last executing test programs: 1m51.689301802s ago: executing program 4 (id=5434): openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000440)=@framed={{}, [@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xc96}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f00000003c0)='GPL\x00', 0x10001, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000001bc0)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="000000009913697777ee4b60000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r8}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="180000000000000000000000000000006110370000000000950000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0500000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000f70f02a10000000000"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r9}, 0x10) 1m51.350225065s ago: executing program 4 (id=5437): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x8, 0x1e2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800086}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001410) ioctl$TUNSETOFFLOAD(r2, 0x40047451, 0x2000000c) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000004000001d8500000007000000440000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={0xffffffffffffffff, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x37, 0xc, &(0x7f00000004c0)=ANY=[@ANYRESDEC, @ANYRES32, @ANYRESHEX=r7], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRESDEC=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x7a, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00@\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x16, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffa0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 1m50.873867047s ago: executing program 4 (id=5445): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b400000000000000691142000000000004000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="ceaa00000000000071101000000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 1m50.732771057s ago: executing program 4 (id=5446): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2000000000000000000000cd7d", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000030000000100"/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000100), 0x237, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x1f2f, 0x18, 0x1e8, &(0x7f00000007c0)="9f44948721919580684010a49e66", 0x0, 0x1e8, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39", &(0x7f0000000000), 0x0, 0xe8030000}, 0x23) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000008000000000000000000000181100", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16, @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff8d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r6}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\b\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000fe02b3ff000300"/28], 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r10, &(0x7f0000000600), &(0x7f0000000800)=""/174}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r10, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x1e, 0x11, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff3, 0x0, 0x0, 0x0, 0x6}, [@printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @cb_func={0x18, 0xdad537b582cbbeaf, 0x4, 0x0, 0x4}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xc}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000040)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x22, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x6, 0x7, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r4, 0xffffffffffffffff, 0xffffffffffffffff, r4, r0, r9, r11, r0, r6, r8], 0x0, 0x10, 0x1000, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r12, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r13, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000140)="b9ff03076804268cb89e14f088a847e0ffff2000600000000000ac141416e0885a049a179424", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 1m50.357866809s ago: executing program 4 (id=5449): bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (rerun: 64) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) (async) syz_clone(0x41200100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7ffffffffff}, 0x0, 0x9, 0x8001, 0x0, 0x0, 0x5}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (rerun: 32) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000eb060002000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r3}, 0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000006c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000001c0)={0x1, &(0x7f0000000100)=[{}]}) (async, rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffff002, 0x0, 0x0, 0x0, 0x0, 0x1415, 0x0, 0x0, 0x0, 0x0}, 0x50) (async, rerun: 32) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0x9b}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async, rerun: 64) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x1, 0x8, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (rerun: 64) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c3a00000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{r5}, &(0x7f0000000000), &(0x7f00000000c0)='%pi6 \x00'}, 0x20) (async, rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000e00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r7}, 0x10) 1m50.085854291s ago: executing program 4 (id=5451): r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r0}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0xa, &(0x7f00000000c0)=[{0xeb02, 0x7, 0x4, 0x1fa}, {0x101, 0x8, 0x2, 0xad7}, {0xdd2a, 0x5, 0x0, 0x8}, {0x9, 0x3, 0x88, 0x4}, {0x5, 0x7, 0x4, 0xe038}, {0x7fff, 0x2, 0x0, 0xffff}, {0x4, 0x9, 0x4, 0xd}, {0x4, 0x2, 0x3, 0x1}, {0x5, 0x4, 0x6a, 0x65}, {0x4, 0xb, 0x1, 0xe9}]}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000280)={0x3, 0x80, 0x9, 0x34, 0xff, 0x9, 0x0, 0x8, 0x10, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x111b, 0x6}, 0x2503, 0x5, 0x6, 0x4, 0x3, 0x4, 0x0, 0x0, 0xfffff234, 0x0, 0x282}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0xe) perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x6, 0x7, 0x0, 0x7, 0x0, 0x7, 0x8008, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xd911, 0x1, @perf_bp={&(0x7f0000000180), 0x4}, 0x400, 0x7fffffff, 0x200, 0x1, 0x3, 0x7, 0x6, 0x0, 0x7, 0x0, 0x3}, r1, 0x3, r2, 0x8) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x200001, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f0000000340)) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000003c0)=""/207, 0xcf}, {&(0x7f00000004c0)=""/18, 0x12}, {&(0x7f0000000500)=""/147, 0x93}, {&(0x7f00000005c0)=""/124, 0x7c}, {&(0x7f0000000640)=""/232, 0xe8}, {&(0x7f0000000740)=""/199, 0xc7}, {&(0x7f0000000840)=""/238, 0xee}], 0x7, &(0x7f00000009c0)=""/211, 0xd3}, 0x40002020) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz0\x00', 0x200002, 0x0) r6 = gettid() syz_open_procfs$namespace(r6, &(0x7f0000000b40)='ns/uts\x00') ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000d00)={0xffffffffffffffff, 0x58, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000d40)=0xffffffffffffffff, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000e00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000d80), &(0x7f0000000dc0)='%pK \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000ec0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000e40), &(0x7f0000000e80)='%-010d \x00'}, 0x20) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000f00)=@bloom_filter={0x1e, 0x2, 0x3, 0xffffff3b, 0x8, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x2, 0x9, @void, @value, @void, @value}, 0x50) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000fc0)=@o_path={&(0x7f0000000f80)='./file0\x00', 0x0, 0x4000, r5}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000010c0)={0x6, 0x4, &(0x7f0000000b80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, [@alu={0x4, 0x1, 0x2, 0xa, 0x0, 0xffffffffffffffe2, 0xffffffffffffffff}]}, &(0x7f0000000bc0)='syzkaller\x00', 0x47d52d11, 0x50, &(0x7f0000000c00)=""/80, 0x40f00, 0x22, '\x00', r7, 0x25, r8, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000001000)=[r9, r10, r11, r12], &(0x7f0000001040)=[{0x4, 0x4, 0x10}, {0x2, 0x5, 0x7, 0x8}, {0x0, 0x5, 0x3, 0x7}, {0x0, 0x3, 0x2, 0x6}, {0x1, 0x3, 0x8, 0x6}], 0x10, 0x0, @void, @value}, 0x94) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=@base={0x1a, 0x2, 0x0, 0x4, 0x3003, r10, 0x3, '\x00', r7, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x28, &(0x7f0000001180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}, @exit, @cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffff9}, @cb_func={0x18, 0x3, 0x4, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r12}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r12}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7ff}, @map_fd={0x18, 0x0, 0x1, 0x0, r11}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000012c0)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, 0x25, r8, 0x8, &(0x7f0000001300)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000001340)={0x3, 0x9, 0x6, 0x6}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000001400)=[r13, r1, r9], &(0x7f0000001440)=[{0x0, 0x2, 0x0, 0x8}, {0x2, 0x4, 0x9, 0xca3188df1bb1539a}, {0x2, 0x3, 0x5, 0xb}, {0x1, 0x3, 0x4, 0x4}, {0x5, 0x3, 0xf, 0xc}, {0x2, 0x5, 0xa, 0xa}, {0x4, 0x4, 0xe, 0xb}], 0x10, 0x2ed, @void, @value}, 0x94) r14 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001840)={&(0x7f0000001700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@union={0x1, 0x7, 0x0, 0x5, 0x0, 0x0, [{0x2, 0x3, 0x8}, {0x5, 0x3, 0x1}, {0x6, 0x3, 0x7fffffff}, {0x1, 0x0, 0x4}, {0x8, 0x2, 0x7ff}, {0x6, 0x1, 0x7}, {0x0, 0x2, 0x66b}]}]}, {0x0, [0x30]}}, &(0x7f0000001780)=""/135, 0x7b, 0x87, 0x1, 0x0, 0x0, @void, @value}, 0x28) r15 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001a00)={0x6, 0x8, &(0x7f0000001580)=@raw=[@printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x80000001}}], &(0x7f00000015c0)='syzkaller\x00', 0x5000, 0xd9, &(0x7f0000001600)=""/217, 0x40f00, 0x45, '\x00', r7, 0x25, r14, 0x8, &(0x7f0000001880)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000018c0)={0x1, 0x9, 0xfffffff7, 0x3}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001900)=[r12, r13], &(0x7f0000001940)=[{0x0, 0x3, 0xd, 0xa}, {0x2, 0x1, 0xf, 0x7}, {0x1, 0x4, 0x6, 0xb}, {0x2, 0x2, 0xa, 0x8}, {0x2, 0x4, 0x7, 0x1}, {0x5, 0x2, 0x1, 0x9}, {0x0, 0x5, 0x4, 0xb}, {0x1, 0x4, 0x7, 0x7}, {0x0, 0x2, 0x6, 0x7}, {0x1, 0x3, 0xc, 0xb}], 0x10, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000001ac0), 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001b40)=@generic={&(0x7f0000001b00)='./file0\x00', r15}, 0x18) r16 = openat$cgroup_procs(r5, &(0x7f0000001b80)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r16, &(0x7f0000001bc0), 0x12) 1m35.01674099s ago: executing program 32 (id=5451): r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r0}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0xa, &(0x7f00000000c0)=[{0xeb02, 0x7, 0x4, 0x1fa}, {0x101, 0x8, 0x2, 0xad7}, {0xdd2a, 0x5, 0x0, 0x8}, {0x9, 0x3, 0x88, 0x4}, {0x5, 0x7, 0x4, 0xe038}, {0x7fff, 0x2, 0x0, 0xffff}, {0x4, 0x9, 0x4, 0xd}, {0x4, 0x2, 0x3, 0x1}, {0x5, 0x4, 0x6a, 0x65}, {0x4, 0xb, 0x1, 0xe9}]}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000280)={0x3, 0x80, 0x9, 0x34, 0xff, 0x9, 0x0, 0x8, 0x10, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x111b, 0x6}, 0x2503, 0x5, 0x6, 0x4, 0x3, 0x4, 0x0, 0x0, 0xfffff234, 0x0, 0x282}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0xe) perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x6, 0x7, 0x0, 0x7, 0x0, 0x7, 0x8008, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xd911, 0x1, @perf_bp={&(0x7f0000000180), 0x4}, 0x400, 0x7fffffff, 0x200, 0x1, 0x3, 0x7, 0x6, 0x0, 0x7, 0x0, 0x3}, r1, 0x3, r2, 0x8) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x200001, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f0000000340)) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000003c0)=""/207, 0xcf}, {&(0x7f00000004c0)=""/18, 0x12}, {&(0x7f0000000500)=""/147, 0x93}, {&(0x7f00000005c0)=""/124, 0x7c}, {&(0x7f0000000640)=""/232, 0xe8}, {&(0x7f0000000740)=""/199, 0xc7}, {&(0x7f0000000840)=""/238, 0xee}], 0x7, &(0x7f00000009c0)=""/211, 0xd3}, 0x40002020) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz0\x00', 0x200002, 0x0) r6 = gettid() syz_open_procfs$namespace(r6, &(0x7f0000000b40)='ns/uts\x00') ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000d00)={0xffffffffffffffff, 0x58, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000d40)=0xffffffffffffffff, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000e00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000d80), &(0x7f0000000dc0)='%pK \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000ec0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000e40), &(0x7f0000000e80)='%-010d \x00'}, 0x20) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000f00)=@bloom_filter={0x1e, 0x2, 0x3, 0xffffff3b, 0x8, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x2, 0x9, @void, @value, @void, @value}, 0x50) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000fc0)=@o_path={&(0x7f0000000f80)='./file0\x00', 0x0, 0x4000, r5}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000010c0)={0x6, 0x4, &(0x7f0000000b80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, [@alu={0x4, 0x1, 0x2, 0xa, 0x0, 0xffffffffffffffe2, 0xffffffffffffffff}]}, &(0x7f0000000bc0)='syzkaller\x00', 0x47d52d11, 0x50, &(0x7f0000000c00)=""/80, 0x40f00, 0x22, '\x00', r7, 0x25, r8, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000001000)=[r9, r10, r11, r12], &(0x7f0000001040)=[{0x4, 0x4, 0x10}, {0x2, 0x5, 0x7, 0x8}, {0x0, 0x5, 0x3, 0x7}, {0x0, 0x3, 0x2, 0x6}, {0x1, 0x3, 0x8, 0x6}], 0x10, 0x0, @void, @value}, 0x94) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=@base={0x1a, 0x2, 0x0, 0x4, 0x3003, r10, 0x3, '\x00', r7, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x28, &(0x7f0000001180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}, @exit, @cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffff9}, @cb_func={0x18, 0x3, 0x4, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r12}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r12}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x7ff}, @map_fd={0x18, 0x0, 0x1, 0x0, r11}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000012c0)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, 0x25, r8, 0x8, &(0x7f0000001300)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000001340)={0x3, 0x9, 0x6, 0x6}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000001400)=[r13, r1, r9], &(0x7f0000001440)=[{0x0, 0x2, 0x0, 0x8}, {0x2, 0x4, 0x9, 0xca3188df1bb1539a}, {0x2, 0x3, 0x5, 0xb}, {0x1, 0x3, 0x4, 0x4}, {0x5, 0x3, 0xf, 0xc}, {0x2, 0x5, 0xa, 0xa}, {0x4, 0x4, 0xe, 0xb}], 0x10, 0x2ed, @void, @value}, 0x94) r14 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001840)={&(0x7f0000001700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@union={0x1, 0x7, 0x0, 0x5, 0x0, 0x0, [{0x2, 0x3, 0x8}, {0x5, 0x3, 0x1}, {0x6, 0x3, 0x7fffffff}, {0x1, 0x0, 0x4}, {0x8, 0x2, 0x7ff}, {0x6, 0x1, 0x7}, {0x0, 0x2, 0x66b}]}]}, {0x0, [0x30]}}, &(0x7f0000001780)=""/135, 0x7b, 0x87, 0x1, 0x0, 0x0, @void, @value}, 0x28) r15 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001a00)={0x6, 0x8, &(0x7f0000001580)=@raw=[@printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x80000001}}], &(0x7f00000015c0)='syzkaller\x00', 0x5000, 0xd9, &(0x7f0000001600)=""/217, 0x40f00, 0x45, '\x00', r7, 0x25, r14, 0x8, &(0x7f0000001880)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000018c0)={0x1, 0x9, 0xfffffff7, 0x3}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001900)=[r12, r13], &(0x7f0000001940)=[{0x0, 0x3, 0xd, 0xa}, {0x2, 0x1, 0xf, 0x7}, {0x1, 0x4, 0x6, 0xb}, {0x2, 0x2, 0xa, 0x8}, {0x2, 0x4, 0x7, 0x1}, {0x5, 0x2, 0x1, 0x9}, {0x0, 0x5, 0x4, 0xb}, {0x1, 0x4, 0x7, 0x7}, {0x0, 0x2, 0x6, 0x7}, {0x1, 0x3, 0xc, 0xb}], 0x10, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000001ac0), 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001b40)=@generic={&(0x7f0000001b00)='./file0\x00', r15}, 0x18) r16 = openat$cgroup_procs(r5, &(0x7f0000001b80)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r16, &(0x7f0000001bc0), 0x12) 3.5241706s ago: executing program 2 (id=6636): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x1a, 0x4, 0x6, 0x200, 0x1488, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0xffffffffffffff22, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000a40)="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", 0x5a9}], 0x1, 0x0, 0x0, 0x8088}, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x21, &(0x7f0000000540), 0x4) sendmsg$tipc(r4, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r3, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) syz_clone(0x44208400, 0x0, 0x0, 0x0, 0x0, 0x0) 2.945490764s ago: executing program 2 (id=6640): bpf$TOKEN_CREATE(0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x87, 0x0, 0x0, 0x0, 0x204, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0x3ff}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x58, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100033300fe08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x9, 0xbd67, 0x1, 0x80, 0xffffffffffffffff, 0x5, '\x00', r0, r2, 0x2, 0x3, 0x0, 0x7, @void, @value, @void, @value}, 0x50) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x8000, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000400)={'batadv_slave_0\x00', 0x200}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={r2, 0x20, &(0x7f0000000540)={&(0x7f00000004c0)=""/100, 0x64, 0x0, &(0x7f00000001c0)=""/40, 0x28}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) 2.328389427s ago: executing program 5 (id=6665): bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x20, &(0x7f00000005c0)={&(0x7f0000000500)=""/13, 0xd, 0x0, &(0x7f0000000540)=""/115, 0x73}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0x18, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x555, 0x0, 0x0, 0x0, 0x8f}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0x27, r4, 0x8, &(0x7f00000002c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x4, 0xb, 0x1ff, 0x1}, 0x10, r5, r3, 0x8, 0x0, &(0x7f0000000780)=[{0x0, 0x3, 0x5, 0x1}, {0x1, 0x2, 0x2, 0x7}, {0x1, 0x5, 0x5, 0x7}, {0x3, 0x5, 0x0, 0x6}, {0x5, 0x5, 0x7, 0x4}, {0x1, 0x2, 0x7, 0x6}, {0x5, 0x2, 0x5, 0x7}, {0x5, 0x5, 0x10, 0x3}], 0x10, 0x200, @void, @value}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) (async) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0xffd}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800082}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb5d, @void, @value}, 0x90) syz_clone(0x630c0700, 0x0, 0x0, 0x0, 0x0, 0x0) 2.136954268s ago: executing program 2 (id=6669): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001100)=@base={0xa, 0x1, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000002d74e2c9000000000000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18010000000020000000f7ffffff000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0xc8e8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0x3f, &(0x7f0000000880)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES8=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) close(r2) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x501442, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, &(0x7f0000000280)={'vlan0\x00', @random="963aea8f9e0a"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 1.932559069s ago: executing program 3 (id=6674): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd0, &(0x7f0000000280)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x8d, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x16, '\x00', r2, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x40040) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYBLOB="daf76a1e4e03b06ad52e7dba9c8d3ec203c9931a4a5377d96d46c2e8fa9fd8128ae8546866a6e8d97232476781cca2e9d6e8ce1696fcf1857baa974ac2fc24d5e40ebad426c3b70ff856f50731cdc42b107defbc25f9cb956030281f11eb23afe59110ffc0eea4b28938a5a0e5f89398377430719b12b968ae674bb3dd532809", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$TUNSETVNETLE(r7, 0x89e0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000fc0), 0x0, 0x0) ioctl$TUNGETFEATURES(r8, 0x800454cf, &(0x7f0000001000)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00', 0x2}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f0, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="33002a958a36e8002bc931dc2bb73e0a4a41d3a0ab800000b9"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f3, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000300)={{r5}, &(0x7f0000000280), &(0x7f00000002c0)='%ps \x00'}, 0x20) 1.77900527s ago: executing program 0 (id=6675): bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000008c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, '\x00', 0x0, @fallback=0x30, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd82, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='kfree\x00', r2}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b7040000000000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1, 0x4, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000001c0)={r7, &(0x7f0000001c80), &(0x7f0000000100)=""/164, 0x3}, 0x20) write$cgroup_type(r6, &(0x7f0000000180), 0x40001) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10003}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 1.736599401s ago: executing program 3 (id=6677): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3, 0x0, 0xfffffffffffffffd}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='f2fs_destroy_extent_tree\x00', r2, 0x0, 0x9}, 0x18) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000007000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES64=r4, @ANYBLOB="0000000000000000b70800ff0700ea119b4e00007b8af8ff000000000000000000000006000000b704f3db8959d9b83c60000059"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r10}, 0x0, &(0x7f0000000380)}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r11}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x82420, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x143269fc04fb9719, 0x9, 0xffc, 0xfffc, 0x0, 0x3}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 1.531155152s ago: executing program 5 (id=6679): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x14, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000061100000008076c129d937908000"/32], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r0, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x9, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc3, &(0x7f0000000240)=[{}], 0x8, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x44, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)={r1}, 0x4) 1.530730242s ago: executing program 5 (id=6680): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x7fff}, 0x0, 0xe, 0xffffffffffffffff, 0xa) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000110880febb0007aafe8000000000000027bfa7b09303960e2f"], 0xfdef) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x89f1, &(0x7f0000000900)={'ip6gre0\x00', @random="0600002000"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000", @ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x10, 0x204, 0x8, 0x3, 0x10000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @value}, 0x50) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400), 0x509c0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800084}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c00000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 1.315566813s ago: executing program 3 (id=6682): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00'}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000001c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000140)=@framed={{}, [@generic={0x71, 0x0, 0x1, 0x8e}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xb9, &(0x7f0000000200)=""/185, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000040000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000cc0)={&(0x7f0000000380), 0x6e, &(0x7f0000000880)=[{&(0x7f0000000600)=""/234, 0xea}, {&(0x7f0000000400)=""/63, 0x3f}, {&(0x7f00000004c0)=""/109, 0x6d}, {&(0x7f0000000700)=""/90, 0x5a}, {&(0x7f0000000780)=""/195, 0xc3}, {&(0x7f0000000a40)=""/255, 0xff}, {&(0x7f0000000540)=""/39, 0x27}, {&(0x7f0000000b40)=""/168, 0xa8}], 0x8, &(0x7f0000000c00)=[@cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}, 0x32140) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000900)='console\x00', r3}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'geneve1\x00', 0x2}) ioctl$TUNSETOFFLOAD(r5, 0x400454c9, 0x3) ioctl$TUNSETTXFILTER(r5, 0x400454d1, &(0x7f0000000980)={0x0, 0x2e84}) socketpair(0x1f, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1e031800dd5c980128854d4a"], 0xffdd) 1.293653273s ago: executing program 2 (id=6683): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000500)='tasks\x00', 0x2, 0x0) r1 = syz_clone(0x1001000, &(0x7f0000000540)="460ca08db3f48e5a964c6edf0c248e9dfa8a677ce36331ab0b829da39645df11c78579c232eba24ad0e9e497a252f7938aadb479b7608053946915b128c6b7f5d09f10e3602876fc6cc0be3727dc98c9ccbd7a2df368f1ab01ada5bd15b902e72f6ddf920348251c451ebce26f19e1e72b", 0x71, &(0x7f00000005c0), &(0x7f00000006c0), &(0x7f0000000700)="69674149668ba817067ff189d6b6066b7d9c40bf3334771fd42de3d9e2956d5d2ddd9dd42037aa2689de57f4455fb566351c09dc1d69ad77baf1a97b0fcd69a15078429a3d3953ebfdd93d27c25f0881b46f5e7e704c9faa75ca91aa917fb966b5734972ec1bd1771840f34d55ac11ec3b64f9dced1be57d84e4e49f9638136e7f3b20cc10acd0cca93189d47dc06838ebfc9f2d9515d538d6afbd494e1658234cef2d1d25986eaa7c51732fd3e4bf78c2f1abeb9cba36b2550b70fe68") write$cgroup_pid(r0, &(0x7f0000000840)=r1, 0x12) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000000500000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) recvmsg(r4, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb0100180000000000000014000000140000000a00000006000000010000060400000003000000000000000000002e00006f"], 0x0, 0x36, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x11, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, r6, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000001180)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_subtree(r9, &(0x7f0000000380)=ANY=[@ANYBLOB='-', @ANYRESOCT], 0x27) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f00000003c0)=ANY=[@ANYBLOB="050000000000000073113400000000008510000002000000850000000500000095000000000000009500a50500000000d77f4c7e03671bff488e8e0405988d4f82620891e121a4f6f562dc1eabb7786a71d8bc090fd5616c8b512f6a"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) socketpair(0x2c, 0x2, 0x3, &(0x7f0000000300)) socketpair(0x27, 0x800, 0x853d, &(0x7f0000000600)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000080)='kvm_ack_irq\x00', r7, 0x0, 0x4}, 0x18) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 1.175531724s ago: executing program 0 (id=6685): write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="8fcacb7907051175f37538e486dd6300800701082c00db5b686158bbcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000005000000020000000700000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00ae5592a149d100000000000000000600"/27], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000740), 0x8009, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r3 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) write$cgroup_subtree(r3, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fb000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd6372ce22fdb904"], 0xfdef) 611.959617ms ago: executing program 1 (id=6686): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x31, 0x0, 0x3, 0x5}, {0x48, 0x0, 0x0, 0x7ccd836b}, {0x44, 0x91, 0x0, 0x9}, {0x0, 0x0, 0x3, 0x1}, {0x6, 0x0, 0x0, 0xffffffff}]}) 476.458438ms ago: executing program 3 (id=6687): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x10000, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0x1, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0], 0x0, 0x7f, &(0x7f0000000340)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0xf8, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580), 0x4) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@generic={&(0x7f0000000640)='./file0\x00', 0x0, 0x8}, 0x18) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x6, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000e3ff000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r6}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r5}, &(0x7f0000000000), &(0x7f0000000040)=r6}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0x1, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x18, 0x29, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_idx={0x18, 0x4, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @ringbuf_query, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0xb}, @generic={0x6, 0xb, 0x2, 0x5, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000240)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x42, '\x00', r2, 0x0, r3, 0x8, &(0x7f00000005c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x2, 0xe, 0x0, 0x9}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000800)=[0x1, r4, r7, r8, r9], &(0x7f0000000840)=[{0x10001, 