 29.582490][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.602479][ T281] device veth1_macvtap entered promiscuous mode [ 29.616309][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.630323][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.646674][ C0] hrtimer: interrupt took 36702 ns [ 29.654071][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.663478][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.685975][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.700891][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.709409][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.718727][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.363418][ T388] device veth1_macvtap left promiscuous mode [ 31.492157][ T385] device veth1_macvtap entered promiscuous mode [ 31.523369][ T385] device macsec0 entered promiscuous mode [ 31.574465][ T30] kauditd_printk_skb: 44 callbacks suppressed [ 31.574482][ T30] audit: type=1400 audit(1752763807.680:118): avc: denied { create } for pid=391 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 31.776779][ T401] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 31.844640][ T30] audit: type=1400 audit(1752763807.950:119): avc: denied { create } for pid=400 comm="syz.1.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 31.972393][ T30] audit: type=1400 audit(1752763808.080:120): avc: denied { create } for pid=404 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 32.388324][ T410] Â: renamed from pim6reg1 [ 32.454659][ T30] audit: type=1400 audit(1752763808.560:121): avc: denied { create } for pid=412 comm="syz.1.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 32.600560][ T30] audit: type=1400 audit(1752763808.560:122): avc: denied { read } for pid=412 comm="syz.1.21" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 32.720805][ T30] audit: type=1400 audit(1752763808.700:123): avc: denied { create } for pid=412 comm="syz.1.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 32.881045][ T425] device wg2 entered promiscuous mode [ 33.041063][ T30] audit: type=1400 audit(1752763809.150:124): avc: denied { create } for pid=423 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 33.330279][ T433] device veth1_macvtap left promiscuous mode [ 33.397819][ T435] device veth1_macvtap entered promiscuous mode [ 33.430878][ T435] device macsec0 entered promiscuous mode [ 33.800553][ T30] audit: type=1400 audit(1752763809.900:125): avc: denied { relabelfrom } for pid=445 comm="syz.3.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 33.844520][ T30] audit: type=1400 audit(1752763809.920:126): avc: denied { relabelto } for pid=445 comm="syz.3.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 34.317153][ T458] Â: renamed from pim6reg1 [ 34.452196][ T464] Â: renamed from pim6reg1 [ 35.755987][ T30] audit: type=1400 audit(1752763811.860:127): avc: denied { create } for pid=495 comm="syz.3.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 36.861819][ T525] Â: renamed from pim6reg1 [ 38.131636][ T554] device veth0_vlan left promiscuous mode [ 38.254836][ T30] audit: type=1400 audit(1752763814.360:128): avc: denied { create } for pid=539 comm="syz.2.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 38.285219][ T554] device veth0_vlan entered promiscuous mode [ 40.522593][ T593] device veth1_macvtap left promiscuous mode [ 40.589282][ T596] device veth1_macvtap entered promiscuous mode [ 40.601767][ T596] device macsec0 entered promiscuous mode [ 42.269886][ T629] Â: renamed from pim6reg1 [ 43.347567][ T654] device veth1_macvtap left promiscuous mode [ 43.408732][ T654] device veth1_macvtap entered promiscuous mode [ 43.424316][ T654] device macsec0 entered promiscuous mode [ 43.849123][ T670] Â: renamed from pim6reg1 [ 49.258453][ T792] device veth0_vlan left promiscuous mode [ 49.265283][ T792] device veth0_vlan entered promiscuous mode [ 52.095048][ T30] audit: type=1400 audit(1752763828.200:129): avc: denied { create } for pid=840 comm="syz.4.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 54.356557][ T886] device veth0_vlan left promiscuous mode [ 54.374678][ T886] device veth0_vlan entered promiscuous mode [ 54.385252][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 54.396359][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 54.411992][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 55.305043][ T904] device veth0_vlan left promiscuous mode [ 55.338759][ T904] device veth0_vlan entered promiscuous mode [ 55.900641][ T919] Â: renamed from pim6reg1 [ 58.802951][ T970] device veth1_macvtap left promiscuous mode [ 58.821739][ T970] device macsec0 left promiscuous mode [ 58.961419][ T973] device veth1_macvtap entered promiscuous mode [ 58.991612][ T973] device macsec0 entered promiscuous mode [ 59.060652][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 59.946916][ T988] device syzkaller0 entered promiscuous mode [ 62.675557][ T1033] device syzkaller0 entered promiscuous mode [ 63.559967][ T1056] device veth0_vlan left promiscuous mode [ 63.668342][ T1056] device veth0_vlan entered promiscuous mode [ 64.778766][ T1075] device syzkaller0 entered promiscuous mode [ 65.042848][ T1085] device veth0_vlan left promiscuous mode [ 65.062200][ T1085] device veth0_vlan entered promiscuous mode [ 65.356365][ T1096] device veth1_macvtap left promiscuous mode [ 65.362836][ T1096] device macsec0 left promiscuous mode [ 65.538029][ T1096] device veth1_macvtap entered promiscuous mode [ 65.545881][ T1096] device macsec0 entered promiscuous mode [ 67.666600][ T1131] device syzkaller0 entered promiscuous mode [ 67.701471][ T1135] device veth0_vlan left promiscuous mode [ 67.730487][ T1135] device veth0_vlan entered promiscuous mode [ 68.007246][ T1142] device veth0_vlan left promiscuous mode [ 68.038301][ T1142] device veth0_vlan entered promiscuous mode [ 68.666495][ T1154] Â: renamed from pim6reg1 [ 69.364499][ T1174] Â: renamed from pim6reg1 [ 69.552830][ T1176] device syzkaller0 entered promiscuous mode [ 71.400463][ C0] sched: RT throttling activated [ 73.691718][ T1214] Â: renamed from pim6reg1 [ 74.402600][ T1226] device syzkaller0 entered promiscuous mode [ 74.650254][ T30] audit: type=1400 audit(1752763850.750:130): avc: denied { ioctl } for pid=1234 comm="syz.1.264" path="socket:[18973]" dev="sockfs" ino=18973 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 79.915757][ T30] audit: type=1400 audit(1752763856.020:131): avc: denied { create } for pid=1338 comm="syz.2.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 80.171151][ T1342] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.179206][ T1342] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.413034][ T1346] device syz_tun entered promiscuous mode [ 80.455014][ T1343] device bridge_slave_1 left promiscuous mode [ 80.473167][ T1343] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.640965][ T1343] device bridge_slave_0 left promiscuous mode [ 80.647233][ T1343] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.142547][ T1363] Â: renamed from pim6reg1 [ 81.246260][ T1370] Â: renamed from pim6reg1 [ 82.620135][ T1399] device sit0 entered promiscuous mode [ 82.973620][ T1299] syz.3.284 (1299) used greatest stack depth: 22688 bytes left [ 83.261875][ T1416] Â: renamed from pim6reg1 [ 83.321038][ T1414] Â: renamed from pim6reg1 [ 94.699008][ T1635] Â: renamed from pim6reg1 [ 95.325418][ T1646] Â: renamed from pim6reg1 [ 97.211416][ T1683] Â: renamed from pim6reg1 [ 97.810390][ T1698] Â: renamed from pim6reg1 [ 97.981464][ T1700] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.989483][ T1700] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.160027][ T30] audit: type=1400 audit(1752763874.260:132): avc: denied { create } for pid=1699 comm="syz.4.399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 98.460704][ T1700] device bridge_slave_1 left promiscuous mode [ 98.468040][ T1700] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.614176][ T1700] device bridge_slave_0 left promiscuous mode [ 98.682952][ T1700] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.760167][ T1728] Â: renamed from pim6reg1 [ 104.110318][ T1823] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.118695][ T1823] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.258326][ T30] audit: type=1400 audit(1752763880.360:133): avc: denied { create } for pid=1822 comm="syz.1.436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 111.006687][ T30] audit: type=1400 audit(1752763887.100:134): avc: denied { create } for pid=1939 comm="syz.2.471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 111.051359][ T1941] device veth1_macvtap left promiscuous mode [ 111.058074][ T1941] device macsec0 left promiscuous mode [ 111.903237][ T1964] device bridge_slave_1 left promiscuous mode [ 111.927724][ T1964] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.982599][ T1964] device bridge_slave_0 left promiscuous mode [ 112.064981][ T1964] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.653577][ T2116] Â: renamed from pim6reg1 [ 122.797150][ T2166] Â: renamed from pim6reg1 [ 124.952910][ T2210] Â: renamed from pim6reg1 [ 128.600129][ T2299] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.608444][ T2299] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.199597][ T2299] device bridge_slave_1 left promiscuous mode [ 129.351669][ T2299] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.449702][ T2299] device bridge_slave_0 left promiscuous mode [ 129.509168][ T2299] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.378330][ T2331] device syzkaller0 entered promiscuous mode [ 134.157022][ T2419] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.165463][ T2419] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.266489][ T30] audit: type=1400 audit(1752763910.370:135): avc: denied { create } for pid=2429 comm="syz.3.609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 134.684288][ T2433] device syzkaller0 entered promiscuous mode [ 135.618712][ T2461] Â: renamed from pim6reg1 [ 136.921844][ T2490] syz.4.626 (2490) used greatest stack depth: 22432 bytes left [ 137.198549][ T30] audit: type=1400 audit(1752763913.300:136): avc: denied { create } for pid=2498 comm="syz.4.630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 137.234282][ T2499] device sit0 left promiscuous mode [ 137.505763][ T2506] device sit0 entered promiscuous mode [ 140.171349][ T2572] device veth0_vlan left promiscuous mode [ 140.270693][ T2572] device veth0_vlan entered promiscuous mode [ 140.973278][ T2590] device syzkaller0 entered promiscuous mode [ 143.880554][ T2659] device syzkaller0 entered promiscuous mode [ 143.945120][ T2665] device wg2 left promiscuous mode [ 144.052459][ T2666] device wg2 entered promiscuous mode [ 145.737069][ T2698] device sit0 entered promiscuous mode [ 147.153227][ T2721] device syzkaller0 entered promiscuous mode [ 150.694843][ T2796] device sit0 entered promiscuous mode [ 152.951337][ T2843] Â: renamed from pim6reg1 [ 154.064720][ T30] audit: type=1400 audit(1752763930.170:137): avc: denied { tracepoint } for pid=2862 comm="syz.1.733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 155.711810][ T2896] device syzkaller0 entered promiscuous mode [ 158.149510][ T2944] Â: renamed from pim6reg1 [ 160.786129][ T3004] GPL: port 1(erspan0) entered blocking state [ 160.840558][ T3004] GPL: port 1(erspan0) entered disabled state [ 160.849540][ T3004] device erspan0 entered promiscuous mode [ 160.870100][ T3005] device syzkaller0 entered promiscuous mode [ 160.880451][ T3006] GPL: port 1(erspan0) entered blocking state [ 160.887633][ T3006] GPL: port 1(erspan0) entered forwarding state [ 162.692478][ T3055] device syzkaller0 entered promiscuous mode [ 162.742289][ T3056] device wg2 entered promiscuous mode [ 165.237054][ T30] audit: type=1400 audit(1752763941.330:138): avc: denied { create } for pid=3101 comm="syz.4.806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 165.251257][ T3100] device wg2 entered promiscuous mode [ 166.788740][ T3134] device sit0 entered promiscuous mode [ 167.222459][ T3138] device syzkaller0 entered promiscuous mode [ 168.448916][ T3187] Â: renamed from pim6reg1 [ 168.480719][ T3188] device syzkaller0 entered promiscuous mode [ 168.555354][ T3193] device wg2 entered promiscuous mode [ 169.503957][ T3211] device syzkaller0 entered promiscuous mode [ 170.628639][ T3242] device syzkaller0 entered promiscuous mode [ 171.765375][ T3272] GPL: port 1(erspan0) entered blocking state [ 171.845154][ T3272] GPL: port 1(erspan0) entered disabled state [ 171.959695][ T3272] device erspan0 entered promiscuous mode [ 172.608237][ T3269] GPL: port 1(erspan0) entered blocking state [ 172.614887][ T3269] GPL: port 1(erspan0) entered forwarding state [ 173.988835][ T3303] device syzkaller0 entered promiscuous mode [ 177.416433][ T3376] device syzkaller0 entered promiscuous mode [ 179.038932][ T3399] Â: renamed from pim6reg1 [ 180.108496][ T3420] device sit0 entered promiscuous mode [ 