last executing test programs: 2.209189328s ago: executing program 2 (id=3113): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) (async, rerun: 32) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) (async) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r5], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x18, 0x51, &(0x7f0000000a40)=ANY=[@ANYBLOB="1800000003000000000000000400000018110000", @ANYRES8=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018460000faffffff000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000a60900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000020000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYRES32=r7, @ANYRES32=0x1, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000185400000300000000000000000000008510000000000000b7080000000000007b8af8ff00000000b7080000000800007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYRES8=0x0, @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a5000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000380)='GPL\x00', 0x1d9, 0x2a, &(0x7f00000003c0)=""/42, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x4, 0xe, 0x80000000, 0x7}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000500)=[r0, r5], &(0x7f0000000880)=[{0xfffffffe, 0x2, 0x3, 0x7}, {0x4, 0x4, 0x9, 0x5}, {0x1, 0x2, 0x3}, {0x5, 0x4, 0x9, 0x2}, {0x4, 0x5, 0xf}, {0x4, 0x3, 0xc, 0x8}], 0x10, 0xb775}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='cachefiles_ondemand_cread\x00', r9, 0x0, 0xfffffffffffffffc}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00'}, 0x18) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={r5, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x0, &(0x7f00000005c0)=ANY=[@ANYRESOCT=r4, @ANYRES16=r6, @ANYRES64=0x0, @ANYRES8=r8, @ANYRES16=0x0, @ANYBLOB="38fcdef82be4ce642240f8ff728cb4c4df6b100b783812089002da637e000c8cc6d5ae214d7551491830d8f2afa8d027da5165e9f9d81861718ce4ecf974df2cf0c926fc76c030683ffcec54"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r10, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000b034a45d012ecc3ba12369cf3c098191f60380aef5de8829effc97c358b7540939a13efdbbe143f5f9b808e60845f5bb2f0000000000000000000091", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x12, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@map_fd={0x18, 0x1, 0x1, 0x0, r11}, @call={0x85, 0x0, 0x0, 0x75}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xed41d0969ec4053c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r12}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="5650033a0c9be44e18100000", @ANYRES32, @ANYBLOB="00ffffff7f000000000000000000000445"], 0x0}, 0x90) (async, rerun: 32) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) (async, rerun: 32) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r13, 0x89f1, &(0x7f0000000080)) (async, rerun: 64) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x400, 0x9, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x50) (async) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r14, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r15}, 0x18) 2.14961803s ago: executing program 2 (id=3115): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007c5e0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x5}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1700000000000000040000000300"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x58, &(0x7f0000000680)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001000000000000", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bf"], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000"], 0x0}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000"], 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000060000000c000000000000060400000000305f5f2e003a5ddaa79f37db2115814781063cb11f1ba0a1315883b536f6d514e78ffc89750cbc84cebf6b2840cc178a16ce"], &(0x7f00000007c0)=""/218, 0x2a, 0xda, 0x0, 0x1}, 0x28) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff000000"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) close(0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 2.022619002s ago: executing program 2 (id=3119): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r1, @ANYRES32=r1, @ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8000}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f00000002c0)}, 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYRESHEX=r1, @ANYRES64], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) close(r3) (async) close(r3) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) (async) sendmsg$inet(r6, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) recvmsg(r5, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000fc0)=""/4096, 0x1000}, {0x0}, {&(0x7f0000000400)=""/64, 0x40}], 0x3}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r7) (async) close(r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYRES32=r6, @ANYRES32=r9], 0x18}, 0x8810) sendmsg$unix(r7, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r9], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0xae, '\x00', 0x0, @fallback=0x1a6c09ec3df3c33a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7ffd}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) syz_clone(0x440c7400, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000645431f60083eb4c113251dc56524465f5580000000000bc44aa61df1ac7f67fed373a5df18277664b9552e2323ae834f10e05e60eeb9bf9be122ed5889d89221aa6f3ced38eb90acdd207a695a1f94ec195a77763654948175b2b9d039e5298cfe089cb582ccaa308b8f010c164b797e07ed823c0b2ad2cc07e9c472f92a25ea8f6d63270a902985678ca0fa17d9b0de98f1d72acb37b0d5261c2bb7951d1a86354e1982df895c421495b2df119a45ada2361676711e6095921bcb6cfb37dac4e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r10, @ANYRES64=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r10, @ANYRES64=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r11}, 0x10) 1.762417647s ago: executing program 0 (id=3128): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00'}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x7, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000280), 0x9) r2 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000001c0), 0x12) mkdir(0x0, 0x8) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000003c0)='cgroup.freeze\x00', 0x275a, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r4, 0x0) 1.537589171s ago: executing program 0 (id=3131): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{0x1}, &(0x7f0000000140), &(0x7f00000001c0)='%-010d \x00'}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x2a) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0700e400"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB], 0xfdef) syz_clone(0x108011, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x18) setsockopt$sock_attach_bpf(r5, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r6, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000841}, 0x0) recvmsg(r5, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1, &(0x7f00000032c0)=""/4096, 0x1000}, 0x0) 1.411403083s ago: executing program 3 (id=3134): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 1.329595515s ago: executing program 4 (id=3138): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1a"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7538e475dd6317cebb03c23c00fe80000000000000875a65969ff57b0000040000000000000004"], 0xfe1b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850200000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000950000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000080)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r1}, 0x3d) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.321754385s ago: executing program 4 (id=3139): bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="060000cb2d7ebf489121be0e8b47cd771322a164f59e0615106c1b1bb26d1a2a8f9ad124b3b462649f0b9a17ae96232da8cd2078a4410f608c05aa81823e9385315402dabd070a3a81ad9bc553ce3aa15172cc77ce3d379898a4cd734f53b5573b6f235837f0c156bd6b27caad9eab078f5632d03ab079ba46a5e2299591adbe627a69ae6c703bd544fae954f9ffc3993a2183ac8128f82bf2c32ddd8e37981a73d12c11708910005e09e94ef098272b1f882ff091282b8d61fe390d737acbd15e"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x50) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)}, 0x20000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000e500"/22], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0, @ANYRESOCT=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080200000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\b\x00'/28], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) 1.318789685s ago: executing program 3 (id=3140): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r1, @ANYRES8=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xe24}, {0x0, 0x4000}, {0x0}, {0x0}, {&(0x7f00000020c0), 0x500}], 0x5}, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00'}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000090000000000000000000000c50000000ea20000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') (async) r7 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r7, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000040000000800000000000000", @ANYRES32=0x1, @ANYRES64=r6, @ANYRES8=r6, @ANYRES32=r6, @ANYBLOB='\x00'/16], 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES8=r6, @ANYBLOB='\x00'/20, @ANYRESDEC=r0, @ANYRES32, @ANYRESDEC=0x0], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r11}, 0x3d) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r12}, 0x3d) (async) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000001ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='fib6_table_lookup\x00', r4}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r8, @ANYBLOB="0600000000009b8d4800ef7c9447000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000000000000400"/28], 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r10, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000680)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000380), &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x97, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x22, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) 1.317587695s ago: executing program 1 (id=3141): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000004000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000208500000004000000850000000e00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x45084}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0/file0\x00', 0x42) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xddc5}, 0x0, 0xc40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x11, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000791218000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc0, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2620}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r5, &(0x7f0000000000), &(0x7f0000000040)=""/63}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r4}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0xc3, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000580), &(0x7f0000000680), 0x8, 0xe0, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001ac0)=ANY=[@ANYBLOB="02000000d5a20010080000000100000080000000", @ANYRES32, @ANYBLOB="0e00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="01000000000000000200"/28], 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x3}, 0x48) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000540)={r7, r6}, 0xc) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r7, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001bc0)={{r1}, &(0x7f0000001b40), &(0x7f0000001b80)=r2}, 0x20) 1.234202127s ago: executing program 1 (id=3142): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000340)={'team_slave_0\x00', 0x4000}) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0xed, 0x8, 0x1, 0x0, 0x5, 0x8000, 0xa, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x8ffff14ab016d192, @perf_config_ext={0x5, 0x4}, 0x2004, 0x5, 0x70, 0x4, 0x3ff, 0x100, 0x5, 0x0, 0x2, 0x0, 0xd5}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x9) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="8f03000000000060007538e486dd630ace2200052f00000000875a65059ff57b000000000000000000000000263c76dd02caadd30a3b00ac"], 0xcfa4) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000180), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002e000000850000007d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r4}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x10000}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x403, 0x0, 0x5}, 0x0, 0xfffffffffffff7ff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0x10, 0x1}]}}, 0x0, 0x26}, 0x20) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000085", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000060000000b00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00'/28], 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r7, &(0x7f0000000080)='syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup(r8, &(0x7f00000000c0)='syz1\x00', 0x1ff) 1.232134937s ago: executing program 4 (id=3143): r0 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080)={'pim6reg', 0x32, 0x36}, 0xa) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r2, &(0x7f0000000980), 0x20000992) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) 1.231137887s ago: executing program 3 (id=3144): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f00000004c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="00030000000000000000000000000000000000006f041a178633c169f52293ad3f82ee911b46dfef8e67a3234734380110ed12805b21db3d1ddabcd9155914bac6d786481b069f9091104b834e06c100d1cd8c8b02223c2ba2", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r1, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r1}, &(0x7f0000000000), &(0x7f00000005c0)=r2}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = openat$cgroup_subtree(r3, &(0x7f0000000180), 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000200)={[{0x2d, 'rlimit'}]}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x2, 0xc, 0x1400}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x5, 0x2, 0x7, 0x80, 0x1}, 