0x1, 0x8, 0x9}, {0x5, 0x1, 0xd, 0x8}, {0x2, 0x4, 0x0, 0x5}, {0x2, 0x2, 0xd, 0x1}, {0x2, 0x2, 0x8}, {0x0, 0x1, 0x5, 0x2}], 0x10, 0x400, @void, @value}, 0x94) 441.664438ms ago: executing program 0 (id=6688): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf301}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000400)='kmem_cache_free\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000040)={&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000050000003f0000000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r7, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) r9 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x4}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000008400000084000000080000000b00000000000007000000000b000000080000040f0000000100000005000000070000000f000000050000009d0300000400000002000000f7ffffff010000000000000001004c1605000000020000000008000009000000000000000400000008000000020000008100000007000000040000000100000009000000000000f110000000005f0000303e3000"], &(0x7f0000000500)=""/185, 0xa4, 0xb9, 0x0, 0x6, 0x0, @void, @value}, 0x28) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)=@o_path={&(0x7f0000000680)='./file0\x00', 0x0, 0x8, r9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x9, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000400ddff00000000ff7f00008520000003000000852000000500000085100000080000008500000013000000851000000300000085100000070000009500000000000000"], 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x5d, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f00000002c0)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0x8, 0xc5, 0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000700)=[r6, r7, r7, r12, r7, r7], &(0x7f0000000740)=[{0x5, 0x2, 0x3, 0xb}, {0x1, 0x4, 0xb, 0x1}], 0x10, 0x7, @void, @value}, 0x94) ioctl$TUNSETOFFLOAD(r10, 0xc004743e, 0x20001400) 392.748248ms ago: executing program 3 (id=6689): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)=@o_path={&(0x7f0000000500)='./file0\x00', r0, 0x4000, r1}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24561f1b2607995daa56f151905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64b751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07372c29184ff7f4a7c0000070000006056feb4cc664c0af9360a1f7a5e6b607130c89f18c0c1088d8b8588d72ec29c48f0af5f2d9f51c4b45e0000000000000401d01aa27ae8b09e00e79ab20b0b8ed8fb7a68af2ad0810000000000006fa03c6468978089b302d7ff6023cdcedb5e0125ebbcebdde510cb2364149215108337719acd97cfa107d40224edc5465ad32b77a74e802a0dc6bf25cca242bc6099ad2300000480006ef6c1ff0900000000000010c63a949e8b7955394ffaff03000000000000ab87b1bfeda7be586602d985430cea080000000000000126abfb0767042361448279b05d96a703a660581eecdbf5bcd3de227a167ca17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b6c7632d5933a1c1fa5605bd7603f2ba2a790d62d6faec2fed44da4928b30142ba1fde5c5d50b83bae645ffa4997da9c77af4c0cb97fca585ec6bf58351d578be00d952aab9c71764b0a8a7583c90b3433b809bdb9fbd48fc877505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223d8d9e86c5ea06d108d8f80a0eb4fa39f6b5c02e6d6d90756ff578f57000000009700cf0b4b8bc229413300000000000000000003000000000000000000000000001000000000559711e6e8fcffffffffffffffb2d02edc3e01dd271c896249ed85b980680b09000000000f0000169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffffd897ef3b7cda42f93d53046da21b40216e14ba2d6af8656b01e17addaedab25b30002abbba7fa725f38400be7c1fb8f72cd317902f19e385be9e48dccf1f9f3282830689da6b53b263339863297771d74732d400003341bf4a00fc9fec2271ff01589646efd1cf870cd7bb2366fde4a594290c405ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d30a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa7956488bef241875f3b4b6ab7929a57affe760e797724f4fce1093b62d7e8c7123d890decacec55bf404e4e1f74b7eed82571be54c72d978cf906df0042e36acd37d7f9e109f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c70600000000000000b7561301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f870b136345cf67ca3fb5aac518a75f9e7d7101da841735e186c489b3a06fb99e0347f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f91e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e669261192899d4562db0e22d564ae09bb6d163118e401e024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a998de44aeadea2a40da8daccf080842a486721737390cbf3acb2003016f154772f514216bdf57d2a40d40b51ab67903ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99a3594191e104d417e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1594e32409e2a3bce109b6000000000000a1fec9000000d694210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137ab79a404abde7750898b59270bb29b81367ac91bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f00fb8191bbab2dc591dda61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214d00000000d6c98cd1a9fbe1e7d58c08acaf30065b928a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ce21d69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821a00e8c5c39609ff854356cb490000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66018d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d0b3bc19faa5449209b085f3c334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c471c784ae7da7eaa69eb7f7f80572fdd11bb1d070080fbc22bf73468788df51710eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331ff5e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba830d3f474b079b407000000deff000040430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71b967ce7daac4be290159f6bcd75f0dda9de5532e66ae9e48b0ed1254a81faae79b6af6fbb869604d51de44c4e0973171ad47d6c00ebc7603093f000000fdec30cd6db49a47613808bad959719c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f15d6533f78a1f4e2df4ca23d867693fd42de9b49a1b36d48a44ba6a4530e59bec53e876dc660dd63bed8d31c31c37a373d4efd89f0000377b1b1292a893a516dab183ee65744fb8fc4f9ce2242e0f0059161c5e0000000000000000000057d77480e0345effff6413258d1f6eb190aa28cbb4bafe34124172e436b176c7ed4b132fb805d5edd9d188daf28d89c014c3ecca10ae55704544673e1fa03b84f63e022fe755f4007a4a899eaf52c4f491d8e97c862e29e457060000007ac691faee1e0c8fe056a07474e6e5490a7d3c3402000000b60600d837c6befc63ddf2f594ad7cbc56a1e44d218c956a5392a995f1fae8e9f206efbb33854dc70104ebc1581848f9745cb796da2dfb714a0500000000000000faed94fc39acfb3fd25dfa8116a154cd1226e1bb72b59fed817072a0da60160761fd3dffda0f7c592eabd8ab68334d2a1693cb187539049e331272bf5135044df8161400211b8012b6eb1ed5656e83f65509bb4b323c5bd61bff949d3bade2f6ffda1360c2786e16937ab61d6dcafed319c716357d0885f9c6d1f442954c167dd9b4acd9468ce3674c82bbb2e31389179b025dbe063b7f906217b2cf8410c7023aa3e5cc3ba1000000000000000000000000000000006ae6301a2da44394275c582a6516bb92ea1980a0a659f2f1811c8b281c209647c4241f292b20508b215dde27bb2487a6e2b5e4a8ccfab90c23827ef06cbe364073005f8a6d1456aaeb85ffb7858f24eced67a67ab825e863928ed64c83f62ffdaa997657335b63c6b4163aff094059e626766845fd779c9e6cdbbd64c24936615ee68538e8fddd0d90f3a7579579a142c0f7b318264d5c13c31cf475829528267ead38523cab7e1664e8426ca85e82ccf821c8a02a7e7d954d05b68a9c28f79429b09e2bb3681ae2b831e27c735123361c193d66ed4d71f19b199d371ec6bfada7cd370e3fdd3cd980fa1e145fd3f3e96b1feb53c865e1ad6acf5d16ed652ee0c7f45352222692fbd679212c225d097aa90f7e1fb1f983415f43e75a19ecf7fd21bfa150ef563aa72ba1c43c5f3d9be128ec26b691f31f9cab931631606a81622f120675c962be2d3b5e95f74f0b209e42e6bdd76e6e725295b1d78d928f6f63c41cbde2ba66ad81168070c8c6e18a6e452a31bdc4a60d637545ed4c8a1c649c3ce54ad3e16304d06a234f5f9311ef0f78924b68dbb4712efdb6974667bdb54f16fd2061b9ba93638dd177227e94e4ebd0ec1d437db948062bf41742000000000000000000305f70dd02fa0c61d5fe6d8ff35389246037e18d34c1375ae04f44f0c2543c772c5ccb137be7dc1874c5140200000054d77d4ea5ed144a648257f4a0301067bbcd9b91072659d872f26b796e2b81025edb5f45f785e2c2602b248ecdd80f019ca659be7e8ae953325a27564f33c9d458a60be3dab38baab7eb1a66ab1ffd6308f7fd51beb356fe75eb985b7581bb5584c53984ba9c7340f97e8d3825681c53de5f554e595b00000000000000006a8fa9f05d64c4be42f981f00051a3bc38613067dbd1427e01bfec016e51844cefa8a855bf23ac887b4a88eed6d9443857242f28e31a41d20105fbf3394ff910e734b4d9101265ff729c426e01c1ab13dda8c388b9e6626f19eecb87e39175e85e17000000000000000000009431807e43886903526074e6b40244c938a4c68a38c25ddd7c143b3f14eafe4b28ec66815cf8d1f56aa1424bc9b5d58790298e5b310969e50c222563b54e60854e1bfeef448aca8c5ccbf5546ce4c3cd5a733fec25fb94e1e0f966bcbd28a4d8fe4f556eaa1104a793006619700798354c6ae0040965e3083562bfa20968c04007d21dc02c9fd1f75e1ff40f439bdde4e784012e52049b483f02f81b88f5f57816b3fecec79cfca8d37203e769759d6b6a56b7605ced8ee18475a77ff0963a565fb6021d216c01b1098e40550a1cfd80e9180100000000000000654cd76ca61fe5ad8a31ec558fdbfa706d5e738bceae81fe777c307d5bc72183a4c2d35732e74dd690c57bdfdc1f069f9491bca7a8c59363799be70018c25ece5ad7307dc7a95c51bc25a8bbe2cf5ddf6aa161693782b0e7feb8a768f391b49d4c978c96dbb52f21c122eba9f17c8bed10591958cf06321a248b5f76ceedfe0d080d6aeadc11b237b3326dd04b86ac37c0d131544888db9e128d059761ad9a393e96c3b41c13c5a381bff187a75de560ba6eb3faa5ff8d2bb3c88f8de5efc2fb2200cfda6d07ceae22577064334fbf76a23e62e6059211d995b879f6b7d3f7fcf03652b81e6b7cdeff947ad185d3c6269ca247b429c3b872a8f1ef60407d29a874f4ec31c9effed55543a65a6b4d778cebcd43b7905f3960140bd783540a7353014bda8e9c7a34a5f428fd1f8eb11e837dd9d586487fdebcb1ecd3a003ff0fda4be617fecf1ff0ef2cdfb7fea73ca18874664d60a4b9423f3297bc8eb91b4ee1d73272ab28a7d7ab055a8eb58fe379de85338304e26e3620941b463e9049fd105c74c91cc4d71b0f76e2c2e4825106aa7ce2a3adbbc7a0443ece98c077b358e752b439132a0f27080ece2a94c320b002c77f82662675a7713c7067081cac15994698c41ff4754268ae2676384ff799783f55d7e5a1a092a01b965dc99cb7a9d98440c355927629f2bcf9dc2396eb2f5d25829715b24327642ac48f1201014a95e0e65e12cdf27e19043e3c5d3e798375cead35b9a93190a52cdecaaccc854a1d41ef365303f0e9b4fc969c9dab6df5e8a795b140fcc09e8a7b694d12932917facd8ceaa4e2d0d16bb0b95387fcd5ff136d8abddf94daf442bbff744591931872a36cf921ad69f2127386e8b0f9afee4da8d3fbec809fbb3ca0fded2859cf25d4c6155d396c5b9bd1a928923123f63f4c40688eae69990a9419456247bbaeb7948de84d2ff875414883bb1e503d4bfebc01bc12a53ea06bf38e571157bd642dac25dbee7832c58378374a39483d6721eec96c28911db21c0c006b42afc90000000000000000000000700000000000000000008ce4ea442c1a207108b35511186c5e860278f6463f52f3990ce08b1bfccc3cff4b5ae27b610aa9ba11b47d4f94c439e055cdbb2b12c983885c93ea4ab4ca1e02d831ae162ee104"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001d40)={&(0x7f0000000000)='hrtimer_start\x00', r4}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe80, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r6}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 390.225048ms ago: executing program 5 (id=6690): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0xffe5) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) (async) socketpair(0x1, 0x1, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r3}, 0x10) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x844) (async) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_macvtap\x00', 0x100}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43451) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa1000000000000c7010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x89f1, &(0x7f0000000900)={'ip6gre0\x00', @random="0600002000"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 388.203398ms ago: executing program 1 (id=6691): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000009000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000009000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80288, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80288, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007f2fff0000001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000067dfb4a518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000067dfb4a518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x8, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x8, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0000000000000000000000000104000000000000", @ANYRES32, @ANYBLOB="ff000000000000000000000000000000000000005f83581cf210fd709534b183636233b24fefbfa5fc674c27bd5877c7d5b97448e6fd093bb947bc3bfeee1553546413de5e75a36b154b6aac4a4310541f4c51d36ad68d2f29a4274bc284", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000200"/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, 0x0, &(0x7f0000000040)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, 0x0, &(0x7f0000000040)}, 0x20) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000200)=r5, 0x4) close(r7) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x4, 0x6, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x4, 0x6, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 345.498838ms ago: executing program 2 (id=6692): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf5b9fc20e31db8f3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r5}, 0x0, &(0x7f0000000040)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040), 0x2a, 0x0, 0xffffffffffffffff, 0x37, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x24) 286.226329ms ago: executing program 1 (id=6693): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@bloom_filter={0x1e, 0x0, 0x101, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0, 0x0, &(0x7f0000000300)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000340), &(0x7f0000000200), 0x8, 0xa, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x2, 0x3, 0x100ffff, 0x87b, 0x356, r0, 0xffff, '\x00', r1, 0xffffffffffffffff, 0x4, 0x1, 0x1, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x5, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0b0000000700000001000100080000000100000017f1ae", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b7080000011100007b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x0, 0x0, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000006c0)=ANY=[@ANYRESDEC=r4], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) unlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00') r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000000)='cpu&\t\t') 237.208099ms ago: executing program 5 (id=6694): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x29, &(0x7f0000000140), 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7, &(0x7f0000000180), &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x9d, &(0x7f0000000180)=[{}], 0x28, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0xdc, 0x8, 0x8, &(0x7f0000000380)}}, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x1, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r4}, &(0x7f0000000080), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r5}, 0x10) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) setsockopt$sock_attach_bpf(r0, 0x1, 0x29, &(0x7f0000000140), 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7, &(0x7f0000000180), &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x9d, &(0x7f0000000180)=[{}], 0x28, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0xdc, 0x8, 0x8, &(0x7f0000000380)}}, 0x9) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) (async) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x1, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r4}, &(0x7f0000000080), &(0x7f0000000280)}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r5}, 0x10) (async) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 236.734739ms ago: executing program 1 (id=6695): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000008ca1a5e942f6c58cfe2fab5c7e93e2f214887272adb71e4dd8b880bedcbf2124eb2644ffdf8533af5243bfefad7fb144cb808b43b35f535c80b5abdb30d6f7f0bb45c97a4ee80c4b86f36d3ba3d453f762e0a110e2af61043501e82b844555bdfc910a6de4cbd6d48285a16ea917febea8e7b5e3586733b05526b682a8ad", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, 0x0, 0x0}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0b0000000500000008040000cd00000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="001b42d4df0d035d4ba38307ca883e8e250000000000000000000000f30cbad12fb568bff6b621cf3ae92211fa52ac37692a03a9c895a6e1897d40d4f542320c0fd3"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x900b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="8500000013000000350000000000ba00850000000700000095000000000000004cf12aa5cbd56823f81f06a9c0ff431553ca08030871e23089f5e0a141d524588f32cb447f90ee60b191e2c825cd4d580e7953f911aa1f7017230163cf09493497cbe593f90a847687a1ef1f83dd6c1023678a1086f790f9dce435558fe138d7362090db7457c14bc34e6bde0887c697add9a7ab69000000004f0a9c139e19b27de95dbfb3fe241454a04080bf668ce021879c820f9b80fe233888f0008000007027d4b33729d714e0e205db36aa52281c71e90bbd1615e3a833c63d33076af514c622ff99237bfb3557b4e44bdfdae050a0678a3d8407b0a45c623d8ef9baf37ac4effeac63a1606ff3c25ac788dbcc31bb76fbf87fc74300000000932d2793674f1f8719d07a6396b18b6e214bd29aef8d03483012c76199e301494d766a733d7117fc9107bc5b9267f9f8b0d2e2f4f6582b9510d30a5d3d3bd12bc338028e217e7d59efd3090be5bf2f9d1c42104df0da362f586aa2397bb7866d97163b2bdc3364b08dfcc0415c369736ea2897e6bb88e8fae37345fb21b69331e250886b7bf9efdcd5e998f7cfad443c3336c6abfc401c4f774942c7e5a56f0c3281afbf9b1f5e347508a7d2884a2b49b6039c221dabadcd313c01384dd93ff43a3ff43b69bb8659a89d857f3b15de7b06fd9fe93470ee07794c213f9c51a7ecaa2cdc70024c3aa400000000000000000000000000000000000000000000000085d16fbc2f7845935b8abf55ae4fc25c736170a4b9b78bacd235e49c0c773e783f48e36d61aebcaaeec26da752aba7eda57fbe0fbb9d771e1d5b2979ab12b6467ae7d8d746"], &(0x7f00000002c0)='syzkaller\x00', 0x1, 0x99, &(0x7f00000004c0)=""/153, 0x41000, 0x0, '\x00', 0x0, @sched_cls=0x37, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0x0, 0x12, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b688a8", 0x0, 0x4, 0x0, 0x20, 0x0, &(0x7f0000000240)="7028bf1f2eb36d942194261b81b3f1c3c1641dc71dea27044ca76e52479752acb2b6d28deb9520c0685b17ccad5060545b9d36b271fdeaea64eb9fbe6d20614987a653afe43d561d8d6618f01c70c9accaf84ee83cf58b4d953e0c"}, 0x31) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000d09bcf0000001d"], 0x62) (async) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60840, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000200), 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a0, &(0x7f0000000080)) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a2, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) (async) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r5, &(0x7f0000000000), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000646c6c25000000000b2020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300003400000085000000060000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 232.587969ms ago: executing program 5 (id=6696): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="620ac4ff0000000071101500562726b7977f3c8bee4498000000009500000000000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x13, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c1300000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000048aa008085000000700000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000016000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xa) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x7b7c, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x4000008, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r7 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r7, 0x2403, 0x9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r9, &(0x7f0000000000), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7000000000000007b8af8ff00000000bfa200000000000007020100f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 223.223939ms ago: executing program 1 (id=6697): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) recvmsg$unix(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37438e486dd6317ce2208"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) (async) write$cgroup_type(r2, &(0x7f0000000080), 0x9) (async) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) (async) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0), 0x40043, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40001, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x8004745a, 0x2000000c) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) (async) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000), 0xfdef) (async) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x4) 76.90235ms ago: executing program 0 (id=6698): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x22ac, &(0x7f0000000040)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000600), 0x2, 0x0) (async) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) (async) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x0, 0x1000, 0x58, &(0x7f00000022c0)="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", &(0x7f00000004c0)=""/88, 0xfffffff9, 0x0, 0x9, 0x3d, &(0x7f0000000180)="cc6c57bcf98f127efe", &(0x7f0000000200)="2f62ea853bb220fa5890e3b836ea945cc79cf291c9f00156b5eff49a93b84de7b2ba42e6313aa2cfc25b888252b0d234583a7db338b619112e0112e621"}, 0x50) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r3, &(0x7f0000000380), 0x20000000}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000bc0)={&(0x7f0000000a00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000ac0)=""/237, 0x1a, 0xed, 0x1, 0x0, 0x0, @void, @value}, 0x28) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2b, 0x2, 0x7, &(0x7f0000000640)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f00000006c0)=r2, 0x4) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') 76.12574ms ago: executing program 1 (id=6699): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{}, &(0x7f00000005c0), 0x0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3b}}) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000100000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="190000000300000009000000ff03000004000000", @ANYRES32=0x1, @ANYBLOB="1f0a0000000000000000000000bc520000000000", @ANYRES16=r4, @ANYRES32, @ANYBLOB="050000000300"/28], 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1900000004000000040000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000063df928d28c3c6d4e9fda6c729476ab0000000000000000000543e193ea52d14243f396774b1d5e696f424f5b9d02824c67892d788c6fbd2f779a9106a28f6ae13181e8dd27ad92e8a3348c0b23e289636e16b5974f785f9b09ec910919c09a9bd13a32a7c15c0881eb3b81b449c1a974dc5bf4b552e08789fcdaa45f4ebffbd5f723a63d5813855d25995"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r5}, &(0x7f0000000800), &(0x7f0000000840)=r6}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0xe) openat$cgroup_netprio_ifpriomap(r9, &(0x7f00000001c0), 0x2, 0x0) r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4, @perf_bp={0x0, 0xc}, 0x200, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r11) sendmsg$inet(r3, &(0x7f0000000980)={&(0x7f0000000500)={0x2, 0x4e23, @remote}, 0x10, &(0x7f0000000780)=[{&(0x7f0000000b40)="b8671c15822128675bc5360f6c1aac55ad7ca5367ce51b5255c8c9b9fc7c2453e2d046f89c76814195591ce39b2805537e8fca", 0x33}, {&(0x7f0000000580)="7341108cab173ddc67e741ee8f405d3a76b60e6750c16ac5b4a321", 0x1b}, {&(0x7f0000000680)="e4cecbeb7b185b17d423eb4e3b8856aa36c95094c7f6cd7512b50d2764964dc45834b46f92f7b55be76840e2cb669db520b90afabda36a97de36f9ec20e847faa102f3fd47eb885a72d9158cfbf6922f39e89cdbec8e3c4f76a51d1918fedf75e02d9cf42ca55647222a8962ccd689a928e14decbc9c77e3ecd0d9293582cde9c74508d861062e3381328bd5e36b804270f59db080135f21bd2b7777850c3fd42a346183579cdcd3a2451098fc6a29b7af4b2d16a387b1422808f19d22f6fbc9c312129d1555288f77cfd6fc1e86a4c3ede98b5ba2f3e3f9ecc23328734540d09d14", 0xe2}, {&(0x7f00000008c0)="9fa420a1d7bb1778fcecaab4b6fbaaaa82153ddccee574d02c88a0b348efe9b69f564a678fd02ac196b58ec23550415247d2e68d342499128a18b7a59b547586c036479d10770f192eace89a87f86fb80a0078e0b6b562357904d96cfb7ebf452a169cba45873fab1590942e195951404c8adac174e70c35dd151bda6a53292a42d8171f5e51335ea1a54c130302e92ee6501c1667d707c56186e01f841cb1d516c4adfa0dad3ceb78909e789ba8f187a7746271d20d0083a57d3206d9ec1a", 0xbf}, {&(0x7f0000000600)="a37720eb45ece90036784debe83686b2085e811bca98fe54ad52b96d3342d0d906bb87f787afc33e878ca43729d037d9c5a7512a0a337564", 0x38}, {&(0x7f0000000a40)="1c22a5a85684dce6b4c67b224496d2e3d12fb5c6c16a392c650c4528119a8c8416ad41ec051f1253029ddbec410ac2dbaf4aafedaec36413e57da766cd3274de88a5091b01ce63b28806695883b42e26dde9cfa2a4d16fa364f59ee3e779040ec808fb64213e55489df650c5ba6114e3b18c2796ec81616ee8a96d02f77562f905d5699c635efeacc223948b884ce52bfe1a20f7b7eacc2d85b5caac65fe80c87294e1e3423885574aa36d6316a699297ed95440aea2e4f3facd24337331a06b99efdd0f01e73b865e08f716d5b61ba2b4d9a897c0af4895390444cb5ee0641542178e8dcdd533e8e3e7a122a87d8e9fa52acf", 0xf3}, {&(0x7f0000000e80)="d695b12c097cad05cd957c9830fe6a5af732270e76b4b8d5b54ba49c3604c914af535d39d2bbf76ecb346628cc919964b049c461776fdfc1e6b99bb935f32f2e2804f02594d6b5251dd478c59fd77c26923a1004034b2aba1b00392a99ed14ee9196dafb4baa2821c932519c8874c346a92abadcf28b8e9b30ffb8728a11a2fd0c3abc6e22d9656da903cc682b7de053113199a9402290b9abb23a581d3b83f0922245d5aead432de739a184db563e54fa443c9fe47695008578372b9ee25c23ee3aba7f1c713d83a117e9c4046bdc68e76c33a5e3b5c7a14bfabdda3b67eac25b239293e50c31b0206fccde1b81afdf0d99c898a5ea1772e366ff70fedea9e43c0aefa9492702c701aa507a419467aed383d29da49a1a25a17586043fa561db2d0533abb4f3e6beaea265ff0d6ea740359b994923d2f26fbcb71c9cae7e9af8e5cb145c5fcb1c327a53eddd8a0ef9ebb61f8b9fe8d25e42c954fe49fc789d2478bd454479680cd8ad3823ded2ef72f1d4455d561d9040fb049a6106624adefc720e36ff0504261b2047adfa5f9030b4500fd8985a63e42849594e7c55d9414567f7ae400f0d550597335844731e0ae6a21b29af2d32627154c42370278028aef75f39db82cbef990e4e81338fc020b26b8c300b44d7d2516653a3105bf1ed3dd7cf15a0a7da2b2a9a51cf26769fc5e86f1d47271f6d5916dc1e8aecd6d26b7c0c934e92450be8983a56fbe05441162e3c86ad5d0d60cd9bf18084a5baef364ba2ce51f7d017ccbb913b656313418c9d618b0d2ac189aa0260627b0d96cd1defd66fa0dd1582b35684fecfaa297c53cde0c9b3b57e0749abd11f7ebd963ed4d080674b951c95d82cd746ed2f4766d395569fcbbcf8313dc22351d559e29c042244317e301115ff0c2f6ac32e97fcae8e463770ad6ee5c50cd5bb00e2ee8fbf58b941346d6f108801fcc21eed53d200d48077fbb28c39c87106d15ef132880c9b7d7d16745956532ba4a561abe4eac6d2d8b13b2c6711672099c6c10c4431bd2ded28fa52e4aa447c5533bbcf8e3b45fe6f707955c33894d6ddd5a9ec61fa8f580ab5f2f5d5629b40507da26643142766c049323309db0c6e10718199c2b1640469f606cace4ae36fb2da44891196571eb7d57435ac98b918b54e15a1cbfd04e8c0f41ef337f33aca722c41968e46ad2b889e0846c72df497bc836fce88d3608fd8d072fcdc81cf4a562299c051feeda8545204f02f37ba79a15d4a2dd4a942009a8a4a7fb0dff0eb648851e2c889dd39bede7aa2020384bbc34b0771ac32f4935a5a94d0798a173f60c2988af1e77a757844e11c3fce525256fb0b1a66f0f67891c5bb751a991175a92aaf31e1a579e0e0dad334059a5158c505abc3f5c3e739e10fb141308d2c876746c1219d75e60e3cc6c055b6c8d38dd5a3af11a9d081acf51eb18862183e2c0a361a1d0a6ce032733364202837d4ef0573edcae76cc21ec5f925b5fef9751abd92a41159e363cf9199014ba1a19c4ac255eb9f7affd42feecc761b0fd8c2546984758c4091e67306081c3d61900916e9fd191769fac2b9bfd7314e51b0c52eedb764c40f9f019c16862d7f5da91cc0cadac854af88498f76a649d408fcf24cb507c15e6f6146a48ca8b40c095ae1504ee096e8b0e679b3a95ebb9024b65a09ba93f631edffffd55d0d0f13d7c236e95fde802fc9c5b8faddc4dafdb117fa2998442a53813a864d185d82b3a7575b35c77e8492cde6c8be115e0ae54904a680c2883443bfa4522d7151bd1f26f59a01426829afb05cce9f4f71332f653fcacf4ff39003e4a9a40124f1d03ec22a8945fd68274ca617075db08aa8be777b627895661ed2b4ae3e9bd001258cc665190ee17e9ee942171051f78bece6f6e61ef17d7e257adbc0fd439f67223954a4aea0291371d786d0e9f128f9fdf1a0fdd159948c635c2c90608203f10a3a295d1ed6a06f51277573a46a921d50fcca4118ce9b0f64daeb07a60165eadbf66dc114a89bcba88c5c73490699ab9becff4425547d9077252e5e110251b1a483bd184d178c2a617f044e8fd8a6cf0aeb94a60d8c0cf99fd22db66d0c4de1b409356c919c87e371fffcc43b20d762dd32929743bfbd19614c1caa20869c8c010de9cdc06acccafae075b438ac87052136aa3d35fac4dbf31a972ad146e3308d72fdb79120cb5a0ef7f4da2135c7e066ead7d4a0336fac9909f21ff7e73883bead58c9d3277e402a14969be720aa8242561af3ed8055a29f3b5e28254d17b8e0a2afc974f3942d90ce4a5c6cf36151f0845293d0b9d643317c4367035d248d19262875ecd7cc82564bc8efaf267c28a709339f78dc684580ab0ad94335049469f29e668bdb2487aeded9bf3694cedb06ebce30157e2d1057e81d42e74f0eb5e8fd7c085a0e5196a7e01ff017d0d983fff63383473acef1ee701e06eaa65ed34f6795b067d867d44d4f5a7746e4b296b6bc0627b946a34841e0604268c7c98c6ee68c74e792a053011233955dc9e5581d25c343d77bfec2fbe8df758a95ba9719f9f9e02694d9440abcdf4f25af0abd2e3f8af7e02a65f6ae90317a27399349940d41320968b2f33f66efbadd0946426908b2ff4a96b0b284e9b8e8c9597267a2684bb4f430e97e5250982cc775be4ae845e27999c3e724317477ee5d91e5318fb2aedcd8cd21fe90d7934ac5b3e7cd4b91a18aed813eeb540bf9078a8027a2b56e6f4dad595a062ec3c21b2a3bc0f07b5fd8bc57095a4901899ed703d6fcf0155b8f7dd03e929ee7deb9073310480ca789fa4e62ee9ab4f2d47180731ac2e4be29545259e8aa201864e4c2717dc4afcf19a9ad7f02e7cbaf38570178accf8e8d237e1ad054114bd59d54a948017265786d2bb1c8642217792f704497af7a8adbda3e105a64a55f42ff366f4d3064c583ada0076d328d781638734d5c7290bfc763ac1b94670dd6f5aa546c9bff9c707b27a485f2c78113405b110f417a95475052d6736a1761ab92fa9ef195515e949e4ca681afb90bdc98e97a6a72aba64cbde5fc749a641ef61c254e992424714b1c66874f0f487abb0782f68a31fd37a67aa45b75b26cc26800eaa6e12735026af8d0615cce03fcfa428cebe86842f3a1932a284cafeb37ea174ce60bcb6528ec7467ee5f36a782c31b2a46bc65589d6232cfffe7252f70f1ffbbc320a6f0436aeef1c8cc2ec22d2acb233d28f775122da16d803489a38996aa88f88e964688d6795b539399fd646934f3df3bf857b75b62f57686c019fbcaf89820871571327a800f5e864b295594d060062116ab03b42d185e08e0d407dac771afb9320e09477cce8b656137b04eb756ecbd33648b0b56089b8c17921b822573f06ed826d2b36c1495adee68da5c93726f288650e8788d982dcc1588fe16987839a0197d69d48c47dddd9eff5bcc874da076d3b76e05585d9990b7c13cb922f73dd4937740a0ae2da3a50c621e4752b9d3703a999da4d34484568cb7824e4adab8b35d278ddbe676a4c2109710685e8f3a439cb097b79f2344c72c58a5139bae740b704c25e9f3d45aec69631bc5fcf9c24da0ce92f8d85d3e762589c95ced8e3e6763b8668d8c7a2ad73de3ed8b204960fb6492379d3108d824d22b9c4b47eefb124b41645ee55d43d9755aceed9e691893a2d856f0a3d462b76ef6496ef8b523779eda5bd3cdd6c6dd0ac89fb6131e722866019d966bfae85bb9728385eb0cff35bfa6c9047982b964f13aa994b295b8881d53b0ae8eab24ef1193c71c5ccae2bd59eb156b252e9f9affa301154f0cc69512a93c313738627144acd65077dcba3c767027e92cfde38b5839d57d1433067e4e29be91f384a00dbc6e0db141f0aa69c1992d3bf179c5331098931b38c4442b5f03744ac1e3ea3f272f8d2c8ead285f680efcb31e2772530fa613ad969238a609a8f3a08d4e4a0c592ccc1bb0a3dae983a3398bc83aba0c7922830be8d976a7aa5759f9b8b5c7d9c374cd05d706542c608c7fab0520680fcc55eeb7768eab606ae8a3972ee4446908e64ccea8628abf84e64245e26ca1917a9b21159135dd1becb107fd414e0a4f81945e493f0bad096feed717f2bf8e81591edbb779cb47f88d77012cf9ef087a7eec05a12cd21dcdfa50ce31bdec3170196728987d62ecf8695c9f43848436806e067ec886fec6f9a41cf1b9ffc29dc4a9f4fa8ea66399eda0017b7ef2c889fb1d73bbfaf005a2dfa520dd2ba588328e7596caa124b11930b9aa11bbd41e45dbbc0eae2c9471655da8c8d800929fc0893e82fc157a2e23fc16d6135511b8b82a154c5f36a5d366cc1d4a48a2cd30f4576e78731ed58413158320480ccf4d9146c4fb70cde6a18cd4ce373340705c77d871d4dd2c94114af1dcf8441fcf49e7956772688965ea9a1bad90d1966c88d0adcd23ab48c86bb02a8d16df1aa221e2c61a43f70ea3d09d41d3533e93786b2548336f207e929f06119ca68b0920cbe461adf56923a674de9239f1d5e6893dc87dd44dd9a40b4566c0a65141720620a49f6662d5204da0d98bd2c4306d1a4a6241480ebc91e7f9262cfb41b35cb4e81e57362c7ae69aa69859936a06f400ac2c7a36c7076d90a98dc03356cf6bd6ca7843223db3276c076e721bcf1537e974b9457ebd23fd385b067807e5f90f38f511053515d273f1346a9a6c3ec04052f4431063eac97469ac51b5f6dcdc3b266d3eb1c57c2ab50e7fedd4aeb05c39859581a1de5716a9922bcdecd84282f5235a9b9e08ff016bd9bd70b2ffd9ab6347429df73b7b1ffe1c9e91a4c3a0305fe5b7942ad9993f5ceba25433cec7a1a8555c2e5ce99d4ee0e81a7747982c4df7493f44e9bd0175f785e7cb679e1b51912988dab0b69bade0b151d5487bdc8903cacea7d163211c82069504eaa7e89624dea7b11e3b877866552abbc63cdac171bb2499e4d6a657fc9c9402951ad358a51c426a777512e4f4b2e29e26d09597ffe40826ab663b69343fae77881001878c57073b91aa4ad5308a5800d7cfbb1299bb20f4284bfc86a9fcfe54aa94f99ff9d2d6b9bafa30a479d78b220b9ce7bcb208dcf060831fe4ba790c8bf7d6d30881c458fcb348901e4f6628b0a67ec06b3058cb713eaf8d83ab1af78976b4b0431495e4e3da2004147b9afdba8789132ebc1bff6cb2449bb1c4d2826bafee0c42fd8fda0f03a24db714e0feb7d75316d371f5e6a3f2575a6b358275ee467fcc6cbd54c118b6bd9a2d0909cfd8a85fe33b21db111d41221f2513cb4b6c82d94d73f58b9b7c74f50e69e4edb7c0920186033946c06ecb6133961b37f36b8f197b6d39dce16dcd53f625ea9ba3a69f3ba6dc787100a4176ddf358a689074d817a67b213dad85faf840e07479a66e1dd952748eacfca6a2f47f6a22d164e4d29bff282ce41e613c36088e6ea3232a4fec485553e1f02df0e675173e1f6fe4b676a2dcbd5e355726288b8c756307ccbf4da53fde4b3d9c1ef1fbb88a56d49bcc7694f855a51210f0fbd28bbc06216f915baebf7b09a6ea19f0f37705af049726c54a5381b15e0fd09d0d101b702338628bca48696bcd8cd47fcc02c694cdd36688af5059077787824a6e03fd604f61c78901c19017f06020b5be0606c77a81d8810b468263790959bc411e41b25cf0302309ac59ac20c5560e356b558742ea8e59a22e5896741c5769b0147f35af3a04bb6672b77921ca2bcec8edaad1670a45ba8d3806004bb05ab31abfe7db3ed9f0b4a0aa45efe47ee91c15c3e7097e90150670", 