last executing test programs: 5.989571301s ago: executing program 1 (id=3617): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8000000000000000, 0x5}, 0x4130, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfff4}, 0x0, 0x0, r0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x20, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0xffffffffffffff64, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000080000000500000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000002200000000000000000018130000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r5 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r4}, 0x8) close(r5) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0)={r5, r4, 0x0, r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x7ffe}, 0x6105, 0x0, 0x3}, 0x0, 0xfefffffffffffffb, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) 5.50027485s ago: executing program 2 (id=3628): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0xc0fd3b5db255bf83, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000001c0)={0x6, &(0x7f0000000180)=[{0xf74a, 0x6, 0x4, 0x5}, {0xc2b7, 0xfc, 0x6}, {0x8, 0xc6, 0x4, 0x5}, {0x1, 0x6, 0x9, 0x3ff}, {0x8c5, 0x8, 0x2, 0x5}, {0x2, 0xf, 0x9, 0x7}]}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000200)={'syz_tun\x00', 0x200}) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x5, [@enum={0xf, 0x1, 0x0, 0x6, 0x4, [{0x7, 0x3cec}]}, @struct={0x10, 0x6, 0x0, 0x4, 0x0, 0x0, [{0xe, 0x4, 0x7}, {0x10, 0x1, 0x3}, {0xb, 0x0, 0xff}, {0xc, 0x4, 0x5}, {0x10, 0x4, 0x4}, {0x9, 0x5, 0xc}]}, @decl_tag={0xe, 0x0, 0x0, 0x11, 0x5}]}, {0x0, [0x30, 0x5f, 0x47]}}, &(0x7f0000000300)=""/31, 0x95, 0x1f, 0x0, 0x7fff, 0x10000}, 0x28) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x280000, 0x7, 0x2bdf, 0x20, r0, 0x10, '\x00', r2, r4, 0x0, 0x0, 0x5, 0x1}, 0x50) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={r1, 0x1, 0x8}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480)=@o_path={&(0x7f0000000440)='./file0\x00', 0x0, 0x8, r0}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000500)=[0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0], 0x0, 0x9c, &(0x7f0000000580)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x91, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000800)={0x1b, 0x0, 0x0, 0x7, 0x0, r7, 0xe, '\x00', r9, r4, 0x0, 0x3}, 0x50) r12 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c00)={0x6, 0x1a, &(0x7f0000000980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@map_val={0x18, 0x0, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xf}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a80)='GPL\x00', 0xdc1, 0x5e, &(0x7f0000000ac0)=""/94, 0x40f00, 0x44, '\x00', r9, 0x25, r4, 0x8, &(0x7f0000000b40)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000b80)={0x3, 0x3, 0xc, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r6], 0x0, 0x10, 0x7}, 0x94) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x18, 0xf, &(0x7f0000000880)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @map_val={0x18, 0x7, 0x2, 0x0, r7}], &(0x7f0000000900)='syzkaller\x00', 0xfffffffd, 0x11, &(0x7f0000000940)=""/17, 0x41100, 0x2, '\x00', r2, @fallback=0x7, r4, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r10, r12, 0x3, &(0x7f0000000cc0)=[r0], &(0x7f0000000d00)=[{0x3, 0x3, 0xd, 0xc}, {0x4, 0x2, 0x7, 0x2}, {0x4, 0x1, 0xc, 0xa}], 0x10, 0x6d9}, 0x94) r14 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={&(0x7f0000000ec0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x110, 0x110, 0x7, [@ptr={0x6}, @enum={0x7, 0x3, 0x0, 0x6, 0x4, [{0x5, 0x154}, {0x8, 0x6}, {0x5, 0x451e233}]}, @enum={0x9, 0x8, 0x0, 0x6, 0x4, [{0x0, 0xfddc}, {0x3, 0x7f}, {0x4, 0x3}, {0x8, 0x800}, {0xb, 0x8}, {0xb, 0x4}, {0x5, 0xfffffffe}, {0x3, 0x7fff}]}, @fwd={0x7}, @type_tag={0x2, 0x0, 0x0, 0x12, 0x3}, @union={0x10, 0x6, 0x0, 0x5, 0x0, 0xff, [{0x5, 0x5, 0x5}, {0xa, 0x3, 0x2}, {0xf, 0x4, 0xfff}, {0x6, 0x3, 0xd3b}, {0x7, 0x3, 0xb}, {0xa, 0x0, 0x9}]}, @ptr={0x10, 0x0, 0x0, 0x2, 0x5}, @enum={0xf, 0x2, 0x0, 0x6, 0x4, [{0xe, 0x40}, {0xd, 0x8f2f}]}]}, {0x0, [0x5f, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000001000)=""/245, 0x12f, 0xf5, 0x1, 0x7cad, 0x10000}, 0x28) r15 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000011c0)={r8}, 0x4) r16 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001240)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000e00)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x334}, @map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffff9}, @jmp={0x5, 0x1, 0xd, 0x1, 0xb, 0x10, 0x10}], &(0x7f0000000e40)='GPL\x00', 0xdc14, 0x28, &(0x7f0000000e80)=""/40, 0x7aa34ffa0fcc45be, 0x0, '\x00', r9, 0x18, r14, 0x8, &(0x7f0000001140)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000001180)={0x5, 0x1, 0x2, 0x80}, 0x10, 0x14cae, r15, 0x2, 0x0, &(0x7f0000001200)=[{0x3, 0x2, 0x5, 0x9}, {0x3, 0x5, 0x5, 0x6}], 0x10, 0xfff}, 0x94) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000001300)=0x1) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@base={0x4, 0x3210, 0x10000, 0x399, 0x2, r11, 0x4, '\x00', r2, r4, 0x5, 0x1, 0x1}, 0x50) openat$cgroup_freezer_state(r6, &(0x7f00000013c0), 0x2, 0x0) write$cgroup_freezer_state(r7, &(0x7f0000001400)='THAWED\x00', 0x7) close(r13) r17 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r10, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r16, 0xe0, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000017c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000001800)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001840)=[0x0], 0x0, 0x36, &(0x7f0000001880)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000018c0), &(0x7f0000001900), 0x8, 0x3c, 0x8, 0x8, &(0x7f0000001940)}}, 0x10) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000001ac0)={0x14, 0x2a, &(0x7f0000001440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7fff}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x872}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000015c0)='GPL\x00', 0x3, 0xec, &(0x7f0000001600)=""/236, 0x0, 0x5, '\x00', 0x0, @fallback=0xf, r17, 0x8, &(0x7f0000001740)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000001780)={0x0, 0xc, 0xec3, 0x5}, 0x10, r18, r16, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001e40)={r19, 0xe0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001b80)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000001bc0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001c00)=[0x0], 0x0, 0x62, &(0x7f0000001c40)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001c80), &(0x7f0000001cc0), 0x8, 0x7d, 0x8, 0x8, &(0x7f0000001d00)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=@bloom_filter={0x1e, 0xdc8c, 0xfffffc00, 0x3, 0x40044, r4, 0x7ff, '\x00', r20, 0xffffffffffffffff, 0x5, 0x1, 0x1, 0x5}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001f00)={0x1b, 0x0, 0x0, 0x85a, 0x0, r0, 0x7fffffff, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x5}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001f80)={0x1b, 0x0, 0x0, 0x9f, 0x0, 0x1, 0x4, '\x00', r20, r17, 0x2, 0x1}, 0x50) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002100)={@ifindex=r20, 0x22, 0x0, 0x100, &(0x7f0000002000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000002040)=[0x0, 0x0], &(0x7f0000002080)=[0x0, 0x0, 0x0], &(0x7f00000020c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000002140)={@cgroup, r13, 0x21, 0x4000, r15, @void, @value=r15, @void, @void, r21}, 0x20) 5.224707467s ago: executing program 2 (id=3630): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x53}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) (async) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3558, 0x8}, 0x0, 0x0, 0x0, 0x9, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) sendmsg$unix(0xffffffffffffffff, 0x0, 0x24008010) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) (async) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 5.172000903s ago: executing program 1 (id=3631): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0xfffffffffffffde1, 0x10, &(0x7f0000002e00), &(0x7f0000000300), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/13, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000020001000900000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000008000000000000000001811da0058408ae2a35d5e54a21afc2f8c2ddd7899b29e87ee947aed64fc094d2c9d5a8f5a1adbe2dbe78d1424d30a0f6ff1771f24702eee47dce99d0ca2c4fe33071b0f253f0170dcda949954ae7f607506c7b57b3690a311ace2f554029b63ec067659b8a344a1e148802abd54ef39b234b0abddf73bc9648e5decbe04000000f135cd8b5ed63de9dc9643af9b", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001a40)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) 5.145580865s ago: executing program 2 (id=3632): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) close(r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYRES32=0x0, @ANYRES32=r0, @ANYRES32=r1], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000002c0)='rss_stat\x00', r2}, 0x18) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="00007fffffffffffffff00"/20, @ANYRES32=0x0, @ANYBLOB], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x800}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r7) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x4, 0xc}, 0x48) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000440)={0xffffffffffffffff, r0}, 0xc) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r8) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, @perf_bp={0x0, 0xc}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x895}, 0x0, 0x0, 0xffffffffffffffff, 0x9) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r9) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x12, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x81}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000180)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0xa, 0x8, 0xc795}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000280)=[r0, r0, r0, r0, 0x1, r0], &(0x7f0000000300)=[{0x3, 0x2, 0x3, 0x2}], 0x10, 0x7f}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)=@o_path={&(0x7f0000000000)='./file0\x00', r10, 0x4000, r3}, 0x18) 4.462681823s ago: executing program 4 (id=3635): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000731122000000000016000000000000009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0xfffffffa, 0xfd90, &(0x7f0000000240)=""/195, 0x41000, 0x11, '\x00', 0x0, @sched_cls}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x6b7, 0x0, 0x1}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000200007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000007d00000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="1b0000000000000000000000c30e000000000000", @ANYRES32=r0, @ANYBLOB="ffffff7f000000008ab53b1ba46465150000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x18, 0x26, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffff}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xc}, @exit, @exit, @call={0x85, 0x0, 0x0, 0x43}, @jmp={0x5, 0x1, 0x2, 0x3, 0x3, 0x1, 0xfffffffffffffff0}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000006c0)='GPL\x00', 0x2d, 0x35, &(0x7f0000000700)=""/53, 0x81e00, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000780)=[r3, r3, r3], &(0x7f00000007c0)=[{0x5, 0x3, 0xd, 0x3}, {0x2, 0x3, 0x0, 0x1}, {0x3, 0x4, 0x0, 0xc}, {0x4, 0x2, 0x5, 0xa}], 0x10, 0xffffffa0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r2}, 0x18) r6 = openat$cgroup(r1, &(0x7f00000008c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_pressure(r6, &(0x7f0000000900)='io.pressure\x00', 0x2, 0x0) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 3.954718304s ago: executing program 0 (id=3639): bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x69}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x69}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="61105c00000000006113380000000000bfa00000000000000700000008ffffffd50301001874004095000600000000006916360000000000bf67000000000000360607000fff07201706000020190000160300000ee60060bf050000000000007b650000000000006507f9ff01000000070700004ddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f17540faf80250aa20c669a5e12814cb1cea5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000400c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44221b235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10fd7ed6735154beb4000000000000000000000000004000bc00f6746a9709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43ea0ffb567b40407d000000210000000000000000005f37d8703f37ca364a601ae899a56715a0a62a34c1d926a0f6a5480a55c22fe3a5ac00000000000000000000000500002000000000fb79ea00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e14d90deae46e26c596f84eba90000000000000000fffb0000000082fb0d3cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b06ff7f0000000000007f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6106f117b062df67d3a6473265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089e0b1c23c0f3cdad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631d22bad050e9856b48ae3a03a497c37758537650fe6db89da3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0af1cb3f1f815f8989d78854ca4d3116dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff139604faf0453bedf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c29984864961a57ff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee15620789c524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2b4dc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca87ddd9d064e081383409ed2912c811ae63f03212a5331c2a4ead000000000000000000000000000000000000000000000000001386866b311bd144bc32e059658c9f8342c90c1ade31b78072841b8b5a943d62a44cea6b050c42e3c205fad6a23fb43c93da0f49d911877265e6ee443e37397ecf89021e7f579e8d3a74c12b52938d91e9de07fc8eeeb9505f4a9c26266bf5449484ccc1317c747664e9f7478f8200000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) 3.816746588s ago: executing program 0 (id=3641): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x2, 0x10, 0x4, 0x0, 0x0, 0x3, 0x175c5c, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x3}, 0x89, 0xc8, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000a00)='fib_table_lookup\x00', r4}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) close(r1) recvmsg$unix(r0, 0x0, 0x40) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18060000100000000000000062f9070000e3000000000000b8698f357f200984ae75abd3430528a9c270b943d98410ee2886a334c4f4a8044c5bc3705e7d9e25cef90385d31c867adb6455"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00'}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x8000000000000, 0xffff0000, 0x0, 0x0, 0x5ff, 0x0, 0x400}, 0x0, 0x10, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000140)={'nr0\x00', 0x6132}) 3.749863535s ago: executing program 3 (id=3642): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r1}, &(0x7f0000000800), &(0x7f0000000840)=r2}, 0x17) perf_event_open(&(0x7f0000000a00)={0x5, 0x80, 0x2, 0x0, 0x3, 0x0, 0x0, 0x400, 0x2805a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0), 0xf}, 0x0, 0x401, 0x200, 0x0, 0x7, 0x0, 0x101, 0x0, 0x400000}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x20, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x200081}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100023}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000d0300000000000000000000011000000080000000000000000000000300"], 0x0, 0x4e}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000840)=ANY=[@ANYRES32, @ANYBLOB="1e00004000120000005000002df0acd92e93529179c14230e8269e17d57a82f7df69650ec6c8111e5d20aef880d5d7f2d1cd6fe47bc02e5b08c98b35ca8c9a7964f45f0b427fa1aebf962f2796454c84b41061a29aadd10286941db10bc21cbaf827e43bffb5c0ab13370eb4651e2a00fbcf22fd9b782c4f60eb0b195e520ec1dc55fcc4efe28ba2989037f0f945842c9d0cd5df95c4664ae9617698b6937b0cae", @ANYRES64], 0x10) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000080)=ANY=[@ANYBLOB='+cqu '], 