0x50) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0xc02e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_config_ext={0xcf4, 0x8}, 0x11100, 0x4, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$OBJ_PIN_MAP(0x9, &(0x7f0000000040)=@generic={0x0, r8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r6}, 0x10) close(r0) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.146304939s ago: executing program 2 (id=3145): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000a40)=""/261, 0x105}], 0x1}, 0x1f00) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) (async, rerun: 64) socketpair(0x2, 0x5, 0x84, &(0x7f0000000040)) (async) sendmsg$tipc(r0, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) (async) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000010700000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) (async, rerun: 64) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 32) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) (rerun: 32) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x19, &(0x7f0000000880)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @call={0x85, 0x0, 0x0, 0x7d}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0xed41d0969ec4053c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) 1.100658369s ago: executing program 3 (id=3146): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xeb, '\x00', 0x0, @tracing=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000e2e2"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x404, 0xe, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x4, @perf_bp={0x0, 0x1}, 0x110c00, 0x200, 0x2, 0x0, 0x9, 0xb, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="560a0000000000007911050000000000180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) r5 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0xff, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10}, 0x0, 0xffefffffffffffff, r5, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x900000000000100, 0x7, 0x5, 0x0, 0x200000, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 1.02765333s ago: executing program 2 (id=3147): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x17, 0x5, &(0x7f0000000240)=@framed={{}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0xb}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000018", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000008000000000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) close(r1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x68001, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) write$cgroup_subtree(r1, 0x0, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r4}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="090000000800000004000000094000000a000000", @ANYBLOB="001e00000000000000000000000000000000000036f9f5097c3ee2b045262c8f630866ffab6004fec87d0f3f930fb479197edccef888b299051f3a3eb492be44db6f80a12f28548d8c8d8c21124cabde4178cd45fe9e87299e27063fc0ec12ba8deeff", @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='rseq_ip_fixup\x00', r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r5}, 0x10) 949.037232ms ago: executing program 3 (id=3148): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r0}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x3, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xf, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x41100, 0x12, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x3, 0x22, 0x6}, 0x10, r1, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540), 0x10, 0x4}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfffffffffffffd04, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x3a0ffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0500000004000000080000000500000010a40300", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000100"/20, @ANYRES32=r5, @ANYBLOB="dd64479f53cfcc1dc9ece11141c5730c", @ANYRES32=r5, @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x33, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x1, 0x40, 0x0, 0x1ff}]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 842.215914ms ago: executing program 2 (id=3149): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r1], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(0x0, 0x100) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="0200000004000000060000000500"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff90, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2d, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) ioctl$TUNGETVNETLE(r3, 0x40047451, &(0x7f0000000180)) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{}, &(0x7f0000000000), &(0x7f0000000040)='%pi6 \x00'}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001580)={0x0, 0xffffffffffffff3c, &(0x7f0000000300)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911040000000000000003c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62458c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f00000025c0)="87fb74cf4d67adbbd062637f514c1f5eb18d7b442e6457a356c6cb1f71a43dfae773c8489cce5145f92615d4bdb13ef54d6ae90ec7733180fcf5adf3e13fdb05b57b748bd14eda042a97fdd84498304a504a0a159b972e8200c2d0f536a3465ec498ed12b924bd134057df36129d3ebe3dd3ce9f0671e5278143e4afa3d43f444681de1b5f9725fca34fa357fe2154981666fb9dc202fc17a0199eb1c25bdd1005e590e84783ee9894c888998dc25a83c14aeee31d114acfa0bcd235d571cd765f4b9259ba43e6fc30291d8a642146c4771898030b736aeee6b247abb0784b154e104e7dcda401f9b1736fea30a41a4153fe6a9a525bd0a3487571f914f05b590e242341ade289d8f5b842c6be4a93c2755dfd47174def782a2f8f61c068b5a012f02c0801601e860def788121e8808c01fed4c920a3698d0d684920918c95b17f76bbcb4f265c931d8f79560ff8114b70f4dd6791e2ed70cfeb89905791b88be26efe1c5c66b7b50b3d2be0dbc066dfc31618f9507f6f340b85a2f76a6dcac9d6ccc289ace5e5fecd25afe22ffa451f5e365ab33cc985f2e9d7f7fb1be4794740a94215d7db14b0ffcec19e5e3c5ae0d8578ef3b65d2a7a77a11e390a6c3a6b391061c886b961e3c2f42d62047bfe1356a44b840d3d956105f4c0fa95db08c4933f00de77cdc057c28b41fecfc8398c442be1ad065954f6c9dfeb2fd7207e8548a00a1d50bdf522d2abfdafd71723616a34830fbfa8fc81e0c2639cc12f363a4919b7a00ac8189dad3e7e54122a2ef430f623658d5e281c9a19442995bb9b0e3f7d13e3016b6f9523be196bf23bbcc5ec802f43ef8b651d688d9d5a44f35c9847e4c32bce3e9ebed2326adadc76f06a195db32c80b3090d7cd65c9d8518ba4e528c5eb5c7a1c5695b21595fa8a8621734bfda8afddd65e1f37a1990220a00fa9bd2c22b0117ceb08ae6af3c944c2eca924abfddad065d1472d0c3f742a49b1e78c669471873706ad157d831d7482b773f07b0673a6ce1e227a7a4d13744bf459434c0ab1c323a38b1a84cbf1ce9741f2b8fdcc2e073e56171603d035aacd83e71d5132831f4f1e8bf517979f132a33fd03783272e9b8c96dfa4e1d320a58d82acfc8d3d53a5a52daafe4dc8be08f4ad53e11cc21374b6ff4ff5ea2ecc5d3f7c057f74f0098e57d990090475cdaffdef0da917653ed10fb70b94b72e5b4d95cbea0fc1dd2579635ad6ab545ba4d7b6d2f5442bdb78beb6c8ed62942a439117025b4566b48d9f3a17fdf4577e8606a4bc4c26557e58312fd2d1a541ebec3e5ae28eef8b2ab0597083716dd12889335570ee7839530eee879d9b137606cd4dd7103991671b4464bb68529eb19fb7a8845e3491bfbac688a87cf0744f429ea112014402915c4c1f6bae08d689d3cb7d641d7befe8fc74a2242310a9a367a39531b4c86da5b39df524e52f33ff9c40b48cb196ffc9ca855b6e698ade8a83e52b9ddc5031ff09e1907e4f8b0d07e64e1fb8e427f8819a7be907aa216bf8e2a4c7cc87ed53bf9490d4cc788b91f3b9f705e984a7e62c7a495e8421b97c39dc954b35468f17c6682334f4e16308448f457faeffff6d1f818522fa441d3a48168bdb12ffebace436a3915b63076cb6a655718647f87eaaf313b5bbd430421eed3a2215e439600a56eac8c65291eb103326a8034662bd337ab51577d9110ec7151be5cc9c54b2a30891acac5ad006ed537dbeb8f16eecbde7cf4e71373faf3c36b772f6d7ea9346875c8cf1049d49d4f8eb01b946c11e8c8e3ab2015f282167acddcc77fff03e1be9134252af0abfe538b4d25fc4ff874b52b9fb0996b5f32b4141dbd30578ff46e13ef6c63fc1620f62cb11a3dce401993976c272a5f62fde3f2a0e654d19e7a39dcdb622b9526d2a15cc18e6f817c916a00775353dd9c8954e66d0445b59bb0f5e6e3b46447232f52a0e398b057d123ef503afcbd48544db6434d2025bfc8dab72262a4fa5426a03061e7f8966e0086ff8ab5a91ab59f19b830394ee8bc76d6fb4816b8f4cde35b7eb9d3811228d51c54828f97fd1e648196c81bc73ed56249a59f318704e84656a6cedd2b8c1e1808d1cc648749abc643131e494c01336d4a14b8609656f2c972dc23c5c2e43fe40119fb88b5ec2aade35c03646e347354c493de8ab3672ccf94af0df333c6678299129d79be0eec281c5b3858ce3995566a390b674635b356692e3e9c53a089638ba0d69e772b7b410a5ae03de12e7de755ee559e1707b7b8003aabc8e2ce03c01e3183ff2d93262f6d5ceaafecdae66bc7cb3952c5a6571d864d502f281db5a228695badca5d022fdb6da56ab15dc377d1c1f8581ff56e28c2b2a84edb629547d28275c2ed571103b4ca7cdeb0776ba9f9dffcd78d21c3d4caa9289ed199672f4e7b912068c49c817114c37d37ea03954bae87d1ddae3da2ad85feb2fbb735b75a51f7bee5c8d88cc7bf64700d1a46ec6b631ae22ac7b06730a86a26bdcb992e1c7b50142de96b14a8468e4514068a30896fc677fddefaebb125c693a8d460469c7fe535f844781940f66d6abd091191c3122d584f5b0f5b0d443713d7d5186124d73de28aca30b719d4a55e09d259bddbf16995aeb1000880890afbd24d4066b0398985a40999de22ce176348e1c1f57eaf75b92a1e4f1482e89a00ac2cc36b20e36af9ec310599c19a5b1d6f8fadba104c58c801c6633315f82ebfa88faddd0b693e2f827f586c1cc5538e93bcf10f81af6dd7ee727df3b5018c0b4e31e40d040a47503b6ace4d29a1162ce487351825255f5584aff7cbd421f85c3d9fbb3784abd9848f16028b68f0d32ed8bb80106e8cc4acb939ff88bd39976d166b2addebf628b3fcd056da2f60e1b90f7a32702954921908ebccb683622a1f574ceba6951bef5e751c338c8279318dc28e36b9fc2bb17c3ad08aceb00fc388e6db112a738f86a4a1eb11526e1b9d73250b326285ed47c4398d93a3933d9a784249b65ad7d78a1f81d96ef36493ed693045a2150a8eb43cecc0c93e7d20b15b39a0646b081c2923b816365b7fbb41683a41732d942c5aa12faf876ec7f036becde8f3295af6dacff38d076d8e06260fee167703bb610745374a2758a6b88e465ca77d1f3105ae8b6b04a1eb509fb178d6249dbbc84d5d1d069278449a89d03e4a9a395d8170c329a296cfc329798cb9b9f1078d098cf3f989fd4ec53e013fbe917df35292d44fb1f3da4da4432a1847d4721514ade8cda5e5c0b51183580fc35266a970ebba74faeda56d4dcb56df51f96ad237452cedbd0cb2bee112713c3d450835811bf3da9745136d428e148fd0932dc77c8d8e61a16c625241fad8425b4ece394eedd5f165bd94923bfa1172be8edc8a4fcaae5f77ee8cc510192b27964da09c3e84efb4bc7154da1a24da8b7e544b42278d2574687ec76143afa6cf193d52a2a7f4c20ee57b6056a1337d5e408117a6cf1ab49c8980f39597f69902085d3e8d374d44e6ab4ed1185a26be2bc7281e9cfbbeb6bed899aa1924d3faa06d95999fbeaf2337494e0c2c39eef5a73fcde84459a9ea48d4e015d9e5bb5839354967ce02f637bc8678d2595b9a918fc36b927d7501f0ac2e3471ce02b5df355689c87f191ef5390900a41deec29984e45a878ece964b0009aad561316fc3b30ce1b49266d32eb17cd30f3e17e1f59014e8c518940dd0a093d1349c1a7c2581963bbe0ba372b6426e81c33c71b2ec8141c5713e52a37fff0a417a5b259e1420d9fb6a731f5baa0cc494221947895aa8fa14745a986a366bff9d0c239a19f85372497565b5b703da16439019df5f3d29f4247fb528854c9648630f03e9dedde5a08a47728ea6a4d42e62eff6fa3bd402325e0f4387b60171c37c180f958ad80955779c899517e7ea76eed00598e01552eaaf08b723daf9d466e8c57af43a15a46528b1119f5074aa3c51f77357ebe158275bc06b89640d7ce3c0a03af01418d7dc6ae8a1be8ab08c1722d66d1e9277480b8b178447667c024f9b78f8a878a2d7cf8e83e5104f6964b2907a989abafc7d7d0df941abf3d7283b6a11d46c2911a42182ec27ab785d92946e1ee8ef44846d561850d2a98c305c382f36d4cfc9b2bfd3b86ef21a0d187adcafbec8268c7d662a34dda1c83c4967097743133bc8c587edf249f5668c34ddb112fa4eb1bea9c8f6a000f1f34428b54688a5e214a7919868b25dbe930e86a243ecf54afe0b518c647d04873d2cf62cb2ab27f00015537a4fd2ea3dc8777abdf3284622347016566da0b9c406ca8c40694e4013a53fbf2e803d51b0bbe5e9df5fc74f66be618856357ccf803c53ed0e3b3fe79f69f0ede9b565d8f7a8ce5aa8cbb4e8fa61be3fd00ffb07e45065498925c14c0b311942d4ed951ad6237aadb5405bc7b2d79e1fd295b7c2ed8efa883e44c86a5053e2f421c6d4dc0c47d3a05d911db37d6efdb8e50fb3f06139ac147bc7162c21aece79eaf72e9779f19eb5395cec3d15a7594ea70a6b373d98651d2215b210f037ea3f8a57ded74474f6fdb64a08b56af52168da70b30aee03472cd8bee5af04cad7303004a4aba464b99", 0xcb3}, {&(0x7f00000006c0)="97b13f5cf9f584c87e0e637d2ff483a311bb412cb3b03c3d9e97e435f2fceb58ff0402ed7b96244b43386c222917662028d7a01206a1990722ccef1d8f39f7c8ae242e58359217b1c6161ea741445cf16b0c48eb18a6c72174dfb7cd1bd0f409dad5a432bed4afb470da3656dd30d70769e229dc91037321d618e1eff4a176ea46d5cd4d5da97f80356e46d9e8166bf2d97210b631654ece218a2a204a1786ab5a60a881a7a294cd2f92438350e6e3ec4439ebe06133ff65b1e32b809ba0482783b563ec8e5778285da5211e5821135433053a7921319c544d5e797f"}, {&(0x7f00000007c0)="75c37714a0bada8343bceb64ccb6d95a2a37b020e0bf1f6a1de4584223a2f285aaca30a9554cd5cdc1659cb9fec462cc5c2220a7cd891ec3bad99fe3c06e15a109ec0fdb6aeeee5ef8e4bfc28e17984a3860b907d549492d47a447782b7357ea72f4b2c26512a6a33c0247b730a6182ea5a99aee25fcee07f9cb0a80595cd5f744fa6898fdffda5b34b19474b8e853467329e4aea36cfd0e00735d37beb0f895c5688259a8935194eefd3a96d55707133a08f03e14da563160a545396b93341f41c161c93687e28a"}, {&(0x7f0000000b00)="1b080b7a30aec939ce8e26e0cbbe37fc064ceef965fd5e3b6739c966492dbdf71c04423d8a403e56dfd224e4e55918a5e31e683fec5cc9460882a0d1628d02d51a8da997073f856e2cd00586c6e8c89c71cf8be6121b0b3a85d597a1afb0cc311f30cc26183c8e594ce5ff62661c9e32cbc9dd9a72985e9857f3bddb52382b6c27ca85d5774cf17b92e2d2097f12a8687e70f90d46381a47706a9124a2cf61b84f26aae22fd4da84ae35b93f7be9fdfdfbf33c59f5c657e9f7e81b81b786082f88af4de07808ff3c954bae"}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) 638.327428ms ago: executing program 0 (id=3150): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) close(r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, &(0x7f0000000180), &(0x7f00000001c0)=r4}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x4000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x9) syz_clone(0xae12e400, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002a000000"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) unlink(&(0x7f0000000140)='./cgroup\x00') r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0xc004743e, 0x110e22fff6) close(r9) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 442.679672ms ago: executing program 4 (id=3151): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r0}, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 428.164312ms ago: executing program 1 (id=3152): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x1b}, 0x0, 0x0, 0x80000001, 0x0, 0x4000000, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) (async) recvmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) close(r3) (async) close(r3) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffc}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffc}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x200fffe, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x7300, 