180.914582][ T3418] device syzkaller0 entered promiscuous mode [ 181.200787][ T3433] device sit0 left promiscuous mode [ 182.439629][ T3449] Â: renamed from pim6reg1 [ 183.894303][ T3477] device syzkaller0 entered promiscuous mode [ 184.008725][ T3481] device sit0 left promiscuous mode [ 184.057282][ T3482] device sit0 entered promiscuous mode [ 184.581733][ T3488] Â: renamed from pim6reg1 [ 184.845996][ T3499] device veth0_vlan left promiscuous mode [ 184.921183][ T3499] device veth0_vlan entered promiscuous mode [ 184.928640][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.973486][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.010724][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 185.411245][ T3501] ÿÿÿÿÿÿ: renamed from vlan1 [ 186.644181][ T3524] Â: renamed from pim6reg1 [ 187.011149][ T3530] device syzkaller0 entered promiscuous mode [ 187.161121][ T3533] Â: renamed from pim6reg1 [ 192.535697][ T3589] device syzkaller0 entered promiscuous mode [ 195.200651][ T3653] device pim6reg1 entered promiscuous mode [ 197.679386][ T3707] device sit0 left promiscuous mode [ 199.774359][ T3707] syz.3.990 (3707) used greatest stack depth: 21488 bytes left [ 200.812892][ T3739] device veth0_vlan left promiscuous mode [ 200.828254][ T3739] device veth0_vlan entered promiscuous mode [ 200.989243][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 201.041381][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 201.121754][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 201.535095][ T3758] device veth0_vlan left promiscuous mode [ 201.658275][ T3758] device veth0_vlan entered promiscuous mode [ 201.910603][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 201.942608][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 201.992273][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 202.006902][ T3760] device sit0 left promiscuous mode [ 208.769009][ T3878] device syzkaller0 entered promiscuous mode [ 209.534877][ T3890] device syzkaller0 entered promiscuous mode [ 211.762203][ T3921] syz.1.1052[3921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.762315][ T3921] syz.1.1052[3921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.669808][ T3930] device syzkaller0 entered promiscuous mode [ 215.124102][ T3986] device syzkaller0 entered promiscuous mode [ 215.248402][ T3996] Â: renamed from pim6reg1 [ 217.310384][ T4025] Â: renamed from pim6reg1 [ 218.308677][ T4049] syz.4.1092[4049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.308808][ T4049] syz.4.1092[4049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.805921][ T4078] device pim6reg1 entered promiscuous mode [ 219.844915][ T4087] device sit0 left promiscuous mode [ 223.490068][ T4105] device syzkaller0 entered promiscuous mode [ 223.587708][ T4111] Â: renamed from pim6reg1 [ 223.689727][ T4112] device veth0_vlan left promiscuous mode [ 223.705496][ T4112] device veth0_vlan entered promiscuous mode [ 228.426393][ T4165] device syzkaller0 entered promiscuous mode [ 230.198847][ T4207] device veth0_vlan left promiscuous mode [ 230.246036][ T4207] device veth0_vlan entered promiscuous mode [ 230.307871][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 230.324710][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 230.339401][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 231.048516][ T30] audit: type=1400 audit(1752764007.150:139): avc: denied { ioctl } for pid=4233 comm="syz.1.1143" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 231.634106][ T4241] device syzkaller0 entered promiscuous mode [ 232.089865][ T4251] syz.3.1145[4251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.089948][ T4251] syz.3.1145[4251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.307674][ T4302] device veth0_vlan left promiscuous mode [ 235.554698][ T4302] device veth0_vlan entered promiscuous mode [ 235.614842][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.650919][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.764312][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 236.923395][ T4333] device veth0_vlan left promiscuous mode [ 237.028827][ T4333] device veth0_vlan entered promiscuous mode [ 238.160838][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.177952][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 238.185757][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.473366][ T4352] device veth0_vlan left promiscuous mode [ 238.480080][ T4352] device veth0_vlan entered promiscuous mode [ 240.150241][ T4386] device sit0 entered promiscuous mode [ 240.168600][ T30] audit: type=1400 audit(1752764016.270:140): avc: denied { write } for pid=4374 comm="syz.1.1186" name="cgroup.subtree_control" dev="cgroup2" ino=307 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 240.343041][ T30] audit: type=1400 audit(1752764016.370:141): avc: denied { open } for pid=4374 comm="syz.1.1186" path="" dev="cgroup2" ino=307 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 240.530848][ T30] audit: type=1400 audit(1752764016.380:142): avc: denied { ioctl } for pid=4374 comm="syz.1.1186" path="" dev="cgroup2" ino=307 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 242.093585][ T4434] device syzkaller0 entered promiscuous mode [ 246.460099][ T4534] device syzkaller0 entered promiscuous mode [ 247.844897][ T4573] Â: renamed from pim6reg1 [ 248.889509][ T4593] device syzkaller0 entered promiscuous mode [ 249.609158][ T4605] device syzkaller0 entered promiscuous mode [ 250.901077][ T4636] device veth0_vlan left promiscuous mode [ 251.030875][ T4636] device veth0_vlan entered promiscuous mode [ 251.332868][ T4645] device sit0 entered promiscuous mode [ 252.619287][ T4674] Â: renamed from pim6reg1 [ 253.129256][ T4690] device veth0_vlan left promiscuous mode [ 253.219685][ T4690] device veth0_vlan entered promiscuous mode [ 253.430742][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 253.458697][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 253.531629][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 253.644138][ T4699] device sit0 left promiscuous mode [ 253.902958][ T4701] device sit0 entered promiscuous mode [ 256.131468][ T4756] device veth0_vlan left promiscuous mode [ 256.147630][ T4756] device veth0_vlan entered promiscuous mode [ 256.211467][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 256.221886][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 256.253327][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 258.062188][ T4789] device sit0 left promiscuous mode [ 261.045342][ T4844] syz.1.1333[4844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.045440][ T4844] syz.1.1333[4844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.905200][ T4854] device sit0 entered promiscuous mode [ 262.367547][ T4859] device sit0 left promiscuous mode [ 262.540302][ T4859] device sit0 entered promiscuous mode [ 263.210678][ T4868] device sit0 left promiscuous mode [ 263.763332][ T4870] device sit0 entered promiscuous mode [ 264.211084][ T4882] Â: renamed from pim6reg1 [ 264.490195][ T4895] device sit0 left promiscuous mode [ 265.571812][ T4915] device syzkaller0 entered promiscuous mode [ 267.091185][ T4942] syz.0.1351[4942] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.091283][ T4942] syz.0.1351[4942] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.116452][ T4944] device wg2 left promiscuous mode [ 267.536163][ T4956] device syzkaller0 entered promiscuous mode [ 267.750570][ T4960] Â: renamed from pim6reg1 [ 269.330849][ T4982] device sit0 left promiscuous mode [ 270.202642][ T5003] Â: renamed from pim6reg1 [ 272.069903][ T5040] device sit0 entered promiscuous mode [ 272.637543][ T5055] Â: renamed from pim6reg1 [ 272.705751][ T5042] syz.2.1383[5042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.730796][ T5042] syz.2.1383[5042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.815818][ T5058] device syzkaller0 entered promiscuous mode [ 273.141796][ T5067] device sit0 left promiscuous mode [ 273.175181][ T5071] device sit0 entered promiscuous mode [ 273.323900][ T5069] device sit0 entered promiscuous mode [ 273.893976][ T5085] device syzkaller0 entered promiscuous mode [ 274.306956][ T5101] device veth1_macvtap left promiscuous mode [ 274.333972][ T5101] device macsec0 left promiscuous mode [ 274.483927][ T5107] device veth1_macvtap entered promiscuous mode [ 274.490891][ T5107] device macsec0 entered promiscuous mode [ 274.539850][ T5106] device wg2 left promiscuous mode [ 274.871157][ T5120] syz.4.1403[5120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.871241][ T5120] syz.4.1403[5120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.506685][ T5130] device syzkaller0 entered promiscuous mode [ 277.981210][ T5189] device sit0 entered promiscuous mode [ 278.754779][ T5203] Â: renamed from pim6reg1 [ 279.239353][ T5210] device syzkaller0 entered promiscuous mode [ 279.543202][ T5216] device veth1_macvtap left promiscuous mode [ 279.697258][ T5218] Â: renamed from pim6reg1 [ 279.752181][ T5216] device veth1_macvtap entered promiscuous mode [ 279.760159][ T5216] device macsec0 entered promiscuous mode [ 280.415054][ T5231] device sit0 left promiscuous mode [ 280.725638][ T5231] device sit0 entered promiscuous mode [ 281.254556][ T5239] device syzkaller0 entered promiscuous mode [ 282.610566][ T5271] device sit0 left promiscuous mode [ 283.180884][ T5284] device syzkaller0 entered promiscuous mode [ 283.223758][ T5277] Â: renamed from pim6reg1 [ 283.506773][ T5290] device sit0 entered promiscuous mode [ 284.540184][ T5313] device sit0 left promiscuous mode [ 284.733645][ T5313] device sit0 entered promiscuous mode [ 285.716124][ T5324] Â: renamed from pim6reg1 [ 285.806186][ T5331] device syzkaller0 entered promiscuous mode [ 285.813164][ T5334] device sit0 left promiscuous mode [ 286.002728][ T5333] device sit0 entered promiscuous mode [ 287.387352][ T5367] device veth1_macvtap left promiscuous mode [ 287.410326][ T5367] device macsec0 left promiscuous mode [ 287.569259][ T5367] device veth1_macvtap entered promiscuous mode [ 287.593266][ T5367] device macsec0 entered promiscuous mode [ 287.765518][ T5371] device veth0_vlan left promiscuous mode [ 287.794351][ T5371] device veth0_vlan entered promiscuous mode [ 287.998638][ T5377] device syzkaller0 entered promiscuous mode [ 288.301794][ T5387] Â: renamed from pim6reg1 [ 290.309501][ T5423] device sit0 left promiscuous mode [ 290.676756][ T5440] device sit0 entered promiscuous mode [ 291.142999][ T5446] device veth0_vlan left promiscuous mode [ 291.238461][ T5446] device veth0_vlan entered promiscuous mode [ 292.303089][ T5471] device sit0 left promiscuous mode [ 295.603634][ T5537] device pim6reg1 entered promiscuous mode [ 295.905141][ T5537] device pim6reg1 left promiscuous mode [ 298.178811][ T5599] device veth0_vlan left promiscuous mode [ 298.271665][ T5599] device veth0_vlan entered promiscuous mode [ 301.584345][ T5684] device sit0 left promiscuous mode [ 301.931935][ T5701] device syzkaller0 entered promiscuous mode [ 303.836479][ T5758] Â: renamed from pim6reg1 [ 304.947553][ T5774] @ÿ: renamed from bond_slave_0 [ 308.750286][ T5862] Â: renamed from pim6reg1 [ 312.768683][ T5940] device wg2 left promiscuous mode [ 312.969307][ T5936] device wg2 entered promiscuous mode [ 313.756352][ T5963] device veth1_macvtap left promiscuous mode [ 313.815734][ T5963] device macsec0 left promiscuous mode [ 314.057524][ T5963] device veth1_macvtap entered promiscuous mode [ 314.074293][ T5963] device macsec0 entered promiscuous mode [ 314.114674][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 314.667641][ T5972] device syzkaller0 entered promiscuous mode [ 316.015019][ T6003] device sit0 left promiscuous mode [ 317.201723][ T6031] device veth1_macvtap left promiscuous mode [ 317.363162][ T30] audit: type=1400 audit(1752764093.470:143): avc: denied { create } for pid=6030 comm="syz.3.1673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 318.144545][ T6036] device syzkaller0 entered promiscuous mode [ 318.603537][ T6053] device veth1_macvtap left promiscuous mode [ 318.689147][ T6053] device macsec0 left promiscuous mode [ 318.766242][ T6049] device veth1_macvtap entered promiscuous mode [ 318.794707][ T6049] device macsec0 entered promiscuous mode [ 321.012095][ T6103] Â: renamed from pim6reg1 [ 322.921852][ T6131] device wg2 entered promiscuous mode [ 323.348482][ T30] audit: type=1400 audit(1752764099.450:144): avc: denied { create } for pid=6138 comm="syz.4.1700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 324.324611][ T6168] Â: renamed from pim6reg1 [ 324.927616][ T6183] device veth1_macvtap left promiscuous mode [ 327.191927][ T6214] device sit0 entered promiscuous mode [ 327.515479][ T6226] Â: renamed from pim6reg1 [ 328.105138][ T6235] device macsec0 entered promiscuous mode [ 328.942878][ T6244] device sit0 entered promiscuous mode [ 329.606526][ T6256] device wg2 left promiscuous mode [ 329.670048][ T6254] bond_slave_1: mtu greater than