0x5) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180e000000000000000000000000000095bf000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2004}, 0x80) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[], 0x5) close(0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000"], &(0x7f0000000440)='GPL\x00', 0x4, 0x99, &(0x7f0000000480)=""/153}, 0x94) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)=@o_path={&(0x7f0000000040)='./file0\x00', 0x0, 0x4000, r3}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4, 0x0, 0x2}, 0x18) socketpair(0x9, 0x5, 0x1, &(0x7f00000001c0)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 3.50065905s ago: executing program 4 (id=3643): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r1, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x102004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r6}, &(0x7f0000000180), &(0x7f00000001c0)=r5}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x9, 0x1, 0x7fe2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0x9e0}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r10, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000200)={r10, &(0x7f0000000080), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r9}, 0x10) 3.429974867s ago: executing program 0 (id=3644): close(0x3) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00007fffffffffffffff00"/20, @ANYRES32=0x0, @ANYBLOB], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x204000, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f00000002c0)=0x49) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r5) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, @perf_bp={0x0, 0xc}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x895}, 0x0, 0x0, 0xffffffffffffffff, 0x9) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, 0x0, 0x0) close(r6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000580)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x6e}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 3.423657637s ago: executing program 3 (id=3645): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000200), &(0x7f00000003c0)=r1}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), 0x0}, 0x20) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="16000000000000"], 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0xffffffff, 0xe, 0x0, 0x9}, 0x0, 0x10, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd4242"], 0xfdef) (async) close(r4) (async) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, 0x0, 0x48) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000003000), 0x201, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, 0x0, 0x0) 3.312119068s ago: executing program 4 (id=3646): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000007000000020000000400000005"], 0x87) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000e500000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000020000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(0x0, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xffc0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r0, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)='%pi6 \x00'}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r6, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000080)=[0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0], 0x0, 0xae, &(0x7f00000001c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0xfa, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1c, 0x23, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3c09}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_fd={0x18, 0x6, 0x1, 0x0, 0x1}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_fd={0x18, 0x6}, @call={0x85, 0x0, 0x0, 0x34}]}, &(0x7f0000000680)='GPL\x00', 0x80000001, 0x2f, &(0x7f0000000780)=""/47, 0x40f00, 0x0, '\x00', r7, @fallback=0x23, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x3, 0x10, 0x7f, 0x7}, 0x10, r8, r6}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000680)={0x9ec, 0x0}, 0x8) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x400, 0x1f, 0x5, 0x70006, r0, 0x10, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x5, 0x7}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x1f, 0x1b, &(0x7f0000000540)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @map_idx_val={0x18, 0xd, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, @ldst={0x0, 0x1, 0x1, 0x1, 0x7, 0xfffffffffffffff8, 0x10}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7ff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f0000000340)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0xcf8f5d69b364aeb6, 0x44, '\x00', r7, @fallback=0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x1, 0x9, 0x8, 0x8001}, 0x10, r9, r3, 0x3, &(0x7f0000000800)=[r1, r0, r1, r10, r0, 0xffffffffffffffff, r1], &(0x7f0000000880)=[{0x2, 0x3, 0x6, 0x4}, {0x0, 0x4, 0xa, 0x2}, {0x4, 0x4, 0x5, 0x4}], 0x10, 0x9}, 0x94) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x80) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x900000000000100, 0x7, 0x5, 0x2000000000000000, 0x200000, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r11}, 0x10) 3.287793621s ago: executing program 3 (id=3647): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)=ANY=[@ANYRESOCT=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0xb}, {0x26, 0x0, 0x0, 0xfffffff9}}, [@printk={@p, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xb, 0x9, 0xa, 0xfff9}, {0x7, 0x0, 0x3}, {}, {}, {0x4}}], {{0x5, 0x1, 0x2, 0x3}, {0x5, 0x0, 0xb, 0x3}, {0x85, 0x0, 0x0, 0x76}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 3.207363829s ago: executing program 3 (id=3648): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) (async) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r3], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f00000002c0)='cpuset.mems\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) (async) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) (async) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r7}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000d80)=ANY=[], 0x48) (async) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000d80)=ANY=[], 0x48) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000008000000060000000000000e010000000000000000000000010000060400000006000000000000000000000000005f005d8819de4d1ec8c0843d21"], &(0x7f00000001c0)=""/131, 0x44, 0x83, 0x1}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa, &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa2, 0x0, 0x0, 0x10, &(0x7f0000000700), &(0x7f0000000540), 0x8, 0xdd, 0x8, 0x0, 0x0}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa, &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa2, 0x0, 0x0, 0x10, &(0x7f0000000700), &(0x7f0000000540), 0x8, 0xdd, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="1e000000a01200000a000000fc69ab7703000000", @ANYRES32, @ANYBLOB='\b\x00'/20, @ANYRES32=r10, @ANYRES32, @ANYBLOB], 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_tracing={0x1a, 0xc, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x101}}, @exit]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x0, '\x00', r10, 0x18, r9, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xc4ca, 0xffffffffffffffff, 0x4, &(0x7f0000000280)=[r8, r8, r8, r8], &(0x7f0000000340)=[{0x5, 0x4, 0xa}, {0x2, 0x5, 0xe, 0xa}, {0x5, 0x2, 0xd, 0x8}, {0x2, 0x5, 0x6, 0x4}], 0x10, 0x7fff}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b80)={r5, 0x20, &(0x7f0000000800)={&(0x7f0000000980)=""/254, 0xfe, 0x0, &(0x7f0000000a80)=""/193, 0xc1}}, 0x10) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b80)={r5, 0x20, &(0x7f0000000800)={&(0x7f0000000980)=""/254, 0xfe, 0x0, &(0x7f0000000a80)=""/193, 0xc1}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c40)={{r0, 0xffffffffffffffff}, &(0x7f0000000bc0), &(0x7f0000000c00)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x12, 0x3, &(0x7f0000000540)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0x9}], &(0x7f0000000600)='syzkaller\x00', 0x8, 0x29, &(0x7f0000000640)=""/41, 0x100, 0x40, '\x00', r10, @cgroup_sock_addr=0xb, r5, 0x8, &(0x7f00000007c0)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, r11, 0xffffffffffffffff, 0x0, &(0x7f0000000c80)=[r0, r12, r6, r0, r5, r3, r0, r3, 0x1], 0x0, 0x10, 0x2}, 0x94) 3.030180207s ago: executing program 2 (id=3649): bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0}, 0x18) bpf$ENABLE_STATS(0x20, &(0x7f0000000880), 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00007e0d100500000002000000040600"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="18117a8f6cd29a9eb37b176b0000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000230000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000009706400001000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000ffffffff18120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000180)=""/139, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0x2, 0xfffffff9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000300)=[r1], &(0x7f00000004c0)=[{0x1, 0x2, 0xd, 0x6}, {0x4, 0x4, 0x9, 0x6}], 0x10, 0x10001}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r6, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) close(r5) bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000700"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) close(r7) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000180)='sys_enter\x00', r9}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 2.981877432s ago: executing program 1 (id=3650): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000020000000000000061198c00000069009500000000000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x80) 2.935516097s ago: executing program 2 (id=3651): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffd74) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001}, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000b80)=ANY=[@ANYBLOB="9feb01005ffc"], 0x0, 0xfc5f}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b708"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000300), 0x75, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r4, 0x0, 0x0}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r8}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) ioctl$SIOCSIFHWADDR(r7, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) 2.857931704s ago: executing program 4 (id=3652): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000009400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) sendmsg$inet(r0, &(0x7f0000000ac0)={&(0x7f0000000500)={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000000a00)=[{&(0x7f0000000540)="bd53ef201f7f34347dca1915d55e3e0532baac76e6e38e56969b04d408a44e84683aa813d4edb8799e4d580c87529bcfc14ae60fc087645b7629f88f39086cbd9f8ed1bb5e190a9cfbde607b95c40f7e24c0c2ccbc8fd021d13c3a7e4244", 0x5e}, {&(0x7f00000008c0)="f8d90cf1b33284786dd3e19747faaffb019394e41143d95c5f777ca5ea25fe1da080af48f5641eef4384554e68ef36ec3bee2c087c1775ef07d1e7eab084", 0x3e}, {&(0x7f0000000900)="bce7f775429e5ba10e98353f1854d28ac8f547756830cf4a64612ca0cf37de6e75bd60a32b814f19e19d08fc2cc3041826166c63567c8374a2044a335fd1cabf98599acabf5b42c85ac010d05ffc665e15c9f2da9e6ab03a668ac6df1bf1c2b8238a1cab667ab0d7e394fdc11c1ceaff34842d4fbabac422389bf5ba3bf800036b33bfab9b9a", 0x86}, {&(0x7f0000000d00)="a808ac811f173b8c93a060dc5468a8fbd998d64419427c2462345e8d07833f3deb1e7d19a36f01d8a00867dc98c4b855b7ca76beb03af91254cea5f79d867f6abc2816306177e27741c396d9954deb4f616b8ce385fb8be68c9ff1a6925aa278522af9ef14e6378caa3ab4f7c987b3a8a101974e3a31fa63af3d6338343f10dc89425b4743c79b02a98d1809540c3f13eae303b983ac38f06e5ef45fb08c92d90894842401e560ed5cdc070a0ca0a5bc33c00eeb455ab752784d1f3f8948b0bc76063e93cad6a239cc63ff332c205a45782f1313e0d452ce50a427d41a9926b338f359820aee318b1fe36f9234fbdb82cb4b871732b832", 0xf7}], 0x4, &(0x7f0000000a40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x92}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1102b98d}}], 0x30}, 0x80) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r3}, 0x18) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x14, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x4e}]}, &(0x7f0000000080)='syzkaller\x00'}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNATTACHFILTER(r5, 0xc0189436, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) unlink(&(0x7f0000000000)='./cgroup.cpu/cpuset.cpus/file0\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b708000000feffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f0000000380)=""/29, 0x1d, 0x0, &(0x7f00000003c0)=""/2, 0x2}}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYRES8], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r7, r4}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r9}, 0x10) (async, rerun: 64) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x13}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r12}, 0x10) (async) gettid() (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) sendmsg$unix(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000007c0)='T', 0x1}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18}, 0x0) (async) recvmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000280)=""/230, 0xe6}], 0x1}, 0x0) 2.827790057s ago: executing program 1 (id=3653): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x7, 0xfff, 0x7}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0x0, 0xe6, &(0x7f0000000400), 0x0, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0xe8, 0x8, 0xfde2, &(0x7f0000000540)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0100000205000000000000000900000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r1, @ANYRES32, @ANYBLOB="ffffffff000000000200"/28], 0x50) (async) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001140), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x2, 0x4, &(0x7f0000001000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@jmp={0x5, 0x1, 0x9, 0xb, 0x8, 0xc}]}, &(0x7f0000001040)='GPL\x00', 0x75, 0xaa, &(0x7f0000001080)=""/170, 0x41000, 0x4, '\x00', r1, @fallback=0x3e, r2, 0x8, &(0x7f0000001180)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000011c0)={0x2, 0x10, 0xa, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x2, &(0x7f0000001200), &(0x7f0000001240)=[{0x4, 0x5, 0xd, 0x2}, {0x4, 0x5}], 0x10, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xfbcb26cf476f522b, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2"], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xfe0f183f06ec5d87, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) (async) r5 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r5, 0x0) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x58, 0x4, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r6}, &(0x7f00000002c0), &(0x7f0000000340)=r4}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xaf) (async) r8 = gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) syz_open_procfs$namespace(r8, &(0x7f0000000280)='ns/user\x00') (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x28) (async) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000100000000851000000300000818200000", @ANYRES32, @ANYBLOB="000000000000000095000000000000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x3}, 0x80) (async) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.466356683s ago: executing program 0 (id=3654): bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="02000000af000000020000000c00000000140016c8426aee00", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRES64=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r3 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r2}, 0x8) close(r3) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x35, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x600000000000000, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x17, 0x12, &(0x7f0000000780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@map_val={0x18, 