0x4000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x4}, 0x28) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x200fffe, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x7300, 0x4000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x4}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x30}) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x84000, &(0x7f0000000280)="1d9375e86248e0416d39e1ead7254cee5ea43c47e5fcc54f2193f6676a0200443444ccf202000000d3806ae0d7fc5915af24c49348203a6ae621a7ba69ea190ce3e611d5a28e3555a27fbd4f91ccc3d94ab6c16e1196e6f0ef37dd7bfa4b853c36078896cd4b41297eb2010038e8fbc4eb950d6b49628e55", 0xfd72, &(0x7f0000000300), &(0x7f0000000600), &(0x7f0000000780)="691e1447beaa5d2510648ff6f1117d614e17c02e726c7c6a642abae1b5f749f1119476dd91084657434293b3516c8402e0600100000000000000e8146974ca36df3c865b06da0e535f54c06be406ca32a3092e7e2d311309b60b3bb71d676f4554fb887fee52ba30c4ad7959aacbc527dab68c1f25a726a910073e269787c2cacf5e950f9cb37e8874fef7349b69370c9337decfbcd7fbd0acd7339dc495ad8a0c1ecfebbeb9a986eccd6d9edfbaa9664e4a86600f11b8843d3c96fc2f3e599b133728fb5d8d490c692fedd053d7f9342efe59e2f04f68cb072bea444e9ba376026d1508b023095fefb942ecbb55393d6228783a9870") (async) syz_clone(0x84000, &(0x7f0000000280)="1d9375e86248e0416d39e1ead7254cee5ea43c47e5fcc54f2193f6676a0200443444ccf202000000d3806ae0d7fc5915af24c49348203a6ae621a7ba69ea190ce3e611d5a28e3555a27fbd4f91ccc3d94ab6c16e1196e6f0ef37dd7bfa4b853c36078896cd4b41297eb2010038e8fbc4eb950d6b49628e55", 0xfd72, &(0x7f0000000300), &(0x7f0000000600), &(0x7f0000000780)="691e1447beaa5d2510648ff6f1117d614e17c02e726c7c6a642abae1b5f749f1119476dd91084657434293b3516c8402e0600100000000000000e8146974ca36df3c865b06da0e535f54c06be406ca32a3092e7e2d311309b60b3bb71d676f4554fb887fee52ba30c4ad7959aacbc527dab68c1f25a726a910073e269787c2cacf5e950f9cb37e8874fef7349b69370c9337decfbcd7fbd0acd7339dc495ad8a0c1ecfebbeb9a986eccd6d9edfbaa9664e4a86600f11b8843d3c96fc2f3e599b133728fb5d8d490c692fedd053d7f9342efe59e2f04f68cb072bea444e9ba376026d1508b023095fefb942ecbb55393d6228783a9870") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x702, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xec, 0x1, 0x1, 0x1, 0x0, 0x6, 0x8c0c3, 0xf, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, @perf_bp={0x0, 0x7}, 0x0, 0xffffffffffffdabb, 0x206, 0x4, 0x1, 0x200001, 0x6, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x10000000000d, 0xffffffffffffffff, 0x3) (async) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xec, 0x1, 0x1, 0x1, 0x0, 0x6, 0x8c0c3, 0xf, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, @perf_bp={0x0, 0x7}, 0x0, 0xffffffffffffdabb, 0x206, 0x4, 0x1, 0x200001, 0x6, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x10000000000d, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) 12.90819ms ago: executing program 0 (id=3153): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x21}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bf"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000080), 0x200}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x3}, 0x38) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) socketpair(0x11, 0x3, 0x0, &(0x7f00000001c0)) (async, rerun: 32) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff, 0x1000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x3}, 0x50) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) (async, rerun: 32) r5 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r3}, 0x8) (rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x20005, 0xf, 0x4, 0x10885, r4, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @value=r5}, 0x50) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32514, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r7], 0x0}, 0x94) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) (async) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0xfffffe51) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x6, 0x3, &(0x7f0000000040)=@framed={{0x56, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0xc}}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, r9}, 0x94) (async, rerun: 64) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305829, &(0x7f0000000040)) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r6}, 0x18) r10 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r10}, @generic={0x79, 0x0, 0x0, 0xe7}, @initr0, @exit, @alu={0x5, 0x0, 0xd, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) 11.68275ms ago: executing program 1 (id=3154): bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/1421], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001340)={r2, 0x0, 0xe, 0x0, &(0x7f0000000f80)="dd7e7bc2300823a04347f02db2c6", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000a40)="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", 0x5a9}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x21, &(0x7f0000000540), 0x4) sendmsg$tipc(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x40850) sendmsg$tipc(r3, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r0, &(0x7f0000000540)={&(0x7f0000000340)=@id={0x1e, 0x3, 0x3, {0x4e23, 0x4}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x2000c041) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80400, 0x0) ioctl$TUNSETIFF(r6, 0x400454da, &(0x7f00000002c0)={'bond0\x00', 0x4000}) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={&(0x7f0000001140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x7, [@struct={0x5, 0x2, 0x0, 0xc, 0x0, 0x0, [{0x10, 0x1, 0x3}, {0x6, 0x2, 0x1000000}]}]}, {0x0, [0x5f, 0x61, 0x2e, 0x0, 0x2e]}}, &(0x7f0000001300)=""/179, 0x43, 0xb3, 0x1, 0x2}, 0x28) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) 8.65826ms ago: executing program 0 (id=3155): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x18) close(r3) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0)={r3, r0, 0x0, r3}, 0x10) 7.00011ms ago: executing program 4 (id=3156): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000440)=r1) close(0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x8, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x56}]}, 0x0, 0x4, 0x99, &(0x7f00000002c0)=""/153}, 0x94) gettid() r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x71b}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f00000006c0)=ANY=[@ANYBLOB], 0xcfa4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000008700000000000000a6000000ffffff8595", @ANYRESDEC], &(0x7f0000000380)='GPL\x00', 0x3, 0x105, &(0x7f0000000580)=""/261, 0x0, 0xe, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0f000000080000000800"/20, @ANYRES32, @ANYBLOB="000000820000000000000000000000000000009beffb25d3dc6b4585c6d18df9e588612297c70a50b7f31b1b221a04420aa6289389615782ec3b7b4320459bef2c202f7c729e185944200a0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@bloom_filter={0x1e, 0x6046, 0x9, 0x2, 0x2491, r7, 0xffffff00, '\x00', 0x0, r8, 0x3, 0x5, 0x0, 0x9}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) 6.5079ms ago: executing program 1 (id=3157): bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x20, &(0x7f0000000040)={&(0x7f00000000c0)=""/246, 0xf6, 0x0, &(0x7f00000001c0)=""/160, 0xa0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111a900000000008510000002000000850200000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x41100, 0x7, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x94) 6.21503ms ago: executing program 3 (id=3158): bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x0, 0xc, &(0x7f0000000680)=ANY=[], 0x0, 0xfffffffe, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x10, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) bpf$MAP_CREATE(0x300000000000000, 0x0, 0xfffffffffffffcc4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa, &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x25, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000700), &(0x7f0000000540), 0x8, 0x496, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={0x0, 0x4}, 0x20, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="1e000000a01200000a000000fc69ab7703000000", @ANYRES32, @ANYBLOB='\b\x00'/20, @ANYRES32=r1, @ANYRES32, @ANYBLOB="0500000003000000040000000900000000040000000000000000000051821454d5329f77df6f85e7696506756e88e46a69d5d965fcf43726b5ab913b5848f6831ae0e9866c6dc892d97c61073da82f0bbd2994d8f5f630ee02538ff6d319b3dc3975ea0e78232e5c23b5670af7b70fec1d8b9d6c9c40d49039dbaf6031a88a86258191496700c61a4e80751a3eb3984f993ffad79b4600"/161], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0), 0xc) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010100)={0xffffffffffffffff, &(0x7f00000102c0), &(0x7f0000010440)=""/198}, 0x20) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a00)=r2, 0x4) mkdirat$cgroup(r5, &(0x7f0000000940)='syz1\x00', 0x1ff) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', r1, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_tracing={0x1a, 0x5, &(0x7f0000001140)=ANY=[@ANYBLOB="180000000004000000000000000000000095000200f0ff0000000000000000000000000000c77b001c6e91db611ff613673cce9094660100000000000031ae178f5bb90ecbcf85a30b09b0364741ae32e3aecb294e99560494f9850a01620b6c58a5202f3482f89cf09ddc9151545b99608247bc2b0c19120cc1a86f6d302fb0077b93dcbc4f280c5266e0b8f76e029cc0165a26163e275197a21ed5f8f2f43819fa9bc3bca399ea58e46accacdf91f3805fc41172eb19e8df501733adf615d22233af7733bd6956f9becacceae607821b4a0996ce53fda5e0554658ae7005b406dc85bc5bd8f1eba080eac8696fb3c5234eaf104489f142ea16e56c0fc061550597ac9830a251e3b69e"], &(0x7f0000000b00)='syzkaller\x00', 0x1000, 0xa2, &(0x7f0000000d00)=""/162, 0x40f00, 0x4, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000b40)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x3, 0xe, 0xfffffffe, 0x8}, 0x10, 0x6a8a, r3, 0x8, &(0x7f0000000900)=[0xffffffffffffffff], &(0x7f0000000e40)=[{0x0, 0x3, 0xe, 0x8}, {0x5, 0x3, 0x5, 0xb}, {0x2, 0x3, 0x4, 0x6}, {0x1, 0x6, 0xb, 0x3}, {0x5, 0x1, 0x5}, {0x2, 0x1, 0x10, 0x7}, {0x0, 0x4, 0xd, 0x2}, {0x4, 0x3, 0xe, 0x7}], 0x10, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r0}, 0x10) socketpair(0x18, 0x2, 0x1, &(0x7f0000000000)) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) 5.347ms ago: executing program 1 (id=3159): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x63) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x63) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x10001, 0x9, 0x1}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) (async) 4.77794ms ago: executing program 4 (id=3160): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) (async) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB='\x00\x00\x00^,m]\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB='\x00\x00\x00^,m]\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='spmi_write_end\x00', r2, 0x0, 0x10000}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRESOCT=r4], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRESOCT=r4], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0), 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a00), 0x4) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={&(0x7f00000003c0)="f51f559c934242a941825ff2ab27f7a982883cc9f9f8cb8b459a5134f8a3aae2f140754b348d5087ee64e882d928b6969c41c4ae0c47b0e15d8794e9a6a3e420842dff5f16ba1ee0b47fc25ee8b52ee6d6625f58307a28820c338914764b51be3557a841378d88ae4ee1f150332ad6f8510733639b3d14b2e7fd57c5039cf555beed5c9f3ff9992b4a20a3a9af7164cf7f2b11c44b30720dbc5fc49cf88a77b4c6ba9980d891bfbed094974187840e67a3ae54a6f3bbdaa2617e6b1b8a8ca4dc57fb039f48d035928ef07e158a", &(0x7f0000000900)=""/170, &(0x7f0000000c40)="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", &(0x7f0000000a40)="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", 0x80000001}, 0x38) 0s ago: executing program 0 (id=3161): socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000e40)=""/4096, 0x1000}], 0x1}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000400000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600000000000000180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f4ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x6f) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000980), 0x0, 0x2f, 0xe8034000, 0x0, 0x0, 0x0, 0x0, 0x5dc}, 0x50) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20408, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, @perf_bp={0x0}, 0x0, 0x101, 0x0, 0x0, 0xfffffffffff7bbfe, 0x4, 0xfffd, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.122' (ED25519) to the list of known hosts. [ 30.213136][ T24] audit: type=1400 audit(1757945711.700:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 30.214476][ T267] cgroup: Unknown subsys name 'net' [ 30.235961][ T24] audit: type=1400 audit(1757945711.700:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 30.263763][ T24] audit: type=1400 audit(1757945711.740:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 30.264020][ T267] cgroup: Unknown subsys name 'devices' [ 30.499173][ T267] cgroup: Unknown subsys name 'hugetlb' [ 30.505072][ T267] cgroup: Unknown subsys name 'rlimit' [ 30.675721][ T24] audit: type=1400 audit(1757945712.160:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 30.699394][ T24] audit: type=1400 audit(1757945712.160:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 30.724664][ T24] audit: type=1400 audit(1757945712.160:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 30.752650][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 30.761764][ T24] audit: type=1400 audit(1757945712.250:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 30.787457][ T24] audit: type=1400 audit(1757945712.250:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 30.819227][ T24] audit: type=1400 audit(1757945712.310:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 30.844781][ T24] audit: type=1400 audit(1757945712.310:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 30.871414][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 31.981100][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.988376][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.995989][ T275] device bridge_slave_0 entered promiscuous mode [ 32.004173][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.011585][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.019417][ T275] device bridge_slave_1 entered promiscuous mode [ 32.026201][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.033495][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.041091][ T277] device bridge_slave_0 entered promiscuous mode [ 32.049246][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.056469][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.063920][ T277] device bridge_slave_1 entered promiscuous mode [ 32.126508][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.133720][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.141272][ T276] device bridge_slave_0 entered promiscuous mode [ 32.156803][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.163876][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.171485][ T276] device bridge_slave_1 entered promiscuous mode [ 32.191654][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.198760][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.206233][ T279] device bridge_slave_0 entered promiscuous mode [ 32.215453][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.222802][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.230556][ T278] device bridge_slave_0 entered promiscuous mode [ 32.237675][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.244807][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.252385][ T278] device bridge_slave_1 entered promiscuous mode [ 32.265551][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.272866][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.280377][ T279] device bridge_slave_1 entered promiscuous mode [ 32.412503][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.419571][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.427145][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.434191][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.444093][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.451258][ T278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.458540][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.465840][ T278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.478720][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.485966][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.498151][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.505211][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.512594][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.519666][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.542656][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.549864][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.557144][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.564170][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.584645][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.592028][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.599763][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.607330][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.614596][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.622177][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.629370][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.636481][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.643686][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.651490][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 32.659026][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 32.680011][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 32.687845][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 32.696553][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.703885][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.711535][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 32.720283][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.727660][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.735396][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 32.743105][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 32.768773][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 32.777382][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 32.785851][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.792923][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.802006][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 32.810626][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.817684][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.825202][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 32.833748][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.841241][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.848742][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 32.857319][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 32.865535][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.872610][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.880163][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 32.888510][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.895544][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.903026][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 32.911193][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 32.931485][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 32.939976][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.947097][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.955162][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 32.963642][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 32.984515][ T275] device veth0_vlan entered promiscuous mode [ 32.992655][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 33.001279][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 33.009766][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 33.018806][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 33.027379][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 33.035361][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 33.043817][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 33.052149][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 33.060099][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.068307][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 33.076345][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 33.084866][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 33.092538][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 33.109059][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 33.117895][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 33.126471][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 33.134885][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.144349][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 33.152174][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 33.160375][ T276] device veth0_vlan entered promiscuous mode [ 33.173187][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 33.181201][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 33.189329][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 33.197816][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 33.206158][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.213266][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.221418][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 33.230159][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 33.238905][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.245947][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.260959][ T275] device veth1_macvtap entered promiscuous mode [ 33.270152][ T276] device veth1_macvtap entered promiscuous mode [ 33.280254][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 33.288833][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 33.297837][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 33.305823][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 33.314513][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 33.323148][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 33.331387][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 33.339755][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 33.347954][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 33.356074][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 33.378460][ T278] device veth0_vlan entered promiscuous mode [ 33.387933][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 33.396368][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 33.404953][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 33.413624][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 33.422691][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 33.431793][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 33.440340][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 33.448890][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 33.457581][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 33.465862][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.474096][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 33.482798][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 33.491534][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 33.499914][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 33.508424][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 33.515883][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 33.527799][ T277] device veth0_vlan entered promiscuous mode [ 33.540718][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 33.549196][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.558194][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 33.566527][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 33.575694][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 33.584053][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 33.603387][ T279] device veth0_vlan entered promiscuous mode [ 33.609796][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 33.617451][ T276] request_module fs-gadgetfs succeeded, but still no fs? [ 33.625673][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.634442][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 33.642031][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 33.654001][ T278] device veth1_macvtap entered promiscuous mode [ 33.662162][ T276] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 33.672330][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 33.682522][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 33.695620][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 33.704236][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 33.713266][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 33.722052][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 33.730880][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 33.743391][ T277] device veth1_macvtap entered promiscuous mode [ 33.763760][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 33.773247][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 33.790971][ T279] device veth1_macvtap entered promiscuous mode [ 33.807506][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 33.816148][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 33.817074][ T305] cgroup: syz.0.1 (305) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 33.825030][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 33.851241][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 33.860271][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 33.874772][ T305] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 33.894895][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 33.907691][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 33.916243][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 33.925491][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.037848][ T317] syz.2.6[317] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.037903][ T317] syz.2.6[317] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.074086][ T317] device wg2 entered promiscuous mode [ 34.216679][ C1] hrtimer: interrupt took 26697 ns [ 35.640883][ T24] kauditd_printk_skb: 41 callbacks suppressed [ 35.640895][ T24] audit: type=1400 audit(1757945717.130:115): avc: denied { tracepoint } for pid=406 comm="syz.3.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 35.753416][ T24] audit: type=1400 audit(1757945717.160:116): avc: denied { create } for pid=406 comm="syz.3.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 36.528176][ T24] audit: type=1400 audit(1757945718.020:117): avc: denied { create } for pid=420 comm="syz.2.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 36.683296][ T442] device veth0_vlan left promiscuous mode [ 36.697394][ T442] device veth0_vlan entered promiscuous mode [ 36.757031][ T458] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.764356][ T458] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.804250][ T461] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.811558][ T461] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.819005][ T461] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.826151][ T461] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.865067][ T461] device bridge0 entered promiscuous mode [ 36.952284][ T24] audit: type=1400 audit(1757945718.440:118): avc: denied { relabelfrom } for pid=470 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 37.052843][ T24] audit: type=1400 audit(1757945718.470:119): avc: denied { relabelto } for pid=470 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 37.100164][ T475] device sit0 entered promiscuous mode [ 37.296303][ T488] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 37.340979][ T488] device syzkaller0 entered promiscuous mode [ 37.455380][ T24] audit: type=1400 audit(1757945718.940:120): avc: denied { create } for pid=491 comm="syz.0.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 37.576852][ T24] audit: type=1400 audit(1757945718.940:121): avc: denied { create } for pid=491 comm="syz.0.