device maximum [ 329.887601][ T6256] device wg2 entered promiscuous mode [ 330.252803][ T6270] Â: renamed from pim6reg1 [ 333.027563][ T6308] device sit0 entered promiscuous mode [ 333.272956][ T6319] device wg2 entered promiscuous mode [ 333.410970][ T6324] Â: renamed from pim6reg1 [ 335.887834][ T6373] device wg2 entered promiscuous mode [ 336.590447][ T6386] device sit0 left promiscuous mode [ 336.667171][ T6388] device sit0 entered promiscuous mode [ 340.891808][ T6429] device syzkaller0 entered promiscuous mode [ 340.941955][ T6435] device sit0 entered promiscuous mode [ 342.479040][ T6461] bond_slave_1: mtu greater than device maximum [ 342.630832][ T6467] device sit0 left promiscuous mode [ 342.766980][ T6467] device sit0 entered promiscuous mode [ 343.286181][ T6487] device sit0 left promiscuous mode [ 343.448189][ T6487] device sit0 entered promiscuous mode [ 350.229866][ T6573] device veth0_vlan left promiscuous mode [ 350.289470][ T6573] device veth0_vlan entered promiscuous mode [ 350.385994][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 350.425875][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 350.481143][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 353.383049][ T6615] GPL: port 1(erspan0) entered blocking state [ 353.460872][ T6615] GPL: port 1(erspan0) entered disabled state [ 353.531480][ T6615] device erspan0 entered promiscuous mode [ 353.607979][ T6616] GPL: port 1(erspan0) entered blocking state [ 353.614309][ T6616] GPL: port 1(erspan0) entered forwarding state [ 354.671587][ T6624] Â: renamed from pim6reg1 [ 357.643449][ T6645] device syzkaller0 entered promiscuous mode [ 358.322708][ T6651] device syzkaller0 entered promiscuous mode [ 360.930951][ T6698] device sit0 left promiscuous mode [ 361.065886][ T6699] device sit0 entered promiscuous mode [ 362.309401][ T6724] Â: renamed from pim6reg1 [ 366.639821][ T6771] Â: renamed from pim6reg1 [ 368.589093][ T6809] device veth0_vlan left promiscuous mode [ 368.613743][ T6809] device veth0_vlan entered promiscuous mode [ 368.800429][ T6813] Â: renamed from pim6reg1 [ 368.833114][ T6817] device syzkaller0 entered promiscuous mode [ 371.178265][ T6851] device sit0 left promiscuous mode [ 371.830461][ T6862] Â: renamed from pim6reg1 [ 373.508925][ T6892] Â: renamed from pim6reg1 [ 373.869699][ T6898] device sit0 left promiscuous mode [ 375.924685][ T6931] Â: renamed from pim6reg1 [ 376.452845][ T6944] device sit0 left promiscuous mode [ 377.554356][ T6964] device syzkaller0 entered promiscuous mode [ 377.731702][ T6969] device veth0_vlan left promiscuous mode [ 377.739812][ T6969] device veth0_vlan entered promiscuous mode [ 377.879611][ T30] audit: type=1400 audit(1752764153.980:145): avc: denied { create } for pid=6960 comm="syz.4.1935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 378.115376][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 378.144413][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 378.215171][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 378.381153][ T6978] Â: renamed from pim6reg1 [ 379.305216][ T7006] GPL: port 1(erspan0) entered blocking state [ 379.378011][ T7006] GPL: port 1(erspan0) entered disabled state [ 379.398882][ T7006] device erspan0 entered promiscuous mode [ 379.411640][ T7008] GPL: port 1(erspan0) entered blocking state [ 379.417811][ T7008] GPL: port 1(erspan0) entered forwarding state [ 380.341504][ T7027] Â: renamed from pim6reg1 [ 380.893554][ T7031] device syzkaller0 entered promiscuous mode [ 380.980826][ T7039] device veth0_vlan left promiscuous mode [ 380.991013][ T7039] device veth0_vlan entered promiscuous mode [ 381.140813][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 381.161251][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 381.225397][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 384.416243][ T7107] device syzkaller0 entered promiscuous mode [ 384.521510][ T7109] device veth0_vlan left promiscuous mode [ 384.543809][ T7109] device veth0_vlan entered promiscuous mode [ 386.250823][ T7146] Â: renamed from pim6reg1 [ 386.577796][ T7156] device syzkaller0 entered promiscuous mode [ 386.675134][ T7158] device sit0 left promiscuous mode [ 388.562138][ T7197] device wg2 left promiscuous mode [ 388.641088][ T7198] device wg2 entered promiscuous mode [ 389.355416][ T7215] device syzkaller0 entered promiscuous mode [ 390.629314][ T7238] device sit0 entered promiscuous mode [ 390.719017][ T7239] device sit0 left promiscuous mode [ 390.830021][ T7245] device sit0 entered promiscuous mode [ 391.191555][ T7260] device veth0_vlan left promiscuous mode [ 391.208524][ T7260] device veth0_vlan entered promiscuous mode [ 391.235047][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 391.251451][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 391.375362][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 392.026262][ T7280] device sit0 entered promiscuous mode [ 395.699002][ T7317] device wg2 left promiscuous mode [ 395.854163][ T7317] device wg2 entered promiscuous mode [ 395.975742][ T7321] device sit0 left promiscuous mode [ 396.288730][ T7335] device veth0_vlan left promiscuous mode [ 396.317556][ T7335] device veth0_vlan entered promiscuous mode [ 396.349988][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 396.361451][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 396.372115][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 400.613308][ T7365] device wg2 left promiscuous mode [ 400.716068][ T7365] device wg2 entered promiscuous mode [ 402.969506][ T7414] device syzkaller0 entered promiscuous mode [ 405.632604][ T7454] device veth0_vlan left promiscuous mode [ 405.642173][ T7454] device veth0_vlan entered promiscuous mode [ 405.671735][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 405.683676][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 405.722560][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 406.115624][ T7462] device syzkaller0 entered promiscuous mode [ 408.951512][ T7522] device syzkaller0 entered promiscuous mode [ 409.104171][ T7526] device sit0 left promiscuous mode [ 411.568580][ T7571] device syzkaller0 entered promiscuous mode [ 411.854176][ T7575] device veth0_vlan left promiscuous mode [ 411.864103][ T7575] device veth0_vlan entered promiscuous mode [ 414.264077][ T7606] device pim6reg1 entered promiscuous mode [ 414.891219][ T7608] device syzkaller0 entered promiscuous mode [ 423.493416][ T7768] device syzkaller0 entered promiscuous mode [ 426.640575][ T7805] GPL: port 1(erspan0) entered blocking state [ 426.736892][ T7805] GPL: port 1(erspan0) entered disabled state [ 426.820952][ T7805] device erspan0 entered promiscuous mode [ 426.853871][ T7815] GPL: port 1(erspan0) entered blocking state [ 426.860198][ T7815] GPL: port 1(erspan0) entered forwarding state [ 428.440810][ T7838] device veth0_vlan left promiscuous mode [ 428.448138][ T7838] device veth0_vlan entered promiscuous mode [ 428.494749][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 428.518205][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 428.566364][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 428.645521][ T7845] device pim6reg1 entered promiscuous mode [ 431.144672][ T7888] device syzkaller0 entered promiscuous mode [ 433.445832][ T7926] device sit0 entered promiscuous mode [ 436.287320][ T7981] device syzkaller0 entered promiscuous mode [ 438.334548][ T8003] device sit0 left promiscuous mode [ 440.840041][ T8064] device sit0 entered promiscuous mode [ 444.649796][ T8110] device sit0 entered promiscuous mode [ 449.599906][ T8219] device sit0 entered promiscuous mode [ 451.230680][ T8245] syz.4.2326[8245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 451.230758][ T8245] syz.4.2326[8245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 451.626537][ T8262] device syzkaller0 entered promiscuous mode [ 453.391425][ T8309] device syzkaller0 entered promiscuous mode [ 457.606609][ T8385] device syzkaller0 entered promiscuous mode [ 461.944502][ T8476] device syzkaller0 entered promiscuous mode [ 473.821940][ T8724] device sit0 left promiscuous mode [ 475.062312][ T8749] device syzkaller0 entered promiscuous mode [ 476.692878][ T8787] device syzkaller0 entered promiscuous mode [ 477.132353][ T8804] device sit0 left promiscuous mode [ 478.973028][ T8849] device syzkaller0 entered promiscuous mode [ 480.629117][ T8884] device syzkaller0 entered promiscuous mode [ 481.595918][ T8902] device syzkaller0 entered promiscuous mode [ 482.692503][ T8927] device syzkaller0 entered promiscuous mode [ 484.572337][ T8974] device syzkaller0 entered promiscuous mode [ 484.596916][ T8977] GPL: port 2(veth1_macvtap) entered blocking state [ 484.613886][ T8977] GPL: port 2(veth1_macvtap) entered disabled state [ 486.417992][ T9029] device syzkaller0 entered promiscuous mode [ 488.255324][ T9071] device syzkaller0 entered promiscuous mode [ 492.357290][ T9166] device syzkaller0 entered promiscuous mode [ 492.545161][ T9177] syz.2.2635[9177] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 492.545267][ T9177] syz.2.2635[9177] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 497.474376][ T9270] device syzkaller0 entered promiscuous mode [ 499.553394][ T9322] device syzkaller0 entered promiscuous mode [ 501.370087][ T9372] device syzkaller0 entered promiscuous mode [ 501.903664][ T9379] device syzkaller0 entered promiscuous mode [ 502.042348][ T9383] device syzkaller0 entered promiscuous mode [ 504.446202][ T9441] device sit0 left promiscuous mode [ 505.007280][ T9452] device syzkaller0 entered promiscuous mode [ 506.107230][ T9484] device sit0 left promiscuous mode [ 510.289927][ T9591] device syzkaller0 entered promiscuous mode [ 512.365574][ T9638] device syzkaller0 entered promiscuous mode [ 513.959753][ T9673] device syzkaller0 entered promiscuous mode [ 516.204703][ T9724] device syzkaller0 entered promiscuous mode [ 518.727362][ T9793] device syzkaller0 entered promiscuous mode [ 523.394909][ T9893] device pim6reg1 entered promiscuous mode [ 527.349419][ T9976] device syzkaller0 entered promiscuous mode [ 527.540024][ T9983] device syzkaller0 entered promiscuous mode [ 529.750420][T10028] device syzkaller0 entered promiscuous mode [ 530.227195][T10040] device wg2 left promiscuous mode [ 530.234309][T10040] syz.0.2922[10040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 530.234420][T10040] syz.0.2922[10040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 530.250076][T10040] device wg2 entered promiscuous mode [ 535.828836][T10191] device syzkaller0 entered promiscuous mode [ 536.272890][T10212] syz.3.2985[10212] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 536.272993][T10212] syz.3.2985[10212] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 536.609651][T10219] device wg2 left promiscuous mode [ 536.756911][T10221] device wg2 entered promiscuous mode [ 537.446961][T10239] device syzkaller0 entered promiscuous mode [ 540.568348][T10334] device pim6reg1 entered promiscuous mode [ 542.458153][T10382] device syzkaller0 entered promiscuous mode [ 544.123741][T10434] device pim6reg1 entered promiscuous mode [ 545.067023][T10448] device syzkaller0 entered promiscuous mode [ 546.432833][T10491] device syzkaller0 entered promiscuous mode [ 546.841004][T10499] ªªªªªª: renamed from vlan0 [ 548.625329][T10542] device syzkaller0 entered promiscuous mode [ 548.888213][T10547] GPL: port 2(vlan1) entered blocking state [ 548.912241][T10547] GPL: port 2(vlan1) entered disabled state [ 548.930208][T10547] device vlan1 entered promiscuous mode [ 549.122026][T10551] device pim6reg1 entered promiscuous mode [ 551.870104][T10611] device syzkaller0 entered promiscuous mode [ 556.306292][T10729] device wg2 left promiscuous mode [ 556.342444][T10731] device wg2 entered promiscuous mode [ 557.438950][T10752] bond_slave_1: mtu less than device minimum [ 563.571145][T10879] device wg2 left promiscuous mode [ 563.669034][T10879] device wg2 entered promiscuous mode [ 571.612894][T11088] device pim6reg1 entered promiscuous mode [ 573.626235][T11138] syz.0.3297[11138] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 573.626329][T11138] syz.0.3297[11138] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 573.936301][T11146] device syzkaller0 entered promiscuous mode [ 575.261276][T11169] device syzkaller0 entered promiscuous mode [ 580.941256][T11286] device syzkaller0 entered promiscuous mode [ 581.867631][T11302] device syzkaller0 entered promiscuous mode [ 583.607158][T11330] device syzkaller0 entered promiscuous mode [ 585.671906][T11396] syz.0.3384[11396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 585.671990][T11396] syz.0.3384[11396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 585.841956][T11399] device macsec0 left promiscuous mode [ 586.037252][T11402] device syzkaller0 entered promiscuous mode [ 589.414474][T11497] device syzkaller0 entered promiscuous mode [ 591.354479][T11544] syz.0.3433[11544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 