0x2, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x8, 0xf0, &(0x7f0000000840)=""/240, 0x41000, 0x41, '\x00', 0x0, @fallback=0x1, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r1, 0x5, &(0x7f0000000340)=[r3], &(0x7f00000006c0)=[{0x0, 0x2, 0x6, 0x1}, {0x2, 0x5, 0x8, 0x5}, {0x5, 0x5, 0x3, 0x1}, {0x4, 0x3, 0xa, 0x6}, {0x1, 0x4, 0xc}], 0x10, 0x3}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000400)={r7}, 0xc) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0xa}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)=@generic={&(0x7f0000000500)='./file0\x00'}, 0x18) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x4d, 0x1, 0x3}]}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0)={r3, r2, 0x0, r3}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000080000000000000000000080850000000f00000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000725e850000000100000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000680)={r10}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 125.341407ms ago: executing program 3 (id=3655): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001", @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="160000000000000061b1000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r5, 0x0, &(0x7f0000001780)=""/4096}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$TOKEN_CREATE(0x24, &(0x7f0000000300)={0x0, r3}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x10, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r7, r2, 0x0, 0x1, &(0x7f0000000280)='\x00'}, 0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r6}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r8, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) close(r8) sendmsg$inet(r9, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000061193000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 124.987408ms ago: executing program 1 (id=3656): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0xc, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000800b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000280), 0x84, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='wbt_stat\x00', r1, 0x0, 0x6a}, 0x2) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 122.706698ms ago: executing program 2 (id=3657): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000071103b00000000009512000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000740)={0x0, r3}, 0x8) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b0000000000000000000000040000", @ANYRES32=r1, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000001000000000000bb5ce5debb585eb287b03460e9d311235e92b1f400"/42], 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0x0, 0x0}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x4, 0x45, 0x1488, 0xffffffffffffffff, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r8) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2d, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETOFFLOAD(r9, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r8, 0x40047451, &(0x7f0000000180)) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='ext4_es_remove_extent\x00', r10}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 121.383178ms ago: executing program 4 (id=3658): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1802009200fcffff000100000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000500000095000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xbc) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x19}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000010c0)) 57.250984ms ago: executing program 3 (id=3659): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000640)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x81) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x3d) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@cgroup=r1, 0x26, 0x1, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000200)=[0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r1, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r11, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000580)=""/219, 0xdb}], 0x1, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}, 0x10020) close(r9) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r14}, 0x10) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000005000000000000010018120000", @ANYRES32=r12, @ANYRESDEC=r11], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000002d00)='kmem_cache_free\x00', r15}, 0x18) close(r10) r16 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@ifindex=r8, r2, 0x31, 0x2002, r6, @value=r16, @void, @void, @void, r7}, 0x20) 56.385644ms ago: executing program 0 (id=3660): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x28}, 0x18) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) r3 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000140)={0x0, r0}, 0x8) close(r1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file1\x00', r2}, 0x18) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000200)=0xffffffffffffffff, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000240)={r4, r2, 0x4, r2}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xe, 0x0, 0x7, 0x8, 0x1c50, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1}, 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x3, 0xd7, 0x2a63, 0x45080, 0x1, 0x1ff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x125, 0x125, 0x7, [@const={0x7, 0x0, 0x0, 0xa, 0x3}, @type_tag={0x10, 0x0, 0x0, 0x12, 0x4}, @type_tag={0x2, 0x0, 0x0, 0x12, 0x2}, @volatile={0x7, 0x0, 0x0, 0x9, 0x3}, @func_proto={0x0, 0x9, 0x0, 0xd, 0x0, [{0x3, 0x2}, {0xc, 0x1}, {0xb, 0x4}, {0x5, 0x3}, {0xa}, {0xc, 0x1}, {0x1, 0x3}, {0x7, 0x4}, {0xd, 0x1}]}, @datasec={0xd, 0xa, 0x0, 0xf, 0x1, [{0x5, 0x0, 0x6}, {0x1, 0x1, 0x10001}, {0x5, 0x5, 0x204000}, {0x2, 0x98f, 0x3eec}, {0x5, 0xa, 0xfffffffa}, {0x4, 0x40, 0x7}, {0x4, 0x80000001, 0xc}, {0x5, 0x6ee, 0x7fffffff}, {0x1, 0x8001, 0x9}, {0x2, 0x7}], "b9"}, @func={0xf, 0x0, 0x0, 0xc, 0x3}, @int={0xd, 0x0, 0x0, 0x1, 0x0, 0x32, 0x0, 0x6b, 0x7}]}, {0x0, [0x0, 0x2e, 0x61, 0x61, 0x61]}}, &(0x7f00000006c0)=""/114, 0x147, 0x72, 0x1, 0x401}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000800)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe3, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0xa8, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x5}, 0x50) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=@bloom_filter={0x1e, 0x1000, 0x479, 0x7, 0x2a00, 0xffffffffffffffff, 0x512, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x50) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=@base={0x9, 0xffffff01, 0x81, 0x4, 0x20, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x50) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xf, 0x18, &(0x7f0000000380)=@raw=[@jmp={0x5, 0x0, 0xc, 0xf, 0x1, 0x1}, @map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffa}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @map_val={0x18, 0x9, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x7}, @exit], &(0x7f0000000440)='syzkaller\x00', 0xff, 0x0, 0x0, 0x41100, 0x20, '\x00', r7, @cgroup_device=0x6, r8, 0x8, &(0x7f0000000780)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x0, 0x4}, 0x10, r10, 0xffffffffffffffff, 0x1, &(0x7f0000000c80)=[r11, r12, r13], &(0x7f0000000cc0)=[{0x1, 0x3, 0x7}]}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000dc0)) r15 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000fc0)=@generic={&(0x7f0000000f80)='./file0\x00', 0x0, 0x8}, 0x18) r16 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001000)={0x3, 0x4, 0x4, 0xa, 0x0, r11, 0x7f8000, '\x00', r9, r8, 0x3, 0x5}, 0x50) r17 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001100)={0x6, 0x11, &(0x7f0000000e00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@map_fd={0x18, 0x8, 0x1, 0x0, r5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000ec0)='syzkaller\x00', 0xe, 0x37, &(0x7f0000000f00)=""/55, 0x40f00, 0x40, '\x00', r7, 0x25, r8, 0x8, &(0x7f0000000f40)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000001080)=[r5, r15, r5, r5, r6, r13, r6, r13, r16, r12], &(0x7f00000010c0)=[{0x0, 0x4, 0xf, 0x1}, {0x1, 0x4, 0x10, 0x7}, {0x1, 0x4, 0xc, 0x7}, {0x4, 0x1, 0x2, 0x6}], 0x10, 0xf92}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001300)={r13, &(0x7f00000011c0)="72bcd9e8d75b6d2612f2370fe3744cd6fa498b5bfb0c388e99b3ab54dc684096fdc551a112cd7d423cb1835b6fa2d457c618a756c2fa5014e7fc7a9ee789944f67334eacab43715533b02ba5e447b501568d80c84fb1ce605b6ab94c58d32041382191e33f83991eac3bbf22991e05af38d3689dcda3175145e8c1a0f202063f27752e757eb78df35f0b73914f141730b20fa826226740f2a2b747c84a27ff63efca66dfda65b21a946d4b84dc37c09ef8d1dd3a5c0cf9486db601a2edc1df48cafeaba73ede67f055a0b5eca7f7a1ff6c8578fbc6f0", &(0x7f00000012c0)=""/39}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001440)={@ifindex=r7, 0x7, 0x0, 0x9, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001400)=[0x0, 0x0, 0x0], 0x0}, 0x40) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000014c0)={0x0, 0x0}, 0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001480)={@ifindex=r18, r14, 0x3, 0x2034, r2, @void, @void, @value=r20, @void, r19}, 0x20) r21 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001800)=@bpf_ext={0x1c, 0x29, &(0x7f0000001500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x398, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@map_idx={0x18, 0x8, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x16, 0x3, 0x7, 0xd46}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @jmp={0x5, 0x0, 0x4, 0x9, 0xb, 0xfffffffffffffff4, 0x4}, @generic={0x0, 0xa, 0xe, 0x8, 0x9}, @map_val={0x18, 0x3, 0x2, 0x0, r15, 0x0, 0x0, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7ff}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001680)='syzkaller\x00', 0x8, 0x56, &(0x7f00000016c0)=""/86, 0x40e00, 0xb, '\x00', r9, 0x0, r8, 0x8, &(0x7f0000001740)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001780)={0x4, 0xe, 0x7, 0x6}, 0x10, 0x2dc18, r17, 0x0, &(0x7f00000017c0)=[r5], 0x0, 0x10, 0x3}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r21, 0xe0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0], 0x0, 0xa9, &(0x7f0000001980)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000019c0), &(0x7f0000001a00), 0x8, 0x68, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001ec0)={0x6, 0x1d, &(0x7f0000001bc0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@map_val={0x18, 0x8, 0x2, 0x0, r12, 0x0, 0x0, 0x0, 0x8001}, @cb_func={0x18, 0x8, 0x4, 0x0, 0x5}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @ldst={0x2, 0x3, 0x7, 0x1, 0x9, 0xfffffffffffffffe, 0x10}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001cc0)='GPL\x00', 0x1, 0xa9, &(0x7f0000001d00)=""/169, 0x41100, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001dc0)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000001e00)=[r15, r16], &(0x7f0000001e40)=[{0x4, 0x5, 0xb, 0x8}, {0x5, 0x1, 0xd, 0x9}, {0x3, 0x5, 0x10, 0x5}, {0x3, 0x1, 0x1, 0x8}, {0x0, 0x5, 0x5, 0x9}, {0x0, 0x3, 0xc, 0x9}, {0x2, 0x3, 0xf, 0x2}, {0x2, 0x5, 0x1, 0x3}], 0x10, 0x2}, 0x94) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001f80)={'veth1_to_team\x00', 0x400}) 28.826067ms ago: executing program 1 (id=3661): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000000)={@cgroup, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x21, &(0x7f0000000240)={0xffffffffffffffff, 0x1f2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={r0, &(0x7f00000002c0)="9c23e0c50cf34838ca05e3166e4d9a62d31e8cfa6fe1254ef15bd4bbccd1d7", &(0x7f0000000300)=""/191}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x49, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000480)={r4, &(0x7f0000000340), &(0x7f00000003c0)=""/183}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000500)={0x0, r3}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(r6, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 28.378107ms ago: executing program 4 (id=3662): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000280), 0x6, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'pim6reg1\x00', 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 0s ago: executing program 0 (id=3663): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004e9bf00060000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x88541, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/12], 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000001000000791260000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000940)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="160000070000000004fd380c366f3f89679b624b37956944e8000000ff00000600000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r4}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_int(r6, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000200)=ANY=[@ANYRESOCT=r7, @ANYBLOB='1-2:5/', @ANYRESHEX=r6], 0x31) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r8}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r10, &(0x7f0000000980)={0x0, 0xffffffffffffff13, &(0x7f0000000400)=[{&(0x7f0000000740)="559dbc1613263fac51343a6413c0efd0459f138fc622c63ef4cef8ed36050821356d408194cfe30e8dc94d6d9afdec6f1e0eb2dddc5f39377c7aaed1141f43b15a4d00d4601e7ed0f364a1149fc588ba305e0ccbc906df2f5ed4f5bea59146a4c2d1d21468e330e7fb38c58f5689e461bd2cc4612fd64194b808e0cd2c2357c6866f305e89e3a870c922beb49346bcd374416a42a92a58ab93a80d2df01337148f8521d2fcc64878fbb544e7918edb1031f2b97ff049dc5dcab4a01bc501f375939e223bdf7d1c0d5f08dda42fa3b8b4d66f486cf87177218bb1c7d1d70c9c860e32b1caa7e34eebd6479616fe8d9f974cffcf6394f55c5037a5fa9a", 0x1080}], 0x29a, 0x0, 0x3e80}, 0x11) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.60' (ED25519) to the list of known hosts. [ 20.319602][ T24] audit: type=1400 audit(1763336405.320:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.320839][ T267] cgroup: Unknown subsys name 'net' [ 20.328408][ T24] audit: type=1400 audit(1763336405.320:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.339019][ T24] audit: type=1400 audit(1763336405.330:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.339340][ T267] cgroup: Unknown subsys name 'devices' [ 20.485856][ T267] cgroup: Unknown subsys name 'hugetlb' [ 20.491460][ T267] cgroup: Unknown subsys name 'rlimit' [ 20.692288][ T24] audit: type=1400 audit(1763336405.690:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.715504][ T24] audit: type=1400 audit(1763336405.690:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.736640][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.740337][ T24] audit: type=1400 audit(1763336405.690:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 20.771990][ T24] audit: type=1400 audit(1763336405.750:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.797404][ T24] audit: type=1400 audit(1763336405.750:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.827042][ T24] audit: type=1400 audit(1763336405.830:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.852576][ T24] audit: type=1400 audit(1763336405.830:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.852638][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.839065][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.846289][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.853742][ T275] device bridge_slave_0 entered promiscuous mode [ 21.861792][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.868896][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.876449][ T275] device bridge_slave_1 entered promiscuous mode [ 21.919380][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.926773][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.934421][ T276] device bridge_slave_0 entered promiscuous mode [ 21.963359][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.970588][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.977983][ T276] device bridge_slave_1 entered promiscuous mode [ 22.022924][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.030008][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.037463][ T279] device bridge_slave_0 entered promiscuous mode [ 22.046926][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.054397][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.061808][ T279] device bridge_slave_1 entered promiscuous mode [ 22.076400][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.083460][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.091030][ T277] device bridge_slave_0 entered promiscuous mode [ 22.099510][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.106591][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.113907][ T277] device bridge_slave_1 entered promiscuous mode [ 22.153142][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.160249][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.167783][ T278] device bridge_slave_0 entered promiscuous mode [ 22.176011][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.183136][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.190539][ T278] device bridge_slave_1 entered promiscuous mode [ 22.291635][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.298723][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.306001][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.313020][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.325524][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.332591][ T278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.339957][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.347006][ T278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.359289][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.366543][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.374585][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.381725][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.394876][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.401954][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.409209][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.416264][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.441162][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.448448][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.455831][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.463362][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.471774][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.479056][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.486473][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.493653][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.501257][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.524690][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.532471][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.540813][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.547847][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.575576][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.583123][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.591326][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.600290][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.607346][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.614824][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.622908][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.629949][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.637283][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.644730][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.652149][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.660531][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.668710][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.675846][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.683288][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.691636][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.700079][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.707133][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.714523][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.722619][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.729648][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.736977][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.745212][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.752227][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.759674][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.788961][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.797273][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.805370][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.813287][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.821692][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.831374][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.839613][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.846646][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.853941][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.862402][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.869470][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.876949][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.884999][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.892889][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.900870][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.919350][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.927443][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.935868][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.944735][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.961561][ T275] device veth0_vlan entered promiscuous mode [ 22.968271][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.976691][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.985300][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.993504][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.001843][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.009672][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.018333][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.025967][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.035981][ T276] device veth0_vlan entered promiscuous mode [ 23.044314][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.052441][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.062617][ T279] device veth0_vlan entered promiscuous mode [ 23.072054][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.079674][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.087303][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.095318][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.103295][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.111060][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.127118][ T276] device veth1_macvtap entered promiscuous mode [ 23.134193][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.143151][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.152643][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.161862][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.170469][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.181008][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.189376][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.201585][ T275] device veth1_macvtap entered promiscuous mode [ 23.209947][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.218207][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.226768][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.234536][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.242748][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.257537][ T279] device veth1_macvtap entered promiscuous mode [ 23.264423][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.272088][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.280738][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.289171][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.297332][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.305628][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.313428][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.322578][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.330199][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.337666][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.345385][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.352730][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.361037][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.370691][ T277] device veth0_vlan entered promiscuous mode [ 23.377615][ T278] device veth0_vlan entered promiscuous mode [ 23.386961][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.395382][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.412916][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.421523][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.421698][ T276] request_module fs-gadgetfs succeeded, but still no fs? [ 23.430707][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.446022][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.455783][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.464295][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.477432][ T277] device veth1_macvtap entered promiscuous mode [ 23.485662][ T276] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 23.515102][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.529495][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.537917][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.546612][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.555258][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.563797][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.572195][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.580688][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.589232][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.607003][ T278] device veth1_macvtap entered promiscuous mode [ 23.676520][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.690440][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.699391][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.708378][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.717610][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.752418][ T313] device pim6reg1 entered promiscuous mode [ 23.844007][ C1] hrtimer: interrupt took 24424 ns [ 24.409645][ T362] device pim6reg1 entered promiscuous mode [ 24.900261][ T399] cgroup: syz.1.27 (399) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 24.999886][ T399] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 25.279618][ T422] device syzkaller0 entered promiscuous mode [ 25.404107][ T427] device pim6reg1 entered promiscuous mode [ 25.582951][ T24] kauditd_printk_skb: 44 callbacks suppressed [ 25.582964][ T24] audit: type=1400 audit(1763336410.580:118): avc: denied { setattr } for pid=441 comm="syz.4.40" path="pipe:[14418]" dev="pipefs" ino=14418 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 25.665569][ T438] device pim6reg1 entered promiscuous mode [ 26.503746][ T24] audit: type=1400 audit(1763336411.500:119): avc: denied { cpu } for pid=477 comm="syz.2.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 27.084593][ T24] audit: type=1400 audit(1763336412.080:120): avc: denied { ioctl } for pid=494 comm="syz.0.57" path="socket:[15333]" dev="sockfs" ino=15333 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.307565][ T24] audit: type=1400 audit(1763336412.310:121): avc: denied { create } for pid=501 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 27.394202][ T493] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.404115][ T493] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.991719][ T24] audit: type=1400 audit(1763336413.990:122): avc: denied { create } for pid=576 comm="syz.1.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 29.424004][ T587] device veth0_vlan left promiscuous mode [ 29.456545][ T587] device veth0_vlan entered promiscuous mode [ 29.570793][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.622272][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.678297][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.856840][ T24] audit: type=1400 audit(1763336414.860:123): avc: denied { create } for pid=607 comm="syz.0.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 30.307569][ T623] device veth1_macvtap left promiscuous mode [ 30.421743][ T623] device veth1_macvtap entered promiscuous mode [ 30.449117][ T623] device macsec0 entered promiscuous mode [ 30.526446][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 30.564894][ T635] device sit0 entered promiscuous mode [ 30.862555][ T641] device syzkaller0 entered promiscuous mode [ 31.026982][ T656] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.034198][ T656] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.045387][ T656] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.052450][ T656] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.059788][ T656] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.066848][ T656] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.075083][ T656] device bridge0 entered promiscuous mode [ 31.113866][ T670] device veth1_macvtap left promiscuous mode [ 31.154159][ T670] device veth1_macvtap entered promiscuous mode [ 31.169832][ T670] device macsec0 entered promiscuous mode [ 31.207679][ T670] device pim6reg1 entered promiscuous mode [ 31.869373][ T24] audit: type=1400 audit(1763336416.870:124): avc: denied { relabelfrom } for pid=726 comm="syz.2.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 31.933593][ T24] audit: type=1400 audit(1763336416.870:125): avc: denied { relabelto } for pid=726 comm="syz.2.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 32.272147][ T24] audit: type=1400 audit(1763336417.270:126): avc: denied { create } for pid=758 comm="syz.3.