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 37.925328][ T512] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.932698][ T512] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.951442][ T512] device bridge0 left promiscuous mode [ 38.400249][ T24] audit: type=1400 audit(1757945719.890:122): avc: denied { append } for pid=522 comm="syz.2.62" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 38.589748][ T543] device pim6reg1 entered promiscuous mode [ 38.596780][ T24] audit: type=1400 audit(1757945719.930:123): avc: denied { create } for pid=522 comm="syz.2.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 39.080845][ T579] device pim6reg1 entered promiscuous mode [ 39.294072][ T593] syz.1.83[593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.301187][ T593] syz.1.83[593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.028303][ T605] Ÿë: port 1(veth0_to_team) entered blocking state [ 40.047165][ T605] Ÿë: port 1(veth0_to_team) entered disabled state [ 40.054434][ T605] device veth0_to_team entered promiscuous mode [ 40.126845][ T608] device wg2 entered promiscuous mode [ 40.384873][ T24] audit: type=1400 audit(1757945721.870:124): avc: denied { create } for pid=638 comm="syz.0.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 40.426363][ T629] device syzkaller0 entered promiscuous mode [ 41.284420][ T663] device pim6reg1 entered promiscuous mode [ 41.817717][ T689] device pim6reg1 entered promiscuous mode [ 42.981979][ T24] audit: type=1400 audit(1757945724.470:125): avc: denied { create } for pid=745 comm="syz.0.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 43.304837][ T754] device pim6reg1 entered promiscuous mode [ 43.640221][ T761] device syzkaller0 entered promiscuous mode [ 43.787039][ T759] device wg2 entered promiscuous mode [ 43.913813][ T24] audit: type=1400 audit(1757945725.400:126): avc: denied { create } for pid=766 comm="syz.1.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 45.245689][ T828] device sit0 entered promiscuous mode [ 45.365248][ T822] device pim6reg1 entered promiscuous mode [ 46.529653][ T893] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.560849][ T897] device pim6reg1 entered promiscuous mode [ 46.968933][ T948] ------------[ cut here ]------------ [ 46.974757][ T948] trace type BPF program uses run-time allocation [ 46.982279][ T948] WARNING: CPU: 0 PID: 948 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 46.993895][ T948] Modules linked in: [ 46.998479][ T948] CPU: 0 PID: 948 Comm: syz.1.183 Not tainted syzkaller #0 [ 47.006498][ T948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 47.017633][ T948] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 47.024858][ T948] Code: 85 e9 14 fe ff ff e8 b9 fa ef ff 31 c0 e9 15 fe ff ff e8 ad fa ef ff c6 05 64 c4 2c 05 01 48 c7 c7 e0 77 05 85 e8 ea 84 fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 47.046411][ T948] RSP: 0018:ffffc90000d67468 EFLAGS: 00010246 [ 47.053296][ T948] RAX: be83c9f149740700 RBX: 0000000000000001 RCX: 0000000000080000 [ 47.063690][ T948] RDX: ffffc9000192c000 RSI: 0000000000002228 RDI: 0000000000002229 [ 47.072389][ T948] RBP: ffffc90000d674b0 R08: dffffc0000000000 R09: ffffed103ee0a5f8 [ 47.080873][ T948] R10: ffffed103ee0a5f8 R11: 1ffff1103ee0a5f7 R12: ffff88810f804000 [ 47.091582][ T948] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888111ae5000 [ 47.100139][ T948] FS: 00007f954b16b6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 47.109603][ T948] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 47.116610][ T948] CR2: 0000200000010000 CR3: 0000000119b05000 CR4: 00000000003506b0 [ 47.136774][ T948] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 47.145882][ T948] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 47.161168][ T948] Call Trace: [ 47.194029][ T948] ? __fdget+0x1a1/0x230 [ 47.211919][ T948] resolve_pseudo_ldimm64+0x526/0x1020 [ 47.237907][ T948] ? bpf_check+0xd680/0xd680 [ 47.246304][ T948] ? kvmalloc_node+0x88/0x130 [ 47.251554][ T948] bpf_check+0x8d4b/0xd680 [ 47.256290][ T948] ? bpf_get_btf_vmlinux+0x60/0x60 [ 47.261961][ T948] ? 0xffffffffa00024f0 [ 47.295704][ T948] ? is_bpf_text_address+0x177/0x190 [ 47.322736][ T948] ? selinux_bpf_prog_alloc+0x51/0x140 [ 47.336773][ T948] ? __kernel_text_address+0xa0/0x100 [ 47.350465][ T948] ? unwind_get_return_address+0x4d/0x90 [ 47.365598][ T948] ? stack_trace_save+0xe0/0xe0 [ 47.378594][ T948] ? arch_stack_walk+0xee/0x140 [ 47.415100][ T948] ? stack_trace_save+0x98/0xe0 [ 47.434810][ T948] ? stack_trace_snprint+0xf0/0xf0 [ 47.450243][ T948] ? __kasan_slab_alloc+0x69/0xf0 [ 47.498615][ T948] ? selinux_bpf_prog_alloc+0x51/0x140 [ 47.508559][ T948] ? __kasan_kmalloc+0xec/0x110 [ 47.520851][ T948] ? __kasan_kmalloc+0xda/0x110 [ 47.534883][ T948] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 47.548437][ T948] ? selinux_bpf_prog_alloc+0x51/0x140 [ 47.583662][ T948] ? security_bpf_prog_alloc+0x62/0x90 [ 47.618399][ T948] ? bpf_prog_load+0x949/0x1420 [ 47.638801][ T948] ? __se_sys_bpf+0x442/0x680 [ 47.661494][ T948] ? __x64_sys_bpf+0x7b/0x90 [ 47.680260][ T948] ? do_syscall_64+0x31/0x40 [ 47.700430][ T948] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 47.763936][ T948] ? memset+0x35/0x40 [ 47.786816][ T948] ? bpf_obj_name_cpy+0x193/0x1e0 [ 47.796739][ T948] bpf_prog_load+0xf5a/0x1420 [ 47.804424][ T948] ? map_freeze+0x320/0x320 [ 47.809108][ T948] ? selinux_bpf+0xc7/0xf0 [ 47.813767][ T948] ? security_bpf+0x82/0xa0 [ 47.818713][ T948] __se_sys_bpf+0x442/0x680 [ 47.823274][ T948] ? __x64_sys_bpf+0x90/0x90 [ 47.844346][ T948] ? __bpf_trace_sys_enter+0x62/0x70 [ 47.856969][ T948] __x64_sys_bpf+0x7b/0x90 [ 47.861511][ T948] do_syscall_64+0x31/0x40 [ 47.880779][ T948] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 47.895767][ T948] RIP: 0033:0x7f954c702ba9 [ 47.900636][ T948] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 47.998795][ T948] RSP: 002b:00007f954b16b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 48.083717][ T948] RAX: ffffffffffffffda RBX: 00007f954c949fa0 RCX: 00007f954c702ba9 [ 48.092763][ T981] device sit0 entered promiscuous mode [ 48.129859][ T948] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 48.184064][ T948] RBP: 00007f954c785e19 R08: 0000000000000000 R09: 0000000000000000 [ 48.239402][ T992] device pim6reg1 entered promiscuous mode [ 48.239569][ T948] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 48.253664][ T948] R13: 00007f954c94a038 R14: 00007f954c949fa0 R15: 00007fff4b005308 [ 48.261974][ T948] ---[ end trace a222998ae0beffa2 ]--- [ 48.603023][ T24] audit: type=1400 audit(1757945730.090:127): avc: denied { create } for pid=1017 comm="syz.4.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 48.844468][ T1033] device syzkaller0 entered promiscuous mode [ 49.283090][ T24] audit: type=1400 audit(1757945730.770:128): avc: denied { ioctl } for pid=1044 comm="syz.1.209" path="mnt:[4026532288]" dev="nsfs" ino=4026532288 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 49.889893][ T24] audit: type=1400 audit(1757945731.370:129): avc: denied { create } for pid=1082 comm="syz.2.220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 50.063648][ T24] audit: type=1400 audit(1757945731.530:130): avc: denied { create } for pid=1097 comm="syz.3.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 50.154936][ T1105] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.163561][ T1105] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.326764][ T1108] device bridge_slave_1 left promiscuous mode [ 50.342050][ T1108] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.350320][ T1108] device bridge_slave_0 left promiscuous mode [ 50.356577][ T1108] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.452908][ T24] audit: type=1400 audit(1757945731.940:131): avc: denied { write } for pid=1127 comm="syz.2.231" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 50.519693][ T24] audit: type=1400 audit(1757945732.010:132): avc: denied { create } for pid=1127 comm="syz.2.231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 51.164105][ T1187] device syzkaller0 entered promiscuous mode [ 51.181028][ T1200] syz.2.248 uses obsolete (PF_INET,SOCK_PACKET) [ 51.305104][ T1203] device sit0 left promiscuous mode [ 51.519828][ T24] audit: type=1400 audit(1757945733.010:133): avc: denied { create } for pid=1228 comm="syz.0.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 52.090294][ T1263] device syzkaller0 entered promiscuous mode [ 52.103463][ T1275] device veth1_macvtap left promiscuous mode [ 52.137200][ T1284] device veth1_macvtap entered promiscuous mode [ 52.144234][ T1284] device macsec0 entered promiscuous mode [ 52.155749][ T1293] device pim6reg1 entered promiscuous mode [ 52.264202][ T1305] device wg2 left promiscuous mode [ 52.311065][ T1305] device wg2 entered promiscuous mode [ 52.591107][ T24] audit: type=1400 audit(1757945734.080:134): avc: denied { create } for pid=1328 comm="syz.4.284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 53.220213][ T24] audit: type=1400 audit(1757945734.710:135): avc: denied { create } for pid=1337 comm="syz.0.289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 54.365921][ T1392] device syzkaller0 entered promiscuous mode [ 55.213184][ T24] audit: type=1400 audit(1757945736.700:136): avc: denied { create } for pid=1455 comm="syz.3.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 55.541490][ T24] audit: type=1400 audit(1757945737.030:137): avc: denied { create } for pid=1484 comm="syz.2.326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 55.643370][ T1490] device syzkaller0 entered promiscuous mode [ 55.761878][ T24] audit: type=1400 audit(1757945737.250:138): avc: denied { create } for pid=1492 comm="syz.3.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 57.178099][ T1535] device syzkaller0 entered promiscuous mode [ 57.249490][ T1551] syz.1.344[1551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.249574][ T1551] syz.1.344[1551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.416349][ T1560] device pim6reg1 entered promiscuous mode [ 57.882989][ T1604] device veth0_vlan left promiscuous mode [ 57.898492][ T1604] device veth0_vlan entered promiscuous mode [ 59.286090][ T1696] device veth0_vlan left promiscuous mode [ 59.293134][ T1696] device veth0_vlan entered promiscuous mode [ 59.741216][ T1732] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.807751][ T1736] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.815233][ T1736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.835764][ T1736] device bridge0 entered promiscuous mode [ 60.050232][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 60.579295][ T1755] device syzkaller0 entered promiscuous mode [ 61.275432][ T24] audit: type=1400 audit(1757945742.760:139): avc: denied { create } for pid=1799 comm="syz.2.409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 62.365742][ T1858] device pim6reg1 entered promiscuous mode [ 63.131542][ T1914] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 63.259409][ T24] audit: type=1400 audit(1757945744.750:140): avc: denied { create } for pid=1915 comm="syz.3.446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 63.863123][ T1949] syz.0.456[1949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.863220][ T1949] syz.0.456[1949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.903903][ T1947] device veth0_vlan left promiscuous mode [ 63.922116][ T1947] device veth0_vlan entered promiscuous mode [ 63.930485][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 63.940127][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 63.950501][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 64.006281][ T1942] device veth0_vlan left promiscuous mode [ 64.019938][ T1942] device veth0_vlan entered promiscuous mode [ 64.141880][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 64.151482][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 64.160021][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 65.161893][ T2008] device syzkaller0 entered promiscuous mode [ 65.219448][ T2009] device pim6reg1 entered promiscuous mode [ 65.788448][ T24] audit: type=1400 audit(1757945747.270:141): avc: denied { create } for pid=2028 comm="syz.4.484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 65.842989][ T2062] device pim6reg1 entered promiscuous mode [ 65.871342][ T24] audit: type=1400 audit(1757945747.290:142): avc: denied { write } for pid=2028 comm="syz.4.484" name="cgroup.subtree_control" dev="cgroup2" ino=185 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 65.924660][ T24] audit: type=1400 audit(1757945747.300:143): avc: denied { open } for pid=2028 comm="syz.4.484" path="" dev="cgroup2" ino=185 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 66.213935][ T2080] device syzkaller0 entered promiscuous mode [ 66.460531][ T2096] device veth0_vlan left promiscuous mode [ 66.518864][ T2096] device veth0_vlan entered promiscuous mode [ 66.921550][ T2120] device pim6reg1 entered promiscuous mode [ 67.132337][ T2129] device pim6reg1 entered promiscuous mode [ 67.257162][ T24] audit: type=1400 audit(1757945748.750:144): avc: denied { create } for pid=2133 comm="syz.0.512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 67.394565][ T2139] device pim6reg1 entered promiscuous mode [ 67.549459][ T24] audit: type=1400 audit(1757945749.040:145): avc: denied { associate } for pid=2155 comm="syz.3.518" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 67.791851][ T2166] device syzkaller0 entered promiscuous mode [ 67.837194][ T2177] device pim6reg1 entered promiscuous mode [ 69.078201][ T2245] device veth1_macvtap left promiscuous mode [ 69.373217][ T2275] syz.3.551[2275] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.373276][ T2275] syz.3.551[2275] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.444894][ T2277] device pim6reg1 entered promiscuous mode [ 69.760869][ T2275] device veth0_vlan left promiscuous mode [ 69.782744][ T2275] device veth0_vlan entered promiscuous mode [ 69.834369][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.849499][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 69.890242][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 69.975700][ T2291] ÿÿÿÿÿÿ: renamed from vlan1 [ 70.473916][ T24] audit: type=1400 audit(1757945751.950:146): avc: denied { create } for pid=2321 comm="syz.1.564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 70.755699][ T2336] device syzkaller0 entered promiscuous mode [ 71.389811][ T2352] device syzkaller0 entered promiscuous mode [ 72.122890][ T2374] device veth1_macvtap left promiscuous mode [ 72.146822][ T2374] device macsec0 left promiscuous mode [ 72.214637][ T2374] device veth1_macvtap entered promiscuous mode [ 72.257203][ T2374] device macsec0 entered promiscuous mode [ 72.297873][ T24] audit: type=1400 audit(1757945753.770:147): avc: denied { ioctl } for pid=2380 comm="syz.4.580" path="" dev="cgroup2" ino=185 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 72.333465][ T2386] bridge0: port 3(veth1) entered blocking state [ 72.355582][ T2386] bridge0: port 3(veth1) entered disabled state [ 72.384616][ T2386] device veth1 entered promiscuous mode [ 72.399731][ T2386] bridge0: port 3(veth1) entered blocking state [ 72.406151][ T2386] bridge0: port 3(veth1) entered forwarding state [ 72.529900][ T2390] device macsec0 entered promiscuous mode [ 72.876384][ T2433] device pim6reg1 entered promiscuous mode [ 73.847935][ T2506] device pim6reg1 entered promiscuous mode [ 74.703255][ T2544] syzkaller0: create flow: hash 2911376862 index 0 [ 74.833849][ T2539] device syzkaller0 entered promiscuous mode [ 75.078931][ T2544] syzkaller0 (unregistered): delete flow: hash 2911376862 index 0 [ 75.459222][ T2578] device syzkaller0 entered promiscuous mode [ 75.476265][ T2577] device pim6reg1 entered promiscuous mode [ 76.137790][ T24] audit: type=1400 audit(1757945757.630:148): avc: denied { create } for pid=2613 comm="syz.0.