last executing test programs: 21.57323368s ago: executing program 1 (id=3798): close(0xffffffffffffffff) close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r4}, 0x8) ioctl$SIOCSIFHWADDR(r3, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) 20.461871144s ago: executing program 0 (id=3799): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="8f03000000000060007538e486dd630ace2200102f00fe80000000000000875a65059ff57b000000000000000000"], 0xcfa4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0xfffffff6) ioctl$SIOCSIFHWADDR(r2, 0x8924, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x9, 0x4, 0x4, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0x14, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{}, &(0x7f0000000800), 0x0}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) 20.460992344s ago: executing program 1 (id=3800): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, 0x0, &(0x7f00000002c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r6}, 0x8) ioctl$SIOCSIFHWADDR(r5, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x89}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x88) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 20.460094305s ago: executing program 2 (id=3801): openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7b3, 0x653}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x20000000000000c8, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d80)={&(0x7f0000000c80)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000060000000400000000000008000000000000000061"], 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x10, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756e6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070000000850000000f00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000540)={r1}, 0xc) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000001000)=@base={0x10, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402, 0x22b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffeffffffffffffb, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x6, 0x4, 0x599, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r2, 0x0, 0x1ba8847c99}, 0x38) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000004c0)={&(0x7f0000000180), 0x6e, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/179, 0x40000}], 0x1}, 0x12) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x301) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1}, 0x0) 20.080782046s ago: executing program 2 (id=3802): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x7ab046, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x0, 0x3, 0x4, 0x4a, 0xffffffffffffffff, 0xe2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4, 0x5, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000950000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r0, 0x0, 0x0) 18.812469814s ago: executing program 0 (id=3803): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1600000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000000500000085000000a000000095"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000780), &(0x7f0000000500)=""/65}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r4}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 18.811092134s ago: executing program 1 (id=3804): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="1b000000000000000000000000000000000000004ef9bdbbd93c727ac6fd0aa46f5b40348ea9dc8c46ac078f4628177edc342d51c19ab028f8b6fd1199022c882ae489281db0f25e3962aa92b6c655e4e806a75c8dc54d6424565f006fc013235e51e429bd3dc3235384d855ca5fc696700644791298e923683477be179da5e5a80912917756254ac40d27027fa9fabf7bf246d74e6e4bad4583f50f0493f91755ad9d9e9ef9874494d5cfdf762a06dd7fe0f1a4f3fca9a8a5133b92f35f65f23f982b11a0beaf146b857bfdeed9e6b058cb9e", @ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00'/25], 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000005f28ee20ee4aefc760785c8784570258d5e5f7971863e9d48c6ace98a9fa790d2deadc0f378c31d3ecf8481dac05c0dc02444d879bdd9ad94ccfd4fbbd80f882b3fcf4c58e8dc4cb9c841037597800fee3baa39292fd6073d76a6ce7776daeac0c5f94777fce3beea63c06501e508df2b88120a4471a6cf69a03e18a41283614a9237b416488e9707837fa"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) getpid() ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) 18.810194144s ago: executing program 2 (id=3805): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x1, 0x7, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) mkdir(&(0x7f0000000140)='./file0\x00', 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f0000000100), &(0x7f0000000000)=""/8, 0x2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x2, 0x4, 0x10008, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000380)=ANY=[@ANYRESHEX=r2, @ANYBLOB, @ANYRESOCT=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x5, 0x8, 0x40, 0x42, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r3}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001600)={r3, &(0x7f0000000580), &(0x7f0000001580)=""/92}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) 18.809314754s ago: executing program 4 (id=3806): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r0, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40010) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='rss_stat\x00', r4}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r5}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000001000000000000000000000063010c000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r7, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x4, 0x4, 0x4, 0xbf28, 0x0, 0xffffffffffffffff, 0x0, '\x00', r8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$TUNSETIFINDEX(r6, 0x400454da, &(0x7f0000000080)=r8) 18.6100784s ago: executing program 4 (id=3807): close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x7fff, 0x9, 0x4, 0x210, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3, 0x4, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/net\x00') syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r2}, 0x8) ioctl$SIOCSIFHWADDR(r1, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) 18.418117286s ago: executing program 0 (id=3808): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x16) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={r1, 0x58, &(0x7f0000000600)}, 0x10) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000b00)='ext4_ext_convert_to_initialized_enter\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_clone(0x10000000, &(0x7f0000000180)="5ca44104bacbd4ed9a63193f03d96fcefefd4c56923e051251f71eefebe02d822d2c0d9349613bfa55ccc1f6", 0x2c, &(0x7f00000001c0), &(0x7f0000000280), &(0x7f0000000300)="1f81eef4ee181e80fb2a2d9e44a2ea6c3bb91cc12e751c9611191b10c80c12a93708fa0f91eafae5c809118816a8710c24cd41ce5529bb42ae7cb04953f3b41bc1da72c434430e0e8b310ccad3ce8da4e43133be39d1073241d1") syz_open_procfs$namespace(r5, &(0x7f0000000380)='ns/user\x00') socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a1, &(0x7f0000000080)) 18.417558486s ago: executing program 1 (id=3810): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80350, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x7ff}}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0xb0}, [@ldst={0x5}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r0}, 0x10) r2 = syz_clone(0x164000, &(0x7f0000000000)="db2ae5d8e31d6d0ccbbc75c5b9569934b623832037d0998178adc1447b1ee7ea38e3309228b02ed934ca4475f63f944bf12d2c7cf05f071ab28ba7eb2f043cf189d0be3d79ace804e4402ca8b7973f54f97aaaf0ed7ffaa0f6969a5681931655d2f4c17bc8c7e8d47f8578e6df0e611a69976d56febc92c46eb8bf3c07be416dcf5e45282a42be2bb0088c39b33438af9b98e4f41d833f76cbdc39ae9d451d60b52825dbd201f6b8557358f556d5d9e22f15d35c3dc4cbf424154427d7b79fa521c2e390555e7a79fc81f3f0a85448cdb726a22e6e33c89295c8c9f67a734aea537128a2256fed8ccdaf4a47bfea61379480601f0fed40af21d37f46092c1dbc2a64fb30f1bbea5b4658c0c759c5ff9fe8b917c30a3fe0e161765e65a91f5e852a696bd30448f57538539ead15144691645cf963bfe8a1ce4582e915dfb78fcc12c0964e88bb64b73b3f24ef3a69f3fef75c2803ec1901d2f2ed2c9d51b7da51071f1a1bb40147f9ba3c4fcf52153cfc11ec073e79df768bf45d575cb996c026346cbd69978b3c3d059c9c2bb357b776e455fa65cf89a1697fc2d50a0dd8314a7e65656cf51b63f1a27e38f5d3ef9e9f5cf93898235df57a2d05c46d39858243d0dfec8bb6b73c4cd8de2ac93c53387e610ca6e51f6534b2648cad84552284c91e11560666289e0f4b1a22d12bf9bc031fbb06ef9db3845a9073846907f08fe3a8a04daeb0cbd536ee7a6a219b6baac1f60d367323e3b8bc65a5baadb08117f2c55c89b7f981b6023db2f3d492b43c349d4af4853fc679b65c48c5f13dc3bcae2782c3d20d9c16680c797e06b86063ccfabd2fd0bc9803bf78e0c6916478fdcf28dd350c205926cd8e68b3e5f3eaeb91758b3f52ec4d83c0a77c80cbed3aff74e0417f30eea8b9ab5639d34d9b4ee2b15360e9aec89ea5eec8ac88cb30ef494147a3927411b88e85a9ac6a8ca14c2d2bc5295653ecefbc59873dd4ba89e94470941d7500600c317400a5eca37b9aa0ecdb3d36eb48497bab05971b32877ec107dda735d127de90e4bbf0c660b98ed11f620205738aa69f69ec84c8c016485a712c4497d8f0936cdacde868db3fe0d3bff87bfc8b737bbff94c33a242d83a11cc84da9e8bd19d5cb43e58956202f84ece19678bf7ebc2134bcb07a96e47dc9f90a6c6ec1af42d534665a68f84dc9efb512f88a2d3bf4d4b383c8cc08733d51c8d30f5ed218ba7f4491739a81f566318e58940a03f4c013b8743edcd5c05517016fae05e449ae1c3bb13452a96df34cb63d0d9a53e189076fe2d3f4fb2052b1bf472eaaf71692d56e12ded9cc23423ee419d70a67f8d138a8073d549bb447c9e354ae0440a5533e97696d70c27cfc5e6555d9c5beee0d69726d25702a53a3bc0d45899a6cd7684868148a1c3ce893ff5a65dd70d045bc84710a690fad339ebd95085c86efa8fed9741e825799bafb5e8b66b64ddba35e50e99df9256a161c224a39ee507b242afc898d877fcdf9511b873d82bbfbef00550c140ebddea8486c26ce06f6df12089d15f66edd8d56804e0be4bacb589cd7987e3baea1096756b82a4f17c37529e95843ab2a6ad5bf3dd97139b66681005436359eed2e759a16d56dd4112f799c10204793a37c1601041860d60ee669e0a14971f03d936675a9ce3f3e594acb2da2ff88378ab46071269f715b1a2ba6b0a6deccfc2f47f003b32f2171ed37cc7d9b4e019e826bb3da52f0d13c089323058d8f390f316a2fa61cf3ac697dccc4a979982ed5fa5a59ef31ced143441476f6b1c734f2dd06df3bed3803c49ef4c1fbde94df1bd101d9c2066169e79db1b5aea4b471e7fbddf0285f4267dd4e0653ec6675a0e3fcb35d13c01aeffe1d4d04ffcbe5bcd30f4a9845d5719961a0dfde79c81ea0bb1064c977956a6246fe5e3f797bff3bde42eaeef1ec2750d03e285a51d395354cc22c54f77482a7a20ed08aacd5e8fd16d55e8869604aa1cee3af23aae62f8a2b28334e952ef3c7045cd09e25cd54ecf80e3a5093dafd12dd34c085bcb5d5afdc6935e120655ed127c88676c002667341039337add2ff7280a9ec34612feb604086b13d66453177c58be13c9c8143c2407b682c08f154507f41fcdcd111b9307d51dac822e2d320aa03d1ae5da0e98b02dae57abc90e1060fee3b3b19cc2fea03dca92a216ad141eadf06fd932486ac1c606cb6118bf9b617fbee6718ed3c2ddf68be4afc86b4a831930cf45155e8e2c664170700dfdd5079887a147d48340a36ff3c233c353fd766d271258afe392919cacda858352a72beddee073e52e01dbe25dca5da40678e171e19dbb8a2cd233e622c426119cecc86027a04a5a95f7684869347e974f788247adf8e340fe23398d906eb970145c1ddfb2be2a6c2d34b5bd58b80d0d1d6e1dda88d6d6d4524115e7d62ad37e88fade8fb3da060184601adbbd9526577443938f73afc88a7657a4d6efc4b444ba31598e4f58d4cbcd8e765cc81693021522a6f65abdd8e1a83b97e00c85061e1120189f4ceff514d391115b73b56a14c123c202b94fbe1e8891c095bccacdd409c432f22ab7488e136252e78244719126d35cebb1ee3e498163b6f39885467f0231e15fe57a66df974cedd10bdf648dfb120a48e0f60d6347d26e74dce68106448f4665ba46cf42fdd54fa1b949fbec99f120060939cabe2d4d8098c2604f51cb834dc1d61f6423e43a11fe1cf40128bf9ccd9d30779c09b563275cf1ed92d5b0e5928f459594642a09d540d927e7101639cb02c3aa56ea5feb18e46c48d6d0832a71ff5f2ef30f28a70d37ad26a21ca8031acc975da8659056ce6fc3442b2b019131cd81ae5d2b82180a280bd916a4812b76269832b4a91a9d0e5a02d15343d342f6f3feb589353ca6012b3f1e8c5b0b249ca007b8f01b7b08a14a8fed939a0ce92e61c6ff61bcd58d992ba9922e21eb851cf105f3805cca3769096a42d386d72dc77bb97e0059dd8838d4a01bb473b10dd11f7aca55747747799c29b6a9739d5c11edfc9293cf61e81038077efd2e1b623c37d5937918acbe9b566d1b61ba87fb70", 0x880, &(0x7f0000001000), 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x98, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001180)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"/3432], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x18000000000002a0, 0x10, 0x0, &(0x7f0000000080)="5aee41dea43e63a3f7fb7f1100000000", 0x0, 0xf004, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000e9ff00000400000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={0x0}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 18.195203605s ago: executing program 4 (id=3811): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000006c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000001c0)={0x1, &(0x7f0000000100)=[{0x6}]}) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55, 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 18.13898402s ago: executing program 0 (id=3812): close(0xffffffffffffffff) close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r4}, 0x8) ioctl$SIOCSIFHWADDR(r3, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) 