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 32.272701][ T751] device pim6reg1 entered promiscuous mode [ 32.298182][ T763] ------------[ cut here ]------------ [ 32.306565][ T763] trace type BPF program uses run-time allocation [ 32.313109][ T763] WARNING: CPU: 1 PID: 763 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 32.353502][ T763] Modules linked in: [ 32.388029][ T763] CPU: 1 PID: 763 Comm: syz.1.126 Not tainted syzkaller #0 [ 32.494797][ T763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 32.585892][ T763] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 32.654125][ T763] Code: 85 e9 14 fe ff ff e8 99 fa ef ff 31 c0 e9 15 fe ff ff e8 8d fa ef ff c6 05 34 c9 2c 05 01 48 c7 c7 80 7a 05 85 e8 7a a4 fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 32.674886][ T760] device syzkaller0 entered promiscuous mode [ 32.819795][ T763] RSP: 0018:ffffc90000d57468 EFLAGS: 00010246 [ 32.857848][ T763] RAX: ba4a8989038d6900 RBX: 0000000000000001 RCX: 0000000000080000 [ 33.104321][ T763] RDX: ffffc9000192c000 RSI: 0000000000001f51 RDI: 0000000000001f52 [ 33.112975][ T779] device veth0_vlan left promiscuous mode [ 33.123163][ T779] device veth0_vlan entered promiscuous mode [ 33.190616][ T763] RBP: ffffc90000d574b0 R08: dffffc0000000000 R09: ffffed103ee24e8b [ 33.264265][ T763] R10: ffffed103ee24e8b R11: 1ffff1103ee24e8a R12: ffff888127bc8000 [ 33.291641][ T763] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88810a815800 [ 33.343102][ T810] device sit0 left promiscuous mode [ 33.402594][ T763] FS: 00007f447e40a6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 33.411846][ T763] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 33.422892][ T763] CR2: 00007f7396006d58 CR3: 000000011d5f7000 CR4: 00000000003506a0 [ 33.431062][ T763] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 33.439253][ T763] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 33.447417][ T763] Call Trace: [ 33.450805][ T763] ? __fdget+0x1a1/0x230 [ 33.455491][ T763] resolve_pseudo_ldimm64+0x526/0x1020 [ 33.461137][ T763] ? bpf_check+0xd680/0xd680 [ 33.466799][ T763] ? kvmalloc_node+0x88/0x130 [ 33.471686][ T763] bpf_check+0x8d4b/0xd680 [ 33.476305][ T763] ? bpf_get_btf_vmlinux+0x60/0x60 [ 33.481472][ T763] ? bpf_prog_fb72c91d2c8535ba_F+0x9c/0x800 [ 33.487681][ T763] ? is_bpf_text_address+0x177/0x190 [ 33.493169][ T763] ? selinux_bpf_prog_alloc+0x51/0x140 [ 33.504143][ T817] device sit0 entered promiscuous mode [ 33.510255][ T763] ? __kernel_text_address+0xa0/0x100 [ 33.516416][ T763] ? unwind_get_return_address+0x4d/0x90 [ 33.522145][ T763] ? stack_trace_save+0xe0/0xe0 [ 33.527259][ T763] ? arch_stack_walk+0xee/0x140 [ 33.533601][ T763] ? stack_trace_save+0x98/0xe0 [ 33.539707][ T763] ? stack_trace_snprint+0xf0/0xf0 [ 33.545344][ T763] ? __kasan_slab_alloc+0x69/0xf0 [ 33.550544][ T763] ? selinux_bpf_prog_alloc+0x51/0x140 [ 33.556195][ T763] ? __kasan_kmalloc+0xec/0x110 [ 33.561194][ T763] ? __kasan_kmalloc+0xda/0x110 [ 33.567406][ T763] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 33.577856][ T763] ? selinux_bpf_prog_alloc+0x51/0x140 [ 33.583614][ T763] ? security_bpf_prog_alloc+0x62/0x90 [ 33.590969][ T763] ? bpf_prog_load+0x949/0x1420 [ 33.595982][ T763] ? __se_sys_bpf+0x442/0x680 [ 33.600908][ T763] ? __x64_sys_bpf+0x7b/0x90 [ 33.605946][ T763] ? do_syscall_64+0x31/0x40 [ 33.611386][ T763] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 33.628141][ T763] ? memset+0x35/0x40 [ 33.632228][ T763] ? bpf_obj_name_cpy+0x193/0x1e0 [ 33.637353][ T763] bpf_prog_load+0xf5a/0x1420 [ 33.642200][ T763] ? map_freeze+0x320/0x320 [ 33.649192][ T763] ? selinux_bpf+0xc7/0xf0 [ 33.653924][ T763] ? security_bpf+0x82/0xa0 [ 33.660802][ T763] __se_sys_bpf+0x442/0x680 [ 33.668837][ T763] ? __x64_sys_bpf+0x90/0x90 [ 33.673586][ T763] ? __kasan_check_read+0x11/0x20 [ 33.679023][ T763] __x64_sys_bpf+0x7b/0x90 [ 33.683507][ T763] do_syscall_64+0x31/0x40 [ 33.688271][ T763] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 33.694547][ T763] RIP: 0033:0x7f447f9a26c9 [ 33.699192][ T763] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 33.719343][ T763] RSP: 002b:00007f447e40a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 33.727901][ T763] RAX: ffffffffffffffda RBX: 00007f447fbf8fa0 RCX: 00007f447f9a26c9 [ 33.736094][ T763] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 33.774201][ T763] RBP: 00007f447fa24f91 R08: 0000000000000000 R09: 0000000000000000 [ 33.804635][ T763] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 33.814918][ T763] R13: 00007f447fbf9038 R14: 00007f447fbf8fa0 R15: 00007fff854d2888 [ 33.823127][ T763] ---[ end trace 6a908ae238eec4d4 ]--- [ 33.829156][ T838] device veth1_macvtap left promiscuous mode [ 33.843604][ T838] device macsec0 left promiscuous mode [ 33.887371][ T838] device veth1_macvtap entered promiscuous mode [ 33.893868][ T838] device macsec0 entered promiscuous mode [ 33.983360][ T850] device pim6reg1 entered promiscuous mode [ 34.132999][ T868] syz.3.152 uses obsolete (PF_INET,SOCK_PACKET) [ 34.822909][ T897] device syzkaller0 entered promiscuous mode [ 35.022491][ T24] audit: type=1400 audit(1763336420.010:127): avc: denied { create } for pid=904 comm="syz.2.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 35.120443][ T24] audit: type=1400 audit(1763336420.120:128): avc: denied { create } for pid=904 comm="syz.2.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 35.445848][ T24] audit: type=1400 audit(1763336420.450:129): avc: denied { create } for pid=920 comm="syz.3.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 36.417005][ T959] device sit0 entered promiscuous mode [ 36.597658][ T967] device pim6reg1 entered promiscuous mode [ 37.670168][ T1026] device veth1_macvtap left promiscuous mode [ 37.728115][ T24] audit: type=1400 audit(1763336422.730:130): avc: denied { tracepoint } for pid=1025 comm="syz.2.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 37.779203][ T1031] device veth1_macvtap entered promiscuous mode [ 37.817216][ T1031] device macsec0 entered promiscuous mode [ 38.535799][ T24] audit: type=1400 audit(1763336423.540:131): avc: denied { append } for pid=1056 comm="syz.2.200" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 38.974698][ T1074] device pim6reg1 entered promiscuous mode [ 39.627536][ T24] audit: type=1400 audit(1763336424.630:132): avc: denied { create } for pid=1104 comm="syz.2.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 39.755103][ T24] audit: type=1400 audit(1763336424.750:133): avc: denied { create } for pid=1104 comm="syz.2.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 39.924133][ T1114] device pim6reg1 entered promiscuous mode [ 40.402734][ T24] audit: type=1400 audit(1763336425.400:134): avc: denied { create } for pid=1156 comm="syz.3.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 40.564693][ T1161] device veth0_vlan left promiscuous mode [ 40.618833][ T1161] device veth0_vlan entered promiscuous mode [ 41.425074][ T1240] device syzkaller0 entered promiscuous mode [ 41.438415][ T1240] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 42.386781][ T1286] syz.4.268[1286] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.386857][ T1286] syz.4.268[1286] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.828389][ T24] audit: type=1400 audit(1763336427.830:135): avc: denied { create } for pid=1324 comm="syz.0.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 43.609159][ T1359] device veth1_macvtap left promiscuous mode [ 43.617277][ T1357] device pim6reg1 entered promiscuous mode [ 44.475010][ T24] audit: type=1400 audit(1763336429.480:136): avc: denied { create } for pid=1405 comm="syz.1.301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 44.564060][ T24] audit: type=1400 audit(1763336429.480:137): avc: denied { create } for pid=1405 comm="syz.1.301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 44.756790][ T24] audit: type=1400 audit(1763336429.750:138): avc: denied { create } for pid=1442 comm="syz.2.309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 45.186924][ T1468] device veth1_macvtap left promiscuous mode [ 45.193145][ T1468] device macsec0 left promiscuous mode [ 45.265334][ T24] audit: type=1400 audit(1763336430.270:139): avc: denied { create } for pid=1467 comm="syz.3.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 46.703857][ T1566] device wg2 entered promiscuous mode [ 47.869821][ T1623] device macsec0 left promiscuous mode [ 47.938014][ T1623] device veth1_macvtap entered promiscuous mode [ 47.963148][ T1623] device macsec0 entered promiscuous mode [ 48.057744][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 48.079354][ T1638] device sit0 left promiscuous mode [ 48.871566][ T24] audit: type=1400 audit(1763336433.870:140): avc: denied { read write } for pid=1692 comm="syz.1.376" name="cgroup.subtree_control" dev="cgroup2" ino=221 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 48.967000][ T24] audit: type=1400 audit(1763336433.870:141): avc: denied { open } for pid=1692 comm="syz.1.376" path="" dev="cgroup2" ino=221 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 49.215192][ T1715] device pim6reg1 entered promiscuous mode [ 49.389325][ T1744] device sit0 left promiscuous mode [ 49.547346][ T1747] device sit0 entered promiscuous mode [ 49.746910][ T1748] device sit0 entered promiscuous mode [ 50.644506][ T1755] device pim6reg1 entered promiscuous mode [ 50.875991][ T1792] device syzkaller0 entered promiscuous mode [ 51.093331][ T1826] device sit0 left promiscuous mode [ 51.234882][ T1846] device syzkaller0 entered promiscuous mode [ 52.771042][ T1910] device syzkaller0 entered promiscuous mode [ 53.442303][ T1929] device syzkaller0 entered promiscuous mode [ 53.617564][ T1931] device veth0_vlan left promiscuous mode [ 53.643656][ T1931] device veth0_vlan entered promiscuous mode [ 53.713001][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 53.723791][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 53.844766][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 54.479409][ T1954] device syzkaller0 entered promiscuous mode [ 54.529133][ T1976] device wg2 left promiscuous mode [ 54.826245][ T1993] device syzkaller0 entered promiscuous mode [ 55.134540][ T2015] device pim6reg1 entered promiscuous mode [ 55.146316][ T2019] device pim6reg1 entered promiscuous mode [ 55.733880][ T24] audit: type=1400 audit(1763336440.730:142): avc: denied { create } for pid=2035 comm="syz.4.470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 56.035737][ T24] audit: type=1400 audit(1763336441.040:143): avc: denied { create } for pid=2056 comm="syz.1.476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 56.819525][ T2077] ЊЊЊЊЊЊ: renamed from vlan0 [ 58.103348][ T2134] device pim6reg1 entered promiscuous mode [ 58.219940][ T2140] device pim6reg1 entered promiscuous mode [ 58.225405][ T24] audit: type=1400 audit(1763336443.220:144): avc: denied { create } for pid=2141 comm="syz.1.499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 58.286900][ T2140] device syzkaller0 entered promiscuous mode [ 58.882105][ T2168] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.890935][ T2168] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.968356][ T2169] device bridge_slave_1 left promiscuous mode [ 59.012944][ T2169] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.061519][ T2169] device bridge_slave_0 left promiscuous mode [ 59.078647][ T2169] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.419422][ T2179] tap0: tun_chr_ioctl cmd 1074025677 [ 59.430534][ T2179] tap0: linktype set to 774 [ 60.002346][ T24] audit: type=1400 audit(1763336445.000:145): avc: denied { create } for pid=2216 comm="syz.4.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 60.696731][ T2252] device pim6reg1 entered promiscuous mode [ 63.850219][ T2269] device sit0 left promiscuous mode [ 66.736573][ T2376] device pim6reg1 entered promiscuous mode [ 66.991080][ T2397] device syzkaller0 entered promiscuous mode [ 67.020354][ T24] audit: type=1400 audit(1763336452.020:146): avc: denied { create } for pid=2400 comm="syz.1.572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 68.302115][ T2467] device wg2 entered promiscuous mode [ 68.362292][ T2466] device wg2 left promiscuous mode [ 68.560876][ T2483] device bridge0 entered promiscuous mode [ 69.225716][ T24] audit: type=1400 audit(1763336454.220:147): avc: denied { ioctl } for pid=2527 comm="syz.4.608" path="" dev="cgroup2" ino=185 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 69.665858][ T2542] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 70.199031][ T2567] device syzkaller0 entered promiscuous mode [ 70.588430][ T2624] device pim6reg1 entered promiscuous mode [ 71.958742][ T24] audit: type=1400 audit(1763336456.960:148): avc: denied { create } for pid=2668 comm="syz.0.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 72.212272][ T2669] device syzkaller0 entered promiscuous mode [ 72.626713][ T2702] device syzkaller0 entered promiscuous mode [ 73.370070][ T2820] џџџџџџ: renamed from vlan1 [ 74.862490][ T2872] џџџџџџ: renamed from vlan1 [ 75.283349][ T24] audit: type=1400 audit(1763336460.280:149): avc: denied { create } for pid=2897 comm="syz.0.699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 75.924169][ T2914] device syzkaller0 entered promiscuous mode [ 76.163938][ T2921] device syzkaller0 entered promiscuous mode [ 77.572628][ T2983] device sit0 entered promiscuous mode [ 78.036294][ T2998] device pim6reg1 entered promiscuous mode [ 78.341442][ T3021] device veth0_vlan left promiscuous mode [ 78.408395][ T3021] device veth0_vlan entered promiscuous mode [ 78.502868][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 78.511946][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 78.560085][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 78.571515][ T3023] џџџџџџ: renamed from vlan1 [ 78.655718][ T3027] device veth1_macvtap left promiscuous mode [ 78.718420][ T3028] device veth1_macvtap entered promiscuous mode [ 78.740967][ T3028] device macsec0 entered promiscuous mode [ 79.058249][ T3042] device pim6reg1 entered promiscuous mode [ 79.180007][ T3052] device wg2 entered promiscuous mode [ 79.410872][ T3082] device veth1_macvtap left promiscuous mode [ 79.428179][ T3082] device macsec0 left promiscuous mode [ 79.577197][ T24] audit: type=1400 audit(1763336464.580:150): avc: denied { create } for pid=3105 comm="syz.3.760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 80.178747][ T3143] device veth1_macvtap left promiscuous mode [ 80.208840][ T3143] device macsec0 left promiscuous mode [ 80.484305][ T24] audit: type=1400 audit(1763336465.490:151): avc: denied { create } for pid=3175 comm="syz.2.780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 81.070858][ T24] audit: type=1400 audit(1763336466.070:152): avc: denied { create } for pid=3208 comm="syz.0.789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 81.138959][ T24] audit: type=1400 audit(1763336466.090:153): avc: denied { create } for pid=3212 comm="syz.1.790" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 81.892948][ T24] audit: type=1400 audit(1763336466.890:154): avc: denied { create } for pid=3246 comm="syz.1.801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 82.405989][ T3268] device syzkaller0 entered promiscuous mode [ 82.667881][ T3278] device wg2 left promiscuous mode [ 83.769898][ T3341] : renamed from bond_slave_0 [ 84.299869][ T3374] device wg2 entered promiscuous mode [ 85.586269][ T3455] device pim6reg1 entered promiscuous mode [ 86.358992][ T3521] syz.4.877[3521] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.359051][ T3521] syz.4.877[3521] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.210381][ T3654] device wg2 entered promiscuous mode [ 92.215908][ T3756] device veth1_macvtap left promiscuous mode [ 92.222040][ T3756] device macsec0 left promiscuous mode [ 92.356091][ T3758] device veth1_macvtap entered promiscuous mode [ 92.384198][ T3758] device macsec0 entered promiscuous mode [ 93.809440][ T3780] device syzkaller0 entered promiscuous mode [ 94.185132][ T3815] device veth1_to_hsr entered promiscuous mode [ 94.610033][ T3829] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.617353][ T3829] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.662637][ T3829] device bridge0 left promiscuous mode [ 94.737511][ T3832] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.745749][ T3832] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.766011][ T3832] device bridge0 left promiscuous mode [ 95.122220][ T3862] device wg2 entered promiscuous mode [ 95.487169][ T3901] device pim6reg1 entered promiscuous mode [ 95.611002][ T3905] pimreg: tun_chr_ioctl cmd 1074025677 [ 95.624126][ T3905] pimreg: linktype set to 6 [ 95.871790][ T3931] device veth1_macvtap entered promiscuous mode [ 95.879395][ T3931] device macsec0 entered promiscuous mode [ 95.913409][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 96.333991][ T3947] device syzkaller0 entered promiscuous mode [ 96.596008][ T3949] device syzkaller0 entered promiscuous mode [ 96.719441][ T3966] device syzkaller0 entered promiscuous mode [ 97.056408][ T3984] device sit0 entered promiscuous mode [ 97.688733][ T4018] device veth1_macvtap left promiscuous mode [ 97.765959][ T4018] device macsec0 left promiscuous mode [ 98.307894][ T4046] device pim6reg1 entered promiscuous mode [ 99.531927][ T4105] bridge0: port 3(veth0) entered blocking state [ 99.580641][ T4105] bridge0: port 3(veth0) entered disabled state [ 99.588085][ T4105] device veth0 entered promiscuous mode [ 99.622260][ T4107] device veth0 left promiscuous mode [ 99.627880][ T4107] bridge0: port 3(veth0) entered disabled state [ 99.767333][ T4123] device pim6reg1 entered promiscuous mode [ 100.205341][ T4127] device syzkaller0 entered promiscuous mode [ 100.922358][ T4151] device syzkaller0 entered promiscuous mode [ 101.246762][ T4187] device syzkaller0 entered promiscuous mode [ 102.032442][ T4226] device macsec0 entered promiscuous mode [ 102.292779][ T4235] device wg2 entered promiscuous mode [ 102.694134][ T24] audit: type=1400 audit(1763336487.690:155): avc: denied { setattr } for pid=4250 comm="syz.4.1083" path="/dev/net/tun" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 102.979950][ T4262] device veth1_macvtap entered promiscuous mode [ 102.991869][ T4262] device macsec0 entered promiscuous mode [ 103.014652][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 103.191909][ T4268] device syzkaller0 entered promiscuous mode [ 105.110813][ T24] audit: type=1400 audit(1763336490.110:156): avc: denied { create } for pid=4358 comm="syz.2.1117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 106.145359][ T4414] device sit0 left promiscuous mode [ 106.202811][ T4417] device sit0 entered promiscuous mode [ 106.490112][ T4418] device syzkaller0 entered promiscuous mode [ 107.336581][ T4472] device syzkaller0 entered promiscuous mode [ 107.438031][ T4472] device pim6reg1 entered promiscuous mode [ 107.688283][ T4494] device pim6reg1 entered promiscuous mode [ 108.349574][ T4513] device syzkaller0 entered promiscuous mode [ 109.595711][ T4590] Бџ: renamed from team_slave_1 [ 109.877324][ T4606] syz.4.1189 (4606) used obsolete PPPIOCDETACH ioctl [ 111.378802][ T24] audit: type=1400 audit(1763336496.360:157): avc: denied { create } for pid=4702 comm="syz.2.1219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 112.119390][ T4752] device veth0_vlan left promiscuous mode [ 112.132393][ T4752] device veth0_vlan entered promiscuous mode [ 112.465766][ T4762] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 112.720068][ T4770] device syzkaller0 entered promiscuous mode [ 113.902454][ T4808] device veth1_macvtap entered promiscuous mode [ 113.919454][ T4808] device macsec0 entered promiscuous mode [ 114.008305][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 114.031012][ T4814] device sit0 entered promiscuous mode [ 114.358180][ T4841] device sit0 entered promiscuous mode [ 114.938297][ T4879] device veth1_macvtap left promiscuous mode [ 114.994123][ T4879] device macsec0 left promiscuous mode [ 115.636288][ T4913] device syzkaller0 entered promiscuous mode [ 116.860207][ T4977] device pim6reg1 entered promiscuous mode [ 116.980537][ T4989] device syzkaller0 entered promiscuous mode [ 117.216582][ T4996] device sit0 left promiscuous mode [ 117.293388][ T4997] device sit0 entered promiscuous mode [ 118.117055][ T5029] device sit0 entered promiscuous mode [ 118.358689][ T5039] device pim6reg1 entered promiscuous mode [ 118.742347][ T5068] device pim6reg1 entered promiscuous mode [ 118.989116][ T5087] syz.1.1326[5087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.989224][ T5087] syz.1.1326[5087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.081364][ T5097] device sit0 left promiscuous mode [ 119.176526][ T5097] device sit0 entered promiscuous mode [ 119.668855][ T5116] device veth1_macvtap entered promiscuous mode [ 119.688246][ T5116] device macsec0 entered promiscuous mode [ 119.714181][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 119.911958][ T5127] device veth0_vlan left promiscuous mode [ 119.946635][ T5127] device veth0_vlan entered promiscuous mode [ 119.958235][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 119.975867][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЊ: link becomes ready [ 119.992308][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 120.223126][ T5143] device veth0_vlan left promiscuous mode [ 120.267123][ T5143] device veth0_vlan entered promiscuous mode [ 120.310379][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 120.321090][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 120.330343][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 121.095483][ T24] audit: type=1400 audit(1763336506.100:158): avc: denied { create } for pid=5185 comm="syz.1.1354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 122.705937][ T5258] device syzkaller0 entered promiscuous mode [ 123.101944][ T5279] device syzkaller0 entered promiscuous mode [ 123.753097][ T24] audit: type=1400 audit(1763336508.750:159): avc: denied { create } for pid=5303 comm="syz.1.1388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 126.196895][ T5365] device syzkaller0 entered promiscuous mode [ 126.439154][ T5388] device syzkaller0 entered promiscuous mode [ 127.803222][ T5499] device pim6reg1 entered promiscuous mode [ 128.000045][ T5524] device pim6reg1 entered promiscuous mode [ 128.194116][ T5547] device pim6reg1 entered promiscuous mode [ 128.433759][ T278] cgroup: fork rejected by pids controller in /syz4 [ 128.807360][ T5582] device veth0_vlan left promiscuous mode [ 128.821653][ T5582] device veth0_vlan entered promiscuous mode [ 128.857546][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 128.874798][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 128.904762][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 129.128929][ T5594] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.139897][ T5594] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.156946][ T5594] device bridge_slave_0 entered promiscuous mode [ 129.185386][ T5594] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.196706][ T5594] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.214653][ T5594] device bridge_slave_1 entered promiscuous mode [ 129.490959][ T24] audit: type=1400 audit(1763336514.490:160): avc: denied { create } for pid=5594 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 129.512736][ T24] audit: type=1400 audit(1763336514.490:161): avc: denied { write } for pid=5594 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 129.521375][ T5594] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.540438][ T5594] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.547770][ T5594] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.554837][ T5594] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.567685][ T24] audit: type=1400 audit(1763336514.490:162): avc: denied { read } for pid=5594 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 129.675115][ T5636] device wg2 left promiscuous mode [ 129.744186][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 129.752220][ T406] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.767515][ T406] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.800947][ T5636] device veth1_to_team entered promiscuous mode [ 129.928971][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.956180][ T406] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.963281][ T406] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.996331][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 130.021097][ T406] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.028248][ T406] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.088791][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 130.114555][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 130.228514][ T5636] device wg2 entered promiscuous mode [ 130.316457][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 130.330513][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 130.366538][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 130.386981][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.411687][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 130.433780][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 130.457950][ T5594] device veth0_vlan entered promiscuous mode [ 130.487286][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 130.501811][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 130.527876][ T5594] device veth1_macvtap entered promiscuous mode [ 130.537388][ T5655] device veth0_vlan left promiscuous mode [ 130.558836][ T5655] device veth0_vlan entered promiscuous mode [ 130.626761][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 130.637922][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.665053][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЊ: link becomes ready [ 130.703159][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 130.770305][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 130.788039][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 130.811062][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 130.819955][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 131.216286][ T5658] device syzkaller0 entered promiscuous mode [ 132.102985][ T49] device bridge_slave_1 left promiscuous mode [ 132.121747][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.162772][ T49] device bridge_slave_0 left promiscuous mode [ 132.192662][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.231613][ T49] device veth1_macvtap left promiscuous mode [ 132.258098][ T49] device veth0_vlan left promiscuous mode [ 133.972962][ T24] audit: type=1400 audit(1763336518.970:163): avc: denied { associate } for pid=5701 comm="syz.4.1493" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 134.390215][ T5731] device pim6reg1 entered promiscuous mode [ 134.793207][ T5742] device syzkaller0 entered promiscuous mode [ 135.627665][ T5809] device veth0_vlan left promiscuous mode [ 135.643273][ T5809] device veth0_vlan entered promiscuous mode [ 135.724506][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 135.758408][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЊ: link becomes ready [ 135.774490][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 137.090205][ T5926] device syzkaller0 entered promiscuous mode [ 137.583329][ T5953] device wg2 left promiscuous mode [ 137.648815][ T5953] device wg2 entered promiscuous mode [ 138.152677][ T5980] device pim6reg1 entered promiscuous mode [ 139.355522][ T6048] syz.3.1587[6048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.355573][ T6048] syz.3.1587[6048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.645516][ T6165] device sit0 left promiscuous mode [ 141.267199][ T6193] device pim6reg1 entered promiscuous mode [ 141.291212][ T6195] cgroup: fork rejected by pids controller in /syz2 [ 141.712424][ T6226] device syzkaller0 entered promiscuous mode [ 141.938591][ T6214] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.945940][ T6214] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.953493][ T6214] device bridge_slave_0 entered promiscuous mode [ 141.960764][ T6214] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.967977][ T6214] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.975531][ T6214] device bridge_slave_1 entered promiscuous mode [ 142.272458][ T6249] device syzkaller0 entered promiscuous mode [ 142.680614][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 142.692619][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 142.727238][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 142.748977][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 142.777862][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.784997][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 142.821839][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 142.851120][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 142.890981][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.898091][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.934824][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 142.970227][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 142.989788][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 143.029916][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 143.039475][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 143.111415][ T6214] device veth0_vlan entered promiscuous mode [ 143.145459][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 143.155305][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 143.163747][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 143.172031][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.180414][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 143.188119][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 143.234074][ T6285] device wg2 left promiscuous mode [ 143.261999][ T6288] device wg2 entered promiscuous mode [ 143.309382][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 143.327863][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 143.378809][ T6214] device veth1_macvtap entered promiscuous mode [ 143.401603][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 143.409564][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 143.434609][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 143.463453][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 143.482609][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 143.580132][ T406] device veth1_macvtap left promiscuous mode [ 143.594606][ T406] device veth0_vlan left promiscuous mode [ 146.519255][ T6469] Бџ: renamed from team_slave_1 [ 147.298992][ T6523] device pim6reg1 entered promiscuous mode [ 147.697837][ T24] audit: type=1400 audit(1763336532.700:164): avc: denied { create } for pid=6572 comm="syz.3.1732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 147.737012][ T6570] device syzkaller0 entered promiscuous mode [ 148.914364][ T6632] GPL: port 1(erspan0) entered blocking state [ 148.921019][ T6632] GPL: port 1(erspan0) entered disabled state [ 148.947101][ T6632] device erspan0 entered promiscuous mode [ 149.024498][ T6643] device wg2 left promiscuous mode [ 149.030841][ T6633] GPL: port 1(erspan0) entered blocking state [ 149.037018][ T6633] GPL: port 1(erspan0) entered forwarding state [ 149.365026][ T6639] device syzkaller0 entered promiscuous mode [ 150.230851][ T6705] QБ6у`в˜: renamed from lo [ 150.259114][ T6707] device veth1_macvtap left promiscuous mode [ 150.269568][ T6708] device veth1_macvtap entered promiscuous mode [ 150.288180][ T6708] device macsec0 entered promiscuous mode [ 150.616087][ T6723] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 150.689546][ T6723] device syzkaller0 entered promiscuous mode [ 150.715655][ T6720] џџџџџџ: renamed from vlan1 [ 150.886202][ T6741] device sit0 left promiscuous mode [ 152.657665][ T6811] device syzkaller0 entered promiscuous mode [ 153.993678][ T6861] device veth0_vlan left promiscuous mode [ 154.008268][ T6861] device veth0_vlan entered promiscuous mode [ 154.083920][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 154.125612][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 154.186482][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 154.769138][ T6896] device wg2 entered promiscuous mode [ 155.654151][ T6953] device veth1_macvtap left promiscuous mode [ 160.314136][ T7136] device pim6reg1 entered promiscuous mode [ 160.899594][ T7156] syz.1.1893[7156] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.899696][ T7156] syz.1.1893[7156] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.132753][ T7217] device wg2 left promiscuous mode [ 162.847104][ T24] audit: type=1400 audit(1763336547.850:165): avc: denied { create } for pid=7263 comm="syz.4.1923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 163.257018][ T7269] device syzkaller0 entered promiscuous mode [ 163.302927][ T7280] device veth0_vlan left promiscuous mode [ 163.313469][ T7280] device veth0_vlan entered promiscuous mode [ 163.357355][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 163.414795][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 163.457075][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 163.934820][ T7314] device wg2 left promiscuous mode [ 163.996494][ T7314] device wg2 entered promiscuous mode [ 165.045544][ T7370] device wg2 left promiscuous mode [ 165.127405][ T7377] device syzkaller0 entered promiscuous mode [ 165.912060][ T7453] device