591.354553][T11544] syz.0.3433[11544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 598.645112][T11713] device wg2 left promiscuous mode [ 598.833305][T11713] syz.1.3485[11713] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 598.833386][T11713] syz.1.3485[11713] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 598.879542][T11713] syz.1.3485[11713] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 598.985643][T11713] syz.1.3485[11713] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 599.111726][T11713] device wg2 entered promiscuous mode [ 600.671200][T11764] device wg2 left promiscuous mode [ 600.679883][T11764] syz.2.3502[11764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 600.679961][T11764] syz.2.3502[11764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 600.696402][T11764] syz.2.3502[11764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 600.732964][T11764] syz.2.3502[11764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 600.800789][T11764] device wg2 entered promiscuous mode [ 615.171431][T12095] device syzkaller0 entered promiscuous mode [ 616.718912][T12149] tap0: tun_chr_ioctl cmd 1074025680 [ 620.662569][T12246] device syzkaller0 entered promiscuous mode [ 632.828095][T12391] device syzkaller0 entered promiscuous mode [ 636.749788][T12483] device syzkaller0 entered promiscuous mode [ 637.209825][T12497] device syzkaller0 entered promiscuous mode [ 637.283268][T12497] device syzkaller0 left promiscuous mode [ 638.860634][T12548] device veth1_macvtap left promiscuous mode [ 644.388593][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 644.409079][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 644.456313][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 644.483168][ T10] GPL: port 2(vlan1) entered blocking state [ 644.489714][ T10] GPL: port 2(vlan1) entered forwarding state [ 647.613726][T12727] device pim6reg1 entered promiscuous mode [ 651.382412][T12813] device veth0_vlan left promiscuous mode [ 651.391083][T12813] device veth0_vlan entered promiscuous mode [ 651.503049][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 651.516123][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 651.603537][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 659.612790][ T30] audit: type=1400 audit(1752764435.720:146): avc: denied { create } for pid=12983 comm="syz.4.3899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 661.645912][ T30] audit: type=1400 audit(1752764437.750:147): avc: denied { create } for pid=13029 comm="syz.4.3911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 662.061654][T13043] syz.0.3915[13043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 662.061732][T13043] syz.0.3915[13043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 662.122358][T13043] device veth0_vlan left promiscuous mode [ 662.178431][T13043] device veth0_vlan entered promiscuous mode [ 662.218709][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 662.228058][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 662.235858][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 663.508645][T13083] device syzkaller0 entered promiscuous mode [ 665.985049][T13131] device veth0_vlan left promiscuous mode [ 665.997716][T13131] device veth0_vlan entered promiscuous mode [ 666.037417][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 666.046694][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 666.063195][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 666.582001][T13147] syz.2.3947[13147] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 666.582077][T13147] syz.2.3947[13147] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 666.766223][T13148] GPL: port 2(vlan1) entered disabled state [ 666.937069][T13147] GPL: port 2(vlan1) entered blocking state [ 666.943076][T13147] GPL: port 2(vlan1) entered forwarding state [ 668.135004][T13182] device syzkaller0 entered promiscuous mode [ 669.149346][T13203] syz.4.3963[13203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 669.149420][T13203] syz.4.3963[13203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 669.280812][T13210] device veth0_vlan left promiscuous mode [ 669.381743][T13210] device veth0_vlan entered promiscuous mode [ 669.417679][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 669.426471][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 669.440149][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 670.123859][T13233] device wg2 left promiscuous mode [ 670.288241][T13233] device wg2 entered promiscuous mode [ 670.599920][T13246] device syzkaller0 entered promiscuous mode [ 672.965266][T13300] device sit0 entered promiscuous mode [ 673.453851][T13316] device sit0 left promiscuous mode [ 682.258369][T13465] GPL: port 2(vlan1) entered disabled state [ 682.377461][T13468] GPL: port 2(vlan1) entered blocking state [ 682.383721][T13468] GPL: port 2(vlan1) entered forwarding state [ 684.373191][T13505] device syzkaller0 entered promiscuous mode [ 684.690666][T13512] device veth0_vlan left promiscuous mode [ 684.724192][T13512] device veth0_vlan entered promiscuous mode [ 684.788382][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 684.807820][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 684.865399][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 686.484783][T13542] device sit0 entered promiscuous mode [ 692.044359][T13641] GPL: port 2(vlan1) entered disabled state [ 695.180791][T13700] device syzkaller0 entered promiscuous mode [ 701.136436][T13796] syz.4.4146[13796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 701.136515][T13796] syz.4.4146[13796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 701.471300][T13796] device veth0_vlan left promiscuous mode [ 701.558551][T13796] device veth0_vlan entered promiscuous mode [ 701.643756][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 701.696465][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 701.733463][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 704.572313][T13841] device sit0 entered promiscuous mode [ 705.938028][T13864] device syzkaller0 entered promiscuous mode [ 706.795302][T13898] syz.3.4181[13898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 706.795383][T13898] syz.3.4181[13898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 707.071241][T13898] device veth0_vlan left promiscuous mode [ 707.145909][T13898] device veth0_vlan entered promiscuous mode [ 707.204887][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 707.226493][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 707.279406][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 710.235152][T13957] syz.0.4196[13957] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 710.235235][T13957] syz.0.4196[13957] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 710.702356][T13957] device veth0_vlan left promiscuous mode [ 710.745976][T13957] device veth0_vlan entered promiscuous mode [ 710.766978][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 710.776298][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 710.789885][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 710.902077][T13969] syz.1.4210[13969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 710.902157][T13969] syz.1.4210[13969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 711.114581][T13969] device veth0_vlan left promiscuous mode [ 711.219169][T13969] device veth0_vlan entered promiscuous mode [ 711.272799][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 711.335265][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 711.396560][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 711.688955][T13991] device sit0 entered promiscuous mode [ 712.686483][ T30] audit: type=1400 audit(1752764488.780:148): avc: denied { create } for pid=14010 comm="syz.2.4212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 713.507059][T14027] syz.2.4216[14027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 713.507140][T14027] syz.2.4216[14027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 713.806148][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 713.917183][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 713.967276][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 714.021503][ T45] GPL: port 2(vlan1) entered blocking state [ 714.027576][ T45] GPL: port 2(vlan1) entered forwarding state [ 714.762280][T14057] device macsec0 left promiscuous mode [ 715.193959][T14072] syz.0.4234[14072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 715.194036][T14072] syz.0.4234[14072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 715.432244][T14078] device sit0 entered promiscuous mode [ 715.601929][T14075] device veth0_vlan left promiscuous mode [ 715.637014][T14075] device veth0_vlan entered promiscuous mode [ 715.655572][T14075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 715.718147][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 715.745115][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 715.783713][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 719.387857][T14154] device wg2 left promiscuous mode [ 719.475619][T14154] device wg2 entered promiscuous mode [ 720.493056][T14169] device syzkaller0 entered promiscuous mode [ 720.607838][T14183] device sit0 left promiscuous mode [ 720.777104][T14184] device sit0 entered promiscuous mode [ 721.139509][T14195] device sit0 left promiscuous mode [ 722.366217][T14218] device sit0 entered promiscuous mode [ 726.234162][T14284] device sit0 entered promiscuous mode [ 726.683031][T14292] device wg2 left promiscuous mode [ 726.743514][T14293] device wg2 entered promiscuous mode [ 728.472040][T14335] device sit0 left promiscuous mode [ 728.580523][T14335] device sit0 entered promiscuous mode [ 730.750113][T14377] device sit0 left promiscuous mode [ 730.852386][T14377] device sit0 entered promiscuous mode [ 731.087498][T14383] device wg2 left promiscuous mode [ 731.204189][T14391] device wg2 entered promiscuous mode [ 732.009478][T14401] device syzkaller0 entered promiscuous mode [ 732.303278][T14410] GPL: port 2(vlan1) entered disabled state [ 736.716559][T14499] device sit0 left promiscuous mode [ 736.799156][T14499] device sit0 entered promiscuous mode [ 739.407395][T14560] device sit0 left promiscuous mode [ 740.144420][T14580] GPL: port 2(syz_tun) entered blocking state [ 740.153741][T14580] GPL: port 2(syz_tun) entered disabled state [ 740.165806][T14580] device syz_tun entered promiscuous mode [ 740.194093][T14580] GPL: port 2(syz_tun) entered blocking state [ 740.200366][T14580] GPL: port 2(syz_tun) entered forwarding state [ 740.821631][T14597] device wg2 left promiscuous mode [ 740.896822][T14597] device wg2 entered promiscuous mode [ 741.405204][T14617] device veth0_vlan left promiscuous mode [ 741.487102][T14617] device veth0_vlan entered promiscuous mode [ 741.612083][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 741.623960][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 741.632333][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 744.042480][T14660] device syzkaller0 entered promiscuous mode [ 744.441864][T14681] device sit0 left promiscuous mode [ 744.635034][T14681] device sit0 entered promiscuous mode [ 751.478417][T14783] device sit0 left promiscuous mode [ 753.598255][T14819] device veth0_vlan left promiscuous mode [ 753.712915][T14819] device veth0_vlan entered promiscuous mode [ 753.834115][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 753.876071][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 753.910701][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 756.045779][T14852] device syzkaller0 entered promiscuous mode [ 756.286072][T14862] device sit0 left promiscuous mode [ 758.736083][T14908] Â: renamed from pim6reg1 [ 759.091367][T14911] device sit0 left promiscuous mode [ 765.569880][T15000] device syzkaller0 entered promiscuous mode [ 768.329540][T15041] device veth0_vlan left promiscuous mode [ 768.381227][T15041] device veth0_vlan entered promiscuous mode [ 768.427467][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 768.482436][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 768.506420][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 769.596711][T15064] Â: renamed from pim6reg1 [ 772.548032][T15106] device sit0 entered promiscuous mode [ 775.193344][ T30] audit: type=1400 audit(1752764551.300:149): avc: denied { read } for pid=15151 comm="syz.0.4573" dev="nsfs" ino=4026532294 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 775.225265][ T30] audit: type=1400 audit(1752764551.300:150): avc: denied { open } for pid=15151 comm="syz.0.4573" path="cgroup:[4026532294]" dev="nsfs" ino=4026532294 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 775.740737][ T30] audit: type=1400 audit(1752764551.840:151): avc: denied { ioctl } for pid=15164 comm="syz.1.4577" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 777.036476][ T30] audit: type=1400 audit(1752764553.140:152): avc: denied { append } for pid=15181 comm="syz.4.4583" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 781.644278][T15223] device pim6reg1 entered promiscuous mode [ 791.582117][T15405] device veth0_vlan left promiscuous mode [ 791.617807][T15405] device veth0_vlan entered promiscuous mode [ 795.312731][T15486] device pim6reg1 entered promiscuous mode [ 795.451467][T15490] device sit0 left promiscuous mode [ 798.497410][T15554] device sit0 left promiscuous mode [ 798.686367][T15554] device sit0 entered promiscuous mode [ 799.437309][T15574] device pim6reg1 entered promiscuous mode [ 802.242759][T15602] syz.1.4724[15602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 802.242841][T15602] syz.1.4724[15602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 804.560564][T15621] device wg2 left promiscuous mode [ 804.861929][T15633] device wg2 entered promiscuous mode [ 805.591744][T15643] device syzkaller0 entered promiscuous mode [ 808.944692][T15717] device veth0_vlan left promiscuous mode [ 808.954751][T15717] device veth0_vlan entered promiscuous mode [ 808.973708][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 808.982175][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 808.989798][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 810.368019][T15751] device sit0 entered promiscuous mode [ 814.008062][T15814] device veth1_macvtap entered promiscuous mode [ 814.020963][T15814] device macsec0 entered promiscuous mode [ 814.119190][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 814.367687][T15819] device syzkaller0 entered promiscuous mode [ 814.574167][T15827] device veth0_vlan left promiscuous mode [ 814.580290][T15827] device veth0_vlan entered promiscuous mode [ 814.587176][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 814.610788][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 814.618357][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 815.802705][T15862] device syzkaller0 entered promiscuous mode [ 816.263819][T15870] device syzkaller0 entered promiscuous mode [ 816.293042][T15876] device sit0 left promiscuous mode [ 816.306439][T15877] device sit0 entered promiscuous mode [ 816.646038][T15892] syz.0.4813[15892] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 816.646140][T15892] syz.0.4813[15892] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 818.618882][T15900] device pim6reg1 entered promiscuous mode [ 819.196090][T15920] device veth1_macvtap left promiscuous mode [ 819.286730][T15920] device macsec0 left promiscuous mode [ 820.671448][T15950] device pim6reg1 entered promiscuous mode [ 820.903336][T15956] ªªªªªª: renamed from vlan0 [ 826.031458][T16050] device veth0_vlan left promiscuous mode [ 826.047950][T16050] device veth0_vlan entered promiscuous mode [ 830.628850][T16074] device veth0_vlan left promiscuous mode [ 830.664505][T16074] device veth0_vlan entered promiscuous mode [ 830.798401][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 830.828142][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 830.949538][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 833.756267][T16133] device veth0_vlan left promiscuous mode [ 833.787186][T16133] device veth0_vlan entered promiscuous mode [ 833.820684][T16133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 833.828658][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 833.838921][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 833.848594][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 834.400225][T16155] device sit0 left promiscuous mode [ 834.485942][T16155] device sit0 entered promiscuous mode [ 837.139590][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 837.157752][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 837.165776][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 837.192950][ T7366] GPL: port 2(vlan1) entered blocking state [ 837.198952][ T7366] GPL: port 2(vlan1) entered forwarding state [ 837.899650][T16224] device veth0_vlan left promiscuous mode [ 837.950073][T16224] device veth0_vlan entered promiscuous mode [ 838.844178][T16253] syz.0.4925[16253] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 838.844291][T16253] syz.0.4925[16253] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 842.321692][T16322] device syzkaller0 entered promiscuous mode [ 843.549899][T16337] device veth0_vlan left promiscuous mode [ 843.741887][T16337] device veth0_vlan entered promiscuous mode [ 843.877097][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 843.891015][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 843.944970][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 845.936556][T16365] device syzkaller0 entered promiscuous mode [ 846.537326][T16373] device sit0 entered promiscuous mode [ 847.171523][T16379] device sit0 left promiscuous mode [ 847.298569][T16385] device sit0 entered promiscuous mode [ 848.315523][T16393] O3ãc¤±: renamed from bridge_slave_0 [ 848.871455][T16412] device veth0_vlan left promiscuous mode [ 848.877798][T16412] device veth0_vlan entered promiscuous mode [ 848.931268][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 848.939949][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 848.948106][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 852.692370][ T30] audit: type=1400 audit(1752764628.770:153): avc: denied { create } for pid=16450 comm="syz.3.4983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 854.009381][T16484] device syzkaller0 entered promiscuous mode [ 854.123538][T16487] ÿÿÿÿÿÿ: renamed from vlan1 [ 863.191179][T16626] device sit0 left promiscuous mode [ 863.329386][T16627] device sit0 entered promiscuous mode [ 865.161620][T16678] device veth0_vlan left promiscuous mode [ 865.181612][T16678] device veth0_vlan entered promiscuous mode [ 865.213444][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 865.230788][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 865.238083][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 865.961798][T16700] device wg2 left promiscuous mode [ 865.990649][T16711] syz.3.5067[16711] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 865.990734][T16711] syz.3.5067[16711] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 866.030383][T16705] device wg2 entered promiscuous mode [ 867.024933][T16734] device syzkaller0 entered promiscuous mode [ 868.990076][T16792] device veth0_vlan left promiscuous mode [ 868.996717][T16792] device veth0_vlan entered promiscuous mode [ 869.043110][T14103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 869.061662][T14103] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 869.068991][T14103] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 869.087714][T16794] device syzkaller0 entered promiscuous mode [ 871.567158][T16843] device wg2 left promiscuous mode [ 871.647181][T16849] device wg2 entered promiscuous mode [ 873.134661][T16903] device pim6reg1 entered promiscuous mode [ 873.783039][T16919] device sit0 left promiscuous mode [ 874.375680][T16930] device sit0 entered promiscuous mode [ 875.406822][T16952] device pim6reg1 entered promiscuous mode [ 876.913232][T16979] device veth0_vlan left promiscuous mode [ 876.976870][T16979] device veth0_vlan entered promiscuous mode [ 877.113814][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 877.130364][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 877.148131][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 879.363723][T17030] GPL: port 2(vlan1) entered disabled state [ 880.394092][T17056] device sit0 left promiscuous mode [ 881.173643][T17068] device macsec0 left promiscuous mode [ 883.506985][T17105] device sit0 entered promiscuous mode [ 883.561900][T17107] device wg2 left promiscuous mode [ 884.068754][T17131] device sit0 left promiscuous mode [ 891.214421][T17246] device pim6reg1 entered promiscuous mode [ 891.244646][T17252] device syzkaller0 entered promiscuous mode [ 893.873441][T17307] syz.1.5256[17307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 893.873551][T17307] syz.1.5256[17307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 895.158634][T17326] device veth0_vlan left promiscuous mode [ 895.176600][T17326] device veth0_vlan entered promiscuous mode [ 895.193140][T14103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 895.217735][T14103] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 895.233507][T14103] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 896.479094][T17337] device pim6reg1 entered promiscuous mode [ 897.014960][T17342] device sit0 entered promiscuous mode [ 898.661425][T17373] device pim6reg1 entered promiscuous mode [ 902.376074][T17453] device pim6reg1 entered promiscuous mode [ 908.079274][T17566] device sit0 left promiscuous mode [ 908.338736][T17571] syz.2.5350[17571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 908.338843][T17571] syz.2.5350[17571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 909.707996][T17607] device sit0 left promiscuous mode [ 913.817251][T17664] device wg2 left promiscuous mode [ 913.894736][T17670] device wg2 entered promiscuous mode [ 915.323038][T17713] device sit0 entered promiscuous mode [ 916.341208][T17739] device sit0 entered promiscuous mode [ 917.552617][T17762] device sit0 left promiscuous mode [ 917.653340][T17762] device sit0 entered promiscuous mode [ 919.127199][T17788] device sit0 left promiscuous mode [ 919.771096][T17809] device wg2 left promiscuous mode [ 919.831493][T17817] device wg2 entered promiscuous mode [ 921.661718][T17864] device wg2 left promiscuous mode [ 921.669518][T17864] device wg2 entered promiscuous mode [ 923.046134][T17902] device sit0 entered promiscuous mode [ 925.770987][T17941] device pim6reg1 entered promiscuous mode [ 925.797049][T17945] device sit0 left promiscuous mode [ 926.411585][T17947] device sit0 entered promiscuous mode [ 927.573667][T17967] device sit0 entered promiscuous mode [ 928.727733][T17984] device sit0 left promiscuous mode [ 929.256228][T17991] device sit0 left promiscuous mode [ 929.400786][T17994] device sit0 entered promiscuous mode [ 929.787109][T17999] device wg2 left promiscuous mode [ 929.873839][T18005] device wg2 entered promiscuous mode [ 930.939575][T18026] device pim6reg1 entered promiscuous mode [ 931.050017][T18028] device sit0 left promiscuous mode [ 931.094699][T18029] device sit0 entered promiscuous mode [ 931.464892][T18039] device sit0 left promiscuous mode [ 934.162996][T18089] device sit0 left promiscuous mode [ 934.877566][T18105] device pim6reg1 entered promiscuous mode [ 935.173666][T18110] device sit0 left promiscuous mode [ 935.309444][T18111] device sit0 entered promiscuous mode [ 935.504432][T18112] device pim6reg1 entered promiscuous mode [ 938.932680][T18149] device syzkaller0 entered promiscuous mode [ 938.982677][T18154] device pim6reg1 entered promiscuous mode [ 941.749977][T18178] device sit0 entered promiscuous mode [ 943.233338][T18210] device pim6reg1 entered promiscuous mode [ 943.355111][T18218] device veth0_vlan left promiscuous mode [ 943.361299][T18218] device veth0_vlan entered promiscuous mode [ 943.370380][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 943.387312][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 943.405387][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 945.318373][T18259] device sit0 left promiscuous mode [ 945.416376][T18259] device sit0 entered promiscuous mode [ 945.535446][T18261] device wg2 left promiscuous mode [ 945.600545][T18265] device wg2 entered promiscuous mode [ 945.712488][T18271] device pim6reg1 entered promiscuous mode [ 945.856482][T18270] device veth1_macvtap entered promiscuous mode [ 945.864033][T18270] device macsec0 entered promiscuous mode [ 946.014303][T18283] device sit0 entered promiscuous mode [ 946.196893][T18276] device syzkaller0 entered promiscuous mode [ 946.214122][T18268] device pim6reg1 entered promiscuous mode [ 946.220979][T14103] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 946.235687][T18282] device sit0 left promiscuous mode [ 946.440964][T18286] device sit0 left promiscuous mode [ 946.949801][T18296] device syzkaller0 entered promiscuous mode [ 947.250754][T18300] device pim6reg1 entered promiscuous mode [ 947.636036][T18309] device sit0 entered promiscuous mode [ 948.221609][T18315] device veth0_to_team entered promiscuous mode [ 948.392456][T18322] device sit0 left promiscuous mode [ 948.472630][T18320] device wg2 left promiscuous mode [ 948.496272][T18324] device sit0 entered promiscuous mode [ 948.609141][T18325] device wg2 entered promiscuous mode [ 948.735640][T18329] device veth0_vlan left promiscuous mode [ 948.761261][T18329] device veth0_vlan entered promiscuous mode [ 948.777524][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 948.793061][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 948.820822][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 949.068618][T18334] device pim6reg1 entered promiscuous mode [ 949.249582][T18335] device syzkaller0 entered promiscuous mode [ 