0x1000}], 0x7}, 0x81) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0, 0x6}, 0x801}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) syz_clone(0x4080b000, 0x0, 0x0, &(0x7f0000000e40), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r12}, 0x10) 75.33496ms ago: executing program 0 (id=6700): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = gettid() perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001480)}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x9, 0xc, 0x7, 0x5, 0x0, 0x7, 0x10, 0x9, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xab, 0x4, @perf_bp={&(0x7f00000002c0), 0xc}, 0x110410, 0x5, 0x9, 0x2, 0x0, 0xa, 0x4, 0x0, 0x8, 0x0, 0xfff}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x9) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000400)={&(0x7f0000000380)="8d7336b2fe85f6b880dfc16eb75ee55a3982f5059ccbe13e3e1132a8f14c6c5b898c55ba8e6d05bd7e5fe402d93f0514d75d5eee8198352dcd3b512e9760157fa7839f7397f60a25068207d3771c4c45fda3785b9a702f31db3d3de822cc3173c50f784b45343c9485fd38b6a5", &(0x7f0000000500)=""/232, &(0x7f0000000600)="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", &(0x7f0000000ac0)="a9e5f6b4b81abb616b0a34c606ec0fe1db2b2f37d3bbac38164ae12b2bef8cc0554cd4c351e41e1467eeb2f12ab934c5b28748922795abd190c6ddcdae86405edfef78a12fe4a0eb761b66e244c492e8bae5a6ff5594829ccadee5fbbd616ef483663e45bfd6f198e7bcb19373f2d8be7b6d94d20c4442da889d3f8aa7176910bbd0074b3e6af0c1", 0x4, r0, 0x4}, 0x38) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0xd, 0x8, 0x29, 0xfc, 0x0, 0x6, 0x20, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000200), 0x4}, 0x1, 0x6, 0x1, 0x8, 0x8, 0x7fffffff, 0x5b3e, 0x0, 0x800, 0x0, 0xf883}, r2, 0xd, r3, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r1}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f00000002c0)=""/46, 0x1b, 0x2e, 0x0, 0xa030, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x7, 0x1ff, 0x1218, 0x7, 0x20141, r0, 0x2, '\x00', 0x0, r5, 0x5, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r6, &(0x7f0000001300), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='xprtrdma_dma_maperr\x00', r4}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 9.403281ms ago: executing program 3 (id=6701): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000b80)=ANY=[], &(0x7f0000000540)=""/246, 0x42, 0xf6, 0x1, 0x0, 0x0, @void, @value}, 0x28) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="00000000030000000000000000000000000020000000000200000000e896e499cf726e0a2b4927b330967c91933724e656b5a09de914a0dce6c74f6f89a663a6b2a80d8c4dec030645b99b8dd85000000000000000044e9051cdd59e0926d77fc41b25aadb97732de7e913142d87f822761e2c9a9456d3a7c53866e2d23ebcbb05f95613b4e5ae5f91b41bebe3cfd99c7bc87dfe25f013af102103b0ee40767aa6b62d90e046b5781769aed5492b4a6e113789"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xd, 0x0, 0x0, 0xd7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={0x0, r3}, 0x18) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="28010000000000000100", @ANYRESDEC=r2], 0x128}, 0x14) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x3, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000700)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1ff, 0x12) mkdirat$cgroup(r4, &(0x7f0000000080)='syz0\x00', 0x1ff) 6.09677ms ago: executing program 0 (id=6702): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa10000000000000701"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0500000004000000032000000c00000000000000", @ANYRES32, @ANYBLOB="feffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000000097b5da2799fe"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) close(0x3) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r3, &(0x7f0000000280), &(0x7f0000000000)=""/6, 0x2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffabad, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001d80)={0x6, 0x14, &(0x7f0000000600)=@raw=[@jmp={0x5, 0x0, 0x5, 0x6, 0x3, 0xfffffffffffffff0}, @generic={0xd, 0x1, 0x2, 0xf001}, @ldst={0x2, 0x2, 0x2, 0x6, 0x0, 0xffffffffffffffc0, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @cb_func={0x18, 0x1, 0x4, 0x0, 0x2}, @btf_id={0x18, 0xfd25140c1410da65, 0x3, 0x0, 0x2}, @alu={0x4, 0x0, 0x0, 0x3, 0x4, 0x80, 0xfffffffffffffffc}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @jmp={0x5, 0x1, 0x9, 0x5, 0x7, 0x2, 0x1}], &(0x7f0000000380)='GPL\x00', 0x800, 0x55, &(0x7f00000006c0)=""/85, 0x41100, 0x10, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000a40)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000001d00)={0x5, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001d40)=[r3, r2], 0x0, 0x10, 0x3, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x20}) socketpair(0x18, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000500)='\xa8\x96\x8d\xe8\x8a\xef\xc9\xcf\xc7\x14\xda[N\x8d\x02r\xbd]\x87\xe0\\\x1f\xfa)eV\xe7\xcc\xb1\x1b\xdb\x00N\x84\xd9@\xe9\xda\xca\t\xa8\x15T\xab\\\xc8\fj\xb1(A\xe8\x86\xb69\xce\xd3\xa2d\xa6\xff\xffG\xfc\x972nS\xc5h\x935SU\x87\xd1v\xc4\xdb0\x9b\xb4\x96\x1bM!\xd5\xa1t\xf3\xe9\x92*X\xe1\xbd\xa0\xce\"\xd7\x02\xbe\x7f\x00\x1a e\x84\xdf)\xfb/\xba\xd0`\xb7\xd6\xeb\xc7*\xba2\xf2\x9b\xfaF\xdf\xb2\xb9EE\xd5\x06Z\xb1\xfc\xe8\xf8@\xd4d\xb7\xe1\xbf08\xac\x05T\xda\xff\xd3\x0eaE\xef{lR4?\a\xe5\x91\xb57\t\x88K\xd3\xa4]\x89\xea\xbdu\xe2\xd3\f\xcd&\xd3\xce\v\xe8\t\x00\xd8\xfc\xa2I\xca%\x13\xb2\xc7Uq\xb6\xb3w\xcc5r\xc4\xb6\xb2\x13E\xdf\xbbo\xf9$\xbb\x8e\xab\xfaM\x00'/241) getpid() socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x10, 0x9, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x2}, 0xa100, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 0s ago: executing program 2 (id=6703): bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x24}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x9, 0x10001, 0xb, 0x81, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/98}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1b, 0x17, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4}, {{}, {}, {}, {0x85, 0x0, 0x0, 0x7d}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/89}, 0x20) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1008e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x0, 0x0, 0x0, 0xfffffefffff7bbfe, 0xffffffff, 0x0, 0x0, 0x5fd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.65' (ED25519) to the list of known hosts. [ 20.085275][ T24] audit: type=1400 audit(1732031306.919:66): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.086311][ T273] cgroup: Unknown subsys name 'net' [ 20.107739][ T24] audit: type=1400 audit(1732031306.919:67): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.134704][ T24] audit: type=1400 audit(1732031306.959:68): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.134880][ T273] cgroup: Unknown subsys name 'devices' [ 20.339371][ T273] cgroup: Unknown subsys name 'hugetlb' [ 20.344806][ T273] cgroup: Unknown subsys name 'rlimit' [ 20.536563][ T24] audit: type=1400 audit(1732031307.369:69): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=249 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.559825][ T24] audit: type=1400 audit(1732031307.369:70): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.584637][ T24] audit: type=1400 audit(1732031307.369:71): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.590098][ T276] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 20.616271][ T24] audit: type=1400 audit(1732031307.449:72): avc: denied { relabelto } for pid=276 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.641567][ T24] audit: type=1400 audit(1732031307.449:73): avc: denied { write } for pid=276 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.671462][ T24] audit: type=1400 audit(1732031307.509:74): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.696991][ T24] audit: type=1400 audit(1732031307.509:75): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.723017][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.469090][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.475936][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.483442][ T285] device bridge_slave_0 entered promiscuous mode [ 21.491600][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.498446][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.505628][ T283] device bridge_slave_0 entered promiscuous mode [ 21.513830][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.520876][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.528177][ T283] device bridge_slave_1 entered promiscuous mode [ 21.534634][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.541933][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.549125][ T285] device bridge_slave_1 entered promiscuous mode [ 21.571018][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.577929][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.585048][ T284] device bridge_slave_0 entered promiscuous mode [ 21.594149][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.601136][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.608368][ T284] device bridge_slave_1 entered promiscuous mode [ 21.680507][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.687348][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.694661][ T287] device bridge_slave_0 entered promiscuous mode [ 21.703420][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.710324][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.717377][ T287] device bridge_slave_1 entered promiscuous mode [ 21.747322][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.754204][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.761395][ T286] device bridge_slave_0 entered promiscuous mode [ 21.770043][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.776986][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.784824][ T286] device bridge_slave_1 entered promiscuous mode [ 21.834607][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.841562][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.848664][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.855426][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.874265][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.881121][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.888202][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.894985][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.929765][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.936606][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.943719][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.950587][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.966710][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.973579][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.980672][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.987436][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.009102][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.015940][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.023053][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.029846][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.049858][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.058430][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.065391][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.072843][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.079906][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.086864][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.094328][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.101623][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.108697][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.115811][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.123190][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.130574][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.139099][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.169206][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.177295][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.184917][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.192461][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.200638][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.207652][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.215201][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.222911][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.230976][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.238930][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.245741][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.253118][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.261157][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.268009][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.275092][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.283034][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.289869][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.303004][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.310937][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.317880][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.325117][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.334094][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.340941][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.359025][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.367196][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.375041][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.382269][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.390064][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.398083][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.404919][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.412116][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.420192][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.427010][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.434344][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.442292][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.449126][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.456309][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.464106][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.482057][ T283] device veth0_vlan entered promiscuous mode [ 22.496157][ T286] device veth0_vlan entered promiscuous mode [ 22.506142][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.514403][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.523157][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.531047][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.539088][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.546851][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.554504][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.562719][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.570638][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.578414][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.586190][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.594208][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.602164][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.610581][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.619058][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.626783][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.636121][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.643481][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.660846][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.669187][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.677292][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.685552][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.693911][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.702150][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.715246][ T285] device veth0_vlan entered promiscuous mode [ 22.723196][ T287] device veth0_vlan entered promiscuous mode [ 22.730071][ T284] device veth0_vlan entered promiscuous mode [ 22.736042][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.744394][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.752389][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.760615][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.768502][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.776127][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.784151][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.791733][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.799313][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.806735][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.814205][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.821622][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.830861][ T286] device veth1_macvtap entered promiscuous mode [ 22.837535][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.845606][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.853780][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.873298][ T283] device veth1_macvtap entered promiscuous mode [ 22.880410][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.889023][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.896877][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.904519][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.912789][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.921182][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.929236][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.937598][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.945572][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.955685][ T285] device veth1_macvtap entered promiscuous mode [ 22.963941][ T284] device veth1_macvtap entered promiscuous mode [ 22.971170][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.978753][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.986838][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.994913][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.004662][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.012739][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.023971][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.032296][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.046651][ T287] device veth1_macvtap entered promiscuous mode [ 23.063198][ T286] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 23.074133][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.082111][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.091059][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.099551][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.107623][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.116139][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.125824][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.134358][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.142831][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.151275][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.159747][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.168220][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.176260][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.199935][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.215455][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.441481][ C0] hrtimer: interrupt took 26955 ns [ 23.524602][ T327] device pim6reg1 entered promiscuous mode [ 23.960772][ T331] cgroup: syz.0.1 (331) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 24.020142][ T331] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 24.435639][ T360] ------------[ cut here ]------------ [ 24.447134][ T360] trace type BPF program uses run-time allocation [ 24.509662][ T360] WARNING: CPU: 1 PID: 360 at kernel/bpf/verifier.c:10493 check_map_prog_compatibility+0x65b/0x7c0 [ 24.559732][ T360] Modules linked in: [ 24.563532][ T360] CPU: 1 PID: 360 Comm: syz.4.12 Not tainted 5.10.226-syzkaller-00001-g6a01908517df #0 [ 24.573672][ T360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 24.585898][ T360] RIP: 0010:check_map_prog_compatibility+0x65b/0x7c0 [ 24.593561][ T360] Code: c8 e9 84 fe ff ff e8 34 f4 ee ff 31 db e9 85 fe ff ff e8 28 f4 ee ff c6 05 0e 1d 65 05 01 48 c7 c7 e0 76 45 85 e8 15 7a c2 ff <0f> 0b e9 42 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 17 fa ff [ 24.616634][ T360] RSP: 0018:ffffc90000de6f90 EFLAGS: 00010246 [ 24.686836][ T357] device wg2 entered promiscuous mode [ 24.707931][ T360] RAX: 76001e947aeedf00 RBX: ffff88810fa37800 RCX: 0000000000040000 [ 24.813941][ T360] RDX: ffffc90003969000 RSI: 00000000000007a0 RDI: 00000000000007a1 [ 24.839285][ T360] RBP: ffffc90000de6fd0 R08: ffffffff81522098 R09: ffffed103ee2a5f8 [ 24.853999][ T360] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 24.870437][ T360] R13: 1ffff92000025a04 R14: ffff88810f98c000 R15: ffffc9000012d020 [ 24.886161][ T360] FS: 00007fa2e4e136c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 24.903293][ T360] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 24.914485][ T360] CR2: 0000000020000000 CR3: 000000010fb3e000 CR4: 00000000003506a0 [ 24.930296][ T360] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 24.943198][ T360] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 24.951452][ T360] Call Trace: [ 24.955096][ T360] ? show_regs+0x58/0x60 [ 24.961381][ T360] ? __warn+0x160/0x2f0 [ 24.965681][ T360] ? check_map_prog_compatibility+0x65b/0x7c0 [ 24.972907][ T360] ? report_bug+0x3d9/0x5b0 [ 24.977386][ T360] ? check_map_prog_compatibility+0x65b/0x7c0 [ 24.983966][ T360] ? handle_bug+0x41/0x70 [ 24.989636][ T360] ? exc_invalid_op+0x1b/0x50 [ 24.994340][ T360] ? asm_exc_invalid_op+0x12/0x20 [ 25.000935][ T360] ? wake_up_klogd+0xb8/0xf0 [ 25.005532][ T360] ? check_map_prog_compatibility+0x65b/0x7c0 [ 25.011895][ T360] ? __fdget+0x1bc/0x240 [ 25.016310][ T360] resolve_pseudo_ldimm64+0x586/0x1020 [ 25.022475][ T360] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 25.028695][ T360] ? bpf_check+0xf2b0/0xf2b0 [ 25.033632][ T360] ? bpf_check+0x1bb5/0xf2b0 [ 25.039649][ T360] ? bpf_check+0x1da3/0xf2b0 [ 25.044399][ T360] bpf_check+0xaf21/0xf2b0 [ 25.049526][ T360] ? 0xffffffffa002eb30 [ 25.053772][ T360] ? bpf_get_btf_vmlinux+0x60/0x60 [ 25.059516][ T360] ? __kernel_text_address+0x9b/0x110 [ 25.064846][ T360] ? unwind_get_return_address+0x4d/0x90 [ 25.070843][ T360] ? arch_stack_walk+0xf3/0x140 [ 25.076211][ T360] ? stack_trace_save+0x113/0x1c0 [ 25.081679][ T360] ? stack_trace_snprint+0xf0/0xf0 [ 25.086758][ T360] ? selinux_bpf_prog_alloc+0x51/0x140 [ 25.098155][ T360] ? selinux_bpf_prog_alloc+0x51/0x140 [ 25.104876][ T360] ? ____kasan_kmalloc+0xed/0x110 [ 25.113846][ T360] ? ____kasan_kmalloc+0xdb/0x110 [ 25.122700][ T360] ? __kasan_kmalloc+0x9/0x10 [ 25.127781][ T360] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 25.134665][ T360] ? selinux_bpf_prog_alloc+0x51/0x140 [ 25.139057][ T341] device syzkaller0 entered promiscuous mode [ 25.141569][ T360] ? security_bpf_prog_alloc+0x62/0x90 [ 25.152796][ T360] ? __se_sys_bpf+0x9f8c/0x11cb0 [ 25.159074][ T360] ? __x64_sys_bpf+0x7b/0x90 [ 25.163923][ T360] ? do_syscall_64+0x34/0x70 [ 25.168972][ T360] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 25.175219][ T360] ? kvm_sched_clock_read+0x18/0x40 [ 25.181800][ T360] ? sched_clock+0x3a/0x40 [ 25.186274][ T360] ? sched_clock_cpu+0x1b/0x3b0 [ 25.192852][ T360] ? sched_clock+0x3a/0x40 [ 25.204638][ T360] ? __irq_exit_rcu+0x40/0x150 [ 25.209884][ T360] ? irq_exit_rcu+0x9/0x10 [ 25.214447][ T360] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 25.221570][ T360] __se_sys_bpf+0x107a2/0x11cb0 [ 25.227198][ T360] ? __kasan_check_write+0x14/0x20 [ 25.245772][ T360] ? __x64_sys_bpf+0x90/0x90 [ 25.250638][ T360] ? futex_wake+0x630/0x790 [ 25.256570][ T360] ? do_futex+0x13c5/0x17b0 [ 25.263305][ T360] ? timerqueue_add+0x24c/0x270 [ 25.268758][ T360] ? futex_exit_release+0x1e0/0x1e0 [ 25.273925][ T360] ? __hrtimer_run_queues+0x9ea/0xa50 [ 25.279439][ T360] ? ktime_get+0x10e/0x140 [ 25.283939][ T360] ? lapic_next_event+0x5f/0x70 [ 25.288856][ T360] ? clockevents_program_event+0x214/0x2c0 [ 25.294951][ T360] ? __se_sys_futex+0x355/0x470 [ 25.300915][ T360] ? hrtimer_interrupt+0x6a8/0x8b0 [ 25.306564][ T360] ? fpu__clear_all+0x20/0x20 [ 25.311324][ T360] ? __kasan_check_read+0x11/0x20 [ 25.316368][ T360] __x64_sys_bpf+0x7b/0x90 [ 25.321539][ T360] do_syscall_64+0x34/0x70 [ 25.325776][ T360] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 25.333898][ T360] RIP: 0033:0x7fa2e619a759 [ 25.338352][ T360] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 25.363062][ T360] RSP: 002b:00007fa2e4e13038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 25.371886][ T360] RAX: ffffffffffffffda RBX: 00007fa2e6351f80 RCX: 00007fa2e619a759 [ 25.379756][ T360] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 25.400857][ T360] RBP: 00007fa2e620d75e R08: 0000000000000000 R09: 0000000000000000 [ 25.409346][ T360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 25.417243][ T360] R13: 0000000000000000 R14: 00007fa2e6351f80 R15: 00007ffe83e17ad8 [ 25.425085][ T360] ---[ end trace dd0ce7025829fc66 ]--- [ 25.443027][ T24] kauditd_printk_skb: 35 callbacks suppressed [ 25.443036][ T24] audit: type=1400 audit(1732031312.279:111): avc: denied { read } for pid=378 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 25.523076][ T24] audit: type=1400 audit(1732031312.359:112): avc: denied { create } for pid=392 comm="syz.4.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 25.685482][ T24] audit: type=1400 audit(1732031312.519:113): avc: denied { read } for pid=402 comm="syz.1.24" name="ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.707975][ T24] audit: type=1400 audit(1732031312.519:114): avc: denied { open } for pid=402 comm="syz.1.24" path="/dev/ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.732385][ T24] audit: type=1400 audit(1732031312.519:115): avc: denied { ioctl } for pid=402 comm="syz.1.24" path="/dev/ppp" dev="devtmpfs" ino=149 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.740218][ T407] device syzkaller0 entered promiscuous mode [ 25.846612][ T24] audit: type=1400 audit(1732031312.679:116): avc: denied { create } for pid=424 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 25.879757][ T24] audit: type=1400 audit(1732031312.679:117): avc: denied { create } for pid=424 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 26.057149][ T24] audit: type=1400 audit(1732031312.889:118): avc: denied { create } for pid=443 comm="syz.0.