16.798473533s ago: executing program 4 (id=3814): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000005c0), 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x20010, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) 16.798189033s ago: executing program 0 (id=3815): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x5670}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000000000000040000000400000000000000", @ANYRES32=r0, @ANYBLOB='\x00'/13, @ANYRES32=0x0, @ANYRESDEC=r1, @ANYBLOB="00000000000000000000000000000000000000020000000000000000", @ANYRESHEX=r1], 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={&(0x7f0000000780)="5d7e70487eef7d97c5c0d33aa5e4afa1718549dc21ad35f5669b8c3bbcb8d165ea609c24b55a9df18cd76ac07b38d6bea580fb2f3af321870b49b23de85a72904057e00426b7ab", 0x0, 0x0, &(0x7f0000000a40)="f521f0f1b98b354395cff5141e8f8768e94b5524b021a4fb9391f25dae2040567d763c72a0c9db1e952065cb2f22db5fc6c23c66aaa49bc7461a7705be7c241b620b313cd3a43c6737f423adf619b3", 0xaf, 0xffffffffffffffff, 0x4}, 0x38) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x3, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x3e, 0x0, 0x2, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800"/16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1f, 0x1, 0x2, &(0x7f0000000680)) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) 16.797910443s ago: executing program 1 (id=3816): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="8f03000000000060007538e486dd630ace2200102f00fe80000000000000875a65059ff57b000000000000000000"], 0xcfa4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0xfffffff6) ioctl$SIOCSIFHWADDR(r2, 0x8924, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x9, 0x4, 0x4, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0x14, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{}, &(0x7f0000000800), 0x0}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) 16.797697103s ago: executing program 2 (id=3817): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000009500001000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001600)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) close(0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) close(r3) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1202, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) write$cgroup_subtree(r3, &(0x7f00000000c0)=ANY=[], 0x2) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) 16.084428333s ago: executing program 2 (id=3818): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, 0x0, &(0x7f00000002c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r6}, 0x8) ioctl$SIOCSIFHWADDR(r5, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x89}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x88) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 15.952210134s ago: executing program 4 (id=3819): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x3, 0x3, &(0x7f0000000180)=@framed={{0x18, 0x2}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_type(r1, 0x0, 0x2, 0x0) write$cgroup_type(r2, &(0x7f0000000280), 0x9) r3 = openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r3, &(0x7f0000000c40)=r4, 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@bloom_filter={0x1e, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0xffffffffffffffff) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='memory.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, 0x0, 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000200)=0x1, 0x12) syz_clone(0x24001100, 0x0, 0x8, 0x0, 0x0, 0x0) 14.609832787s ago: executing program 2 (id=3820): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="1b000000000000000000000000000000000000004ef9bdbbd93c727ac6fd0aa46f5b40348ea9dc8c46ac078f4628177edc342d51c19ab028f8b6fd1199022c882ae489281db0f25e3962aa92b6c655e4e806a75c8dc54d6424565f006fc013235e51e429bd3dc3235384d855ca5fc696700644791298e923683477be179da5e5a80912917756254ac40d27027fa9fabf7bf246d74e6e4bad4583f50f0493f91755ad9d9e9ef9874494d5cfdf762a06dd7fe0f1a4f3fca9a8a5133b92f35f65f23f982b11a0beaf146b857bfdeed9e6b058cb9e", @ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00'/25], 