950.506638][T18366] device sit0 entered promiscuous mode [ 951.198383][T18386] device sit0 left promiscuous mode [ 951.226722][T18386] device sit0 entered promiscuous mode [ 951.454262][T18388] device pim6reg1 entered promiscuous mode [ 951.513527][T18393] device sit0 left promiscuous mode [ 951.588202][T14103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 951.597104][T14103] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 951.610809][T14103] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 951.629612][T14103] GPL: port 2(vlan1) entered blocking state [ 951.635613][T14103] GPL: port 2(vlan1) entered forwarding state [ 951.876436][T18401] device syz_tun entered promiscuous mode [ 952.155247][T18407] device pim6reg1 entered promiscuous mode [ 952.632821][T18422] device sit0 entered promiscuous mode [ 953.543426][T18440] GPL: port 2(vlan1) entered disabled state [ 954.270531][T18449] device sit0 entered promiscuous mode [ 954.583644][T18459] device sit0 left promiscuous mode [ 954.747791][T18459] device sit0 entered promiscuous mode [ 954.932449][T18460] device pim6reg1 entered promiscuous mode [ 956.469917][T18501] device sit0 left promiscuous mode [ 958.130834][T18523] device sit0 entered promiscuous mode [ 958.251963][T18517] device sit0 left promiscuous mode [ 958.422232][T18524] device pim6reg1 entered promiscuous mode [ 959.634337][T18538] device syzkaller0 entered promiscuous mode [ 960.075060][T18550] device veth0_to_team entered promiscuous mode [ 960.733447][T18565] device pim6reg1 entered promiscuous mode [ 962.431273][T18575] device sit0 left promiscuous mode [ 962.652112][T18575] device sit0 entered promiscuous mode [ 962.913682][T18586] device veth0_vlan left promiscuous mode [ 962.919866][T18586] device veth0_vlan entered promiscuous mode [ 962.951823][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 962.959957][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 962.987805][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 963.319426][T18597] device veth1_macvtap entered promiscuous mode [ 963.332145][T18597] device macsec0 entered promiscuous mode [ 963.375288][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 963.680272][T18608] device veth0_vlan left promiscuous mode [ 963.701564][ T30] audit: type=1400 audit(1752764739.800:154): avc: denied { create } for pid=18606 comm="syz.0.5664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 963.747382][T18608] device veth0_vlan entered promiscuous mode [ 963.797054][T18608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 963.908778][T14103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 963.930387][T14103] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 963.937753][T14103] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 966.431129][T18666] device pim6reg1 entered promiscuous mode [ 968.890407][T18706] device sit0 left promiscuous mode [ 969.123228][T18708] device pim6reg1 entered promiscuous mode [ 969.386794][T18720] device sit0 left promiscuous mode [ 969.722491][T18720] device sit0 entered promiscuous mode [ 970.790226][T18745] device veth0_vlan left promiscuous mode [ 970.798169][T18745] device veth0_vlan entered promiscuous mode [ 970.842636][T18745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 970.893744][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 970.904152][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 970.913335][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 971.386145][T18755] device sit0 left promiscuous mode [ 972.702526][T18782] device syzkaller0 entered promiscuous mode [ 981.181084][T18916] device syzkaller0 entered promiscuous mode [ 981.203446][T18920] device veth1_macvtap entered promiscuous mode [ 981.216225][T18920] device macsec0 entered promiscuous mode [ 981.266904][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 982.474878][T18949] device wg2 left promiscuous mode [ 983.365178][T18961] device syzkaller0 entered promiscuous mode [ 989.459336][T19005] device veth0_vlan left promiscuous mode [ 989.492704][T19005] device veth0_vlan entered promiscuous mode [ 989.571813][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 989.584117][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 989.638884][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 998.475102][T19151] device veth0_vlan left promiscuous mode [ 998.513189][T19151] device veth0_vlan entered promiscuous mode [ 998.570707][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 998.601173][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 998.608518][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1009.830198][T19271] device sit0 left promiscuous mode [ 1011.710202][T19352] syz.2.5911[19352] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1011.710310][T19352] syz.2.5911[19352] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1017.403179][T19485] device syzkaller0 entered promiscuous mode [ 1027.584377][T19599] device pim6reg1 entered promiscuous mode [ 1027.598651][T19604] device pim6reg1 entered promiscuous mode [ 1027.829046][T19620] syz.2.6019[19620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1027.829159][T19620] syz.2.6019[19620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1031.486238][T19621] device wg2 entered promiscuous mode [ 1032.127216][T19664] syz.1.6038[19664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1032.127315][T19664] syz.1.6038[19664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1032.230926][T19661] device syzkaller0 entered promiscuous mode [ 1035.476572][T19681] device syzkaller0 entered promiscuous mode [ 1035.561993][T19686] device pim6reg1 entered promiscuous mode [ 1038.734723][T19757] bond_slave_1: mtu less than device minimum [ 1038.871114][T19770] ------------[ cut here ]------------ [ 1038.912725][T19770] trace type BPF program uses run-time allocation [ 1038.950895][T19770] WARNING: CPU: 0 PID: 19770 at kernel/bpf/verifier.c:11701 check_map_prog_compatibility+0x6cd/0x870 [ 1039.057893][T19770] Modules linked in: [ 1039.092324][T19770] CPU: 0 PID: 19770 Comm: syz.2.6087 Not tainted 5.15.188-syzkaller-android13-5.15.188_r00 #0 [ 1039.149009][T19770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1039.180323][T19770] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 1039.187082][T19770] Code: ee ff 48 c7 c6 80 e8 47 85 4c 8b 65 d0 e9 fd fc ff ff e8 56 4c ee ff c6 05 03 6f 6b 05 01 48 c7 c7 e0 e4 47 85 e8 a3 39 22 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 1039.279671][T19782] bond_slave_1: mtu less than device minimum [ 1039.288725][T19770] RSP: 0018:ffffc90000c17428 EFLAGS: 00010246 [ 1039.303074][T19770] RAX: 12935d8ab4f31200 RBX: 0000000000000001 RCX: 0000000000080000 [ 1039.400378][T19770] RDX: ffffc9000233f000 RSI: 000000000000297a RDI: 000000000000297b [ 1039.420137][T19770] RBP: ffffc90000c17470 R08: dffffc0000000000 R09: ffffed103ee065e8 [ 1039.434406][T19770] R10: ffffed103ee065e8 R11: 1ffff1103ee065e7 R12: ffff88813d2c4000 [ 1039.451913][T19770] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888135e21800 [ 1039.461582][T19770] FS: 00007f64a54e86c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 1039.470929][T19770] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1039.477632][T19770] CR2: 000000110c2f16e3 CR3: 000000013f2ab000 CR4: 00000000003506a0 [ 1039.491233][T19770] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1039.579362][T19770] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1039.650530][T19770] Call Trace: [ 1039.681443][T19770] [ 1039.706538][T19770] resolve_pseudo_ldimm64+0x685/0x11d0 [ 1039.770619][T19770] ? check_attach_btf_id+0xde0/0xde0 [ 1039.817466][T19770] ? __mark_reg_known+0x1b0/0x1b0 [ 1039.847803][T19770] ? security_capable+0x87/0xb0 [ 1039.907612][T19770] bpf_check+0x2c44/0xf330 [ 1039.932529][T19770] ? is_bpf_text_address+0x177/0x190 [ 1039.962868][T19770] ? bpf_get_btf_vmlinux+0x60/0x60 [ 1040.021177][T19770] ? unwind_get_return_address+0x4d/0x90 [ 1040.061379][T19770] ? stack_trace_save+0xe0/0xe0 [ 1040.116930][T19770] ? arch_stack_walk+0xee/0x140 [ 1040.141077][T19770] ? stack_trace_save+0x98/0xe0 [ 1040.157438][T19770] ? __stack_depot_save+0x34/0x480 [ 1040.170296][T19770] ? __kasan_slab_alloc+0x69/0xf0 [ 1040.212655][T19770] ? __kasan_kmalloc+0xec/0x110 [ 1040.230104][T19770] ? __kasan_kmalloc+0xda/0x110 [ 1040.245260][T19770] ? kmem_cache_alloc_trace+0x119/0x270 [ 1040.275817][T19770] ? selinux_bpf_prog_alloc+0x51/0x140 [ 1040.301823][T19770] ? security_bpf_prog_alloc+0x62/0x90 [ 1040.307661][T19770] ? bpf_prog_load+0x97c/0x1550 [ 1040.339570][T19770] ? __sys_bpf+0x4c3/0x730 [ 1040.354711][T19770] ? __x64_sys_bpf+0x7c/0x90 [ 1040.363351][T19821] bond_slave_1: mtu less than device minimum [ 1040.369586][T19770] ? x64_sys_call+0x4b9/0x9a0 [ 1040.374705][T19770] ? do_syscall_64+0x4c/0xa0 [ 1040.416836][T19770] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1040.457341][T19770] ? check_stack_object+0x81/0x140 [ 1040.463541][T19770] ? memset+0x35/0x40 [ 1040.467721][T19770] ? bpf_obj_name_cpy+0x193/0x1e0 [ 1040.473744][T19770] bpf_prog_load+0x1042/0x1550 [ 1040.478689][T19770] ? map_freeze+0x360/0x360 [ 1040.483577][T19770] ? selinux_bpf+0xc7/0xf0 [ 1040.495955][T19770] ? security_bpf+0x82/0xa0 [ 1040.559931][T19770] __sys_bpf+0x4c3/0x730 [ 1040.598601][T19770] ? bpf_link_show_fdinfo+0x310/0x310 [ 1040.643687][T19770] ? __kasan_check_write+0x14/0x20 [ 1040.649441][T19770] ? switch_fpu_return+0x15d/0x2c0 [ 1040.654969][T19770] __x64_sys_bpf+0x7c/0x90 [ 1040.659605][T19770] x64_sys_call+0x4b9/0x9a0 [ 1040.664422][T19770] do_syscall_64+0x4c/0xa0 [ 1040.669173][T19770] ? clear_bhb_loop+0x50/0xa0 [ 1040.681216][T19770] ? clear_bhb_loop+0x50/0xa0 [ 1040.703493][T19770] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1040.716079][T19770] RIP: 0033:0x7f64a6e7f929 [ 1040.726080][T19770] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1040.901432][T19770] RSP: 002b:00007f64a54e8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1040.983383][T19770] RAX: ffffffffffffffda RBX: 00007f64a70a6fa0 RCX: 00007f64a6e7f929 [ 1041.051586][T19770] RDX: 0000000000000094 RSI: 0000200000000200 RDI: 0000000000000005 [ 1041.059738][T19770] RBP: 00007f64a6f01ca1 R08: 0000000000000000 R09: 0000000000000000 [ 1041.110137][T19770] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1041.153455][T19770] R13: 0000000000000000 R14: 00007f64a70a6fa0 R15: 00007ffd8924b708 [ 1041.179526][T19770] [ 1041.197356][T19770] ---[ end trace 03c934d34084abbe ]--- [ 1041.320004][T19844] device wg2 entered promiscuous mode [ 1041.577236][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1041.591674][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1041.614999][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1041.696848][ T460] GPL: port 2(vlan1) entered blocking state [ 1041.702889][ T460] GPL: port 2(vlan1) entered forwarding state [ 1042.517007][T19875] device syzkaller0 entered promiscuous mode [ 1042.751080][T19878] device wg2 left promiscuous mode [ 1042.834599][T19881] device wg2 entered promiscuous mode [ 1043.985804][T19909] device syzkaller0 entered promiscuous mode [ 1044.100602][T19916] device wg2 left promiscuous mode [ 1044.178207][T19922] device wg2 entered promiscuous mode [ 1045.741507][T19962] device wg2 left promiscuous mode [ 1045.798642][T19967] device wg2 entered promiscuous mode [ 1047.219989][T20017] device veth0_vlan left promiscuous mode [ 1047.712187][T20017] device veth0_vlan entered promiscuous mode [ 1047.738702][T20015] device wg2 left promiscuous mode [ 1047.758780][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1047.810460][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1047.817889][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1047.857332][T20015] device wg2 entered promiscuous mode [ 1049.475950][T20058] bond_slave_1: mtu less than device minimum [ 1049.484158][T20056] device wg2 left promiscuous mode [ 1049.580899][T20056] device wg2 entered promiscuous mode [ 1050.405260][T20075] GPL: port 2(vlan1) entered disabled state [ 1053.890944][T20155] syz.2.6227[20155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1053.891019][T20155] syz.2.6227[20155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1053.943692][T20155] device pim6reg1 entered promiscuous mode [ 1055.974974][T20203] device syzkaller0 entered promiscuous mode [ 1056.351774][T20215] device wg2 left promiscuous mode [ 1056.565581][T20216] device wg2 entered promiscuous mode [ 1057.564360][T20253] device wg2 left promiscuous mode [ 1057.650194][T20261] device wg2 entered promiscuous mode [ 1058.026557][T20288] device veth1_macvtap left promiscuous mode [ 1058.554662][ T30] audit: type=1400 audit(1752764834.660:155): avc: denied { attach_queue } for pid=20302 comm="syz.3.6286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1060.011817][T20385] device pim6reg1 entered promiscuous mode [ 1062.692996][T20466] device syzkaller0 entered promiscuous mode [ 1066.118699][T20557] device syzkaller0 