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 26.087749][ T450] device pim6reg1 entered promiscuous mode [ 26.182623][ T24] audit: type=1400 audit(1732031313.019:119): avc: denied { relabelfrom } for pid=459 comm="syz.3.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 26.288027][ T24] audit: type=1400 audit(1732031313.049:120): avc: denied { relabelto } for pid=459 comm="syz.3.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 26.474194][ T460] device syzkaller0 entered promiscuous mode [ 26.610042][ T471] : renamed from ipvlan1 [ 26.928302][ T494] geneve1: tun_chr_ioctl cmd 1074025672 [ 26.933676][ T494] geneve1: ignored: set checksum enabled [ 28.997085][ T532] device pim6reg1 entered promiscuous mode [ 29.181066][ T558] device pim6reg1 entered promiscuous mode [ 30.455612][ T24] kauditd_printk_skb: 7 callbacks suppressed [ 30.455622][ T24] audit: type=1400 audit(1732031317.289:128): avc: denied { read } for pid=579 comm="syz.2.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.759303][ T24] audit: type=1400 audit(1732031318.599:129): avc: denied { create } for pid=603 comm="syz.0.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 33.450315][ T666] device syzkaller0 entered promiscuous mode [ 34.305494][ T683] device wg2 entered promiscuous mode [ 34.554344][ T706] device syzkaller0 entered promiscuous mode [ 34.555719][ T24] audit: type=1400 audit(1732031321.389:130): avc: denied { write } for pid=698 comm="syz.3.107" name="ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 35.855319][ C0] Illegal XDP return value 16128, expect packet loss! [ 36.459598][ T24] audit: type=1400 audit(1732031323.299:131): avc: denied { create } for pid=737 comm="syz.1.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 38.978069][ T787] device pim6reg1 entered promiscuous mode [ 40.069875][ T24] audit: type=1400 audit(1732031326.909:132): avc: denied { create } for pid=810 comm="syz.0.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 40.161397][ T24] audit: type=1400 audit(1732031326.999:133): avc: denied { tracepoint } for pid=812 comm="syz.1.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 40.272383][ T809] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.284243][ T809] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.361485][ T814] device bridge_slave_1 left promiscuous mode [ 40.373470][ T814] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.389669][ T814] device bridge_slave_0 left promiscuous mode [ 40.395712][ T814] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.526602][ T843] device pim6reg1 entered promiscuous mode [ 41.505555][ T924] device veth1_macvtap left promiscuous mode [ 41.809977][ T24] audit: type=1400 audit(1732031328.649:134): avc: denied { ioctl } for pid=923 comm="syz.4.172" path="socket:[16360]" dev="sockfs" ino=16360 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 41.846061][ T932] device veth1_macvtap entered promiscuous mode [ 41.852537][ T932] device macsec0 entered promiscuous mode [ 43.601796][ T1011] : renamed from vlan1 [ 44.092885][ T1033] device wg2 entered promiscuous mode [ 44.273344][ T24] audit: type=1400 audit(1732031331.109:135): avc: denied { create } for pid=1048 comm="syz.0.205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 44.692047][ T1076] device syzkaller0 entered promiscuous mode [ 44.856440][ T1094] device veth1_macvtap left promiscuous mode [ 45.000823][ T1097] device veth1_macvtap entered promiscuous mode [ 45.024570][ T1097] device macsec0 entered promiscuous mode [ 45.124546][ T1102] device veth1_macvtap left promiscuous mode [ 45.137536][ T1102] device macsec0 entered promiscuous mode [ 45.206256][ T1102] device veth1_macvtap entered promiscuous mode [ 45.416977][ T1116] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.771518][ T24] audit: type=1400 audit(1732031332.609:136): avc: denied { ioctl } for pid=1134 comm="syz.4.228" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 46.640269][ T24] audit: type=1400 audit(1732031333.469:137): avc: denied { create } for pid=1189 comm="syz.1.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 46.882061][ T24] audit: type=1400 audit(1732031333.669:138): avc: denied { create } for pid=1189 comm="syz.1.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 47.916644][ T1258] device veth0_vlan left promiscuous mode [ 48.012555][ T1258] device veth0_vlan entered promiscuous mode [ 48.233474][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.256554][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.300971][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.718218][ T1285] device syzkaller0 entered promiscuous mode [ 48.993102][ T1299] device sit0 entered promiscuous mode [ 49.116785][ T1314] device sit0 left promiscuous mode [ 49.129452][ T1317] cgroup: fork rejected by pids controller in /syz1 [ 49.154948][ T24] audit: type=1400 audit(1732031335.989:139): avc: denied { create } for pid=1312 comm="syz.0.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 49.298350][ T1316] device pim6reg1 entered promiscuous mode [ 49.487355][ T1397] device syzkaller0 entered promiscuous mode [ 49.629450][ T1397] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 50.324600][ T1456] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.380064][ T1456] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.417740][ T1456] device bridge_slave_0 entered promiscuous mode [ 50.513716][ T1457] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.588370][ T1462] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.595983][ T1462] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.654033][ T1456] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.668355][ T1456] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.675751][ T1456] device bridge_slave_1 entered promiscuous mode [ 50.901412][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 50.909303][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.924169][ T24] audit: type=1400 audit(1732031337.759:140): avc: denied { append } for pid=1466 comm="syz.0.293" name="ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 50.949767][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.978687][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.997963][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.004937][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.072581][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.136770][ T24] audit: type=1400 audit(1732031337.969:141): avc: denied { create } for pid=1476 comm="syz.3.296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 51.157163][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.189068][ T24] audit: type=1400 audit(1732031338.009:142): avc: denied { create } for pid=1476 comm="syz.3.296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 51.210927][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.218022][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.225775][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.233782][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.356241][ T1479] device pim6reg1 entered promiscuous mode [ 51.378735][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.390135][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 51.576679][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 51.606487][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 51.644905][ T1456] device veth0_vlan entered promiscuous mode [ 51.658782][ T1489] device veth0_vlan left promiscuous mode [ 51.721219][ T1489] device veth0_vlan entered promiscuous mode [ 51.857726][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 51.879343][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.948089][ T1505] tap0: tun_chr_ioctl cmd 1074025677 [ 51.953678][ T1505] tap0: linktype set to 1 [ 52.001383][ T1456] device veth1_macvtap entered promiscuous mode [ 52.048662][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 52.078367][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 52.169990][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 52.204506][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 52.234043][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 52.283822][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 52.343616][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 52.505894][ T1527] syz.0.309[1527] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.506005][ T1527] syz.0.309[1527] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.547045][ T24] audit: type=1400 audit(1732031339.379:143): avc: denied { mounton } for pid=1456 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=509 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 52.665505][ T49] device bridge_slave_1 left promiscuous mode [ 52.688301][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.708775][ T49] device bridge_slave_0 left promiscuous mode [ 52.714859][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.723143][ T49] device veth1_macvtap left promiscuous mode [ 52.729286][ T49] device veth0_vlan left promiscuous mode [ 53.904340][ T1564] syz.4.317[1564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.904392][ T1564] syz.4.317[1564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.176686][ T1575] device sit0 entered promiscuous mode [ 54.902977][ T1605] syz.2.328[1605] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.903012][ T1605] syz.2.328[1605] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.227001][ T1614] device syzkaller0 entered promiscuous mode [ 55.360202][ T586] syzkaller0: tun_net_xmit 48 [ 55.800348][ T1632] device pim6reg1 entered promiscuous mode [ 56.001876][ T1651] device pim6reg1 entered promiscuous mode [ 56.850848][ T1718] device wg2 entered promiscuous mode [ 57.181146][ T1732] device pim6reg1 entered promiscuous mode [ 57.429613][ T1742] : renamed from pim6reg1 [ 58.977010][ T1801] GPL: port 1(erspan0) entered blocking state [ 58.982999][ T1801] GPL: port 1(erspan0) entered disabled state [ 58.989303][ T1801] device erspan0 entered promiscuous mode [ 58.997491][ T1800] GPL: port 1(erspan0) entered blocking state [ 59.003656][ T1800] GPL: port 1(erspan0) entered forwarding state [ 59.075877][ T1803] device syzkaller0 entered promiscuous mode [ 59.278140][ T1814] device pim6reg1 entered promiscuous mode [ 59.673198][ T1834] device pim6reg1 entered promiscuous mode [ 60.258914][ T1843] device syzkaller0 entered promiscuous mode [ 60.733731][ T1882] device pim6reg1 entered promiscuous mode [ 60.743633][ T1884] syz.0.412[1884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.743703][ T1884] syz.0.412[1884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.773110][ T1884] syz.0.412[1884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.784819][ T1884] syz.0.412[1884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.519428][ T24] audit: type=1400 audit(1732031349.359:144): avc: denied { create } for pid=1948 comm="syz.1.428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 63.229778][ T1975] device pim6reg1 entered promiscuous mode [ 63.687698][ T1999] device veth1_macvtap left promiscuous mode [ 63.833622][ T2008] device veth1_macvtap entered promiscuous mode [ 63.910513][ T2008] device macsec0 entered promiscuous mode [ 64.582549][ T2020] device syzkaller0 entered promiscuous mode [ 65.017480][ T2039] device veth0_vlan left promiscuous mode [ 65.100323][ T2039] device veth0_vlan entered promiscuous mode [ 65.437009][ T2055] device syzkaller0 entered promiscuous mode [ 65.555500][ T2070] syz.2.458[2070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.010315][ T24] audit: type=1400 audit(1732031352.719:145): avc: denied { create } for pid=2071 comm="syz.2.459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 66.131976][ T2074] device veth1_macvtap left promiscuous mode [ 66.169145][ T24] audit: type=1400 audit(1732031352.959:146): avc: denied { create } for pid=2073 comm="syz.1.460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 66.200790][ T2074] device macsec0 entered promiscuous mode [ 67.565236][ T2126] bridge0: port 3(gretap0) entered blocking state [ 67.677642][ T2126] bridge0: port 3(gretap0) entered disabled state [ 67.731861][ T2126] device gretap0 entered promiscuous mode [ 67.738070][ T2126] bridge0: port 3(gretap0) entered blocking state [ 67.744681][ T2126] bridge0: port 3(gretap0) entered forwarding state [ 67.753530][ T2129] device veth1_macvtap left promiscuous mode [ 67.759722][ T2129] device macsec0 left promiscuous mode [ 68.018421][ T2137] device pim6reg1 entered promiscuous mode [ 68.159146][ T2139] device syzkaller0 entered promiscuous mode [ 68.681079][ T2148] device veth0_vlan left promiscuous mode [ 68.802180][ T2148] device veth0_vlan entered promiscuous mode [ 68.838808][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.847089][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 68.862722][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 69.736558][ T2189] device veth0_vlan left promiscuous mode [ 69.767467][ T2189] device veth0_vlan entered promiscuous mode [ 69.894251][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.905373][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 69.915395][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 70.628028][ T2211] device wg2 left promiscuous mode [ 70.774501][ T2211] device wg2 entered promiscuous mode [ 71.854829][ T2249] device bridge0 entered promiscuous mode [ 73.002367][ T2292] device wg2 left promiscuous mode [ 73.123386][ T2292] device wg2 entered promiscuous mode [ 73.428065][ T2299] device veth0_vlan left promiscuous mode [ 73.434470][ T2299] device veth0_vlan entered promiscuous mode [ 73.442167][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 73.509384][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 73.611732][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 74.004161][ T2316] syz.3.521 (2316) used obsolete PPPIOCDETACH ioctl [ 75.613028][ T2348] device pim6reg1 entered promiscuous mode [ 76.599512][ T2384] syz.0.540[2384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.599567][ T2384] syz.0.540[2384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.905159][ T2382] device veth0_vlan left promiscuous mode [ 76.965694][ T2382] device veth0_vlan entered promiscuous mode [ 77.350882][ T2397] syz.4.543[2397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.398406][ T2397] syz.4.543[2397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.453422][ T2401] device pim6reg1 entered promiscuous mode [ 80.341659][ T2483] : renamed from vlan1 [ 80.864007][ T2513] device syzkaller0 entered promiscuous mode [ 83.038997][ T2635] syz.2.603[2635] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.039051][ T2635] syz.2.603[2635] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.892731][ T2650] device veth1_macvtap left promiscuous mode [ 83.975506][ T2650] device macsec0 left promiscuous mode [ 84.125387][ T2647] device veth1_macvtap entered promiscuous mode [ 84.153530][ T2647] device macsec0 entered promiscuous mode [ 84.562751][ T2682] syz.1.618[2682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.562810][ T2682] syz.1.618[2682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.188546][ T2706] device macsec0 left promiscuous mode [ 85.335056][ T2706] device veth1_macvtap entered promiscuous mode [ 85.343516][ T2706] device macsec0 entered promiscuous mode [ 85.451479][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 85.922341][ T24] audit: type=1400 audit(1732031372.759:147): avc: denied { create } for pid=2733 comm="syz.2.635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 88.118375][ T2864] : renamed from pim6reg1 [ 89.774082][ T24] audit: type=1400 audit(1732031376.609:148): avc: denied { create } for pid=2896 comm="syz.4.681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 90.192190][ T2927] syz.4.689[2927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.192243][ T2927] syz.4.689[2927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.249644][ T2927] device wg2 left promiscuous mode [ 90.429077][ T2937] device wg2 entered promiscuous mode [ 95.067027][ T3119] device pim6reg1 entered promiscuous mode [ 95.673411][ T3145] device syzkaller0 entered promiscuous mode [ 96.088926][ T3170] device syzkaller0 entered promiscuous mode [ 96.274535][ T3218] device syzkaller0 entered promiscuous mode [ 96.482364][ T3232] device syzkaller0 entered promiscuous mode [ 96.496464][ T3221] device veth1_macvtap entered promiscuous mode [ 96.508714][ T3221] device macsec0 entered promiscuous mode [ 96.577445][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 96.947706][ T3267] device veth0_vlan left promiscuous mode [ 96.970221][ T3267] device veth0_vlan entered promiscuous mode [ 99.345284][ T3390] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 99.505107][ T3390] device syzkaller0 entered promiscuous mode [ 100.122420][ T3439] device syzkaller0 entered promiscuous mode [ 100.430548][ T3463] device wg2 left promiscuous mode [ 100.459175][ T3463] device wg2 entered promiscuous mode [ 101.121809][ T3535] syz.3.867[3535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.143755][ T24] audit: type=1400 audit(1732031387.979:149): avc: denied { create } for pid=3532 comm="syz.4.866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 102.934715][ T3598] device veth1_macvtap left promiscuous mode [ 102.983562][ T3598] device macsec0 left promiscuous mode [ 103.079708][ T3598] device veth1_macvtap entered promiscuous mode [ 103.243082][ T3598] device macsec0 entered promiscuous mode [ 103.275088][ T3603] device pim6reg1 entered promiscuous mode [ 103.288577][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 103.347765][ T3597] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 104.075096][ T3623] device syzkaller0 entered promiscuous mode [ 105.511701][ T3691] device pim6reg1 entered promiscuous mode [ 105.578513][ T24] audit: type=1400 audit(1732031392.419:150): avc: denied { remove_name } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 105.601175][ T24] audit: type=1400 audit(1732031392.419:151): avc: denied { rename } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 106.520138][ T24] audit: type=1400 audit(1732031393.359:152): avc: denied { create } for pid=3738 comm="syz.0.926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 106.580557][ T3740] device sit0 entered promiscuous mode [ 107.132675][ T3764] device veth0_vlan left promiscuous mode [ 107.138934][ T3764] device veth0_vlan entered promiscuous mode [ 107.149243][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 107.168382][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 107.208854][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 107.898843][ T3800] device syzkaller0 entered promiscuous mode [ 107.992709][ T3804] device syzkaller0 entered promiscuous mode [ 108.359346][ T3819] device syzkaller0 entered promiscuous mode [ 109.056576][ T3839] FAULT_INJECTION: forcing a failure. [ 109.056576][ T3839] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 109.097906][ T3839] CPU: 0 PID: 3839 Comm: syz.4.955 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 109.109106][ T3839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 109.118979][ T3839] Call Trace: [ 109.122123][ T3839] dump_stack_lvl+0x1e2/0x24b [ 109.126720][ T3839] ? bfq_pos_tree_add_move+0x43b/0x43b [ 109.132165][ T3839] ? finish_task_switch+0x1bb/0x5a0 [ 109.137259][ T3839] ? switch_mm_irqs_off+0x71b/0x9a0 [ 109.142259][ T3839] dump_stack+0x15/0x17 [ 109.146519][ T3839] should_fail+0x3c6/0x510 [ 109.150759][ T3839] should_fail_usercopy+0x1a/0x20 [ 109.155626][ T3839] _copy_from_user+0x20/0xd0 [ 109.160198][ T3839] ip_tunnel_ioctl+0xc0/0x210 [ 109.164906][ T3839] ? ip_tunnel_update+0xcc0/0xcc0 [ 109.169779][ T3839] ? __mutex_lock+0xa33/0xf20 [ 109.174286][ T3839] ipip6_tunnel_ioctl+0x203/0xf40 [ 109.179226][ T3839] ? do_vfs_ioctl+0x798/0x1a30 [ 109.183919][ T3839] ? sit_tunnel_xmit+0x24c0/0x24c0 [ 109.188952][ T3839] ? preempt_count_add+0x92/0x1a0 [ 109.193814][ T3839] ? full_name_hash+0xa0/0xf0 [ 109.198333][ T3839] dev_ifsioc+0x6a1/0xae0 [ 109.202493][ T3839] ? dev_ioctl+0xb40/0xb40 [ 109.206744][ T3839] ? dev_get_by_name_rcu+0xc5/0xf0 [ 109.211696][ T3839] dev_ioctl+0x5cc/0xb40 [ 109.215772][ T3839] sock_ioctl+0x685/0x760 [ 109.220026][ T3839] ? sock_poll+0x340/0x340 [ 109.224369][ T3839] ? security_file_ioctl+0x84/0xb0 [ 109.229312][ T3839] ? sock_poll+0x340/0x340 [ 109.233562][ T3839] __se_sys_ioctl+0x114/0x190 [ 109.238074][ T3839] __x64_sys_ioctl+0x7b/0x90 [ 109.242501][ T3839] do_syscall_64+0x34/0x70 [ 109.246755][ T3839] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 109.252486][ T3839] RIP: 0033:0x7fa2e619a759 [ 109.256841][ T3839] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 109.276706][ T3839] RSP: 002b:00007fa2e4e13038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 109.285136][ T3839] RAX: ffffffffffffffda RBX: 00007fa2e6351f80 RCX: 00007fa2e619a759 [ 109.293119][ T3839] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 000000000000000f [ 109.300915][ T3839] RBP: 00007fa2e4e13090 R08: 0000000000000000 R09: 0000000000000000 [ 109.308725][ T3839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 109.316538][ T3839] R13: 0000000000000000 R14: 00007fa2e6351f80 R15: 00007ffe83e17ad8 [ 109.338052][ T3847] device pim6reg1 entered promiscuous mode [ 109.633209][ T3855] device sit0 left promiscuous mode [ 109.831597][ T3855] device sit0 entered promiscuous mode [ 109.993987][ T3872] device syzkaller0 entered promiscuous mode [ 110.351449][ T3883] device veth0_vlan left promiscuous mode [ 110.369947][ T3883] device veth0_vlan entered promiscuous mode [ 110.391992][ T3886] FAULT_INJECTION: forcing a failure. [ 110.391992][ T3886] name failslab, interval 1, probability 0, space 0, times 1 [ 110.405029][ T3886] CPU: 1 PID: 3886 Comm: syz.1.969 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 110.416035][ T3886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 110.426208][ T3886] Call Trace: [ 110.429312][ T3886] dump_stack_lvl+0x1e2/0x24b [ 110.433817][ T3886] ? bfq_pos_tree_add_move+0x43b/0x43b [ 110.439333][ T3886] ? _raw_spin_lock+0xa4/0x1b0 [ 110.443926][ T3886] dump_stack+0x15/0x17 [ 110.448003][ T3886] should_fail+0x3c6/0x510 [ 110.452264][ T3886] ? kvmalloc_node+0x82/0x130 [ 110.456843][ T3886] __should_failslab+0xa4/0xe0 [ 110.461471][ T3886] should_failslab+0x9/0x20 [ 110.465894][ T3886] __kmalloc+0x60/0x330 [ 110.469875][ T3886] kvmalloc_node+0x82/0x130 [ 110.474221][ T3886] alloc_netdev_mqs+0x8e/0xcd0 [ 110.478899][ T3886] ? vti6_exit_batch_net+0x2a0/0x2a0 [ 110.484018][ T3886] ? ipip6_tunnel_locate+0x40d/0x610 [ 110.489143][ T3886] ipip6_tunnel_locate+0x469/0x610 [ 110.494113][ T3886] ? prl_list_destroy_rcu+0x60/0x60 [ 110.499128][ T3886] ? ns_capable+0x89/0xe0 [ 110.503283][ T3886] ipip6_tunnel_ctl+0xca6/0x15c0 [ 110.508148][ T3886] ip_tunnel_ioctl+0x144/0x210 [ 110.512921][ T3886] ? ip_tunnel_update+0xcc0/0xcc0 [ 110.517903][ T3886] ? __mutex_lock+0xa33/0xf20 [ 110.522420][ T3886] ipip6_tunnel_ioctl+0x203/0xf40 [ 110.527286][ T3886] ? do_vfs_ioctl+0x798/0x1a30 [ 110.531871][ T3886] ? sit_tunnel_xmit+0x24c0/0x24c0 [ 110.536838][ T3886] ? preempt_count_add+0x92/0x1a0 [ 110.541764][ T3886] ? full_name_hash+0xa0/0xf0 [ 110.546268][ T3886] dev_ifsioc+0x6a1/0xae0 [ 110.550429][ T3886] ? dev_ioctl+0xb40/0xb40 [ 110.554680][ T3886] ? dev_get_by_name_rcu+0xc5/0xf0 [ 110.559627][ T3886] dev_ioctl+0x5cc/0xb40 [ 110.563708][ T3886] sock_ioctl+0x685/0x760 [ 110.567876][ T3886] ? sock_poll+0x340/0x340 [ 110.572316][ T3886] ? security_file_ioctl+0x84/0xb0 [ 110.577244][ T3886] ? sock_poll+0x340/0x340 [ 110.581507][ T3886] __se_sys_ioctl+0x114/0x190 [ 110.586011][ T3886] __x64_sys_ioctl+0x7b/0x90 [ 110.590437][ T3886] do_syscall_64+0x34/0x70 [ 110.594692][ T3886] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 110.600431][ T3886] RIP: 0033:0x7fe53eae8759 [ 110.604684][ T3886] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 110.624293][ T3886] RSP: 002b:00007fe53d761038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 110.632540][ T3886] RAX: ffffffffffffffda RBX: 00007fe53ec9ff80 RCX: 00007fe53eae8759 [ 110.640388][ T3886] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 000000000000000f [ 110.648348][ T3886] RBP: 00007fe53d761090 R08: 0000000000000000 R09: 0000000000000000 [ 110.656234][ T3886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 110.664288][ T3886] R13: 0000000000000000 R14: 00007fe53ec9ff80 R15: 00007fff6c4794b8 [ 110.745137][ T24] audit: type=1400 audit(1732031397.579:153): avc: denied { create } for pid=3894 comm="syz.4.972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 110.852993][ T3898] syz.1.973[3898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.853037][ T3898] syz.1.973[3898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.489898][ T3923] bridge0: port 3(gretap0) entered disabled state [ 111.507351][ T3923] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.514351][ T3923] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.718572][ T3923] device bridge0 left promiscuous mode [ 111.831157][ T3923] device gretap0 left promiscuous mode [ 111.968436][ T3923] bridge0: port 3(gretap0) entered disabled state [ 112.035815][ T3923] device bridge_slave_1 left promiscuous mode [ 112.167994][ T3923] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.198143][ T3923] device bridge_slave_0 left promiscuous mode [ 112.204210][ T3923] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.316268][ T3937] FAULT_INJECTION: forcing a failure. [ 112.316268][ T3937] name failslab, interval 1, probability 0, space 0, times 0 [ 112.328907][ T3937] CPU: 0 PID: 3937 Comm: syz.3.984 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 112.339990][ T3937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 112.349977][ T3937] Call Trace: [ 112.353195][ T3937] dump_stack_lvl+0x1e2/0x24b [ 112.357722][ T3937] ? bfq_pos_tree_add_move+0x43b/0x43b [ 112.363271][ T3937] ? pcpu_memcg_post_alloc_hook+0x1c8/0x360 [ 112.368999][ T3937] dump_stack+0x15/0x17 [ 112.373163][ T3937] should_fail+0x3c6/0x510 [ 112.377519][ T3937] ? dev_addr_init+0xe0/0x3f0 [ 112.382021][ T3937] __should_failslab+0xa4/0xe0 [ 112.386621][ T3937] should_failslab+0x9/0x20 [ 112.390968][ T3937] kmem_cache_alloc_trace+0x3a/0x2e0 [ 112.396080][ T3937] dev_addr_init+0xe0/0x3f0 [ 112.400505][ T3937] alloc_netdev_mqs+0x129/0xcd0 [ 112.405277][ T3937] ? vti6_exit_batch_net+0x2a0/0x2a0 [ 112.410495][ T3937] ipip6_tunnel_locate+0x469/0x610 [ 112.415697][ T3937] ? prl_list_destroy_rcu+0x60/0x60 [ 112.420726][ T3937] ? ns_capable+0x89/0xe0 [ 112.424898][ T3937] ipip6_tunnel_ctl+0xca6/0x15c0 [ 112.429670][ T3937] ip_tunnel_ioctl+0x144/0x210 [ 112.434267][ T3937] ? ip_tunnel_update+0xcc0/0xcc0 [ 112.439129][ T3937] ? __fsnotify_parent+0x4b9/0x6c0 [ 112.444090][ T3937] ipip6_tunnel_ioctl+0x203/0xf40 [ 112.448932][ T3937] ? do_vfs_ioctl+0x798/0x1a30 [ 112.453532][ T3937] ? sit_tunnel_xmit+0x24c0/0x24c0 [ 112.458485][ T3937] ? preempt_count_add+0x92/0x1a0 [ 112.463343][ T3937] ? full_name_hash+0xa0/0xf0 [ 112.467856][ T3937] dev_ifsioc+0x6a1/0xae0 [ 112.472031][ T3937] ? dev_ioctl+0xb40/0xb40 [ 112.476275][ T3937] ? dev_get_by_name_rcu+0xc5/0xf0 [ 112.481222][ T3937] dev_ioctl+0x5cc/0xb40 [ 112.485292][ T3937] sock_ioctl+0x685/0x760 [ 112.489459][ T3937] ? sock_poll+0x340/0x340 [ 112.493824][ T3937] ? security_file_ioctl+0x84/0xb0 [ 112.498761][ T3937] ? sock_poll+0x340/0x340 [ 112.503024][ T3937] __se_sys_ioctl+0x114/0x190 [ 112.507534][ T3937] __x64_sys_ioctl+0x7b/0x90 [ 112.512395][ T3937] do_syscall_64+0x34/0x70 [ 112.516631][ T3937] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 112.522385][ T3937] RIP: 0033:0x7fe5cf823759 [ 112.526702][ T3937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 112.546927][ T3937] RSP: 002b:00007fe5ce49c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 112.555354][ T3937] RAX: ffffffffffffffda RBX: 00007fe5cf9daf80 RCX: 00007fe5cf823759 [ 112.563159][ T3937] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 000000000000000f [ 112.570971][ T3937] RBP: 00007fe5ce49c090 R08: 0000000000000000 R09: 0000000000000000 [ 112.578802][ T3937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 112.587031][ T3937] R13: 0000000000000000 R14: 00007fe5cf9daf80 R15: 00007ffddd4eb6c8 [ 112.709525][ T24] audit: type=1400 audit(1732031399.549:154): avc: denied { create } for pid=3954 comm="syz.0.990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 112.967020][ T3978] FAULT_INJECTION: forcing a failure. [ 112.967020][ T3978] name failslab, interval 1, probability 0, space 0, times 0 [ 113.037929][ T3978] CPU: 0 PID: 3978 Comm: syz.4.996 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 113.048935][ T3978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 113.058834][ T3978] Call Trace: [ 113.062071][ T3978] dump_stack_lvl+0x1e2/0x24b [ 113.066582][ T3978] ? bfq_pos_tree_add_move+0x43b/0x43b [ 113.071944][ T3978] dump_stack+0x15/0x17 [ 113.075950][ T3978] should_fail+0x3c6/0x510 [ 113.080191][ T3978] ? kvmalloc_node+0x82/0x130 [ 113.084707][ T3978] __should_failslab+0xa4/0xe0 [ 113.089388][ T3978] should_failslab+0x9/0x20 [ 113.093728][ T3978] __kmalloc+0x60/0x330 [ 113.097721][ T3978] kvmalloc_node+0x82/0x130 [ 113.102059][ T3978] alloc_netdev_mqs+0x63d/0xcd0 [ 113.106741][ T3978] ipip6_tunnel_locate+0x469/0x610 [ 113.111783][ T3978] ? prl_list_destroy_rcu+0x60/0x60 [ 113.117008][ T3978] ? ns_capable+0x89/0xe0 [ 113.121161][ T3978] ipip6_tunnel_ctl+0xca6/0x15c0 [ 113.125938][ T3978] ip_tunnel_ioctl+0x144/0x210 [ 113.130523][ T3978] ? ip_tunnel_update+0xcc0/0xcc0 [ 113.135397][ T3978] ? __fsnotify_parent+0x4b9/0x6c0 [ 113.140339][ T3978] ipip6_tunnel_ioctl+0x203/0xf40 [ 113.145367][ T3978] ? do_vfs_ioctl+0x798/0x1a30 [ 113.149962][ T3978] ? sit_tunnel_xmit+0x24c0/0x24c0 [ 113.154931][ T3978] ? preempt_count_add+0x92/0x1a0 [ 113.159776][ T3978] ? full_name_hash+0xa0/0xf0 [ 113.164285][ T3978] dev_ifsioc+0x6a1/0xae0 [ 113.168446][ T3978] ? dev_ioctl+0xb40/0xb40 [ 113.172700][ T3978] ? dev_get_by_name_rcu+0xc5/0xf0 [ 113.177655][ T3978] dev_ioctl+0x5cc/0xb40 [ 113.181729][ T3978] sock_ioctl+0x685/0x760 [ 113.185982][ T3978] ? sock_poll+0x340/0x340 [ 113.190234][ T3978] ? security_file_ioctl+0x84/0xb0 [ 113.195181][ T3978] ? sock_poll+0x340/0x340 [ 113.199436][ T3978] __se_sys_ioctl+0x114/0x190 [ 113.204118][ T3978] __x64_sys_ioctl+0x7b/0x90 [ 113.208542][ T3978] do_syscall_64+0x34/0x70 [ 113.212807][ T3978] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 113.218620][ T3978] RIP: 0033:0x7fa2e619a759 [ 113.222889][ T3978] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 113.242487][ T3978] RSP: 002b:00007fa2e4e13038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 113.250741][ T3978] RAX: ffffffffffffffda RBX: 00007fa2e6351f80 RCX: 00007fa2e619a759 [ 113.258541][ T3978] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 000000000000000f [ 113.266376][ T3978] RBP: 00007fa2e4e13090 R08: 0000000000000000 R09: 0000000000000000 [ 113.274171][ T3978] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 113.282079][ T3978] R13: 0000000000000000 R14: 00007fa2e6351f80 R15: 00007ffe83e17ad8 [ 113.320617][ T3982] device pim6reg1 entered promiscuous mode [ 113.598684][ T3997] device pim6reg1 entered promiscuous mode [ 113.711751][ T4013] FAULT_INJECTION: forcing a failure. [ 113.711751][ T4013] name failslab, interval 1, probability 0, space 0, times 0 [ 113.742200][ T4013] CPU: 0 PID: 4013 Comm: syz.1.1009 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 113.753312][ T4013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 113.763278][ T4013] Call Trace: [ 113.766413][ T4013] dump_stack_lvl+0x1e2/0x24b [ 113.770920][ T4013] ? bfq_pos_tree_add_move+0x43b/0x43b [ 113.776580][ T4013] dump_stack+0x15/0x17 [ 113.780565][ T4013] should_fail+0x3c6/0x510 [ 113.784818][ T4013] ? kvmalloc_node+0x82/0x130 [ 113.789416][ T4013] __should_failslab+0xa4/0xe0 [ 113.794020][ T4013] should_failslab+0x9/0x20 [ 113.798353][ T4013] __kmalloc+0x60/0x330 [ 113.802435][ T4013] kvmalloc_node+0x82/0x130 [ 113.806874][ T4013] alloc_netdev_mqs+0x868/0xcd0 [ 113.811557][ T4013] ipip6_tunnel_locate+0x469/0x610 [ 113.816503][ T4013] ? prl_list_destroy_rcu+0x60/0x60 [ 113.821524][ T4013] ? ns_capable+0x89/0xe0 [ 113.825689][ T4013] ipip6_tunnel_ctl+0xca6/0x15c0 [ 113.830465][ T4013] ip_tunnel_ioctl+0x144/0x210 [ 113.835064][ T4013] ? ip_tunnel_update+0xcc0/0xcc0 [ 113.839924][ T4013] ? __fsnotify_parent+0x4b9/0x6c0 [ 113.844871][ T4013] ipip6_tunnel_ioctl+0x203/0xf40 [ 113.849741][ T4013] ? do_vfs_ioctl+0x798/0x1a30 [ 113.854330][ T4013] ? sit_tunnel_xmit+0x24c0/0x24c0 [ 113.859286][ T4013] ? preempt_count_add+0x92/0x1a0 [ 113.864133][ T4013] ? full_name_hash+0xa0/0xf0 [ 113.868651][ T4013] dev_ifsioc+0x6a1/0xae0 [ 113.872823][ T4013] ? dev_ioctl+0xb40/0xb40 [ 113.877068][ T4013] ? dev_get_by_name_rcu+0xc5/0xf0 [ 113.882035][ T4013] dev_ioctl+0x5cc/0xb40 [ 113.886097][ T4013] sock_ioctl+0x685/0x760 [ 113.890260][ T4013] ? sock_poll+0x340/0x340 [ 113.894603][ T4013] ? security_file_ioctl+0x84/0xb0 [ 113.899572][ T4013] ? sock_poll+0x340/0x340 [ 113.903808][ T4013] __se_sys_ioctl+0x114/0x190 [ 113.908323][ T4013] __x64_sys_ioctl+0x7b/0x90 [ 113.912874][ T4013] do_syscall_64+0x34/0x70 [ 113.917096][ T4013] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 113.922865][ T4013] RIP: 0033:0x7fe53eae8759 [ 113.927071][ T4013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 113.946507][ T4013] RSP: 002b:00007fe53d761038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 113.954747][ T4013] RAX: ffffffffffffffda RBX: 00007fe53ec9ff80 RCX: 00007fe53eae8759 [ 113.962562][ T4013] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 000000000000000f [ 113.970374][ T4013] RBP: 00007fe53d761090 R08: 0000000000000000 R09: 0000000000000000 [ 113.978178][ T4013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 113.985989][ T4013] R13: 0000000000000000 R14: 00007fe53ec9ff80 R15: 00007fff6c4794b8 [ 114.683826][ T4047] device syzkaller0 entered promiscuous mode [ 114.869437][ T4064] FAULT_INJECTION: forcing a failure. [ 114.869437][ T4064] name failslab, interval 1, probability 0, space 0, times 0 [ 114.894196][ T4064] CPU: 1 PID: 4064 Comm: syz.1.1024 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 114.905292][ T4064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 114.915403][ T4064] Call Trace: [ 114.918527][ T4064] dump_stack_lvl+0x1e2/0x24b [ 114.923118][ T4064] ? bfq_pos_tree_add_move+0x43b/0x43b [ 114.928432][ T4064] ? ipip6_tunnel_locate+0x469/0x610 [ 114.933531][ T4064] ? dev_ifsioc+0x6a1/0xae0 [ 114.938316][ T4064] ? sock_ioctl+0x685/0x760 [ 114.942646][ T4064] ? __se_sys_ioctl+0x114/0x190 [ 114.947423][ T4064] ? __x64_sys_ioctl+0x7b/0x90 [ 114.952029][ T4064] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 114.957924][ T4064] dump_stack+0x15/0x17 [ 114.961912][ T4064] should_fail+0x3c6/0x510 [ 114.966166][ T4064] ? register_netdevice+0x218/0x13f0 [ 114.971299][ T4064] __should_failslab+0xa4/0xe0 [ 114.975887][ T4064] should_failslab+0x9/0x20 [ 114.980228][ T4064] kmem_cache_alloc_trace+0x3a/0x2e0 [ 114.985347][ T4064] ? dev_get_valid_name+0x2d6/0x310 [ 114.990383][ T4064] register_netdevice+0x218/0x13f0 [ 114.995445][ T4064] ? __kasan_kmalloc+0x9/0x10 [ 114.999929][ T4064] ? netif_stacked_transfer_operstate+0x240/0x240 [ 115.006193][ T4064] ? memset+0x35/0x40 [ 115.010011][ T4064] ipip6_tunnel_create+0x1f3/0x460 [ 115.014944][ T4064] ipip6_tunnel_locate+0x4b3/0x610 [ 115.019890][ T4064] ? prl_list_destroy_rcu+0x60/0x60 [ 115.024923][ T4064] ? ns_capable+0x89/0xe0 [ 115.029093][ T4064] ipip6_tunnel_ctl+0xca6/0x15c0 [ 115.033867][ T4064] ip_tunnel_ioctl+0x144/0x210 [ 115.038464][ T4064] ? ip_tunnel_update+0xcc0/0xcc0 [ 115.043330][ T4064] ? __fsnotify_parent+0x4b9/0x6c0 [ 115.048273][ T4064] ipip6_tunnel_ioctl+0x203/0xf40 [ 115.053132][ T4064] ? do_vfs_ioctl+0x798/0x1a30 [ 115.057737][ T4064] ? sit_tunnel_xmit+0x24c0/0x24c0 [ 115.062681][ T4064] ? preempt_count_add+0x92/0x1a0 [ 115.067538][ T4064] ? full_name_hash+0xa0/0xf0 [ 115.072053][ T4064] dev_ifsioc+0x6a1/0xae0 [ 115.076228][ T4064] ? dev_ioctl+0xb40/0xb40 [ 115.080470][ T4064] ? dev_get_by_name_rcu+0xc5/0xf0 [ 115.085417][ T4064] dev_ioctl+0x5cc/0xb40 [ 115.089499][ T4064] sock_ioctl+0x685/0x760 [ 115.093835][ T4064] ? sock_poll+0x340/0x340 [ 115.098092][ T4064] ? security_file_ioctl+0x84/0xb0 [ 115.103034][ T4064] ? sock_poll+0x340/0x340 [ 115.107288][ T4064] __se_sys_ioctl+0x114/0x190 [ 115.111801][ T4064] __x64_sys_ioctl+0x7b/0x90 [ 115.116230][ T4064] do_syscall_64+0x34/0x70 [ 115.120571][ T4064] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 115.126297][ T4064] RIP: 0033:0x7fe53eae8759 [ 115.130550][ T4064] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 115.150259][ T4064] RSP: 002b:00007fe53d761038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 115.158495][ T4064] RAX: ffffffffffffffda RBX: 00007fe53ec9ff80 RCX: 00007fe53eae8759 [ 115.166303][ T4064] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 000000000000000f [ 115.174117][ T4064] RBP: 00007fe53d761090 R08: 0000000000000000 R09: 0000000000000000 [ 115.182023][ T4064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.189974][ T4064] R13: 0000000000000000 R14: 00007fe53ec9ff80 R15: 00007fff6c4794b8 [ 115.514803][ T4075] device pim6reg1 entered promiscuous mode [ 116.377706][ T4117] device syzkaller0 entered promiscuous mode [ 116.769824][ T4139] device veth0_vlan left promiscuous mode [ 116.808228][ T4139] device veth0_vlan entered promiscuous mode [ 116.825069][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 116.853445][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 116.895886][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 117.058615][ T4162] device pim6reg1 entered promiscuous mode [ 117.465366][ T4241] device sit0 entered promiscuous mode [ 118.546981][ T4297] device sit0 entered promiscuous mode [ 120.654607][ T4361] device syzkaller0 entered promiscuous mode [ 120.860086][ T4386] device pim6reg1 entered promiscuous mode [ 120.909000][ T4387] device sit0 left promiscuous mode [ 120.945410][ T4389] device sit0 entered promiscuous mode [ 124.650630][ T4559] device sit0 entered promiscuous mode [ 124.820918][ T4579] device syzkaller0 left promiscuous mode [ 125.603111][ T4629] device syzkaller0 entered promiscuous mode [ 125.812783][ T4636] device sit0 left promiscuous mode [ 126.050435][ T4646] device pim6reg1 entered promiscuous mode [ 126.943486][ T4697] device pim6reg1 entered promiscuous mode [ 126.997111][ T4699] device pim6reg1 entered promiscuous mode [ 127.109718][ T4711] syz.0.1202[4711] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.109774][ T4711] syz.0.1202[4711] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.894352][ T4777] device sit0 left promiscuous mode [ 127.959786][ T4777] device sit0 entered promiscuous mode [ 128.692638][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 128.770247][ T4809] syz.2.1232[4809] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.770314][ T4809] syz.2.1232[4809] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.891112][ T4807] device syzkaller0 entered promiscuous mode [ 129.581195][ T4839] device wg2 left promiscuous mode [ 129.616097][ T4839] device wg2 entered promiscuous mode [ 129.803691][ T4846] device sit0 left promiscuous mode [ 130.446525][ T4873] device syzkaller0 entered promiscuous mode [ 131.184449][ T4882] device veth0_vlan left promiscuous mode [ 131.243321][ T4882] device veth0_vlan entered promiscuous mode [ 131.513106][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 131.541763][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 131.576953][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 131.599364][ T4903] syz.4.1260[4903] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.599425][ T4903] syz.4.1260[4903] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.623332][ T4896] device syzkaller0 entered promiscuous mode [ 131.829902][ T4911] device sit0 entered promiscuous mode [ 133.370965][ T5024] device syzkaller0 entered promiscuous mode [ 133.651075][ T5048] syz.3.1299[5048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.651122][ T5048] syz.3.1299[5048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.761158][ T5050] syz.0.1302[5050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.857143][ T5050] syz.0.1302[5050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.975143][ T5076] device syzkaller0 entered promiscuous mode [ 136.210804][ T5174] device syzkaller0 left promiscuous mode [ 137.932009][ T24] audit: type=1400 audit(1732031424.769:155): avc: denied { create } for pid=5257 comm="syz.1.1354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 138.309680][ T24] audit: type=1400 audit(1732031425.149:156): avc: denied { create } for pid=5272 comm="syz.2.1359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 138.332714][ T5276] device pim6reg1 entered promiscuous mode [ 138.518363][ T5271] device veth1_macvtap left promiscuous mode [ 138.548290][ T5271] device macsec0 left promiscuous mode [ 138.588516][ T24] audit: type=1400 audit(1732031425.359:157): avc: denied { append } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 138.902863][ T24] audit: type=1400 audit(1732031425.359:158): avc: denied { open } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 139.108999][ T24] audit: type=1400 audit(1732031425.359:159): avc: denied { getattr } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 141.171399][ T5401] veth1_macvtap: mtu greater than device maximum [ 141.524558][ T5433] device wg2 left promiscuous mode [ 141.881084][ T5447] device pim6reg1 entered promiscuous mode [ 142.044940][ T5461] device sit0 left promiscuous mode [ 142.325234][ T5464] device sit0 entered promiscuous mode [ 142.407370][ T5470] device sit0 left promiscuous mode [ 142.454333][ T5470] device sit0 entered promiscuous mode [ 143.176969][ T5493] device vxcan1 entered promiscuous mode [ 144.607498][ T5542] device pim6reg1 entered promiscuous mode [ 144.928680][ T5554] device pim6reg1 entered promiscuous mode [ 148.170680][ T5613] device sit0 left promiscuous mode [ 148.330077][ T5619] device sit0 entered promiscuous mode [ 149.178594][ T5649] device syzkaller0 entered promiscuous mode [ 149.692106][ T5685] device pim6reg1 entered promiscuous mode [ 149.702669][ T5673] device veth0_vlan left promiscuous mode [ 149.723433][ T5673] device veth0_vlan entered promiscuous mode [ 149.748430][ T5688] syz.4.1475[5688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.912293][ T5691] device pim6reg1 entered promiscuous mode [ 149.997269][ T5709] device syzkaller0 left promiscuous mode [ 150.248570][ T5728] device syzkaller0 entered promiscuous mode [ 150.579832][ T5759] device sit0 left promiscuous mode [ 151.287768][ T5792] device syzkaller0 entered promiscuous mode [ 151.749600][ T5805] device syzkaller0 left promiscuous mode [ 151.937482][ T5817] device pim6reg1 entered promiscuous mode [ 152.414064][ T5861] device veth0_vlan left promiscuous mode [ 152.462596][ T5861] device veth0_vlan entered promiscuous mode [ 152.572110][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 152.584623][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 152.603451][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 152.934725][ T5891] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.008014][ T5897] device pim6reg1 entered promiscuous mode [ 153.034467][ T5900] device veth1_macvtap left promiscuous mode [ 153.040888][ T5900] device macsec0 left promiscuous mode [ 153.053905][ T5900] device veth1_macvtap entered promiscuous mode [ 153.060134][ T5900] device macsec0 entered promiscuous mode [ 153.070034][ T5904] device pim6reg1 entered promiscuous mode [ 153.107688][ T5918] device wg2 left promiscuous mode [ 153.172808][ T5918] syz.3.1542[5918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.172942][ T5918] syz.3.1542[5918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.621258][ T5930] device syzkaller0 entered promiscuous mode [ 154.015946][ T5986] device syzkaller0 entered promiscuous mode [ 154.723570][ T6012] device pim6reg1 entered promiscuous mode [ 155.992078][ T6112] device veth0_vlan left promiscuous mode [ 156.041658][ T6112] device veth0_vlan entered promiscuous mode [ 156.107595][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.118587][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.126037][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 156.268994][ T6120] device pim6reg1 entered promiscuous mode [ 157.428703][ T6192] device syzkaller0 entered promiscuous mode [ 159.105694][ T6274] device sit0 entered promiscuous mode [ 159.735772][ T6298] device pim6reg1 entered promiscuous mode [ 160.118543][ T6318] device pim6reg1 entered promiscuous mode [ 160.453176][ T6330] cgroup: fork rejected by pids controller in /syz3 [ 160.525679][ T6346] device syzkaller0 entered promiscuous mode [ 160.794545][ T6365] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.811567][ T6365] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.819077][ T6365] device bridge_slave_0 entered promiscuous mode [ 160.828744][ T6365] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.837118][ T6365] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.879652][ T6365] device bridge_slave_1 entered promiscuous mode [ 160.936166][ T24] audit: type=1400 audit(1732031447.769:160): avc: denied { create } for pid=6365 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 160.957173][ T24] audit: type=1400 audit(1732031447.769:161): avc: denied { write } for pid=6365 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 160.978598][ T24] audit: type=1400 audit(1732031447.769:162): avc: denied { read } for pid=6365 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 161.001464][ T6365] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.008311][ T6365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.015910][ T6365] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.022750][ T6365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.135497][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.149333][ T534] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.172534][ T534] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.197905][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.206060][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.230016][ T534] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.236976][ T534] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.347973][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.356404][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.364775][ T534] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.371656][ T534] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.403854][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 161.412869][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.421105][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 161.429682][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.444011][ T6365] device veth0_vlan entered promiscuous mode [ 161.463826][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 161.483450][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 161.511442][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 161.529722][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 161.566002][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 161.578643][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 161.594796][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 161.604780][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 161.614845][ T6365] device veth1_macvtap entered promiscuous mode [ 161.736532][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 161.744611][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 161.753484][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 161.762043][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 161.770527][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 161.853522][ T6432] device veth0_vlan left promiscuous mode [ 161.891265][ T6432] device veth0_vlan entered promiscuous mode [ 162.021204][ T49] GPL: port 1(erspan0) entered disabled state [ 162.044296][ T49] device erspan0 left promiscuous mode [ 162.059956][ T49] GPL: port 1(erspan0) entered disabled state [ 162.544697][ T49] device bridge_slave_1 left promiscuous mode [ 162.638448][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.689616][ T49] device bridge_slave_0 left promiscuous mode [ 162.709246][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.881222][ T49] device veth1_macvtap left promiscuous mode [ 162.992493][ T49] device veth0_vlan left promiscuous mode [ 163.255236][ T24] audit: type=1400 audit(1732031450.089:163): avc: denied { create } for pid=6473 comm="syz.3.1694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 163.275685][ T24] audit: type=1400 audit(1732031450.099:164): avc: denied { create } for pid=6473 comm="syz.3.1694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 163.567307][ T24] audit: type=1400 audit(1732031450.399:165): avc: denied { create } for pid=6481 comm="syz.3.1696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 163.965878][ T6489] device syzkaller0 entered promiscuous mode [ 164.688868][ T6521] syz.4.1706[6521] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.688941][ T6521] syz.4.1706[6521] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.471786][ T6551] device syzkaller0 entered promiscuous mode [ 165.827523][ T6581] device syzkaller0 entered promiscuous mode [ 166.618048][ T6612] FAULT_INJECTION: forcing a failure. [ 166.618048][ T6612] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 166.734237][ T6612] CPU: 0 PID: 6612 Comm: syz.4.1731 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 166.745332][ T6612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 166.755231][ T6612] Call Trace: [ 166.758361][ T6612] dump_stack_lvl+0x1e2/0x24b [ 166.762861][ T6612] ? bfq_pos_tree_add_move+0x43b/0x43b [ 166.768155][ T6612] dump_stack+0x15/0x17 [ 166.772148][ T6612] should_fail+0x3c6/0x510 [ 166.776413][ T6612] should_fail_usercopy+0x1a/0x20 [ 166.781262][ T6612] _copy_to_user+0x20/0x90 [ 166.785514][ T6612] simple_read_from_buffer+0xc7/0x150 [ 166.790743][ T6612] proc_fail_nth_read+0x1a3/0x210 [ 166.795595][ T6612] ? proc_fault_inject_write+0x390/0x390 [ 166.801068][ T6612] ? security_file_permission+0x86/0xb0 [ 166.806438][ T6612] ? rw_verify_area+0x1c3/0x360 [ 166.811125][ T6612] ? full_name_hash+0xa0/0xf0 [ 166.815627][ T6612] ? proc_fault_inject_write+0x390/0x390 [ 166.821097][ T6612] vfs_read+0x200/0xba0 [ 166.825091][ T6612] ? netdev_refcnt_read+0x1e0/0x1e0 [ 166.830305][ T6612] ? kernel_read+0x70/0x70 [ 166.834554][ T6612] ? __kasan_check_write+0x14/0x20 [ 166.839500][ T6612] ? mutex_lock+0xa5/0x110 [ 166.843747][ T6612] ? mutex_trylock+0xa0/0xa0 [ 166.848267][ T6612] ? __fdget_pos+0x2e7/0x3a0 [ 166.852695][ T6612] ? ksys_read+0x77/0x2c0 [ 166.856854][ T6612] ksys_read+0x199/0x2c0 [ 166.860954][ T6612] ? vfs_write+0xe70/0xe70 [ 166.865189][ T6612] ? debug_smp_processor_id+0x17/0x20 [ 166.870396][ T6612] __x64_sys_read+0x7b/0x90 [ 166.874771][ T6612] do_syscall_64+0x34/0x70 [ 166.878991][ T6612] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 166.884713][ T6612] RIP: 0033:0x7fa2e619919c [ 166.888973][ T6612] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 166.908408][ T6612] RSP: 002b:00007fa2e4e13030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 166.916650][ T6612] RAX: ffffffffffffffda RBX: 00007fa2e6351f80 RCX: 00007fa2e619919c [ 166.924466][ T6612] RDX: 000000000000000f RSI: 00007fa2e4e130a0 RDI: 0000000000000005 [ 166.932274][ T6612] RBP: 00007fa2e4e13090 R08: 0000000000000000 R09: 0000000000000000 [ 166.940083][ T6612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 166.947895][ T6612] R13: 0000000000000000 R14: 00007fa2e6351f80 R15: 00007ffe83e17ad8 [ 167.331424][ T6630] device veth1_macvtap left promiscuous mode [ 167.479513][ T6639] device veth1_macvtap entered promiscuous mode [ 167.519581][ T6639] device macsec0 entered promiscuous mode [ 167.578751][ T6644] device pim6reg1 entered promiscuous mode [ 168.426742][ T6686] device pim6reg1 entered promiscuous mode [ 168.824324][ T6702] device veth0_vlan left promiscuous mode [ 168.911801][ T6702] device veth0_vlan entered promiscuous mode [ 169.035667][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 169.060091][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 169.102603][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 169.644870][ T6740] device veth1_macvtap left promiscuous mode [ 169.653344][ T6740] device macsec0 left promiscuous mode [ 171.130167][ T24] audit: type=1400 audit(1732031457.969:166): avc: denied { create } for pid=6823 comm="syz.0.1794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 173.249173][ T6964] device pim6reg1 entered promiscuous mode [ 173.316100][ T6955] device syzkaller0 entered promiscuous mode [ 174.005606][ T24] audit: type=1400 audit(1732031460.839:167): avc: denied { write } for pid=7020 comm="syz.4.1854" name="cgroup.subtree_control" dev="cgroup2" ino=291 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 174.056836][ T24] audit: type=1400 audit(1732031460.879:168): avc: denied { open } for pid=7020 comm="syz.4.1854" path="" dev="cgroup2" ino=291 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 174.357385][ T7040] device pim6reg1 entered promiscuous mode [ 175.689666][ T7108] syz.2.1879[7108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.689719][ T7108] syz.2.1879[7108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.180907][ T7142] device pim6reg1 entered promiscuous mode [ 177.393672][ T7146] device sit0 left promiscuous mode [ 180.303223][ T7192] device pim6reg1 entered promiscuous mode [ 180.712007][ T7209] device sit0 entered promiscuous mode [ 181.437360][ T7238] device syzkaller0 entered promiscuous mode [ 182.529349][ T7294] dvmrp1: tun_chr_ioctl cmd 1074025677 [ 182.567903][ T7294] dvmrp1: linktype set to 768 [ 184.612369][ T7361] device syzkaller0 entered promiscuous mode [ 185.237567][ T7376] device pim6reg1 entered promiscuous mode [ 185.774822][ T7416] device sit0 entered promiscuous mode [ 186.464558][ T7459] device syzkaller0 entered promiscuous mode [ 186.472742][ T4191] syzkaller0: tun_net_xmit 48 [ 186.480811][ T7459] syzkaller0: create flow: hash 3824439916 index 1 [ 186.768034][ T7458] syzkaller0: delete flow: hash 3824439916 index 1 [ 187.086434][ T7511] device syzkaller0 left promiscuous mode [ 187.356867][ T7541] device pim6reg1 entered promiscuous mode [ 187.521458][ T7566] device syzkaller0 entered promiscuous mode [ 187.701352][ T7584] device wg2 entered promiscuous mode [ 188.230301][ T7620] device pim6reg1 entered promiscuous mode [ 188.503133][ T7627] device pim6reg1 entered promiscuous mode [ 188.933274][ T7641] device veth1_macvtap left promiscuous mode [ 188.947689][ T7641] device macsec0 left promiscuous mode [ 189.847877][ T7691] syz.3.2042[7691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.847940][ T7691] syz.3.2042[7691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.271257][ T7702] device sit0 left promiscuous mode [ 190.393812][ T7711] device pim6reg1 entered promiscuous mode [ 190.625153][ T7739] device veth0_vlan left promiscuous mode [ 190.681510][ T7739] device veth0_vlan entered promiscuous mode [ 190.970620][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 190.999536][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.028402][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 193.057221][ T7877] device pim6reg1 entered promiscuous mode [ 193.631814][ T7901] device pim6reg1 entered promiscuous mode [ 193.704525][ T7907] device sit0 left promiscuous mode [ 193.791205][ T7907] device veth1 entered promiscuous mode [ 194.415856][ T7951] device veth0_vlan left promiscuous mode [ 194.431770][ T7951] device veth0_vlan entered promiscuous mode [ 194.453817][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 194.469563][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 194.513566][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 196.912250][ T8005] device veth0_vlan left promiscuous mode [ 196.918708][ T8005] device veth0_vlan entered promiscuous mode [ 196.925570][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 196.935187][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 196.963249][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 198.231682][ T8046] device syzkaller0 entered promiscuous mode [ 198.566241][ T8088] device syzkaller0 entered promiscuous mode [ 199.048245][ T8116] syz.1.2160[8116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.048298][ T8116] syz.1.2160[8116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.892971][ T24] audit: type=1400 audit(1732031487.729:169): avc: denied { write } for pid=8166 comm="syz.1.2173" name="net" dev="proc" ino=39380 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 201.287967][ T24] audit: type=1400 audit(1732031487.729:170): avc: denied { add_name } for pid=8166 comm="syz.1.2173" name="cgroup.freeze" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 201.595753][ T24] audit: type=1400 audit(1732031487.729:171): avc: denied { create } for pid=8166 comm="syz.1.2173" name="cgroup.freeze" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 201.616502][ T24] audit: type=1400 audit(1732031487.729:172): avc: denied { associate } for pid=8166 comm="syz.1.2173" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 205.713099][ T8340] syz.4.2210[8340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.713178][ T8340] syz.4.2210[8340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.184561][ T8421] device syzkaller0 left promiscuous mode [ 207.814955][ T8457] device sit0 left promiscuous mode [ 208.024950][ T8474] device sit0 left promiscuous mode [ 208.834729][ T8499] device syzkaller0 entered promiscuous mode [ 209.314384][ T8522] device pim6reg1 entered promiscuous mode [ 209.350333][ T8521] device syzkaller0 entered promiscuous mode [ 209.373355][ T24] audit: type=1400 audit(1732031496.209:173): avc: denied { create } for pid=8528 comm="syz.2.2267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 214.386686][ T8631] : renamed from ipvlan1 [ 214.558508][ T8635] device pim6reg1 entered promiscuous mode [ 218.900422][ T8748] syz.2.2325[8748] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.900478][ T8748] syz.2.2325[8748] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.948250][ T8747] device pim6reg1 entered promiscuous mode [ 219.052526][ T8746] device syzkaller0 entered promiscuous mode [ 219.623843][ T8785] device macsec0 entered promiscuous mode [ 223.200797][ T8935] device pim6reg1 entered promiscuous mode [ 223.664180][ T8951] device pim6reg1 entered promiscuous mode [ 223.942899][ T8961] device syzkaller0 entered promiscuous mode [ 224.244056][ T8986] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 224.258821][ T8986] device syzkaller0 entered promiscuous mode [ 224.708624][ T9010] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.715502][ T9010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.819496][ T9010] device bridge0 entered promiscuous mode [ 225.107923][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 226.691274][ T9084] device pim6reg1 entered promiscuous mode [ 226.703182][ T9090] tap0: tun_chr_ioctl cmd 1074812117 [ 226.797149][ T9086] device pim6reg1 entered promiscuous mode [ 227.152038][ T9117] device pim6reg1 entered promiscuous mode [ 229.028419][ T9190] device syzkaller0 entered promiscuous mode [ 230.551248][ T9230] device syzkaller0 entered promiscuous mode [ 231.751765][ T9293] device pim6reg1 entered promiscuous mode [ 231.830982][ T9296] device pim6reg1 entered promiscuous mode [ 231.953047][ T9305] device syzkaller0 left promiscuous mode [ 233.199265][ T9442] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.206102][ T9442] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.213506][ T9442] device bridge_slave_0 entered promiscuous mode [ 233.221082][ T9442] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.228123][ T9442] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.236307][ T9442] device bridge_slave_1 entered promiscuous mode [ 233.287604][ T9456] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.301342][ T9456] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.429365][ T9467] device bridge_slave_1 left promiscuous mode [ 233.445337][ T9467] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.453012][ T9467] device bridge_slave_0 left promiscuous mode [ 233.459060][ T9467] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.535512][ T9442] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.542571][ T9442] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.549819][ T9442] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.556655][ T9442] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.669922][ T534] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.683548][ T534] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.712411][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.808251][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.854537][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.910899][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.980549][ T534] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.987445][ T534] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.082056][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.134163][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.187923][ T534] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.194806][ T534] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.468841][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 234.477028][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.557894][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 234.565846][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.814452][ T9442] device veth0_vlan entered promiscuous mode [ 234.849552][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 234.863357][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 234.928463][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 234.948153][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 234.966559][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 234.974092][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 235.077965][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 235.101112][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 235.157265][ T9442] device veth1_macvtap entered promiscuous mode [ 235.259796][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 235.267589][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 235.276218][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 235.296440][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 235.330714][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 236.300759][ T49] device veth0_vlan left promiscuous mode [ 236.503926][ T9550] device veth0_vlan left promiscuous mode [ 236.556161][ T9550] device veth0_vlan entered promiscuous mode [ 238.021230][ T9622] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 238.057970][ T9622] pim6reg0: linktype set to 773 [ 240.511642][ T9747] : renamed from pim6reg1 [ 241.205359][ T9768] device pim6reg1 entered promiscuous mode [ 241.518974][ T9784] device pim6reg1 entered promiscuous mode [ 241.589733][ T9792] device veth1_macvtap left promiscuous mode [ 241.595550][ T9792] device macsec0 entered promiscuous mode [ 241.609808][ T9792] device veth1_macvtap entered promiscuous mode [ 242.536836][ T9851] device sit0 entered promiscuous mode [ 243.193302][ T24] audit: type=1400 audit(1732031530.029:174): avc: denied { create } for pid=9867 comm="syz.0.2613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 244.037430][ T24] audit: type=1400 audit(1732031530.869:175): avc: denied { attach_queue } for pid=9883 comm="syz.1.2619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 244.576450][ T9923] device sit0 entered promiscuous mode [ 245.745439][ T9958] device sit0 left promiscuous mode [ 245.997446][ T9983] device syzkaller0 entered promiscuous mode [ 246.134639][ T9986] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.158203][ T9986] device bridge0 left promiscuous mode [ 246.210650][ T9981] device bridge_slave_1 left promiscuous mode [ 246.217302][ T9981] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.226177][ T9981] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.251341][T10084] : renamed from ipvlan1 [ 247.813462][T10109] device veth0_vlan left promiscuous mode [ 247.832359][T10109] device veth0_vlan entered promiscuous mode [ 248.557488][T10157] syz.2.2696[10157] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.557545][T10157] syz.2.2696[10157] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.293251][T10167] device pim6reg1 entered promiscuous mode [ 250.180579][T10210] device syzkaller0 entered promiscuous mode [ 250.314477][T10224] syz.1.2714[10224] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.454447][ T95] udevd[95]: worker [1176] terminated by signal 33 (Unknown signal 33) [ 250.497608][ T95] udevd[95]: worker [1176] failed while handling '/devices/virtual/block/loop3' [ 252.604209][T10306] device sit0 entered promiscuous mode [ 252.819501][T10325] syz.3.2743[10325] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.819564][T10325] syz.3.2743[10325] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.862614][T10327] device wg2 left promiscuous mode [ 255.623911][T10432] device veth1_macvtap left promiscuous mode [ 255.661783][T10432] device macsec0 left promiscuous mode [ 255.838700][T10436] device veth1_macvtap entered promiscuous mode [ 255.859340][T10436] device macsec0 entered promiscuous mode [ 256.073644][T10465] device syzkaller0 entered promiscuous mode [ 257.623214][T10518] syz.4.2794[10518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.623267][T10518] syz.4.2794[10518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.815179][T10527] syz.3.2797[10527] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.925834][T10527] syz.3.2797[10527] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.580344][T10554] device veth1_macvtap left promiscuous mode [ 258.678060][T10554] device macsec0 left promiscuous mode [ 258.728338][T10568] device veth1_macvtap entered promiscuous mode [ 258.750228][T10568] device macsec0 entered promiscuous mode [ 258.755954][T10568] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 258.776238][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 258.815518][T10572] syz.3.2809[10572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.815750][T10572] syz.3.2809[10572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.881221][T10630] device syzkaller0 entered promiscuous mode [ 259.958072][T10649] syz.0.2830[10649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.958138][T10649] syz.0.2830[10649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.057529][T10656] syz.0.2833[10656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.069495][T10656] syz.0.2833[10656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.761685][T10685] device veth1_macvtap left promiscuous mode [ 260.789838][T10685] device macsec0 left promiscuous mode [ 261.081291][T10694] device pim6reg1 entered promiscuous mode [ 263.777000][T10752] device syzkaller0 entered promiscuous mode [ 264.204741][T10767] device pim6reg1 entered promiscuous mode [ 264.370499][T10773] device pim6reg1 entered promiscuous mode [ 264.614017][T10792] bpf_get_probe_write_proto: 4 callbacks suppressed [ 264.614028][T10792] syz.4.2869[10792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.715417][T10792] syz.4.2869[10792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.084497][T10784] device syzkaller0 entered promiscuous mode [ 268.594587][T10921] device pim6reg1 entered promiscuous mode [ 268.986556][T10939] device syzkaller0 left promiscuous mode [ 269.761829][T10951] device pim6reg1 entered promiscuous mode [ 270.538135][T10975] device veth0_vlan left promiscuous mode [ 270.543975][T10975] device veth0_vlan entered promiscuous mode [ 270.742424][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.802311][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 270.929470][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 271.016365][T10973] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.023382][T10973] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.408216][T11103] device syzkaller0 entered promiscuous mode [ 274.565636][T11112] device syzkaller0 entered promiscuous mode [ 274.722488][T11081] @: renamed from bond_slave_0 [ 274.751900][T11112] device sit0 entered promiscuous mode [ 274.891674][T11125] device veth0_vlan left promiscuous mode [ 274.969055][T11125] device veth0_vlan entered promiscuous mode [ 275.096095][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 275.133688][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 275.161899][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 275.187348][T11136] : renamed from vlan0 [ 276.310659][T11159] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.317514][T11159] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.383247][T11159] device bridge_slave_0 entered promiscuous mode [ 276.597374][T11159] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.609990][T11159] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.663078][T11159] device bridge_slave_1 entered promiscuous mode [ 277.896067][T11195] device syzkaller0 entered promiscuous mode [ 277.960078][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 277.968058][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 277.975982][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 277.983452][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 277.990813][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 277.999300][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 278.007239][ T534] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.014088][ T534] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.021946][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 278.030197][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 278.038244][ T534] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.045069][ T534] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.052841][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 278.086471][T11159] device veth0_vlan entered promiscuous mode [ 278.098760][T11159] device veth1_macvtap entered promiscuous mode [ 278.119816][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 278.128867][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 278.137116][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 278.147994][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 278.155918][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 278.166264][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 278.177035][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 278.185290][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 278.193780][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 278.203169][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 278.211796][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 278.304394][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 278.376250][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 278.533341][T11247] syz.1.2990[11247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.533391][T11247] syz.1.2990[11247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.744721][T11262] device wg2 entered promiscuous mode [ 280.185283][ T7] device veth0_vlan left promiscuous mode [ 284.482286][T11406] device pim6reg1 entered promiscuous mode [ 284.629052][T11405] device pim6reg1 entered promiscuous mode [ 285.690974][T11432] device pim6reg1 entered promiscuous mode [ 285.713465][T11426] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.720371][T11426] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.727606][T11426] device bridge_slave_0 entered promiscuous mode [ 285.774724][T11426] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.807908][T11426] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.815284][T11426] device bridge_slave_1 entered promiscuous mode [ 286.100185][T11448] device syzkaller0 entered promiscuous mode [ 286.300724][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 286.308105][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 286.368544][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 286.496062][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 286.607410][ T492] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.614298][ T492] bridge0: port 1(bridge_slave_0) entered forwarding state [ 286.679796][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 286.694793][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 286.703127][ T492] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.709981][ T492] bridge0: port 2(bridge_slave_1) entered forwarding state [ 286.717708][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 286.767038][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 286.775599][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 286.796937][T11475] : renamed from ipvlan1 [ 286.812219][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 286.825593][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 286.838181][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 286.850861][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 286.859990][T11426] device veth0_vlan entered promiscuous mode [ 286.874739][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 286.921327][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 286.983290][T11426] device veth1_macvtap entered promiscuous mode [ 287.009593][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 287.023988][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 287.034126][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 287.082274][ T7] device bridge_slave_1 left promiscuous mode [ 287.094627][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.102534][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.240614][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 287.248766][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 287.257062][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 287.265239][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 287.275535][T11487] 8: renamed from syzkaller0 [ 287.405088][T11511] device veth0_vlan left promiscuous mode [ 287.435869][T11511] device veth0_vlan entered promiscuous mode [ 287.522086][T11521] device erspan0 entered promiscuous mode [ 287.978758][T11555] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.992587][T11555] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.008152][T11555] device bridge_slave_0 entered promiscuous mode [ 288.031920][T11555] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.091787][T11555] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.165426][T11555] device bridge_slave_1 entered promiscuous mode [ 288.645065][T11606] device syzkaller0 entered promiscuous mode [ 288.675702][T11555] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.682626][T11555] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.689687][T11555] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.696574][T11555] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.758843][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 288.784046][ T492] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.899778][ T492] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.085352][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 289.123313][ T492] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.130194][ T492] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.138153][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 289.146334][ T492] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.153217][ T492] bridge0: port 2(bridge_slave_1) entered forwarding state [ 289.248155][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 289.318598][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 289.339532][T11623] device macsec0 left promiscuous mode [ 289.379325][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 289.403816][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 289.421575][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 289.429623][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 289.596400][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 289.606758][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 289.635886][T11630] device pim6reg1 entered promiscuous mode [ 289.658404][T11555] device veth0_vlan entered promiscuous mode [ 289.719357][T11555] device veth1_macvtap entered promiscuous mode [ 289.725937][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 289.738420][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 289.746742][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 289.917749][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 289.927201][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 289.935890][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 289.944876][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 290.003084][T11715] syz.0.3111[11715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.003122][T11715] syz.0.3111[11715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.850209][ T7] device veth1_macvtap left promiscuous mode [ 291.247201][T11785] device sit0 left promiscuous mode [ 291.405263][T11798] device syzkaller0 entered promiscuous mode [ 291.733463][T11816] device syzkaller0 entered promiscuous mode [ 291.937683][T11821] bridge0: port 3(veth1_macvtap) entered blocking state [ 292.008431][T11821] bridge0: port 3(veth1_macvtap) entered disabled state [ 293.724008][T11875] device pim6reg1 entered promiscuous mode [ 294.556802][T11912] syz.0.3166[11912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.556863][T11912] syz.0.3166[11912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.460128][T11953] device syzkaller0 entered promiscuous mode [ 295.505118][T11936] device pim6reg1 entered promiscuous mode [ 295.821579][T11977] syz.1.3184[11977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.821611][T11977] syz.1.3184[11977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.964296][T11998] device pim6reg1 entered promiscuous mode [ 296.804182][T12040] device pim6reg1 entered promiscuous mode [ 298.232251][T12113] device syzkaller0 entered promiscuous mode [ 299.528924][T12210] syz.3.3255[12210] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.528978][T12210] syz.3.3255[12210] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.109960][T12275] device pim6reg1 entered promiscuous mode [ 301.866700][T12322] device syzkaller0 entered promiscuous mode [ 304.078666][T12398] device pim6reg1 entered promiscuous mode [ 305.322774][T12471] : renamed from ipvlan1 [ 305.963859][T12500] device pim6reg1 entered promiscuous mode [ 306.981549][T12547] device syzkaller0 entered promiscuous mode [ 308.371624][T12640] device pim6reg1 entered promiscuous mode [ 308.555876][T12657] device syzkaller0 entered promiscuous mode [ 308.742987][T12677] device pim6reg1 entered promiscuous mode [ 309.869240][T12728] device pim6reg1 entered promiscuous mode [ 310.487301][T12769] device syzkaller0 entered promiscuous mode [ 310.610323][T12770] device pim6reg1 entered promiscuous mode [ 311.147773][T12774] device sit0 left promiscuous mode [ 311.268551][T12774] device sit0 entered promiscuous mode [ 312.410802][T12841] device sit0 entered promiscuous mode [ 313.396023][T12847] device syzkaller0 entered promiscuous mode [ 313.972517][T12872] device veth0_vlan left promiscuous mode [ 313.980278][T12872] device veth0_vlan entered promiscuous mode [ 313.993174][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 314.001599][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 314.009046][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 316.232902][T13005] device syzkaller0 entered promiscuous mode [ 316.316548][T13013] device veth0_vlan left promiscuous mode [ 316.326060][T13013] device veth0_vlan entered promiscuous mode [ 316.342987][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 316.351448][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 316.358961][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 316.456841][T13023] device syzkaller0 entered promiscuous mode [ 316.557575][T13034] device wg2 entered promiscuous mode [ 317.261752][T13067] device pim6reg1 entered promiscuous mode [ 318.561172][T13143] syz.1.3515[13143] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.561257][T13143] syz.1.3515[13143] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.564249][T13142] syz.1.3515[13142] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.618430][T13142] syz.1.3515[13142] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.650828][T13223] device pim6reg1 entered promiscuous mode [ 320.795899][T13223] device wg2 entered promiscuous mode [ 320.986454][T13243] device syzkaller0 entered promiscuous mode [ 322.733316][T13299] device syzkaller0 entered promiscuous mode [ 323.800620][T13318] device syzkaller0 entered promiscuous mode [ 324.858651][T13335] : renamed from vlan1 [ 325.542374][T13348] device pim6reg1 entered promiscuous mode [ 326.057583][T13378] geneve1: tun_chr_ioctl cmd 1074025672 [ 326.138873][T13378] geneve1: ignored: set checksum enabled [ 326.720028][T13413] syz.1.3586 uses obsolete (PF_INET,SOCK_PACKET) [ 326.813954][T13427] device syzkaller0 entered promiscuous mode [ 327.583264][T13443] device syzkaller0 entered promiscuous mode [ 327.764465][T13450] device syzkaller0 entered promiscuous mode [ 328.596589][T13510] device veth1_macvtap left promiscuous mode [ 329.020420][T13545] device veth0_vlan left promiscuous mode [ 329.086079][T13545] device veth0_vlan entered promiscuous mode [ 329.164597][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 329.206902][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 329.224091][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 330.440423][T13612] device veth1_macvtap left promiscuous mode [ 330.820094][T13616] device veth1_macvtap entered promiscuous mode [ 330.869346][T13616] device macsec0 entered promiscuous mode [ 331.888248][T13681] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.897866][T13681] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.144212][T13694] device syzkaller0 entered promiscuous mode [ 334.540049][T13804] device bridge0 entered promiscuous mode [ 336.267596][T13888] device syzkaller0 entered promiscuous mode [ 336.492800][T13899] rose0: tun_chr_ioctl cmd 1074025677 [ 336.499000][T13899] rose0: linktype set to 805 [ 336.506054][T13899] rose0: tun_chr_ioctl cmd 1074025672 [ 336.520285][T13899] rose0: ignored: set checksum disabled [ 336.790931][T13915] syz.0.3727[13915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.791006][T13915] syz.0.3727[13915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.802674][T13916] syz.0.3727[13916] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.128445][T13926] device veth1_macvtap entered promiscuous mode [ 337.166416][T13926] device macsec0 entered promiscuous mode [ 337.331989][T13936] device syzkaller0 entered promiscuous mode [ 337.340458][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 337.479181][T13950] device pim6reg1 entered promiscuous mode [ 338.950542][T13988] device veth1_macvtap left promiscuous mode [ 340.917087][T14053] syz.2.3763[14053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.917141][T14053] syz.2.3763[14053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.986213][T14045] device veth1_macvtap left promiscuous mode [ 341.113582][T14045] device macsec0 left promiscuous mode [ 341.255306][T14054] device veth1_macvtap entered promiscuous mode [ 341.388049][T14054] device macsec0 entered promiscuous mode [ 342.505200][T14104] syz.2.3776[14104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.505237][T14104] syz.2.3776[14104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.935417][T14120] device pim6reg1 entered promiscuous mode [ 344.065842][T14134] device veth0_vlan left promiscuous mode [ 344.170973][T14134] device veth0_vlan entered promiscuous mode [ 344.328712][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 344.378398][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 344.490806][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 345.331724][T14166] device veth0_vlan left promiscuous mode [ 345.462797][T14166] device veth0_vlan entered promiscuous mode [ 345.487413][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 345.506410][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 345.529515][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 348.414690][T14350] device veth1_macvtap left promiscuous mode [ 348.422225][T14350] device macsec0 left promiscuous mode [ 348.510819][T14360] device pim6reg1 entered promiscuous mode [ 348.630529][T14365] device syzkaller0 entered promiscuous mode [ 348.704666][T14367] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.713287][T14367] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.720866][T14367] device bridge_slave_0 entered promiscuous mode [ 348.728662][T14367] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.735499][T14367] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.768523][T14367] device bridge_slave_1 entered promiscuous mode [ 348.841809][T14367] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.848676][T14367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 348.855864][T14367] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.862647][T14367] bridge0: port 1(bridge_slave_0) entered forwarding state [ 348.936208][ T492] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.949981][ T492] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.972135][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 348.990672][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 349.078844][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 349.158142][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 349.238173][ T492] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.245280][ T492] bridge0: port 1(bridge_slave_0) entered forwarding state [ 349.276944][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 349.285411][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 349.293881][ T492] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.300813][ T492] bridge0: port 2(bridge_slave_1) entered forwarding state [ 349.308505][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 349.316425][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 349.324383][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 349.332296][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 349.400155][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 349.410984][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 349.422366][T14367] device veth0_vlan entered promiscuous mode [ 349.462115][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 349.502948][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 349.653726][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 