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 76.395002][ T2637] GPL: port 1(erspan0) entered blocking state [ 76.416816][ T2637] GPL: port 1(erspan0) entered disabled state [ 76.424630][ T2637] device erspan0 entered promiscuous mode [ 76.472812][ T2624] GPL: port 1(erspan0) entered blocking state [ 76.479252][ T2624] GPL: port 1(erspan0) entered forwarding state [ 77.902844][ T2685] device macsec0 entered promiscuous mode [ 77.921520][ T2685] device veth1_macvtap entered promiscuous mode [ 78.017972][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 78.230834][ T2699] syz.2.674[2699] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.230918][ T2699] syz.2.674[2699] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.499746][ T2797] device pim6reg1 entered promiscuous mode [ 80.797111][ T2804] device veth0_vlan left promiscuous mode [ 80.807083][ T2804] device veth0_vlan entered promiscuous mode [ 80.837635][ T2812] device wg2 entered promiscuous mode [ 80.999555][ T2814] device syzkaller0 entered promiscuous mode [ 83.462347][ T2912] device syzkaller0 entered promiscuous mode [ 84.661837][ T2970] ip6erspan0: tun_chr_ioctl cmd 1074025677 [ 84.675250][ T2970] ip6erspan0: linktype set to 805 [ 85.008171][ T3004] device sit0 left promiscuous mode [ 85.050536][ T3004] device sit0 entered promiscuous mode [ 85.094657][ T3015] device syzkaller0 entered promiscuous mode [ 85.333842][ T3052] device pim6reg1 entered promiscuous mode [ 85.680536][ T3074] syz.4.780[3074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.680624][ T3074] syz.4.780[3074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.169301][ T3087] device syzkaller0 entered promiscuous mode [ 86.264215][ T3087] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 86.271808][ T3087] syzkaller0: Linktype set failed because interface is up [ 86.437969][ T3117] device pim6reg1 entered promiscuous mode [ 86.616816][ T3127] device veth1_macvtap left promiscuous mode [ 86.623046][ T3127] device macsec0 left promiscuous mode [ 86.854491][ T3154] device pim6reg1 entered promiscuous mode [ 87.030287][ T3157] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.037541][ T3157] bridge0: port 2(bridge_slave_1) entered forwarding state [ 87.044955][ T3157] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.052013][ T3157] bridge0: port 1(bridge_slave_0) entered forwarding state [ 87.060052][ T3157] device bridge0 entered promiscuous mode [ 87.315051][ T3164] device syzkaller0 entered promiscuous mode [ 87.570751][ T3196] device pim6reg1 entered promiscuous mode [ 87.978078][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 88.672684][ T3238] device syzkaller0 entered promiscuous mode [ 89.219499][ T24] audit: type=1400 audit(1757945770.710:149): avc: denied { create } for pid=3257 comm="syz.3.836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 89.868218][ T3266] device syzkaller0 entered promiscuous mode [ 90.015495][ T3306] device aaaaaaaaaaaaaaa entered promiscuous mode [ 91.664320][ T3394] device veth0_vlan left promiscuous mode [ 91.725903][ T3394] device veth0_vlan entered promiscuous mode [ 92.283888][ T3430] device syzkaller0 entered promiscuous mode [ 92.745447][ T24] audit: type=1400 audit(1757945774.230:150): avc: denied { create } for pid=3453 comm="syz.1.890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 93.326053][ T3485] device syzkaller0 entered promiscuous mode [ 94.019922][ T3520] device sit0 left promiscuous mode [ 94.155611][ T3522] device syzkaller0 entered promiscuous mode [ 94.178494][ T3526] device sit0 entered promiscuous mode [ 94.975021][ T3570] syz.3.923[3570] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.975133][ T3570] syz.3.923[3570] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.225296][ T3594] device pim6reg1 entered promiscuous mode [ 95.671494][ T3621] device syzkaller0 entered promiscuous mode [ 96.173974][ T3658] device wg2 left promiscuous mode [ 96.277684][ T3663] device wg2 entered promiscuous mode [ 97.016882][ T3695] device pim6reg1 entered promiscuous mode [ 98.533994][ T3745] device wg2 left promiscuous mode [ 99.632084][ T3812] syz.4.984[3812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.632148][ T3812] syz.4.984[3812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.723309][ T3800] device syzkaller0 entered promiscuous mode [ 99.804397][ T3809] device wg2 left promiscuous mode [ 101.437869][ T3908] device syzkaller0 entered promiscuous mode [ 101.975006][ T24] audit: type=1400 audit(1757945783.460:151): avc: denied { ioctl } for pid=3993 comm="syz.2.1029" path="socket:[26555]" dev="sockfs" ino=26555 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 102.092689][ T4004] syz.3.1031[4004] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.092826][ T4004] syz.3.1031[4004] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.666898][ T4012] device veth0_vlan left promiscuous mode [ 102.685282][ T4012] device veth0_vlan entered promiscuous mode [ 102.743356][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 102.760399][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 102.793650][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 103.732807][ T24] audit: type=1400 audit(1757945785.220:152): avc: denied { create } for pid=4082 comm="syz.0.1054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 103.865332][ T4111] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 103.884467][ T4111] syzkaller0: linktype set to 1 [ 103.908286][ T4111] syzkaller0: tun_chr_ioctl cmd 35108 [ 103.926015][ T4111] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 105.023789][ T4152] device wg2 entered promiscuous mode [ 105.258565][ T4168] device sit0 left promiscuous mode [ 105.378358][ T4172] device sit0 entered promiscuous mode [ 105.531761][ T24] audit: type=1400 audit(1757945787.020:153): avc: denied { read } for pid=4181 comm="syz.4.1081" name="cgroup.type" dev="cgroup2" ino=364 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 106.634883][ T4235] device pim6reg1 entered promiscuous mode [ 106.677400][ T24] audit: type=1400 audit(1757945788.170:154): avc: denied { create } for pid=4240 comm="syz.3.1101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 110.706826][ T4458] device sit0 left promiscuous mode [ 111.977696][ T24] audit: type=1400 audit(1757945793.460:155): avc: denied { create } for pid=4532 comm="syz.0.1189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 112.183351][ T24] audit: type=1400 audit(1757945793.670:156): avc: denied { create } for pid=4539 comm="syz.1.1190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 113.098430][ T4574] device wg2 left promiscuous mode [ 113.635300][ T4596] syz.1.1206[4596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.635363][ T4596] syz.1.1206[4596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.883552][ T4614] device syzkaller0 entered promiscuous mode [ 115.895780][ T4681] device syzkaller0 entered promiscuous mode [ 116.652038][ T4710] device syzkaller0 entered promiscuous mode [ 116.979627][ T4733] syz.3.1248[4733] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.979707][ T4733] syz.3.1248[4733] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.012166][ T4734] syz.3.1248[4734] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.049893][ T4726] device wg2 left promiscuous mode [ 117.124662][ T4753] device wg2 entered promiscuous mode [ 117.520946][ T4809] syz.4.1267[4809] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.521008][ T4809] syz.4.1267[4809] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.803136][ T4816] Â: renamed from pim6reg1 [ 119.202175][ T4931] device vlan0 entered promiscuous mode [ 119.233607][ T4924] bridge0: port 3(veth1) entered disabled state [ 119.579452][ T4953] device pim6reg1 entered promiscuous mode [ 119.672957][ T4961] sit0: mtu less than device minimum [ 119.968124][ T4968] device sit0 entered promiscuous mode [ 121.599940][ T5005] device syzkaller0 entered promiscuous mode [ 121.821731][ T24] audit: type=1400 audit(1757945803.300:157): avc: denied { create } for pid=4999 comm="syz.3.1320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 122.253008][ T5041] syz.2.1331 (5041) used obsolete PPPIOCDETACH ioctl [ 122.571606][ T95] udevd[95]: worker [300] terminated by signal 33 (Unknown signal 33) [ 122.582873][ T95] udevd[95]: worker [300] failed while handling '/devices/virtual/block/loop2' [ 122.796064][ T5073] ip_vti0: mtu less than device minimum [ 124.544456][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 124.553260][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.560556][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 124.763992][ T5186] device sit0 entered promiscuous mode [ 125.329411][ T5228] device wg2 left promiscuous mode [ 125.352076][ T5228] device wg2 entered promiscuous mode [ 125.656902][ T5239] device pim6reg1 entered promiscuous mode [ 126.569877][ T5283] device syzkaller0 entered promiscuous mode [ 126.619394][ T5273] device pim6reg1 entered promiscuous mode [ 126.682975][ T5289] device sit0 left promiscuous mode [ 126.760491][ T5297] device sit0 entered promiscuous mode [ 128.649176][ T5375] device wg2 entered promiscuous mode [ 129.369936][ T5406] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.377408][ T5406] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.919382][ T5422] device syzkaller0 entered promiscuous mode [ 130.323687][ T5470] device syzkaller0 entered promiscuous mode [ 132.728403][ T5557] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 133.484409][ T5594] device syzkaller0 entered promiscuous mode [ 134.255151][ T5626] device veth1_macvtap left promiscuous mode [ 134.458456][ T5636] device veth0_vlan left promiscuous mode [ 134.505211][ T5636] device veth0_vlan entered promiscuous mode [ 134.623637][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.656556][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 134.696375][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.747672][ T5659] device pim6reg1 entered promiscuous mode [ 134.776701][ T5658] device sit0 entered promiscuous mode [ 136.027783][ T5770] device pim6reg1 entered promiscuous mode [ 136.438456][ T5769] device syzkaller0 entered promiscuous mode [ 136.881945][ T5803] device syzkaller0 entered promiscuous mode [ 137.409047][ T5833] device pim6reg1 entered promiscuous mode [ 138.201261][ T5863] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.769412][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 138.795927][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 138.834455][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 139.818998][ T5961] device veth0_vlan left promiscuous mode [ 139.855153][ T5961] device veth0_vlan entered promiscuous mode [ 139.894444][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 139.907406][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 139.929409][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 141.612597][ T6062] device wg2 left promiscuous mode [ 141.662946][ T6060] device sit0 left promiscuous mode [ 141.823697][ T6062] device wg2 entered promiscuous mode [ 142.287153][ T6087] device veth0_vlan left promiscuous mode [ 142.329981][ T6087] device veth0_vlan entered promiscuous mode [ 142.685680][ T6120] device pim6reg1 entered promiscuous mode [ 143.279940][ T6158] device veth0_vlan left promiscuous mode [ 143.328009][ T6158] device veth0_vlan entered promiscuous mode [ 143.344708][ T6170] syz.3.1664[6170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.344804][ T6170] syz.3.1664[6170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.587092][ T6212] syz.1.1676[6212] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.589679][ T6206] syz.1.1676[6206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.648250][ T6212] syz.1.1676[6212] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.778584][ T6210] device syzkaller0 entered promiscuous mode [ 143.977378][ T6236] syzkaller0: refused to change device tx_queue_len [ 144.035876][ T6238] device sit0 left promiscuous mode [ 146.372707][ T6375] device sit0 left promiscuous mode [ 146.544188][ T6390] device sit0 entered promiscuous mode [ 147.321189][ T6431] device wg2 left promiscuous mode [ 147.445127][ T6441] device syzkaller0 entered promiscuous mode [ 147.487335][ T6430] device wg2 entered promiscuous mode [ 147.968034][ T6506] device pim6reg1 entered promiscuous mode [ 148.705855][ T6543] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 149.733251][ T6613] device syzkaller0 entered promiscuous