veth1_macvtap left promiscuous mode [ 165.944678][ T7453] device macsec0 entered promiscuous mode [ 166.607067][ T7510] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 167.361634][ T7536] device syzkaller0 entered promiscuous mode [ 167.731249][ T7566] syz.1.2004[7566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.731327][ T7566] syz.1.2004[7566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.756754][ T7566] syz.1.2004[7566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.768438][ T7566] syz.1.2004[7566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.828140][ T7560] device wg2 entered promiscuous mode [ 168.517152][ T7611] device sit0 left promiscuous mode [ 169.354525][ T7630] device wg2 left promiscuous mode [ 170.265239][ T7682] device wg2 entered promiscuous mode [ 170.485357][ T7716] device syzkaller0 entered promiscuous mode [ 171.803547][ T7761] device pim6reg1 entered promiscuous mode [ 171.925718][ T24] audit: type=1400 audit(1763336556.930:166): avc: denied { create } for pid=7765 comm="syz.3.2056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 172.200781][ T7777] device sit0 entered promiscuous mode [ 173.270672][ T7834] device sit0 entered promiscuous mode [ 173.806774][ T7868] cgroup: fork rejected by pids controller in /syz1 [ 174.557489][ T7912] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.564967][ T7912] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.572716][ T7912] device bridge_slave_0 entered promiscuous mode [ 174.580222][ T7912] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.587583][ T7912] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.595516][ T7912] device bridge_slave_1 entered promiscuous mode [ 174.738239][ T7912] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.745417][ T7912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.752683][ T7912] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.759727][ T7912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.884048][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.891868][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.900616][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.942911][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 174.966904][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.982936][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 174.991278][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.019217][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 175.079778][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 175.098290][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 175.106640][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 175.116566][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 175.124419][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 175.140989][ T7912] device veth0_vlan entered promiscuous mode [ 175.175358][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 175.183739][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 175.209903][ T7912] device veth1_macvtap entered promiscuous mode [ 175.259477][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 175.274109][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 175.284303][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 175.296665][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 175.305127][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 175.437198][ T8001] syz.3.2120[8001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.437255][ T8001] syz.3.2120[8001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.307616][ T8026] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.326122][ T8026] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.528111][ T800] device bridge_slave_1 left promiscuous mode [ 176.537714][ T800] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.550565][ T800] device bridge_slave_0 left promiscuous mode [ 176.557037][ T800] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.677985][ T8061] device wg2 entered promiscuous mode [ 178.013604][ T8149] device pim6reg1 entered promiscuous mode [ 178.647567][ T8153] device syzkaller0 entered promiscuous mode [ 179.220151][ T8194] syz.3.2174[8194] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.220205][ T8194] syz.3.2174[8194] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.235014][ T8194] syz.3.2174[8194] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.259958][ T8194] syz.3.2174[8194] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.123390][ T8207] device veth0_vlan left promiscuous mode [ 180.282693][ T8207] device veth0_vlan entered promiscuous mode [ 180.469681][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 180.490317][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 180.539571][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 181.130107][ T8243] device veth0_vlan left promiscuous mode [ 181.185548][ T8243] device veth0_vlan entered promiscuous mode [ 181.214789][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 181.234459][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 181.274245][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 181.776997][ T8271] device wg2 left promiscuous mode [ 181.877662][ T8271] device wg2 entered promiscuous mode [ 182.200776][ T8315] device veth0_vlan left promiscuous mode [ 182.223596][ T8315] device veth0_vlan entered promiscuous mode [ 182.303460][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 182.313694][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 182.345501][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 182.945124][ T8365] device veth0_vlan left promiscuous mode [ 183.039454][ T8365] device veth0_vlan entered promiscuous mode [ 183.930289][ T8411] device wg2 left promiscuous mode [ 184.241887][ T8419] device wg2 entered promiscuous mode [ 184.656040][ T8430] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 184.753668][ T8430] device syzkaller0 entered promiscuous mode [ 184.887727][ T8436] device veth0_vlan left promiscuous mode [ 184.962570][ T8436] device veth0_vlan entered promiscuous mode [ 186.302529][ T8487] device sit0 left promiscuous mode [ 186.568777][ T8495] device sit0 entered promiscuous mode [ 187.005532][ T8525] device sit0 entered promiscuous mode [ 187.517174][ T8562] device sit0 left promiscuous mode [ 187.549740][ T8562] device sit0 entered promiscuous mode [ 187.599168][ T24] audit: type=1400 audit(1763336572.600:167): avc: denied { create } for pid=8561 comm="syz.3.2278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 188.379528][ T8610] device pim6reg1 entered promiscuous mode [ 188.933782][ T8625] device syzkaller0 entered promiscuous mode [ 189.219732][ T8644] device pim6reg1 entered promiscuous mode [ 191.720681][ T8729] device sit0 left promiscuous mode [ 191.868479][ T8736] device sit0 entered promiscuous mode [ 193.744635][ T8827] device pim6reg1 entered promiscuous mode [ 195.456763][ T8911] device pim6reg1 entered promiscuous mode [ 195.630822][ T8921] device sit0 left promiscuous mode [ 195.746163][ T8922] device sit0 entered promiscuous mode [ 197.191206][ T8987] device pim6reg1 entered promiscuous mode [ 198.157693][ T9019] tap0: tun_chr_ioctl cmd 1074025677 [ 198.163052][ T9019] tap0: linktype set to 769 [ 198.602065][ T9023] device syzkaller0 entered promiscuous mode [ 200.312044][ T9152] device pim6reg1 entered promiscuous mode [ 201.169101][ T9186] device syzkaller0 entered promiscuous mode [ 201.298168][ T9203] €Т0: renamed from pim6reg1 [ 202.801060][ T9278] device syzkaller0 entered promiscuous mode [ 203.095120][ T9287] device veth1_macvtap left promiscuous mode [ 203.101328][ T9287] device macsec0 left promiscuous mode [ 203.163410][ T9287] device veth1_macvtap entered promiscuous mode [ 203.171224][ T9287] device macsec0 entered promiscuous mode [ 203.264691][ T9290] device pim6reg1 entered promiscuous mode [ 203.824525][ T9305] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 203.833461][ T9305] device syzkaller0 entered promiscuous mode [ 203.939169][ T9306] device veth0_vlan left promiscuous mode [ 203.952067][ T9306] device veth0_vlan entered promiscuous mode [ 204.070316][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.078983][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 204.086851][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.332047][ T9400] device veth0_vlan left promiscuous mode [ 206.344950][ T9400] device veth0_vlan entered promiscuous mode [ 206.360007][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.371542][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.426470][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 215.869697][ T9457] device veth0_vlan left promiscuous mode [ 215.880481][ T9457] device veth0_vlan entered promiscuous mode [ 215.931394][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 215.954542][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 215.963328][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 216.677820][ T9484] device wg2 left promiscuous mode [ 216.716840][ T9484] device wg2 entered promiscuous mode [ 216.944310][ T9491] device syzkaller0 entered promiscuous mode [ 217.885532][ T9517] device pim6reg1 entered promiscuous mode [ 218.030481][ T9514] device gretap0 entered promiscuous mode [ 218.049046][ T9520] device wg2 left promiscuous mode [ 218.142071][ T9525] device wg2 entered promiscuous mode [ 218.334459][ T9541] QБ6уз\b‹ЁY­4: renamed from lo [ 218.467203][ T9548] syz.1.2551[9548] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.467268][ T9548] syz.1.2551[9548] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.510496][ T9548] syz.1.2551[9548] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.536249][ T9548] syz.1.2551[9548] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.661099][ T9548] device xfrm0 entered promiscuous mode [ 218.966540][ T9571] device veth1_macvtap left promiscuous mode [ 219.035323][ T9571] device macsec0 left promiscuous mode [ 220.178550][ T9623] device syzkaller0 entered promiscuous mode [ 221.551282][ T9719] device syzkaller0 entered promiscuous mode [ 221.855060][ T9721] device pim6reg1 entered promiscuous mode [ 222.924131][ T9759] device sit0 left promiscuous mode [ 223.178523][ T9785] device veth0_vlan left promiscuous mode [ 223.226269][ T9785] device veth0_vlan entered promiscuous mode [ 223.285542][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 223.324376][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 223.364160][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 223.764419][ T9792] ip6erspan0: tun_chr_ioctl cmd 21731 [ 223.960054][ T9805] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 223.969126][ T9805] device syzkaller0 entered promiscuous mode [ 224.160871][ T9829] device pim6reg1 entered promiscuous mode [ 226.369815][ T9983] device syzkaller0 entered promiscuous mode [ 226.379563][ T9977] ЊЊЊЊЊЊ: renamed from vlan0 [ 227.163401][T10034] device bridge_slave_1 left promiscuous mode [ 227.178762][T10034] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.194438][T10034] device bridge_slave_0 left promiscuous mode [ 227.200608][T10034] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.285166][T10029] device pim6reg1 entered promiscuous mode [ 227.676592][T10053] device pim6reg1 entered promiscuous mode [ 228.138611][T10105] device sit0 left promiscuous mode [ 229.236019][T10138] device syzkaller0 entered promiscuous mode [ 229.740535][T10164] device sit0 entered promiscuous mode [ 231.284772][T10231] device sit0 entered promiscuous mode [ 232.842572][T10312] device syzkaller0 entered promiscuous mode [ 233.124879][T10325] device pim6reg1 entered promiscuous mode [ 233.371948][T10348] device sit0 left promiscuous mode [ 234.773188][T10435] device wg2 left promiscuous mode [ 234.882473][T10435] device wg2 entered promiscuous mode [ 235.624977][T10477] device pim6reg1 entered promiscuous mode [ 238.666128][ T24] audit: type=1400 audit(1763336623.670:168): avc: denied { create } for pid=10633 comm="syz.2.2868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 243.952237][T10710] device sit0 entered promiscuous mode [ 244.570721][T10728] device pim6reg1 entered promiscuous mode [ 245.786541][T10793] syz.1.2906[10793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.786586][T10793] syz.1.2906[10793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.542923][T10848] device syzkaller0 entered promiscuous mode [ 246.604836][T10846] device sit0 entered promiscuous mode [ 246.685588][T10869] device wg2 left promiscuous mode [ 246.718593][T10870] device pim6reg1 entered promiscuous mode [ 246.897416][T10879] device veth0_vlan left promiscuous mode [ 246.907072][T10879] device veth0_vlan entered promiscuous mode [ 246.923518][T10873] device sit0 left promiscuous mode [ 247.770850][T10896] device syzkaller0 entered promiscuous mode [ 247.891812][T10898] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.899615][T10898] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.907496][T10898] device bridge_slave_0 entered promiscuous mode [ 247.937108][T10898] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.947487][T10898] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.956259][T10898] device bridge_slave_1 entered promiscuous mode [ 248.010917][T10898] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.018015][T10898] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.025328][T10898] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.032364][T10898] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.061216][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 248.094077][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.116872][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.151149][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.159944][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.168277][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.175358][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.204869][T10898] device veth0_vlan entered promiscuous mode [ 248.211190][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.256790][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.288484][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.295606][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.337857][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 248.346189][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 248.354305][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 248.362463][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 248.370521][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 248.379302][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 248.387995][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 248.396115][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 248.411053][T10898] device veth1_macvtap entered promiscuous mode [ 248.485047][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 248.502840][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 248.514393][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 248.522992][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 248.531422][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 248.539540][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 248.548194][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 248.556963][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 248.570366][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 249.683413][T10977] device syzkaller0 entered promiscuous mode [ 249.705959][T10973] device veth0_vlan left promiscuous mode [ 249.714580][T10973] device veth0_vlan entered promiscuous mode [ 249.762758][ T406] device bridge_slave_1 left promiscuous mode [ 249.771122][ T406] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.778805][ T406] device bridge_slave_0 left promiscuous mode [ 249.786310][ T406] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.940713][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 249.949109][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 249.957432][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 250.914717][T11021] device syzkaller0 entered promiscuous mode [ 251.001428][T11041] device sit0 left promiscuous mode [ 251.011658][T11042] device sit0 entered promiscuous mode [ 251.028729][T11041] device sit0 left promiscuous mode [ 251.152698][T11064] device pim6reg1 entered promiscuous mode [ 251.530738][T11092] device pim6reg1 entered promiscuous mode [ 251.809536][T11122] device wg1 entered promiscuous mode [ 252.378592][T11141] device syzkaller0 entered promiscuous mode [ 254.195260][T11225] device pim6reg1 entered promiscuous mode [ 254.672616][T11246] tap0: tun_chr_ioctl cmd 2147767506 [ 258.283977][T11409] device syzkaller0 entered promiscuous mode [ 258.328776][T11406] device syzkaller0 left promiscuous mode [ 258.577776][T11420] device pim6reg1 entered promiscuous mode [ 258.658323][T11432] device pim6reg1 entered promiscuous mode [ 259.254894][T11459] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.262044][T11459] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.269839][T11459] device bridge_slave_0 entered promiscuous mode [ 259.295938][T11459] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.303014][T11459] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.394814][T11459] device bridge_slave_1 entered promiscuous mode [ 259.402207][T11465] ЊЊЊЊЊЊ: renamed from vlan0 [ 259.554117][T11459] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.561224][T11459] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.568578][T11459] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.575639][T11459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.708157][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 259.725713][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.760799][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.812921][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 259.831371][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.838475][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.861139][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 259.880505][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.887587][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.938063][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 259.951046][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 259.964375][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 259.972583][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 260.028450][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 260.042452][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 260.079490][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 260.091755][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.100782][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 260.185682][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 260.218228][T11459] device veth0_vlan entered promiscuous mode [ 260.277166][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 260.307573][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 260.355727][T11459] device veth1_macvtap entered promiscuous mode [ 260.377216][ T406] device veth1_macvtap left promiscuous mode [ 260.383298][ T406] device veth0_vlan left promiscuous mode [ 260.477831][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 260.486167][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 260.495145][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 260.503606][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 260.513573][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 263.881205][T11663] device syzkaller0 entered promiscuous mode [ 264.134244][T11671] device wg2 entered promiscuous mode [ 265.227434][T11691] device sit0 entered promiscuous mode [ 266.540506][T11743] device veth1_macvtap entered promiscuous mode [ 266.554873][T11743] device macsec0 entered promiscuous mode [ 266.593073][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 267.000229][T11774] device pim6reg1 entered promiscuous mode [ 268.805280][T11856] cgroup: fork rejected by pids controller in /syz3 [ 269.515184][T11986] device wg2 left promiscuous mode [ 269.545798][T11984] device sit0 left promiscuous mode [ 269.733667][T11986] device wg2 entered promiscuous mode [ 269.786851][T11982] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.826832][T11982] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.872520][T11982] device bridge_slave_0 entered promiscuous mode [ 269.879823][T11982] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.886900][T11982] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.894438][T11982] device bridge_slave_1 entered promiscuous mode [ 269.990753][T11982] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.997845][T11982] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.005155][T11982] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.012183][T11982] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.038101][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.069100][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.077152][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 270.147197][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 270.164385][T12008] syz.1.3218[12008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.164493][T12008] syz.1.3218[12008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.234134][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 270.294191][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.301306][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.416298][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 270.424846][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.431916][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.505297][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 270.564539][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 270.632958][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 270.642169][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.650964][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 270.659212][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 270.668654][T11982] device veth0_vlan entered promiscuous mode [ 270.680783][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 270.699233][T11982] device veth1_macvtap entered promiscuous mode [ 270.731428][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 270.740177][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 270.770367][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 270.779195][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 271.344605][T12034] device syzkaller0 entered promiscuous mode [ 271.728944][T12093] device syzkaller0 entered promiscuous mode [ 272.387092][ T406] device bridge_slave_1 left promiscuous mode [ 272.393312][ T406] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.423350][ T406] device bridge_slave_0 left promiscuous mode [ 272.429736][ T406] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.449893][ T406] device veth1_macvtap left promiscuous mode [ 272.478788][ T406] device veth0_vlan left promiscuous mode [ 272.900385][T12165] device syzkaller0 entered promiscuous mode [ 274.971433][T12193] device syzkaller0 entered promiscuous mode [ 275.328318][T12209] device sit0 entered promiscuous mode [ 275.546383][ T24] audit: type=1400 audit(1763336660.550:169): avc: denied { create } for pid=12212 comm="syz.4.3277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 275.803982][ T24] audit: type=1400 audit(1763336660.790:170): avc: denied { read } for pid=12226 comm="syz.2.3282" dev="nsfs" ino=4026532369 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 275.854685][ T24] audit: type=1400 audit(1763336660.810:171): avc: denied { open } for pid=12226 comm="syz.2.3282" path="mnt:[4026532369]" dev="nsfs" ino=4026532369 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 275.910102][ T24] audit: type=1400 audit(1763336660.810:172): avc: denied { ioctl } for pid=12226 comm="syz.2.3282" path="mnt:[4026532369]" dev="nsfs" ino=4026532369 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 276.479768][T12255] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 276.520015][T12255] device syzkaller0 entered promiscuous mode [ 276.808901][T12287] device syzkaller0 entered promiscuous mode [ 278.428728][ T95] udevd[95]: worker [9417] terminated by signal 33 (Unknown signal 33) [ 278.443390][ T95] udevd[95]: worker [9417] failed while handling '/devices/virtual/block/loop0' [ 278.619548][T12391] syz.0.3320[12391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.623697][T12391] syz.0.3320[12391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.518205][T12434] device veth1_macvtap left promiscuous mode [ 279.723187][T12434] device pim6reg1 entered promiscuous mode [ 280.626262][T12579] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.633474][T12579] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.644793][T12579] device bridge_slave_0 entered promiscuous mode [ 280.655226][T12579] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.662388][T12579] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.670509][T12579] device bridge_slave_1 entered promiscuous mode [ 280.706030][ T406] GPL: port 1(erspan0) entered disabled state [ 280.720169][ T406] device erspan0 left promiscuous mode [ 280.738796][ T406] GPL: port 1(erspan0) entered disabled state [ 280.809531][T12579] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.816655][T12579] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.824109][T12579] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.831172][T12579] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.858898][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 280.878442][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.898603][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.918710][T12589] device sit0 left promiscuous mode [ 280.941610][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 280.954588][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.961666][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.969944][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 280.979484][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.986545][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.995319][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 281.017843][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 281.034500][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 281.042700][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 281.051747][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 281.059475][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 281.076066][ T406] device bridge_slave_1 left promiscuous mode [ 281.083659][ T406] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.105492][ T406] device bridge_slave_0 left promiscuous mode [ 281.111790][ T406] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.146188][ T406] device veth1_macvtap left promiscuous mode [ 281.152384][ T406] device veth0_vlan left promiscuous mode [ 281.347687][T12599] device veth0_vlan left promiscuous mode [ 281.353870][T12599] device veth0_vlan entered promiscuous mode [ 281.378496][T12579] device veth0_vlan entered promiscuous mode [ 281.410722][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 281.420440][T12579] device veth1_macvtap entered promiscuous mode [ 281.453841][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 281.462344][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 281.507984][ T24] audit: type=1400 audit(1763336666.510:173): avc: denied { unmount } for pid=12579 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 281.530564][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 281.546520][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 281.937874][T12652] device syzkaller0 entered promiscuous mode [ 282.451159][T12662] device syzkaller0 entered promiscuous mode [ 282.881725][T12707] device pim6reg1 entered promiscuous mode [ 283.058559][T12705] device syzkaller0 entered promiscuous mode [ 283.506406][T12714] device syzkaller0 entered promiscuous mode [ 283.521068][T12717] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.528329][T12717] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.563167][T12722] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.570305][T12722] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.577663][T12722] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.584721][T12722] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.592038][T12722] device bridge0 entered promiscuous mode [ 283.890246][T12736] device pim6reg1 entered promiscuous mode [ 284.092561][T12756] device syzkaller0 entered promiscuous mode [ 284.376123][T12792] device pim6reg1 entered promiscuous mode [ 284.686309][T12801] device syzkaller0 entered promiscuous mode [ 285.127964][T12819] device pim6reg1 entered promiscuous mode [ 285.998252][T12872] device sit0 entered promiscuous mode [ 286.657668][T12918] device pim6reg1 entered promiscuous mode [ 287.040697][T12952] device wg2 entered promiscuous mode [ 288.708387][T13011] syz.0.3462[13011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.708484][T13011] syz.0.3462[13011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.772162][T13011] syz.0.3462[13011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.784031][T13011] syz.0.3462[13011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.865263][T13016] device veth1_macvtap left promiscuous mode [ 289.014788][T13026] device veth1_macvtap entered promiscuous mode [ 289.084024][T13026] device macsec0 entered promiscuous mode [ 289.343616][T13039] syz.1.3468[13039] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.343677][T13039] syz.1.3468[13039] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.164885][T13153] device pim6reg1 entered promiscuous mode [ 293.756603][T13199] device syzkaller0 entered promiscuous mode [ 294.118024][T13200] device syzkaller0 entered promiscuous mode [ 294.172004][T13211] device syzkaller0 entered promiscuous mode [ 297.084485][T13304] device pim6reg1 entered promiscuous mode [ 299.346711][T13349] device syzkaller0 entered promiscuous mode [ 300.743231][T13428] device veth0_vlan left promiscuous mode [ 300.776424][T13428] device veth0_vlan entered promiscuous mode [ 300.799952][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 300.844965][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 300.864048][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 303.048545][T13518] device veth0_vlan left promiscuous mode [ 303.067714][T13518] device veth0_vlan entered promiscuous mode [ 303.087788][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 303.101435][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЊ: link becomes ready [ 303.109456][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 303.120718][T13519] Бџ: renamed from team_slave_1 [ 304.033529][T13573] geneve1: tun_chr_ioctl cmd 1074025672 [ 304.054957][T13573] geneve1: ignored: set checksum enabled [ 305.492316][T13653] device sit0 left promiscuous mode [ 305.648446][T13655] device sit0 entered promiscuous mode [ 307.456700][T13705] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.464044][T13705] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.638627][T13712] device bridge_slave_1 left promiscuous mode [ 307.744156][T13712] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.808072][T13712] device bridge_slave_0 left promiscuous mode [ 307.854075][T13712] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.167873][T13733] device pim6reg1 entered promiscuous mode