349.718552][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 349.792209][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 349.848057][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 349.945324][T14367] device veth1_macvtap entered promiscuous mode [ 349.953868][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 349.992534][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 350.008280][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 350.020389][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 350.028706][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 350.762885][ T534] device bridge_slave_1 left promiscuous mode [ 350.788336][ T534] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.878443][ T534] device bridge_slave_0 left promiscuous mode [ 350.887704][ T534] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.901507][ T534] device veth1_macvtap left promiscuous mode [ 350.947682][ T534] device veth0_vlan left promiscuous mode [ 353.453131][T14579] syz.3.3878[14579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.453182][T14579] syz.3.3878[14579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.578525][T14579] syz.3.3878[14579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.622753][T14579] syz.3.3878[14579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.338954][T14607] device wg2 entered promiscuous mode [ 355.051824][T14641] syz.4.3894[14641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.051878][T14641] syz.4.3894[14641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.209688][T14643] device pim6reg1 entered promiscuous mode [ 355.571257][T14663] device pim6reg1 entered promiscuous mode [ 355.715092][T14678] device veth0_vlan left promiscuous mode [ 355.760371][T14678] device veth0_vlan entered promiscuous mode [ 358.743844][T14812] Q6\bY4: renamed from lo [ 360.388324][T14860] device syzkaller0 entered promiscuous mode [ 360.590179][T14881] device pim6reg1 entered promiscuous mode [ 360.991721][T14911] device syzkaller0 entered promiscuous mode [ 361.034380][T14909] device syzkaller0 entered promiscuous mode [ 361.797491][T14958] cgroup: fork rejected by pids controller in /syz0 [ 361.877608][T14965] device pim6reg1 entered promiscuous mode [ 361.923859][T14972] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.406757][T14989] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.413794][T14989] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.421158][T14989] device bridge_slave_0 entered promiscuous mode [ 362.506728][T14989] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.517888][T14989] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.525242][T14989] device bridge_slave_1 entered promiscuous mode [ 362.836996][T15010] device syzkaller0 entered promiscuous mode [ 362.852960][T15012] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 362.859186][T15012] pim6reg0: linktype set to 774 [ 362.873993][T15010] device pim6reg1 entered promiscuous mode [ 362.953012][T15019] device syzkaller0 entered promiscuous mode [ 363.024354][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 363.034315][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 363.063931][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 363.089076][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 363.099905][ T492] bridge0: port 1(bridge_slave_0) entered blocking state [ 363.106750][ T492] bridge0: port 1(bridge_slave_0) entered forwarding state [ 363.124746][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 363.133913][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 363.145819][ T492] bridge0: port 2(bridge_slave_1) entered blocking state [ 363.152702][ T492] bridge0: port 2(bridge_slave_1) entered forwarding state [ 363.199941][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 363.208159][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 363.216324][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 363.233109][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 363.255993][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 363.368749][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 363.377127][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 363.396462][T14989] device veth0_vlan entered promiscuous mode [ 363.465614][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 363.526936][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 363.615741][T14989] device veth1_macvtap entered promiscuous mode [ 363.629284][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 363.636905][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 363.644258][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 363.653353][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 363.661562][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 363.730089][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 363.742903][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 363.752724][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 363.762321][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 363.797191][ T49] device bridge_slave_1 left promiscuous mode [ 363.805379][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.813029][ T49] device bridge_slave_0 left promiscuous mode [ 363.819087][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.827272][ T49] device veth0_vlan left promiscuous mode [ 368.140556][T15222] device syzkaller0 entered promiscuous mode [ 368.174531][T15226] device pim6reg1 entered promiscuous mode [ 368.310829][T15238] device wg2 left promiscuous mode [ 368.438601][T15259] device pim6reg1 entered promiscuous mode [ 372.089168][T15385] device sit0 entered promiscuous mode [ 374.885290][T15476] syz.3.4115[15476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.885371][T15476] syz.3.4115[15476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.895261][T15503] device sit0 entered promiscuous mode [ 376.925441][T15538] syz.1.4133[15538] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.925493][T15538] syz.1.4133[15538] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 377.037413][T15542] device pim6reg1 entered promiscuous mode [ 377.057969][T15549] syz.1.4136[15549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 377.058026][T15549] syz.1.4136[15549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 378.206972][T15566] syz.0.4141[15566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 378.273429][T15589] device syzkaller0 entered promiscuous mode [ 378.372780][T15613] device pim6reg1 entered promiscuous mode [ 378.677618][T15634] device syzkaller0 entered promiscuous mode [ 379.447986][T15655] device syzkaller0 entered promiscuous mode [ 379.760822][T15662] device veth1_macvtap left promiscuous mode [ 380.340809][T15690] device syzkaller0 entered promiscuous mode [ 380.482722][T15702] GPL: port 1(erspan0) entered blocking state [ 380.488748][T15702] GPL: port 1(erspan0) entered disabled state [ 380.495173][T15702] device erspan0 entered promiscuous mode [ 381.081705][T15747] device veth1_macvtap left promiscuous mode [ 381.135248][T15747] device veth1_macvtap entered promiscuous mode [ 381.166157][T15747] device macsec0 entered promiscuous mode [ 381.193436][T15745] device bridge_slave_1 left promiscuous mode [ 381.202257][T15745] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.232936][T15745] device bridge_slave_0 left promiscuous mode [ 381.249300][T15745] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.605231][T15769] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.781027][T15778] pim6reg0: tun_chr_ioctl cmd 1074025698 [ 381.953434][T15802] device veth0_vlan left promiscuous mode [ 381.983400][T15802] device veth0_vlan entered promiscuous mode [ 382.009325][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 382.019662][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 382.033440][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 382.046966][T15793] device veth1_macvtap left promiscuous mode [ 382.055423][T15793] device macsec0 left promiscuous mode [ 382.179335][T15803] device veth1_macvtap entered promiscuous mode [ 382.244101][T15803] device macsec0 entered promiscuous mode [ 382.567450][T15819] device veth1_macvtap entered promiscuous mode [ 382.584730][T15819] device macsec0 entered promiscuous mode [ 382.676752][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 384.573250][T15884] device syzkaller0 entered promiscuous mode [ 385.612679][T15945] device pim6reg1 entered promiscuous mode [ 385.910704][T15965] device veth1_macvtap entered promiscuous mode [ 385.917474][T15965] device macsec0 entered promiscuous mode [ 386.022089][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 386.109919][T15978] tap0: tun_chr_ioctl cmd 2147767506 [ 386.205424][T15989] device pim6reg1 entered promiscuous mode [ 386.775242][T16029] device veth1_macvtap left promiscuous mode [ 386.783144][T16029] device macsec0 left promiscuous mode [ 386.914004][T16032] device veth1_macvtap entered promiscuous mode [ 386.922013][T16032] device macsec0 entered promiscuous mode [ 387.083386][T16040] device pim6reg1 entered promiscuous mode [ 388.020852][T16088] device veth0_vlan left promiscuous mode [ 388.028469][T16088] device veth0_vlan entered promiscuous mode [ 388.040827][T16100] device pim6reg1 entered promiscuous mode [ 388.212512][T16125] device syzkaller0 entered promiscuous mode [ 389.644882][T16119] device syzkaller0 entered promiscuous mode [ 392.753551][T16302] 8: renamed from syzkaller0 [ 392.828396][T16306] device veth0_vlan left promiscuous mode [ 392.913135][T16306] device veth0_vlan entered promiscuous mode [ 393.162217][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 393.199290][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 393.258282][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 393.269508][T16311] device veth0_vlan left promiscuous mode [ 393.301811][T16311] device veth0_vlan entered promiscuous mode [ 393.391398][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 393.427651][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 393.559745][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 393.659968][T16331] syz.0.4354[16331] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.660019][T16331] syz.0.4354[16331] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.706353][T16351] device veth0_vlan left promiscuous mode [ 394.863402][ T95] udevd[95]: worker [1199] terminated by signal 33 (Unknown signal 33) [ 394.941417][T16351] device veth0_vlan entered promiscuous mode [ 394.976636][ T95] udevd[95]: worker [1199] failed while handling '/devices/virtual/block/loop1' [ 395.218680][T16363] device sit0 left promiscuous mode [ 395.595485][T16378] device pim6reg1 entered promiscuous mode [ 395.700168][T16383] device veth1_macvtap left promiscuous mode [ 395.709378][T16383] device macsec0 left promiscuous mode [ 395.888342][T16392] device sit0 entered promiscuous mode [ 396.647894][T16405] device pim6reg1 entered promiscuous mode [ 396.712414][ T24] audit: type=1400 audit(1732031683.549:176): avc: denied { setattr } for pid=16419 comm="syz.0.4379" path="/dev/ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 398.152185][T16492] device pim6reg1 entered promiscuous mode [ 401.160762][T16580] device veth0_vlan left promiscuous mode [ 401.246897][T16580] device veth0_vlan entered promiscuous mode [ 401.602484][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 401.642960][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 401.841999][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 402.156007][ T24] audit: type=1400 audit(1732031688.989:177): avc: denied { create } for pid=16583 comm="syz.4.4425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 402.934009][ T24] audit: type=1400 audit(1732031689.769:178): avc: denied { create } for pid=16617 comm="syz.0.4434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 405.666545][T16724] tap0: tun_chr_ioctl cmd 1074025692 [ 407.524228][T16766] device syzkaller0 entered promiscuous mode [ 407.611421][T16810] device sit0 entered promiscuous mode [ 407.845183][T16874] device veth0_vlan left promiscuous mode [ 407.900099][T16874] device veth0_vlan entered promiscuous mode [ 408.182299][T16880] device vxcan1 entered promiscuous mode [ 408.392681][T16910] device syzkaller0 entered promiscuous mode [ 408.517399][T16916] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.539025][T16916] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.557286][T16916] device bridge_slave_0 entered promiscuous mode [ 408.602095][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 408.615239][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 408.643127][T16925] device pim6reg1 entered promiscuous mode [ 408.653958][T16916] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.667860][T16916] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.675142][T16916] device bridge_slave_1 entered promiscuous mode [ 409.440368][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 409.462438][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 409.606637][T16916] device veth0_vlan entered promiscuous mode [ 409.631346][T16916] device veth1_macvtap entered promiscuous mode [ 409.649449][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 409.663513][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 409.717294][T15762] bridge0: port 1(bridge_slave_0) entered blocking state [ 409.724186][T15762] bridge0: port 1(bridge_slave_0) entered forwarding state [ 409.758239][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 409.805413][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 409.884245][T15762] bridge0: port 2(bridge_slave_1) entered blocking state [ 409.891124][T15762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 409.984995][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 410.080966][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 410.167942][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 410.255392][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 410.337756][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 410.428363][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 410.469824][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 410.528283][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 410.539027][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 410.547121][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 410.555401][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 410.563150][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 410.580154][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 410.589849][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 410.597379][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 410.605637][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 410.628244][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 410.667034][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 410.963970][ T49] device veth1_macvtap left promiscuous mode [ 410.995542][ T49] device veth0_vlan left promiscuous mode [ 412.177760][T17067] device sit0 entered promiscuous mode [ 412.947003][T17092] syzkaller0: refused to change device tx_queue_len [ 414.614639][T17167] device pim6reg1 entered promiscuous mode [ 414.622175][T17168] device pim6reg1 entered promiscuous mode [ 414.657924][T17170] device syzkaller0 entered promiscuous mode [ 416.235345][T17251] device pim6reg1 entered promiscuous mode [ 416.376813][T17276] device pim6reg1 entered promiscuous mode [ 416.843521][T17286] device veth0_vlan left promiscuous mode [ 416.887021][T17286] device veth0_vlan entered promiscuous mode [ 417.097583][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 417.108477][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 417.158419][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 418.321156][T17361] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.206813][T17416] syz.4.4634[17416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.206872][T17416] syz.4.4634[17416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 422.042425][ T24] audit: type=1400 audit(1732031708.869:179): avc: denied { create } for pid=17485 comm="syz.2.4657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 422.112293][T17493] device syzkaller0 entered promiscuous mode [ 422.985086][T17536] device syzkaller0 entered promiscuous mode [ 423.074574][T17547] device veth0_vlan left promiscuous mode [ 423.085903][T17547] device veth0_vlan entered promiscuous mode [ 423.152539][T17549] device syzkaller0 entered promiscuous mode [ 423.171561][T17551] device syzkaller0 entered promiscuous mode [ 423.187920][T17557] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.195312][T17557] device bridge_slave_0 left promiscuous mode [ 423.202191][T17557] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.343330][T17571] device pim6reg1 entered promiscuous mode [ 423.491618][T17580] device veth0_vlan left promiscuous mode [ 423.528742][T17580] device veth0_vlan entered promiscuous mode [ 423.622694][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 423.633011][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 423.653141][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 423.711270][T17587] geneve1: tun_chr_ioctl cmd 1074025681 [ 434.272055][T17684] device veth1_macvtap entered promiscuous mode [ 434.307927][T17684] device macsec0 entered promiscuous mode [ 434.316626][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 434.350908][T17691] syz.2.4716[17691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.350975][T17691] syz.2.4716[17691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.435306][T17693] device veth0_vlan left promiscuous mode [ 434.535751][T17693] device veth0_vlan entered promiscuous mode [ 434.663436][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 434.672817][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 434.680141][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 434.959363][T17707] : renamed from vlan0 [ 435.839114][T17768] device pim6reg1 entered promiscuous mode [ 436.641572][T17812] device pim6reg1 entered promiscuous mode [ 437.695700][T17835] device syzkaller0 entered promiscuous mode [ 438.611172][T17855] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.618425][T17855] bridge0: port 1(bridge_slave_0) entered disabled state [ 438.801912][T17855] device bridge_slave_1 left promiscuous mode [ 438.818676][T17855] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.939834][T17855] device bridge_slave_0 left promiscuous mode [ 439.028054][T17855] bridge0: port 1(bridge_slave_0) entered disabled state [ 439.560755][T17886] device pim6reg1 entered promiscuous mode [ 440.409321][T17912] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.574606][T17909] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.581636][T17909] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.621625][T17909] device bridge0 entered promiscuous mode [ 440.686642][T17926] device veth1_macvtap left promiscuous mode [ 441.483031][T17924] device veth1_macvtap entered promiscuous mode [ 441.561147][T17926] device veth1_macvtap left promiscuous mode [ 441.832290][T17941] syz.2.4783[17941] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 441.832345][T17941] syz.2.4783[17941] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 443.277340][T17990] device sit0 left promiscuous mode [ 443.340089][T17990] device sit0 entered promiscuous mode [ 443.728244][T18017] device sit0 left promiscuous mode [ 443.878310][T18024] device sit0 entered promiscuous mode [ 443.930679][T18032] syz.4.4810[18032] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 443.930753][T18032] syz.4.4810[18032] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 443.970186][T18034] : renamed from ipvlan1 [ 444.089695][T18032] syz.4.4810[18032] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.089780][T18032] syz.4.4810[18032] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.736728][T18060] device wg2 entered promiscuous mode [ 444.941174][T18076] syz.3.4821[18076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.148454][T18085] syz.3.4825[18085] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.316879][T18088] device macsec0 left promiscuous mode [ 445.338226][T18085] syz.3.4825[18085] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.512922][T18087] device veth1_macvtap entered promiscuous mode [ 445.547190][T18087] device macsec0 entered promiscuous mode [ 445.650778][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 445.701990][ T24] audit: type=1400 audit(1732031732.539:180): avc: denied { create } for pid=18111 comm="syz.4.4832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 445.733159][T18112] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.740190][T18112] bridge0: port 1(bridge_slave_0) entered disabled state [ 445.788390][T18112] device bridge0 left promiscuous mode [ 445.813003][T18117] bridge0: port 2(bridge_slave_1) entered blocking state [ 445.819884][T18117] bridge0: port 2(bridge_slave_1) entered forwarding state [ 445.826966][T18117] bridge0: port 1(bridge_slave_0) entered blocking state [ 445.833759][T18117] bridge0: port 1(bridge_slave_0) entered forwarding state [ 445.978813][T18117] device bridge0 entered promiscuous mode [ 446.262073][T18131] device pim6reg1 entered promiscuous mode [ 446.643072][T18147] device sit0 left promiscuous mode [ 447.013242][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 448.445789][T18232] syz.1.4862[18232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 448.445868][T18232] syz.1.4862[18232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 448.556988][T18258] tap0: tun_chr_ioctl cmd 2147767506 [ 448.869312][T18266] device syzkaller0 entered promiscuous mode [ 449.551675][T18297] device wg2 entered promiscuous mode [ 449.597925][T18309] device sit0 left promiscuous mode [ 449.944598][T18332] device syzkaller0 entered promiscuous mode [ 451.361499][T18393] device syzkaller0 entered promiscuous mode [ 451.575658][T18410] tap0: tun_chr_ioctl cmd 1074025675 [ 451.636471][T18410] tap0: persist disabled [ 452.675761][T18436] : renamed from vlan1 [ 453.549113][T18471] device syzkaller0 entered promiscuous mode [ 453.627891][T18480] device veth0_vlan left promiscuous mode [ 453.785887][T18480] device veth0_vlan entered promiscuous mode [ 453.884152][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 453.900388][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 453.915622][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 454.912804][T18530] device syzkaller0 entered promiscuous mode [ 454.973661][T18524] Q6\bY4: renamed from lo [ 455.208243][T18549] device sit0 left promiscuous mode [ 455.294582][T18549] device sit0 entered promiscuous mode [ 455.654858][T18567] device pim6reg1 entered promiscuous mode [ 456.763813][T18639] device pim6reg1 entered promiscuous mode [ 456.819659][T18648] device pim6reg1 entered promiscuous mode [ 457.971273][T18730] device veth1_macvtap left promiscuous mode [ 458.008514][T18733] device pim6reg1 entered promiscuous mode [ 458.158493][T18731] device veth1_macvtap entered promiscuous mode [ 458.248276][T18731] device veth1_macvtap left promiscuous mode [ 458.473979][T18741] device veth0_vlan left promiscuous mode [ 458.514405][T18741] device veth0_vlan entered promiscuous mode [ 458.632952][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 458.651060][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 458.702720][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 467.139323][T18863] device syzkaller0 entered promiscuous mode [ 468.437690][T18929] tap0: tun_chr_ioctl cmd 1074025677 [ 468.442939][T18929] tap0: linktype set to 270 [ 469.158624][T18981] device syzkaller0 entered promiscuous mode [ 470.083873][T18998] device syzkaller0 entered promiscuous mode [ 472.364024][T19095] : renamed from ipvlan1 [ 473.805966][T19174] device veth0_vlan left promiscuous mode [ 473.844272][T19174] device veth0_vlan entered promiscuous mode [ 473.937544][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 473.949980][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 473.971504][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 474.101957][T19193] device pim6reg1 entered promiscuous mode [ 474.549012][T19210] device pim6reg1 entered promiscuous mode [ 475.870797][T19281] device syzkaller0 entered promiscuous mode [ 480.843131][T19397] device pim6reg1 entered promiscuous mode [ 480.989587][T19451] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 481.122645][T19451] device syzkaller0 entered promiscuous mode [ 481.600303][T19478] lo: mtu less than device minimum [ 483.837486][T19599] device veth0_vlan left promiscuous mode [ 483.963321][T19599] device veth0_vlan entered promiscuous mode [ 484.128407][T19595] device pim6reg1 entered promiscuous mode [ 485.470098][T19680] device sit0 left promiscuous mode [ 485.891097][T19689] device pim6reg1 entered promiscuous mode [ 485.908119][T19688] device sit0 entered promiscuous mode [ 486.248100][T19711] device veth0_vlan left promiscuous mode [ 486.305679][T19711] device veth0_vlan entered promiscuous mode [ 486.403774][T19710] device sit0 left promiscuous mode [ 486.418848][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 486.428285][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 486.445314][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 486.458716][T19712] device sit0 entered promiscuous mode [ 486.482655][T19727] syz.2.5287[19727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 486.482710][T19727] syz.2.5287[19727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 486.743034][T19726] device veth1_macvtap left promiscuous mode [ 486.762419][T19726] device macsec0 left promiscuous mode [ 486.861104][T19737] device syzkaller0 entered promiscuous mode [ 487.659998][T19794] syz.4.5308[19794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 487.660117][T19794] syz.4.5308[19794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.323100][T19818] syz.4.5314[19818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.334943][T19818] syz.4.5314[19818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 490.044817][T19859] device pim6reg1 entered promiscuous mode [ 490.850570][T19883] device veth0_vlan left promiscuous mode [ 490.856523][T19883] device veth0_vlan entered promiscuous mode [ 490.863707][T19894] device wg2 left promiscuous mode [ 490.908945][T19894] device wg2 entered promiscuous mode [ 491.012582][T19915] device macsec0 entered promiscuous mode [ 491.150762][T19915] device veth1_macvtap entered promiscuous mode [ 491.204129][T19922] device syzkaller0 entered promiscuous mode [ 491.210781][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 491.244447][T19925] device veth1_macvtap left promiscuous mode [ 493.875630][T20019] device sit0 left promiscuous mode [ 493.920490][T20019] device sit0 entered promiscuous mode [ 494.277511][ T24] audit: type=1400 audit(1732031781.109:181): avc: denied { create } for pid=20027 comm="syz.4.5371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 494.801816][T20046] device macsec0 left promiscuous mode [ 494.896050][T20050] device veth1_macvtap entered promiscuous mode [ 495.000976][T20050] device macsec0 entered promiscuous mode [ 495.134877][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 495.545306][T20067] device syzkaller0 entered promiscuous mode [ 496.695966][T20112] device pim6reg1 entered promiscuous mode [ 497.070667][T20121] device pim6reg1 entered promiscuous mode [ 497.238429][T20129] syz.1.5402[20129] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 497.238486][T20129] syz.1.5402[20129] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 497.424263][T20129] syz.1.5402[20129] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 497.479412][T20132] : renamed from ipvlan1 [ 497.520573][T20129] syz.1.5402[20129] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 498.687397][T20178] device pim6reg1 entered promiscuous mode [ 500.238175][T20236] tap0: tun_chr_ioctl cmd 1074025673 [ 500.498750][T20243] device pim6reg1 entered promiscuous mode [ 500.768254][T20261] device pim6reg1 entered promiscuous mode [ 500.839924][T20268] device syzkaller0 entered promiscuous mode [ 503.389091][T20324] device veth0_vlan left promiscuous mode [ 503.396195][T20324] device veth0_vlan entered promiscuous mode [ 503.405273][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 503.423600][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 503.501871][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 505.398327][T20402] device sit0 left promiscuous mode [ 505.552030][T20405] device sit0 entered promiscuous mode [ 506.195622][T20429] : renamed from pim6reg1 [ 506.220957][T20429] device pim6reg1 entered promiscuous mode [ 507.204680][T20449] device veth0_vlan left promiscuous mode [ 507.228569][T20449] device veth0_vlan entered promiscuous mode [ 507.262801][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 507.274509][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 507.283384][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 508.469674][ T24] audit: type=1400 audit(1732031795.309:182): avc: denied { create } for pid=20470 comm="syz.2.5502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 