mode [ 150.222791][ T6646] device sit0 entered promiscuous mode [ 150.911681][ T6685] device veth0_vlan left promiscuous mode [ 150.959916][ T6685] device veth0_vlan entered promiscuous mode [ 151.023244][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 151.176736][ T6697] device wg2 entered promiscuous mode [ 151.934997][ T6747] device syzkaller0 entered promiscuous mode [ 152.045987][ T6767] device syzkaller0 entered promiscuous mode [ 152.988564][ T6807] device veth0_vlan left promiscuous mode [ 153.066049][ T6807] device veth0_vlan entered promiscuous mode [ 153.127910][ T6812] device veth0_vlan left promiscuous mode [ 153.178525][ T6812] device veth0_vlan entered promiscuous mode [ 153.219500][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 153.279814][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 153.330120][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 153.985856][ T6872] device pim6reg1 entered promiscuous mode [ 154.653947][ T6890] device syzkaller0 entered promiscuous mode [ 154.738557][ T6908] device pim6reg1 entered promiscuous mode [ 155.055900][ T6916] device sit0 left promiscuous mode [ 155.146644][ T6924] device sit0 entered promiscuous mode [ 155.428847][ T6945] device sit0 left promiscuous mode [ 155.498485][ T6945] device sit0 entered promiscuous mode [ 156.017783][ T6994] syz.1.1901[6994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.017842][ T6994] syz.1.1901[6994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.049594][ T6997] device pim6reg1 entered promiscuous mode [ 156.097015][ T6999] device veth0_vlan left promiscuous mode [ 156.106138][ T6999] device veth0_vlan entered promiscuous mode [ 156.114867][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.133589][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.141856][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 156.802807][ T7028] device pim6reg1 entered promiscuous mode [ 157.204734][ T7060] device pim6reg1 entered promiscuous mode [ 157.353675][ T7082] device syzkaller0 entered promiscuous mode [ 158.485739][ T7139] device sit0 left promiscuous mode [ 158.529927][ T7147] syz.1.1945[7147] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.529979][ T7146] syz.1.1945[7146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.529985][ T7147] syz.1.1945[7147] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.784401][ T7170] syz.2.1950[7170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.804428][ T7170] syz.2.1950[7170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.096882][ T7261] device wg2 entered promiscuous mode [ 160.903030][ T7305] device veth0_vlan left promiscuous mode [ 160.938149][ T7305] device veth0_vlan entered promiscuous mode [ 161.090272][ T7321] device veth0_vlan left promiscuous mode [ 161.141634][ T7321] device veth0_vlan entered promiscuous mode [ 161.484841][ T7365] device syzkaller0 entered promiscuous mode [ 161.828125][ T7398] ÿÿÿÿÿÿ: renamed from vlan1 [ 161.982395][ T7429] device syzkaller0 entered promiscuous mode [ 162.020661][ T24] audit: type=1400 audit(1757945843.500:158): avc: denied { setattr } for pid=7432 comm="syz.3.2031" path="/net/tun" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 162.080233][ T7424] device pim6reg1 entered promiscuous mode [ 162.255504][ T7448] device sit0 left promiscuous mode [ 162.405677][ T7458] device sit0 entered promiscuous mode [ 162.638312][ T24] audit: type=1400 audit(1757945844.120:159): avc: denied { create } for pid=7467 comm="syz.1.2042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 163.163407][ T7503] device pim6reg1 entered promiscuous mode [ 163.623937][ T24] audit: type=1400 audit(1757945845.110:160): avc: denied { read open } for pid=7532 comm="syz.1.2060" path="net:[4026532293]" dev="nsfs" ino=4026532293 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 165.294430][ T7615] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 165.977151][ T7653] device syzkaller0 entered promiscuous mode [ 166.101728][ T7663] device wg2 left promiscuous mode [ 166.108988][ T7663] device wg2 entered promiscuous mode [ 166.223189][ T24] audit: type=1400 audit(1757945847.710:161): avc: denied { create } for pid=7670 comm="syz.0.2103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 166.962056][ T7692] device syzkaller0 entered promiscuous mode [ 167.012481][ T7705] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.019756][ T7705] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.027276][ T7705] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.034402][ T7705] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.042192][ T7705] device bridge0 entered promiscuous mode [ 167.391863][ T7740] device pim6reg1 entered promiscuous mode [ 167.436852][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.710232][ T7759] device veth0_vlan left promiscuous mode [ 167.717218][ T7759] device veth0_vlan entered promiscuous mode [ 168.187441][ T7777] device sit0 entered promiscuous mode [ 168.622314][ T7785] device syzkaller0 entered promiscuous mode [ 168.694781][ T7790] device sit0 left promiscuous mode [ 168.913968][ T7792] device sit0 entered promiscuous mode [ 169.568894][ T7816] device syzkaller0 entered promiscuous mode [ 169.686671][ T7846] device sit0 entered promiscuous mode [ 169.876714][ T7872] device wg2 left promiscuous mode [ 169.967983][ T7869] device wg2 entered promiscuous mode [ 170.169889][ T275] cgroup: fork rejected by pids controller in /syz0 [ 170.858997][ T7929] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.874025][ T7929] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.909655][ T7929] device bridge_slave_0 entered promiscuous mode [ 170.922473][ T24] audit: type=1400 audit(1757945852.410:162): avc: denied { create } for pid=7946 comm="syz.2.2188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 170.978182][ T7929] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.985622][ T7929] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.050726][ T7929] device bridge_slave_1 entered promiscuous mode [ 171.296552][ T7965] device veth0_vlan left promiscuous mode [ 171.350785][ T7965] device veth0_vlan entered promiscuous mode [ 171.444170][ T24] audit: type=1400 audit(1757945852.930:163): avc: denied { create } for pid=7929 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 171.467600][ T24] audit: type=1400 audit(1757945852.930:164): avc: denied { write } for pid=7929 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 171.491666][ T24] audit: type=1400 audit(1757945852.930:165): avc: denied { read } for pid=7929 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 171.532156][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 171.546158][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.565096][ T447] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.572205][ T447] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.585960][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 171.685544][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 171.695837][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.704204][ T447] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.711428][ T447] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.718881][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.727135][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.805116][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.825523][ T7929] device veth0_vlan entered promiscuous mode [ 171.852535][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.866930][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.882629][ T7929] device veth1_macvtap entered promiscuous mode [ 171.946585][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 171.955051][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 171.963423][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 172.055475][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 172.064503][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 172.073204][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 172.082612][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 172.558041][ T8031] device syzkaller0 entered promiscuous mode [ 172.803252][ T8048] device pim6reg1 entered promiscuous mode [ 173.575507][ T49] device veth0_to_team left promiscuous mode [ 173.581734][ T49] Ÿë: port 1(veth0_to_team) entered disabled state [ 173.590258][ T49] device bridge_slave_1 left promiscuous mode [ 173.596497][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.605048][ T49] device bridge_slave_0 left promiscuous mode [ 173.612504][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.147632][ T8073] device syzkaller0 entered promiscuous mode [ 174.576326][ T8114] device pim6reg1 entered promiscuous mode [ 175.978552][ T8160] device sit0 entered promiscuous mode [ 176.128052][ T8165] syz.3.2249[8165] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.128113][ T8165] syz.3.2249[8165] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.275360][ T8188] device sit0 entered promiscuous mode [ 177.588300][ T8199] device wg2 left promiscuous mode [ 177.596334][ T8199] device wg2 entered promiscuous mode [ 177.729691][ T8199] device veth0_vlan left promiscuous mode [ 177.756912][ T8199] device veth0_vlan entered promiscuous mode [ 180.485580][ T8360] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.492879][ T8360] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.444539][ T8443] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.451893][ T8443] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.460265][ T8443] device bridge0 left promiscuous mode [ 182.387316][ T8519] syz.3.2353[8519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.387394][ T8519] syz.3.2353[8519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.428489][ T8519] syz.3.2353[8519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.587072][ T8519] syz.3.2353[8519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.907896][ T8569] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 182.956722][ T8569] syzkaller0: persist disabled [ 183.746647][ T8596] device veth0_vlan left promiscuous mode [ 183.795374][ T8596] device veth0_vlan entered promiscuous mode [ 184.103408][ T8614] device syzkaller0 entered promiscuous mode [ 184.400048][ T8640] device syzkaller0 entered promiscuous mode [ 185.265166][ T8688] device sit0 left promiscuous mode [ 186.380155][ T8770] device pim6reg1 entered promiscuous mode [ 187.426978][ T8840] device veth1 left promiscuous mode [ 187.443849][ T8840] bridge0: port 3(veth1) entered disabled state [ 187.499399][ T8840] device bridge_slave_1 left promiscuous mode [ 187.505598][ T8840] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.597335][ T8840] device bridge_slave_0 left promiscuous mode [ 187.605162][ T8840] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.826767][ T8857] device sit0 left promiscuous mode [ 189.396851][ T8950] device pim6reg1 entered promiscuous mode [ 189.623702][ T24] audit: type=1400 audit(1757945871.110:166): avc: denied { create } for pid=8968 comm="syz.3.2478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 190.814036][ T9029] device wg2 left promiscuous mode [ 190.965736][ T9043] syz.4.2501[9043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.965797][ T9043] syz.4.2501[9043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.130267][ T9085] ±: renamed from pim6reg1 [ 192.256631][ T24] audit: type=1400 audit(1757945873.720:167): avc: denied { create } for pid=9087 comm="syz.1.2515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 192.461339][ T9104] device erspan0 left promiscuous mode [ 192.468708][ T9104] GPL: port 1(erspan0) entered disabled state [ 193.259093][ T9133] tap0: tun_chr_ioctl cmd 2147767506 [ 194.036262][ T9163] device wg2 entered promiscuous mode [ 194.664613][ T9173] device syzkaller0 entered promiscuous mode [ 194.736151][ T9179] syz.4.2540[9179] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.736215][ T9179] syz.4.2540[9179] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.757178][ T9180] device veth1_macvtap left promiscuous mode [ 194.811264][ T9180] device macsec0 entered promiscuous mode [ 195.046730][ T9198] device sit0 left promiscuous mode [ 195.167630][ T9196] device sit0 entered promiscuous mode [ 195.662225][ T9215] device syzkaller0 entered promiscuous mode [ 196.801075][ T9294] device pim6reg1 entered promiscuous mode [ 198.707004][ T9441] device sit0 left promiscuous mode [ 199.548546][ T9479] device wg2 left promiscuous mode [ 200.993648][ T9531] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 201.065758][ T9531] device syzkaller0 entered promiscuous mode [ 201.267588][ T9547] device veth0_vlan left promiscuous mode [ 201.287953][ T9547] device veth0_vlan entered promiscuous mode [ 201.364826][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 201.382485][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 201.390536][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 201.883064][ T9579] device wg2 left promiscuous mode [ 201.963708][ T9588] device pim6reg1 entered promiscuous mode [ 202.199027][ T9602] device syzkaller0 entered promiscuous mode [ 202.692651][ T9604] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 203.775665][ T9658] device sit0 entered promiscuous mode [ 204.269513][ T9675] device veth1_macvtap left promiscuous mode [ 204.275714][ T9675] device macsec0 entered promiscuous mode [ 204.648270][ T9680] device syzkaller0 entered promiscuous mode [ 205.992831][ T9759] device pim6reg1 entered promiscuous mode [ 206.183969][ T9765] device sit0 entered promiscuous mode [ 206.944406][ T9784] device wg2 entered promiscuous mode [ 207.050496][ T9793] device pim6reg1 entered promiscuous mode [ 209.707375][ T9872] device pim6reg1 entered promiscuous mode [ 211.590621][ T9945] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.638106][ T9945] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.658728][ T9945] device bridge_slave_0 entered promiscuous mode [ 211.738419][ T9945] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.768888][ T9945] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.810507][ T9945] device bridge_slave_1 entered promiscuous mode [ 212.447991][ T7] device bridge_slave_1 left promiscuous mode [ 212.454315][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.517081][ T7] device bridge_slave_0 left promiscuous mode [ 212.523270][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.647392][T10007] ÿ: renamed from bond_slave_0 [ 225.660937][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.678638][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.697532][T10011] syz.2.2777[10011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.724373][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.768825][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.791128][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.798362][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.816471][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.825881][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.835235][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.842715][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.850836][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 225.859741][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 225.868265][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 225.878240][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 225.919064][T10026] device syzkaller0 entered promiscuous mode [ 225.957049][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 225.965498][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 225.976448][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 225.992610][ T9945] device veth0_vlan entered promiscuous mode [ 226.003953][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 226.023146][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 226.067796][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 226.103755][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 226.131130][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 226.140481][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 226.149248][ T9945] device veth1_macvtap entered promiscuous mode [ 226.161733][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 226.169964][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 226.197242][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 226.225285][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 226.252421][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 226.550663][T10034] device syzkaller0 entered promiscuous mode [ 226.604022][T10039] A6±ÿ: renamed from team_slave_1 [ 227.190378][T10093] device wg2 entered promiscuous mode [ 227.276270][T10099] device sit0 entered promiscuous mode [ 227.674545][T10117] device syzkaller0 entered promiscuous mode [ 228.210828][T10169] Â: renamed from pim6reg1 [ 228.511166][T10191] device pim6reg1 entered promiscuous mode [ 229.432562][T10220] tap0: tun_chr_ioctl cmd 1074025673 [ 229.476740][T10220] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.484965][T10220] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.538066][T10226] device bridge_slave_1 left promiscuous mode [ 229.544386][T10226] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.552506][T10226] device bridge_slave_0 left promiscuous mode [ 229.559112][T10226] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.773496][T10312] device wg2 left promiscuous mode [ 230.869498][T10311] device wg2 entered promiscuous mode [ 231.052157][T10346] GPL: port 1(erspan0) entered blocking state [ 231.059059][T10346] GPL: port 1(erspan0) entered disabled state [ 231.078634][T10346] device erspan0 entered promiscuous mode [ 231.085936][T10346] GPL: port 1(erspan0) entered blocking state [ 231.092331][T10346] GPL: port 1(erspan0) entered forwarding state [ 231.878640][T10393] device veth1_macvtap entered promiscuous mode [ 231.916074][T10402] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 231.946985][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 232.955974][T10442] tap0: tun_chr_ioctl cmd 1074025675 [ 232.966616][T10442] tap0: persist enabled [ 232.981157][T10442] tap0: tun_chr_ioctl cmd 1074025675 [ 233.016835][T10442] tap0: persist enabled [ 233.053712][T10446] device pim6reg1 entered promiscuous mode [ 233.436551][T10464] device sit0 left promiscuous mode [ 233.932710][T10479] device pim6reg1 entered promiscuous mode [ 234.256188][T10486] device syzkaller0 entered promiscuous mode [ 234.597883][T10505] device syzkaller0 entered promiscuous mode [ 235.780016][T10546] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 236.560748][T10573] device pim6reg1 entered promiscuous mode [ 236.656237][T10578] syz.2.2943[10578] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.483845][T10604] device wg2 entered promiscuous mode [ 238.038118][T10653] device veth0_vlan left promiscuous mode [ 238.102165][T10653] device veth0_vlan entered promiscuous mode [ 239.254850][T10730] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.308970][T10730] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.346016][T10730] device bridge_slave_0 entered promiscuous mode [ 239.399138][T10730] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.426828][T10730] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.464134][T10730] device bridge_slave_1 entered promiscuous mode [ 239.618654][T10752] device pim6reg1 entered promiscuous mode [ 239.755141][T10754] device veth0_vlan left promiscuous mode [ 239.832501][T10754] device veth0_vlan entered promiscuous mode [ 239.887753][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 239.917308][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 239.925190][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.047494][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.055184][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.103852][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.127654][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.136856][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.143904][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.167675][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.177006][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.185392][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.192474][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.200116][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.209341][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 240.302988][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.354846][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 240.414049][T10730] device veth0_vlan entered promiscuous mode [ 240.429389][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.438262][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.447673][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.465923][T10730] device veth1_macvtap entered promiscuous mode [ 240.494291][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 240.613037][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 240.630425][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 240.824663][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 240.857914][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 241.193147][T10805] device wg2 left promiscuous mode [ 241.308479][T10808] device wg2 entered promiscuous mode [ 241.623936][ T49] device bridge_slave_1 left promiscuous mode [ 241.631867][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.649261][ T49] device bridge_slave_0 left promiscuous mode [ 241.655718][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.671129][ T49] device veth0_vlan left promiscuous mode [ 242.084633][T10849] device pim6reg1 entered promiscuous mode [ 242.094417][T10822] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.103042][T10822] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.111253][T10822] device bridge_slave_0 entered promiscuous mode [ 242.172529][T10822] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.186409][T10822] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.204144][T10822] device bridge_slave_1 entered promiscuous mode [ 242.481869][T10822] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.488987][T10822] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.496544][T10822] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.503623][T10822] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.563905][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 242.573650][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.581438][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.628364][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 242.638436][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 242.648098][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.655367][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.664647][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 242.677312][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 242.686322][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.693769][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.701641][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 242.710040][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 242.718611][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 242.727157][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 242.740530][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 242.749585][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 242.790076][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 242.801406][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 242.838221][T10822] device veth0_vlan entered promiscuous mode [ 242.850649][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 242.862751][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 242.891534][T10822] device veth1_macvtap entered promiscuous mode [ 242.906979][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 242.915768][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 242.925004][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 242.982598][T10905] device lo entered promiscuous mode [ 243.008029][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 243.027272][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 243.066900][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 243.105775][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 243.350506][T10918] syz.0.3036[10918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.350573][T10918] syz.0.3036[10918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.371685][T10914] device wg2 entered promiscuous mode [ 243.483933][T10912] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.492512][T10912] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.824942][ T49] device veth0_vlan left promiscuous mode [ 244.337810][T10953] device pim6reg1 entered promiscuous mode [ 244.951172][T10996] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.966748][T10996] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.983124][T10996] device bridge_slave_0 entered promiscuous mode [ 245.071546][T10996] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.082200][T10996] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.095993][T10996] device bridge_slave_1 entered promiscuous mode [ 245.129185][T11015] device syzkaller0 entered promiscuous mode [ 245.254227][T11023] device pim6reg1 entered promiscuous mode [ 245.276542][T11023] tap0: tun_chr_ioctl cmd 2147767507 [ 245.310962][T10996] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.318183][T10996] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.325788][T10996] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.333129][T10996] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.403737][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.415674][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.429926][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.441349][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.479558][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.495641][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.502880][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.546762][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.555798][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.562969][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.701915][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 245.809490][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 246.067081][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 246.075627][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 246.110239][T10996] device veth0_vlan entered promiscuous mode [ 246.158400][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 246.205857][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.250005][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 246.268643][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.290376][T10996] device veth1_macvtap entered promiscuous mode [ 246.326769][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 246.397042][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 246.456912][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 246.613814][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 246.627198][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 246.644471][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 246.666514][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 247.429945][ T49] GPL: port 1(erspan0) entered disabled state [ 247.469804][ T49] device erspan0 left promiscuous mode [ 247.549893][ T49] GPL: port 1(erspan0) entered disabled state [ 248.434146][T11172] device wg2 left promiscuous mode [ 248.766183][T11180] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 249.043683][T11212] device pim6reg1 left promiscuous mode [ 249.058962][T11208] device wg2 entered promiscuous mode [ 250.316009][T11313] syz.2.3149[11313] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.316094][T11313] syz.2.3149[11313] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.997206][T11336] device syzkaller0 entered promiscuous mode