entered promiscuous mode [ 1066.913816][T20579] device pim6reg1 entered promiscuous mode [ 1067.301258][T20590] device veth1_macvtap left promiscuous mode [ 1067.378048][T20593] device veth1_macvtap entered promiscuous mode [ 1071.423628][T20671] device wg2 left promiscuous mode [ 1071.502260][T20663] device wg2 entered promiscuous mode [ 1072.811794][T20711] device syzkaller0 entered promiscuous mode [ 1073.097401][T20724] device veth0_vlan left promiscuous mode [ 1073.144911][T20724] device veth0_vlan entered promiscuous mode [ 1073.152072][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1073.161375][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1073.180845][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1073.363498][T20730] device pim6reg1 entered promiscuous mode [ 1073.738160][T20742] device syzkaller0 entered promiscuous mode [ 1074.328629][T20761] device wg2 left promiscuous mode [ 1074.363641][T20764] device wg2 left promiscuous mode [ 1074.427382][T20768] device wg2 entered promiscuous mode [ 1074.715938][T20771] device syzkaller0 entered promiscuous mode [ 1075.387426][T20802] device wg2 left promiscuous mode [ 1075.538889][T20798] device wg2 entered promiscuous mode [ 1076.951245][T20814] device syzkaller0 entered promiscuous mode [ 1079.158237][T20852] device syzkaller0 entered promiscuous mode [ 1079.597404][T20869] device syzkaller0 entered promiscuous mode [ 1079.901811][T20874] device pim6reg1 entered promiscuous mode [ 1081.778954][T20904] device syzkaller0 entered promiscuous mode [ 1081.869849][T20915] device syzkaller0 entered promiscuous mode [ 1082.725799][T20940] device wg2 left promiscuous mode [ 1082.769798][T20940] device wg2 entered promiscuous mode [ 1083.024309][T20952] device pim6reg1 entered promiscuous mode [ 1083.203008][T20958] device pim6reg1 entered promiscuous mode [ 1083.742685][T20980] device wg2 left promiscuous mode [ 1083.841578][T20986] device wg2 entered promiscuous mode [ 1084.373471][T20991] device pim6reg1 entered promiscuous mode [ 1084.811787][T20999] device syzkaller0 entered promiscuous mode [ 1085.096303][T21013] device pim6reg1 entered promiscuous mode [ 1085.887892][T21047] device syzkaller0 entered promiscuous mode [ 1087.662569][T21085] device syzkaller0 entered promiscuous mode [ 1088.758086][T21098] device syzkaller0 entered promiscuous mode [ 1089.217304][T21111] device pim6reg1 entered promiscuous mode [ 1089.512087][T21115] device veth0_vlan left promiscuous mode [ 1089.576564][T21115] device veth0_vlan entered promiscuous mode [ 1089.712055][T20194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1089.720730][T20194] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1089.728042][T20194] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1090.160742][T21139] device sit0 entered promiscuous mode [ 1093.744188][T21210] device syzkaller0 entered promiscuous mode [ 1094.234382][T21207] device syzkaller0 entered promiscuous mode [ 1095.401082][T21231] device syzkaller0 entered promiscuous mode [ 1095.828015][T21255] device veth0_vlan left promiscuous mode [ 1095.871399][T21255] device veth0_vlan entered promiscuous mode [ 1095.911613][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1095.933116][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1095.986141][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1096.408692][T21267] device syzkaller0 entered promiscuous mode [ 1099.182413][T21304] syz.1.6643 (21304) used greatest stack depth: 21232 bytes left [ 1099.200410][T21313] device syzkaller0 entered promiscuous mode [ 1101.859680][T21357] device syzkaller0 entered promiscuous mode [ 1113.250551][T21518] device wg2 left promiscuous mode [ 1113.298867][T21530] device wg2 entered promiscuous mode [ 1113.340157][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1113.351655][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1113.359150][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1113.366525][ T332] GPL: port 2(vlan1) entered blocking state [ 1113.372475][ T332] GPL: port 2(vlan1) entered forwarding state [ 1115.554507][T21588] GPL: port 2(vlan1) entered disabled state [ 1116.076536][T21604] device veth0_vlan left promiscuous mode [ 1116.082907][T21604] device veth0_vlan entered promiscuous mode [ 1116.113810][T20194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1116.132724][T20194] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1116.620283][T20194] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1119.630186][ T30] audit: type=1400 audit(1752764895.730:156): avc: denied { create } for pid=21690 comm="syz.3.6766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1124.625881][T21778] device veth0_vlan left promiscuous mode [ 1124.656448][T21778] device veth0_vlan entered promiscuous mode [ 1124.728441][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1124.744224][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1124.777554][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1125.049620][T21784] device pim6reg1 entered promiscuous mode [ 1126.706633][T21812] syz.4.6804[21812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1126.706712][T21812] syz.4.6804[21812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1130.418869][T21847] device wg2 left promiscuous mode [ 1130.555407][T21849] device wg2 entered promiscuous mode [ 1130.627393][T21853] device veth1_macvtap left promiscuous mode [ 1130.640118][T21853] device macsec0 left promiscuous mode [ 1130.688668][T21854] device veth1_macvtap entered promiscuous mode [ 1130.699239][T21854] device macsec0 entered promiscuous mode [ 1131.178840][T21878] device veth0_vlan left promiscuous mode [ 1131.193365][T21878] device veth0_vlan entered promiscuous mode [ 1131.211816][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1131.219885][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1131.262184][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1132.254028][T21899] device wg2 left promiscuous mode [ 1132.355192][T21899] device wg2 entered promiscuous mode [ 1134.566162][T21943] device syzkaller0 entered promiscuous mode [ 1137.217704][T21984] device sit0 entered promiscuous mode [ 1139.421278][T22013] device syzkaller0 entered promiscuous mode [ 1140.467443][T22038] device wg2 entered promiscuous mode [ 1140.924961][T22052] device wg2 left promiscuous mode [ 1140.983272][T22056] device wg2 entered promiscuous mode [ 1142.209239][T22076] device veth0_vlan left promiscuous mode [ 1142.231963][T22076] device veth0_vlan entered promiscuous mode [ 1142.254129][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1142.262672][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1142.270185][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1144.784286][T22092] device veth0_vlan left promiscuous mode [ 1144.791648][T22092] device veth0_vlan entered promiscuous mode [ 1144.851124][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1144.863206][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1144.873295][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1145.496828][T22101] device sit0 entered promiscuous mode [ 1149.524983][T20194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1149.537341][T20194] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1149.545510][T20194] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1149.554057][T20194] GPL: port 2(vlan1) entered blocking state [ 1149.560039][T20194] GPL: port 2(vlan1) entered forwarding state [ 1151.009786][T22180] device syzkaller0 entered promiscuous mode [ 1151.360789][T22199] device syzkaller0 entered promiscuous mode [ 1153.156593][T22229] GPL: port 2(vlan1) entered disabled state [ 1154.163607][T22260] device syzkaller0 entered promiscuous mode [ 1156.742672][T22293] device veth0_vlan left promiscuous mode [ 1156.760779][T22293] device veth0_vlan entered promiscuous mode [ 1156.793772][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1156.807747][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1156.820205][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1156.929236][T22298] device syzkaller0 entered promiscuous mode [ 1157.784837][T22313] syz.1.6952[22313] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1157.784937][T22313] syz.1.6952[22313] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1157.947850][T22317] device wg2 left promiscuous mode [ 1158.027620][T22317] device wg2 entered promiscuous mode [ 1160.742515][T22355] device wg2 left promiscuous mode [ 1160.845387][T22355] device wg2 entered promiscuous mode [ 1162.780638][T22370] device syzkaller0 entered promiscuous mode [ 1162.811915][T22372] device veth0_vlan left promiscuous mode [ 1162.824471][T22372] device veth0_vlan entered promiscuous mode [ 1162.910158][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1162.918296][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1162.950515][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1164.012076][T22400] device wg2 left promiscuous mode [ 1166.069685][T22400] device wg2 entered promiscuous mode [ 1166.806843][T22429] device syzkaller0 entered promiscuous mode [ 1168.055551][T22455] device veth0_vlan left promiscuous mode [ 1168.063261][T22455] device veth0_vlan entered promiscuous mode [ 1168.104171][T20194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1168.115727][T20194] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1168.123377][T20194] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1171.250990][T22499] device sit0 entered promiscuous mode [ 1172.254753][T22512] device wg2 left promiscuous mode [ 1172.300239][T22514] device wg2 entered promiscuous mode [ 1172.547536][T22523] syz.3.7017[22523] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1172.547617][T22523] syz.3.7017[22523] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1180.038324][T22645] device wg2 left promiscuous mode [ 1180.195179][T22645] device wg2 entered promiscuous mode [ 1183.082273][T22701] device sit0 left promiscuous mode [ 1183.312758][T22701] device sit0 entered promiscuous mode [ 1183.870686][T22708] ÿÿÿÿÿÿ: renamed from vlan1 [ 1184.718653][T22716] device sit0 entered promiscuous mode [ 1186.425278][T22758] device syzkaller0 entered promiscuous mode [ 1187.290648][T22766] Â: renamed from pim6reg1 [ 1187.602043][T22776] device sit0 left promiscuous mode [ 1191.961757][T22845] device syzkaller0 entered promiscuous mode [ 1193.010476][T22869] device wg2 left promiscuous mode [ 1193.179569][T22869] device wg2 entered promiscuous mode [ 1195.860093][T22927] device sit0 left promiscuous mode [ 1196.111862][T22938] device sit0 entered promiscuous mode [ 1196.753997][T22949] device syzkaller0 entered promiscuous mode [ 1198.006005][T22969] device wg2 left promiscuous mode [ 1198.110713][T22975] device wg2 entered promiscuous mode [ 1199.051703][T22982] Â: renamed from pim6reg1 [ 1200.795327][T23020] device syzkaller0 entered promiscuous mode [ 1202.355175][T23064] device sit0 left promiscuous mode [ 1204.903790][T23129] device sit0 left promiscuous mode [ 1205.106553][T23133] device sit0 entered promiscuous mode [ 1206.921102][T23207] device syzkaller0 entered promiscuous mode [ 1207.412536][T23221] device sit0 left promiscuous mode [ 1208.478806][T23248] syz.4.7249[23248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1208.478890][T23248] syz.4.7249[23248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1210.416362][T23302] device sit0 entered promiscuous mode [ 1211.034917][T23312] device wg2 left promiscuous mode [ 1211.131210][T23314] device wg2 entered promiscuous mode [ 1211.405919][T23322] syz.0.7276[23322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1211.406000][T23322] syz.0.7276[23322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1212.749762][T23355] device wg2 left promiscuous mode [ 1212.899443][T23357] device wg2 entered promiscuous mode [ 1213.214855][T23370] device sit0 left promiscuous mode [ 1213.353403][T23377] device sit0 entered promiscuous mode [ 1213.869431][T23387] device sit0 left promiscuous mode [ 1214.486285][T23398] device wg2 left promiscuous mode [ 1214.601391][T23397] device wg2 entered promiscuous mode [ 1214.701621][T23405] device pim6reg1 entered promiscuous mode [ 1215.332111][T23435] device wg2 left promiscuous mode [ 1215.423305][T23439] device wg2 entered promiscuous mode [ 1219.422443][T23520] Â: renamed from pim6reg1 [ 1219.538619][T23531] device pim6reg1 entered promiscuous mode [ 1219.589709][T23538] device syzkaller0 entered promiscuous mode [ 1219.718950][T23548] bond_slave_1: mtu less than device minimum [ 1219.841102][T23561] syz.0.7373[23561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1219.841184][T23561] syz.0.7373[23561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1219.991394][T23571] device bridge_slave_1 left promiscuous mode [ 1220.034054][T23571] bridge0: port 2(bridge_slave_1) entered disabled state [ 1220.054655][T23571] device O3ãc¤± left promiscuous mode [ 1220.066376][T23571] bridge0: port 1(O3ãc¤±) entered