509.500426][T20503] device sit0 left promiscuous mode [ 509.889713][T20517] device syzkaller0 entered promiscuous mode [ 510.658464][T20561] device pim6reg1 entered promiscuous mode [ 510.780166][T20567] device veth1_macvtap left promiscuous mode [ 510.786003][T20567] device macsec0 left promiscuous mode [ 510.992471][T20571] device syzkaller0 entered promiscuous mode [ 510.999344][T20570] device veth1_macvtap entered promiscuous mode [ 511.005506][T20570] device macsec0 entered promiscuous mode [ 511.073515][T20584] device pim6reg1 entered promiscuous mode [ 511.193455][T20586] device syzkaller0 entered promiscuous mode [ 511.227428][T20592] bridge0: port 3(veth0) entered blocking state [ 511.238287][T20592] bridge0: port 3(veth0) entered disabled state [ 511.270949][T20592] device veth0 entered promiscuous mode [ 511.276709][T20592] bridge0: port 3(veth0) entered blocking state [ 511.282940][T20592] bridge0: port 3(veth0) entered forwarding state [ 511.362104][T20597] device syzkaller0 entered promiscuous mode [ 511.632878][T20605] device veth0_vlan left promiscuous mode [ 511.722863][T20605] device veth0_vlan entered promiscuous mode [ 512.230092][T20629] device syzkaller0 entered promiscuous mode [ 512.543909][T20655] device pim6reg1 entered promiscuous mode [ 512.743612][T20671] syzkaller0: tun_chr_ioctl cmd 2148553947 [ 512.749459][T20671] syzkaller0: tun_chr_ioctl cmd 35092 [ 513.725908][T20714] device veth1_macvtap left promiscuous mode [ 513.747932][T20714] device macsec0 left promiscuous mode [ 514.851663][T20773] bridge0: port 3(veth0) entered disabled state [ 514.857775][T20773] bridge0: port 1(bridge_slave_0) entered disabled state [ 515.008440][T20773] device bridge0 left promiscuous mode [ 515.084456][T20772] device syzkaller0 entered promiscuous mode [ 516.995584][T20877] device syzkaller0 entered promiscuous mode [ 517.133240][T20893] device pim6reg1 entered promiscuous mode [ 517.178129][T20884] bridge0: port 1(bridge_slave_0) entered blocking state [ 517.185020][T20884] bridge0: port 1(bridge_slave_0) entered disabled state [ 517.192350][T20884] device bridge_slave_0 entered promiscuous mode [ 517.208049][T20884] bridge0: port 2(bridge_slave_1) entered blocking state [ 517.214952][T20884] bridge0: port 2(bridge_slave_1) entered disabled state [ 517.223586][T20884] device bridge_slave_1 entered promiscuous mode [ 517.237940][ T24] audit: type=1400 audit(1732031804.069:183): avc: denied { create } for pid=20904 comm="syz.3.5624" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 517.496239][T20916] device syzkaller0 entered promiscuous mode [ 517.550412][T20925] device syzkaller0 entered promiscuous mode [ 517.634652][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 517.642693][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 517.650285][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 517.658892][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 517.703738][T15762] bridge0: port 1(bridge_slave_0) entered blocking state [ 517.710609][T15762] bridge0: port 1(bridge_slave_0) entered forwarding state [ 517.718008][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 517.726283][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 517.754864][T15762] bridge0: port 2(bridge_slave_1) entered blocking state [ 517.761737][T15762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 517.828415][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 517.837519][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 517.876872][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 517.902205][T20884] device veth0_vlan entered promiscuous mode [ 517.942761][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 517.958403][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 517.966458][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 517.984379][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 518.011419][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 518.030077][T20884] device veth1_macvtap entered promiscuous mode [ 518.047110][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 518.067368][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 519.001122][T20982] syz.0.5647[20982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 519.001163][T20982] syz.0.5647[20982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 521.179779][T21048] syz.1.5666[21048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 521.212693][T21048] syz.1.5666[21048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 522.750970][T21067] device syzkaller0 entered promiscuous mode [ 524.067527][T21105] device syzkaller0 entered promiscuous mode [ 524.463528][T21121] device sit0 entered promiscuous mode [ 525.295731][T21142] cgroup: fork rejected by pids controller in /syz5 [ 525.552459][T21220] device wg2 entered promiscuous mode [ 525.724561][T21249] device wg2 left promiscuous mode [ 527.303247][T21296] bridge0: port 1(bridge_slave_0) entered blocking state [ 527.476914][T21296] bridge0: port 1(bridge_slave_0) entered disabled state [ 527.587860][T21296] device bridge_slave_0 entered promiscuous mode [ 527.610175][T21296] bridge0: port 2(bridge_slave_1) entered blocking state [ 527.617054][T21296] bridge0: port 2(bridge_slave_1) entered disabled state [ 527.624370][T21296] device bridge_slave_1 entered promiscuous mode [ 527.760297][ T534] device bridge_slave_1 left promiscuous mode [ 527.766308][ T534] bridge0: port 2(bridge_slave_1) entered disabled state [ 527.773780][ T534] device bridge_slave_0 left promiscuous mode [ 527.780425][ T534] bridge0: port 1(bridge_slave_0) entered disabled state [ 527.817374][ T534] device veth1_macvtap left promiscuous mode [ 527.823356][ T534] device veth0_vlan left promiscuous mode [ 528.024268][T21296] bridge0: port 2(bridge_slave_1) entered blocking state [ 528.031133][T21296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 528.038234][T21296] bridge0: port 1(bridge_slave_0) entered blocking state [ 528.044994][T21296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 528.060415][T21342] device pim6reg1 entered promiscuous mode [ 528.084341][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 528.091795][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 528.099289][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 528.109010][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 528.131598][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 528.139804][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 528.146627][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 528.169593][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 528.178253][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 528.185083][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 528.266676][T21356] device syzkaller0 entered promiscuous mode [ 528.296982][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 528.328555][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 528.397637][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 528.441055][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 528.519376][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 528.535274][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 528.553526][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 528.562240][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 528.574243][T21296] device veth0_vlan entered promiscuous mode [ 528.589393][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 528.596790][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 528.652922][T21296] device veth1_macvtap entered promiscuous mode [ 528.660596][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 528.673697][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 528.681734][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 528.743301][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 528.753977][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 528.861228][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 528.869439][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 529.231766][T21404] device syzkaller0 entered promiscuous mode [ 529.728510][T21435] device syzkaller0 entered promiscuous mode [ 531.122206][T21494] device pim6reg1 entered promiscuous mode [ 531.946578][T21526] device pim6reg1 entered promiscuous mode [ 533.448535][T21603] : renamed from pim6reg1 [ 534.359619][T21640] device wg2 left promiscuous mode [ 534.488478][T21640] device wg2 entered promiscuous mode [ 535.550508][T21701] device syzkaller0 entered promiscuous mode [ 535.815828][ T95] udevd[95]: worker [20490] terminated by signal 33 (Unknown signal 33) [ 535.845050][ T95] udevd[95]: worker [20490] failed while handling '/devices/virtual/block/loop5' [ 535.885679][ T95] udevd[95]: worker [21719] terminated by signal 33 (Unknown signal 33) [ 535.924115][ T95] udevd[95]: worker [21719] failed while handling '/devices/virtual/block/loop0' [ 536.622594][T21760] device syzkaller0 entered promiscuous mode [ 537.038586][T21786] device syzkaller0 entered promiscuous mode [ 537.150413][T21795] syz.1.5848[21795] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 537.150469][T21795] syz.1.5848[21795] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 538.029935][T21815] device syzkaller0 entered promiscuous mode [ 538.637138][T21836] device pim6reg1 entered promiscuous mode [ 538.790188][T21854] device bridge0 entered promiscuous mode [ 539.244378][T21869] device syzkaller0 entered promiscuous mode [ 539.350580][T21876] bridge0: port 1(bridge_slave_0) entered blocking state [ 539.357469][T21876] bridge0: port 1(bridge_slave_0) entered disabled state [ 539.365134][T21876] device bridge_slave_0 entered promiscuous mode [ 539.372408][T21876] bridge0: port 2(bridge_slave_1) entered blocking state [ 539.379681][T21876] bridge0: port 2(bridge_slave_1) entered disabled state [ 539.386958][T21876] device bridge_slave_1 entered promiscuous mode [ 539.647120][T21876] bridge0: port 2(bridge_slave_1) entered blocking state [ 539.653992][T21876] bridge0: port 2(bridge_slave_1) entered forwarding state [ 539.661104][T21876] bridge0: port 1(bridge_slave_0) entered blocking state [ 539.667872][T21876] bridge0: port 1(bridge_slave_0) entered forwarding state [ 539.683758][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 539.707208][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 539.815608][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 539.833198][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 539.905233][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 539.941243][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 539.994313][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 540.001212][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 540.105613][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 540.114013][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 540.122000][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 540.128843][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 540.179094][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 540.190408][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 540.198140][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 540.206145][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 540.233526][T21928] device pim6reg1 entered promiscuous mode [ 540.362662][T21942] syz.0.5887[21942] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 540.362717][T21942] syz.0.5887[21942] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 540.382713][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 540.402894][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 540.411083][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 540.418754][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 540.426459][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 540.434376][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 540.451203][T21876] device veth0_vlan entered promiscuous mode [ 540.523032][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 540.568712][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 540.661474][T21876] device veth1_macvtap entered promiscuous mode [ 540.708619][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 540.770187][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 540.786724][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 540.883520][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 540.943161][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 541.450881][T22000] device veth0_vlan left promiscuous mode [ 541.511829][T22000] device veth0_vlan entered promiscuous mode [ 541.530516][T22021] syz.0.5907[22021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 541.530570][T22021] syz.0.5907[22021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 542.662024][T22058] bridge0: port 1(bridge_slave_0) entered blocking state [ 542.686311][T22058] bridge0: port 1(bridge_slave_0) entered disabled state [ 542.693789][T22058] device bridge_slave_0 entered promiscuous mode [ 542.725854][T22058] bridge0: port 2(bridge_slave_1) entered blocking state [ 542.734435][T22058] bridge0: port 2(bridge_slave_1) entered disabled state [ 542.742253][T22058] device bridge_slave_1 entered promiscuous mode [ 542.812406][T22071] device sit0 left promiscuous mode [ 542.853578][T22058] bridge0: port 2(bridge_slave_1) entered blocking state [ 542.860457][T22058] bridge0: port 2(bridge_slave_1) entered forwarding state [ 542.867535][T22058] bridge0: port 1(bridge_slave_0) entered blocking state [ 542.874328][T22058] bridge0: port 1(bridge_slave_0) entered forwarding state [ 542.898014][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 542.906130][ T534] bridge0: port 1(bridge_slave_0) entered disabled state [ 542.943141][ T534] bridge0: port 2(bridge_slave_1) entered disabled state [ 543.050001][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 543.128565][ T534] bridge0: port 1(bridge_slave_0) entered blocking state [ 543.135445][ T534] bridge0: port 1(bridge_slave_0) entered forwarding state [ 543.178228][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 543.203069][ T534] bridge0: port 2(bridge_slave_1) entered blocking state [ 543.209933][ T534] bridge0: port 2(bridge_slave_1) entered forwarding state [ 543.291704][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 543.380705][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 543.413185][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 543.470770][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 543.589421][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 543.619637][ T534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 543.730842][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 543.760040][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 543.908285][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 544.054544][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 544.236970][T22058] device veth0_vlan entered promiscuous mode [ 544.315878][T22058] device veth1_macvtap entered promiscuous mode [ 544.334995][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 544.358229][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 544.366233][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 544.376775][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 544.385410][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 544.404758][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 544.468238][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 545.668682][T22131] syz.2.5939[22131] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 545.668738][T22131] syz.2.5939[22131] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 546.196030][T15762] device bridge_slave_1 left promiscuous mode [ 546.217256][T15762] bridge0: port 2(bridge_slave_1) entered disabled state [ 546.320779][T15762] device bridge_slave_0 left promiscuous mode [ 546.326947][T15762] bridge0: port 1(bridge_slave_0) entered disabled state [ 546.335176][T15762] device veth1_macvtap left promiscuous mode [ 546.341072][T15762] device veth0_vlan left promiscuous mode [ 546.476674][T22142] device sit0 entered promiscuous mode [ 546.740338][T22154] device pim6reg1 entered promiscuous mode [ 547.055030][T22159] device syzkaller0 entered promiscuous mode [ 549.310813][T22260] device sit0 entered promiscuous mode [ 550.408028][T22283] device syzkaller0 entered promiscuous mode [ 550.528333][T22303] device bridge_slave_0 entered promiscuous mode [ 550.564599][T22307] syz.5.5989[22307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 550.564655][T22307] syz.5.5989[22307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 550.639476][T22309] device syzkaller0 entered promiscuous mode [ 551.413036][T22344] device syzkaller0 entered promiscuous mode [ 551.426570][T22346] device pim6reg1 entered promiscuous mode [ 551.732885][T22363] device wg2 left promiscuous mode [ 551.863645][T22364] device wg2 entered promiscuous mode [ 551.871334][T22362] device pim6reg1 entered promiscuous mode [ 552.660640][T22440] device pim6reg1 entered promiscuous mode [ 554.800800][T22553] device veth0_vlan left promiscuous mode [ 554.830163][T22553] device veth0_vlan entered promiscuous mode [ 554.917768][T22554] device veth0_vlan left promiscuous mode [ 554.976607][T22554] device veth0_vlan entered promiscuous mode [ 555.223109][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 555.263247][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 555.276437][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 556.402658][T22645] device syzkaller0 entered promiscuous mode [ 556.611268][T22667] : renamed from ipvlan1 [ 556.725269][T22678] device pim6reg1 entered promiscuous mode [ 556.820500][T22692] device syzkaller0 entered promiscuous mode [ 557.109495][ T24] audit: type=1400 audit(1732031843.949:184): avc: denied { rename } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 557.253350][ T24] audit: type=1400 audit(1732031843.949:185): avc: denied { unlink } for pid=77 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 557.284819][T22717] device veth0_vlan left promiscuous mode [ 557.339410][T22717] device veth0_vlan entered promiscuous mode [ 557.450732][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 557.478309][ T24] audit: type=1400 audit(1732031843.949:186): avc: denied { create } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 557.493102][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 557.645894][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 557.835516][T22725] syz.5.6105[22725] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 558.269431][T22760] device veth0_vlan left promiscuous mode [ 558.315682][T22760] device veth0_vlan entered promiscuous mode [ 558.454906][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 558.463264][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 558.471443][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 559.053222][T22784] syz.5.6123[22784] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 559.055638][T22784] syz.5.6123[22784] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 560.014046][T22809] syz.5.6129[22809] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 560.168594][T22809] syz.5.6129[22809] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 560.853913][T22822] device wg2 left promiscuous mode [ 562.272901][T22844] device pim6reg1 entered promiscuous mode [ 562.658331][T22868] device wg2 left promiscuous mode [ 562.666310][T22868] device wg2 entered promiscuous mode [ 563.830733][T22946] tap0: tun_chr_ioctl cmd 1074812117 [ 564.221048][T22983] device syzkaller0 entered promiscuous mode [ 564.392664][T23007] device syzkaller0 entered promiscuous mode [ 564.463155][T23020] device wg2 left promiscuous mode [ 564.470798][T23020] device wg2 entered promiscuous mode [ 564.476808][T23020] device wg2 left promiscuous mode [ 564.687696][T23038] : renamed from ipvlan1 [ 566.569350][T23125] device sit0 left promiscuous mode [ 566.787135][T23134] device syzkaller0 entered promiscuous mode [ 568.469446][T23185] device pim6reg1 entered promiscuous mode [ 569.895283][T23207] -: renamed from syzkaller0 [ 569.909595][T23207] device pim6reg1 entered promiscuous mode [ 572.543194][T23288] device pim6reg1 entered promiscuous mode [ 572.873482][T23312] device syzkaller0 entered promiscuous mode [ 573.014709][T23356] device pim6reg1 entered promiscuous mode [ 573.137599][T23364] device pim6reg1 entered promiscuous mode [ 573.200964][T23361] device sit0 left promiscuous mode [ 573.229207][T23361] device sit0 entered promiscuous mode [ 573.559724][T23421] syz.1.6301[23421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 573.559778][T23421] syz.1.6301[23421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 573.583942][T23426] device veth0_vlan left promiscuous mode [ 573.602162][T23426] device veth0_vlan entered promiscuous mode [ 573.617690][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 573.625899][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 573.638921][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 573.764306][T23429] device syzkaller0 entered promiscuous mode [ 573.805333][T23442] device pim6reg1 entered promiscuous mode [ 574.111326][T23467] syz.5.6313[23467] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 574.119356][T23467] syz.5.6313[23467] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 575.581801][T23493] device syzkaller0 entered promiscuous mode [ 576.212562][T23535] syz.2.6331[23535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 576.212615][T23535] syz.2.6331[23535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 576.798966][T23549] dvmrp1: tun_chr_ioctl cmd 1074025677 [ 576.979899][T23549] dvmrp1: linktype set to 768 [ 577.443202][T23581] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 578.503324][T23627] bridge0: port 2(bridge_slave_1) entered disabled state [ 578.510329][T23627] bridge0: port 1(bridge_slave_0) entered disabled state [ 578.749429][T23627] device bridge_slave_1 left promiscuous mode [ 578.755432][T23627] bridge0: port 2(bridge_slave_1) entered disabled state [ 578.777577][T23627] device bridge_slave_0 left promiscuous mode [ 578.791459][T23627] bridge0: port 1(bridge_slave_0) entered disabled state [ 579.060769][T23643] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 579.171068][T23656] device sit0 left promiscuous mode [ 579.234860][T23659] device sit0 entered promiscuous mode [ 579.239295][ T24] audit: type=1400 audit(1732031866.069:187): avc: denied { create } for pid=23657 comm="syz.0.6363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 580.383907][T23718] device pim6reg1 entered promiscuous mode [ 589.401105][T23741] device syzkaller0 entered promiscuous mode [ 589.566372][T23768] device veth0_vlan left promiscuous mode [ 589.602115][T23768] device veth0_vlan entered promiscuous mode [ 589.650155][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 589.658353][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 589.665664][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 589.688939][T23770] bridge0: port 2(bridge_slave_1) entered disabled state [ 589.702100][T23770] bridge0: port 1(bridge_slave_0) entered disabled state [ 589.867121][T23791] device pim6reg1 entered promiscuous mode [ 590.610517][T23808] device syzkaller0 entered promiscuous mode [ 590.675764][T23833] device pim6reg1 entered promiscuous mode [ 590.919209][T23847] device sit0 entered promiscuous mode [ 591.403597][T23863] device syzkaller0 entered promiscuous mode [ 592.662011][T23920] syz.3.6431[23920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 592.662068][T23920] syz.3.6431[23920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 592.794392][T23924] device syzkaller0 entered promiscuous mode [ 593.550510][T23955] device syzkaller0 entered promiscuous mode [ 594.400655][T23989] device veth0_vlan left promiscuous mode [ 594.407141][T23989] device veth0_vlan entered promiscuous mode [ 595.767923][T24030] syz.2.6459[24030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 595.767979][T24030] syz.2.6459[24030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 596.502521][T24057] device pim6reg1 entered promiscuous mode [ 596.811699][T24071] device veth0_vlan left promiscuous mode [ 596.820588][T24071] device veth0_vlan entered promiscuous mode [ 597.006234][T24094] device pim6reg1 entered promiscuous mode [ 597.194887][T24118] : renamed from pim6reg1 [ 598.024069][T24151] device veth1_macvtap left promiscuous mode [ 598.098222][T24151] device macsec0 entered promiscuous mode [ 598.432087][T24162] syz.2.6502[24162] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 598.432136][T24162] syz.2.6502[24162] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 598.458410][T24161] syz.2.6502[24161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 598.610813][T24164] device syzkaller0 entered promiscuous mode [ 598.699926][ T3396] syzkaller0: tun_net_xmit 48 [ 598.757411][T24177] device pim6reg1 entered promiscuous mode [ 599.103789][T24190] syz.2.6510[24190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 599.103840][T24190] syz.2.6510[24190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 599.673635][T24228] device syzkaller0 entered promiscuous mode [ 599.942740][T24239] : renamed from ipvlan1 [ 599.949030][T24241] : renamed from pim6reg1 [ 600.087727][T24244] device syzkaller0 entered promiscuous mode [ 600.386058][T24276] device pim6reg1 entered promiscuous mode [ 600.400045][T24271] bridge0: port 1(bridge_slave_0) entered blocking state [ 600.406912][T24271] bridge0: port 1(bridge_slave_0) entered disabled state [ 600.414146][T24271] device bridge_slave_0 entered promiscuous mode [ 600.431072][T24271] bridge0: port 2(bridge_slave_1) entered blocking state [ 600.440278][T24271] bridge0: port 2(bridge_slave_1) entered disabled state [ 600.447992][T24271] device bridge_slave_1 entered promiscuous mode [ 600.526662][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 600.535308][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 600.552966][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 600.565306][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 600.573752][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 600.580594][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 600.590446][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 600.605876][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 600.614438][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 600.622613][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 600.629471][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 600.658030][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 600.688220][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 600.715453][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 600.732504][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 600.740877][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 600.748205][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 600.758061][T15762] device erspan0 left promiscuous mode [ 600.767960][T15762] GPL: port 1(erspan0) entered disabled state [ 600.788967][T24271] device veth0_vlan entered promiscuous mode [ 600.802955][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 600.812753][T24271] device veth1_macvtap entered promiscuous mode [ 600.837286][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 600.854685][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 600.981008][T15762] device veth1_macvtap left promiscuous mode [ 600.990825][T15762] device veth0_vlan left promiscuous mode [ 601.755212][T24365] device wg2 entered promiscuous mode [ 602.336143][T24391] device veth0_vlan left promiscuous mode [ 602.396221][T24391] device veth0_vlan entered promiscuous mode [ 603.386050][T24419] device syzkaller0 entered promiscuous mode [ 603.415015][T24440] syz.0.6577[24440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 603.415518][T24440] syz.0.6577[24440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 604.414343][T24463] device syzkaller0 entered promiscuous mode [ 606.734145][T24579] device pim6reg1 entered promiscuous mode [ 607.270340][T24598] device syzkaller0 entered promiscuous mode [ 607.871572][T24600] device pim6reg1 entered promiscuous mode [ 608.126569][T24654] device syzkaller0 entered promiscuous mode [ 609.175983][T24703] device sit0 left promiscuous mode [ 609.187760][T24703] device sit0 entered promiscuous mode [ 610.305290][T24813] device sit0 entered promiscuous mode [ 610.378141][T24820] device veth0_vlan left promiscuous mode [ 610.383960][T24820] device veth0_vlan entered promiscuous mode [ 610.413066][T24808] device pim6reg1 entered promiscuous mode [ 610.455965][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 610.464372][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 610.569994][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 610.729209][T24833] geneve1: tun_chr_ioctl cmd 1074025681 [ 611.025272][T24825] device sit0 left promiscuous mode [ 611.496596][T24851] device syzkaller0 entered promiscuous mode [ 611.882497][T24898] device sit0 entered promiscuous mode