disabled state [ 1220.116630][T23567] Â: renamed from pim6reg1 [ 1221.048932][T23614] Â: renamed from pim6reg1 [ 1222.455671][T23648] device pim6reg1 entered promiscuous mode [ 1226.260158][T23714] syz.2.7434[23714] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1226.260241][T23714] syz.2.7434[23714] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1226.396849][T23712] device wg2 left promiscuous mode [ 1228.055627][T23752] device wg2 left promiscuous mode [ 1228.105355][T23752] device wg2 entered promiscuous mode [ 1228.119677][T23760] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1232.621076][T23836] device wg2 left promiscuous mode [ 1232.703247][T23837] device wg2 entered promiscuous mode [ 1236.009456][T23904] device wg2 entered promiscuous mode [ 1237.272121][T23930] device wg2 left promiscuous mode [ 1237.382183][T23933] device sit0 entered promiscuous mode [ 1237.526087][T23930] device wg2 entered promiscuous mode [ 1240.938905][T23987] device syzkaller0 entered promiscuous mode [ 1244.790171][T24046] device sit0 left promiscuous mode [ 1244.901771][T24047] device sit0 entered promiscuous mode [ 1245.966058][T24075] device sit0 left promiscuous mode [ 1250.042803][T24125] device syzkaller0 entered promiscuous mode [ 1250.063206][T24123] device pim6reg1 entered promiscuous mode [ 1250.269369][T24146] device wg2 left promiscuous mode [ 1250.425478][T24146] device wg2 entered promiscuous mode [ 1250.463952][T24150] device sit0 left promiscuous mode [ 1251.417299][T24185] device macsec0 left promiscuous mode [ 1251.436401][T24181] device veth1_macvtap entered promiscuous mode [ 1251.453930][T24181] device macsec0 entered promiscuous mode [ 1251.553671][T20194] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1252.091591][T24203] device wg2 left promiscuous mode [ 1252.211079][T24206] device wg2 entered promiscuous mode [ 1252.751466][T24223] device sit0 entered promiscuous mode [ 1255.352744][T24251] device wg2 left promiscuous mode [ 1255.408235][T24252] device wg2 entered promiscuous mode [ 1255.644494][T24263] device sit0 left promiscuous mode [ 1255.767850][T24263] device sit0 entered promiscuous mode [ 1257.086867][T24288] device sit0 entered promiscuous mode [ 1257.827944][T24293] device wg2 left promiscuous mode [ 1257.860965][T24293] device wg2 entered promiscuous mode [ 1260.128198][T24342] device syzkaller0 entered promiscuous mode [ 1260.254390][T24347] device wg2 left promiscuous mode [ 1260.287268][T24348] device wg2 entered promiscuous mode [ 1260.538048][T24353] device syzkaller0 entered promiscuous mode [ 1262.153741][T24385] device wg2 left promiscuous mode [ 1262.186897][T24388] device wg2 entered promiscuous mode [ 1262.564880][T24393] device sit0 left promiscuous mode [ 1262.865055][T24406] device veth1_macvtap left promiscuous mode [ 1262.871567][T24406] device macsec0 left promiscuous mode [ 1262.968365][T24414] device veth1_macvtap entered promiscuous mode [ 1263.020156][T24414] device macsec0 entered promiscuous mode [ 1263.237167][T24420] device pim6reg1 entered promiscuous mode [ 1263.286395][T24422] device wg2 left promiscuous mode [ 1263.359264][T24426] device wg2 entered promiscuous mode [ 1264.021358][T24435] device veth1_macvtap left promiscuous mode [ 1264.027673][T24435] device macsec0 left promiscuous mode [ 1264.265639][T24435] device veth1_macvtap entered promiscuous mode [ 1264.274035][T24435] device macsec0 entered promiscuous mode [ 1264.515564][T24449] device sit0 entered promiscuous mode [ 1265.593266][T24480] device wg2 left promiscuous mode [ 1265.697362][T24480] device wg2 entered promiscuous mode [ 1265.819579][T24483] device macsec0 left promiscuous mode [ 1265.844743][T24483] device veth1_macvtap entered promiscuous mode [ 1265.852513][T24483] device macsec0 entered promiscuous mode [ 1265.883439][T20194] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1267.548144][T24534] device veth1_macvtap left promiscuous mode [ 1267.555422][T24534] device macsec0 left promiscuous mode [ 1267.721103][T24537] device veth1_macvtap entered promiscuous mode [ 1267.727568][T24537] device macsec0 entered promiscuous mode [ 1269.699494][T24566] device pim6reg1 entered promiscuous mode [ 1270.232529][T24582] device sit0 left promiscuous mode [ 1270.324061][T24573] device sit0 entered promiscuous mode [ 1271.298696][T24612] ref_ctr_offset mismatch. inode: 0x25be offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1271.982218][T24630] device veth1_macvtap left promiscuous mode [ 1271.988538][T24630] device macsec0 left promiscuous mode [ 1272.231520][T24624] device veth1_macvtap entered promiscuous mode [ 1272.265177][T24624] device macsec0 entered promiscuous mode [ 1273.561336][T24648] device sit0 left promiscuous mode [ 1273.631548][T24648] device sit0 entered promiscuous mode [ 1274.448863][T24682] device sit0 left promiscuous mode [ 1275.194954][T24698] device wg2 left promiscuous mode [ 1275.288789][T24701] device wg2 entered promiscuous mode [ 1275.385840][T24704] ref_ctr_offset mismatch. inode: 0x1edd offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1276.230122][T24737] device sit0 left promiscuous mode [ 1276.423450][T24745] device veth1_macvtap left promiscuous mode [ 1276.429677][T24745] device macsec0 left promiscuous mode [ 1276.460295][T24747] device veth1_macvtap entered promiscuous mode [ 1276.475748][T24747] device macsec0 entered promiscuous mode [ 1284.096719][T24920] device pim6reg1 entered promiscuous mode [ 1285.013523][T24937] device veth1_macvtap left promiscuous mode [ 1285.055870][T24937] device macsec0 left promiscuous mode [ 1285.243482][T24941] ref_ctr_offset mismatch. inode: 0x1e35 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1285.246299][T24937] device veth1_macvtap entered promiscuous mode [ 1285.271019][T24937] device macsec0 entered promiscuous mode [ 1290.462225][T25101] device sit0 left promiscuous mode [ 1296.841506][T25288] device wg2 left promiscuous mode [ 1298.255658][T25332] device wg2 entered promiscuous mode [ 1299.426876][T25370] device wg2 left promiscuous mode [ 1300.966478][T25417] device wg2 left promiscuous mode [ 1301.068481][T25423] device wg2 entered promiscuous mode [ 1302.542198][T25478] device wg2 left promiscuous mode [ 1302.622184][T25478] device wg2 entered promiscuous mode [ 1317.133068][T25912] device wg2 left promiscuous mode [ 1317.165360][T25919] device wg2 entered promiscuous mode [ 1330.558806][T26358] device wg2 left promiscuous mode [ 1330.637058][T26354] device wg2 entered promiscuous mode [ 1332.211824][T26409] device wg2 left promiscuous mode [ 1332.219714][T26409] device wg2 entered promiscuous mode [ 1349.227440][T26921] device wg2 left promiscuous mode [ 1349.315216][T26923] device wg2 entered promiscuous mode [ 1350.052134][ T30] audit: type=1400 audit(1752765126.140:157): avc: denied { create } for pid=26957 comm="syz.1.8534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1354.036995][T27092] device wg2 left promiscuous mode [ 1354.108476][T27101] device wg2 entered promiscuous mode [ 1354.976083][T27140] device wg2 left promiscuous mode [ 1355.050673][T27141] device wg2 entered promiscuous mode [ 1356.581609][T27179] device wg2 left promiscuous mode [ 1356.642857][T27186] device wg2 entered promiscuous mode [ 1363.646828][T27373] device wg2 left promiscuous mode [ 1363.742874][T27366] device wg2 entered promiscuous mode [ 1367.493445][T27479] device wg2 entered promiscuous mode [ 1369.732770][T27522] device wg2 left promiscuous mode [ 1369.806116][T27522] device wg2 entered promiscuous mode [ 1371.964390][T27552] device wg2 left promiscuous mode [ 1372.091724][T27557] device wg2 entered promiscuous mode [ 1374.563184][T27596] device wg2 left promiscuous mode [ 1374.574013][T27598] device wg2 entered promiscuous mode [ 1380.316636][T27723] device wg2 left promiscuous mode [ 1380.366229][T27723] device wg2 entered promiscuous mode [ 1401.745545][T28061] device wg2 left promiscuous mode [ 1401.777451][T28066] device wg2 entered promiscuous mode [ 1403.774760][T28112] device wg2 left promiscuous mode [ 1403.947439][T28107] device wg2 entered promiscuous mode [ 1412.120175][T28248] device wg2 left promiscuous mode [ 1412.152165][T28249] device wg2 entered promiscuous mode [ 1427.756489][T28515] device wg2 left promiscuous mode [ 1427.836783][T28509] device wg2 entered promiscuous mode [ 1441.317566][T28755] device wg2 left promiscuous mode [ 1441.400612][T28755] device wg2 entered promiscuous mode [ 1458.511789][T29029] device wg2 left promiscuous mode [ 1458.565058][T29032] device wg2 entered promiscuous mode [ 1461.824501][T29068] device wg2 left promiscuous mode [ 1461.901482][T29070] device wg2 entered promiscuous mode [ 1463.098922][T29107] device wg2 left promiscuous mode [ 1463.118153][T29103] device wg2 entered promiscuous mode [ 1471.397136][T29231] device wg2 left promiscuous mode [ 1471.453343][T29232] device wg2 entered promiscuous mode [ 1475.512719][T29274] device wg2 left promiscuous mode [ 1475.586543][T29275] device wg2 entered promiscuous mode [ 1515.983759][T29749] device wg2 left promiscuous mode [ 1515.994697][T29745] device wg2 entered promiscuous mode [ 1537.685519][T30046] device wg2 left promiscuous mode [ 2046.910492][ T460] kworker/dying (460) used greatest stack depth: 20640 bytes left [ 2486.241211][ T30] audit: type=1400 audit(1752766262.350:158): avc: denied { read } for pid=7258 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Stopping sshd: stopped /usr/sbin/sshd (pid 193) OK Stopping crond: stopped /usr/sbin/crond (pid 185) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 139) [ 2487.656176][ T30] audit: type=1400 audit(1752766263.760:159): avc: denied { search } for pid=7286 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping network: [ 2488.576284][ T30] audit: type=1400 audit(1752766264.680:160): avc: denied { write } for pid=140 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2488.613900][ T30] audit: type=1400 audit(1752766264.680:161): avc: denied { remove_name } for pid=140 comm="dhcpcd" name="sock" dev="tmpfs" ino=484 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2488.639939][ T30] audit: type=1400 audit(1752766264.680:162): avc: denied { unlink } for pid=140 comm="dhcpcd" name="sock" dev="tmpfs" ino=484 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 [ 2488.663015][ T30] audit: type=1400 audit(1752766264.740:163): avc: denied { unlink } for pid=140 comm="dhcpcd" name="pid" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 OK Stopping iptables: OK [ 2488.761077][ T30] audit: type=1400 audit(1752766264.840:164): avc: denied { search } for pid=7300 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping system message bus: [ 2488.792737][ T30] audit: type=1400 audit(1752766264.840:165): avc: denied { write } for pid=7300 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2488.833199][ T30] audit: type=1400 audit(1752766264.840:166): avc: denied { add_name } for pid=7300 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2488.889497][ T30] audit: type=1400 audit(1752766264.840:167): avc: denied { create } for pid=7300 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 done killall: can't kill pid 6356: No such process killall: can't kill pid 6802: No such process Stopping klogd: OK Stopping acpid: OK Stopping syslogd: stopped /sbin/syslogd (pid 83) OK umount: can't remount debugfs read-only umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only umount: can't remount /dev/root read-only The system is going down NOW! Sent SIGTERM to all processes [ 2491.537529][ T30] kauditd_printk_skb: 5 callbacks suppressed Connection to 10.128.0.30 closed by remote host. [ 2491.537545][ T30] audit: type=1400 audit(1752766267.630:173): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[429]" dev="pipefs" ino=429 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 Sent SIGKILL to all processes Requesting system poweroff [ 2492.900910][ T332] GPL: port 1(erspan0) entered disabled state [ 2492.908033][ T332] GPL: port 1(erspan0) entered disabled state [ 2492.915265][ T332] device erspan0 left promiscuous mode [ 2492.920817][ T332] GPL: port 1(erspan0) entered disabled state [ 2492.929240][ T332] device erspan0 left promiscuous mode [ 2492.934937][ T332] GPL: port 1(erspan0) entered disabled state [ 2493.020894][ T7322] GPL: port 2(syz_tun) entered disabled state [ 2493.028222][ T7322] GPL: port 2(syz_tun) entered disabled state [ 2493.241190][ T332] device ÿÿÿÿÿÿ left promiscuous mode [ 2493.246761][ T332] GPL: port 2(ÿÿÿÿÿÿ) entered disabled state [ 2493.254686][ T332] device veth1_macvtap left promiscuous mode [ 2493.261233][ T332] device veth1_macvtap left promiscuous mode [ 2493.700195][ T7341] kvm: exiting hardware virtualization [ 2493.707246][ T7341] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 2493.714133][ T7341] ACPI: PM: Preparing to enter system sleep state S5 [ 2493.721491][ T7341] reboot: Power down serialport: VM disconnected.