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000005f28ee20ee4aefc760785c8784570258d5e5f7971863e9d48c6ace98a9fa790d2deadc0f378c31d3ecf8481dac05c0dc02444d879bdd9ad94ccfd4fbbd80f882b3fcf4c58e8dc4cb9c841037597800fee3baa39292fd6073d76a6ce7776daeac0c5f94777fce3beea63c06501e508df2b88120a4471a6cf69a03e18a41283614a9237b416488e9707837fa"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) getpid() ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) 14.609183117s ago: executing program 0 (id=3821): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x6, 0x4, 0x599, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000000), 0x404, r0, 0x0, 0x1ba8847c99}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r3) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000001080)={0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xffffffffffffff00, 0x2}, 0x18828, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14.607447628s ago: executing program 1 (id=3830): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[], 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f00000016c0)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000f0ffffff7a0af0ff0200000079a4f0ff00000000b706000000000081ad64020000000000450404000100ff0f1704000001130a00b7050000000000006a0af2fe000000008500000009000000b700000000000000950000000000000000e154cd8445974b26c933f7ffffffffe40400000056bb2007ee51050512b5b42128aa090a79507df79f298129daa7a6b2f91af50342115e17392ac627c87881c000006146001e04aeacea799a22a2fa798b5adc43eb27d53319d0ad229e5752548300000000dbc2777df150b7cdd77b85b941092314fd085f028f2ed1a4535550614e09d6378198a6097a670838337af2abd55a87ac0394b2f92ffab7d153d62058d0a413b2173619ccf55520f22c9ca8b6712f3024b7041b1df65b3e1b9bf115646d14ce53d13d0ccacda1ef0900094fa737c28b99938512c816fdcceaede3faedc51d29a47fc813a2ec00f4c7a53ac271d6d7f4ea6bf97f2f33e2ea2e534300bcb3fdc4b4861004eefbda7f54f82a804da4f85db47a4a69bf9bc5fa96ee293fbd165a5a68488e40b030166565a097b1b44b451de736bb6d43db8db03d4b7745fef1d04ec633dee254a6d491b849a5a787e814c4fd21a18986252a70f8f92eb6f0e8c7db4bf23242a1f2c28159f09943b1b0452d1b72183aacf4a84f9130b775dd4e9e3070756f97ad791fa99dac06b57479321a05cbee30ff0000001989425f5d0b79f6584d0416d7c4bb9f547b328c8ddc20ea011bf5742e0e0d4334db8b20ce3f9f16cb7fc20fb4791ec85821d0c48fb657c29b309c73f0977e7cde65a82b94c461d7962b0d2277a84af326f37f3e2c25a61ec45c3af97a8f17da954aff3fc8c108755f75ca13fb7c8bbd8b6e7dac1aba4b20dc7de058a4dfa7e85a8bdf1d41a2d8bda74d66f47cc180f82c5f573c6d294d3665016ac59dda0fde4745db06753a7ac74a2d32f7528751313694bf5700b20ef0c248ddd3da32396a614cacad4aff2066bb5d4045c958559b7dcb98a6273b8c651e24d9f679e4fbe948dfb4cc4a389469608241730459f0123fd39206000000000000eb55dad46de56ef907b059b90b8aa49afb9a79ae5498f6589880ed6eea7f9c670012be05e7de0940313c5870786554df26236ebced9390cb6941b8375d936a7d2120eca291963eb2d537d8ee4de5c183c960119451c3157f00000000000000a06a9fa87d64cb77872a2cd8a104e16bb1a2bacf13464ca03aff14a9aa4bd9539f5096412b92012e095b84c20243ff98df3347f0e399d1b9f27e3c33269c0e153b28b2d4410572bc45b9d3fa02208d304d455c3630000000002232017810e743bdaf879946547dbf8b497af002000000cd1d00000020000000ef19349ee7f31abc11c800000000000000000000000928ee53595a779d243a48cea769470424d28804c04b2c4324ab7f4a5c81921f0128dfd70b438af60b060000000000000056642b49b745f3bf2c4af38ffb7d748308eea09fc361b4735efbf3411718d6ee7aebf9ef679dbfae9fb4a79f8a836804ed3a1079b0282a12043408cd60b687dcff91af19010000000000000000456f7d2a42bd13da202274f20675eb781925441578e93046aaddea8ec4ca37f71c2710a7ea8ae0dc214e1cc275b26adfa892e6de92000000000000000000ddff004cff9ec7ffff35e62f4eeee50e6dafecea4d4134f9d006c8d6883eca5c9c58c9e93311ab5009c68c73de2f04f15d005387577f480000ea65559eb00e76e9d0ada201bcbb5c252b28a60ca770663da451790cc36000906d5a9fad98c308e39bd5ffb6151d79c1cee1cd102e3c8e63e9fba05e3633be3f00000015762e5f5a3a0bc33fdbe28a5ffc83f2b485185cc92fe7f791e8f6429309d6adab4b7e508e5bf024ed8f8a005f2bbf96c89739f5cf1e750d50517a59a3ad09e8802e8f4f535447cc0fc9d5f99a73145dfcedad69da9cd4375c624600e78f4458542b14f29611f95d4a31838eeb20c20bb82aa31771cd379ec83554cea5e6539db7384e1f58d81f2f2653c4d9818708e27c89b552d7fcd116bce9c764c714c9402c21d181aac59efb28d4f91652f6750b6ec962802c0320f8059195729d60c534ee8e8ff0755b67fe4c25edb85bcff24c757aa8090000000000008c420eb4304f66e3a37aaf000000c42a570f0e9dd5fd545470f862f8c3c14fa9ecd1e877b0d8ca84c044859e85e6158f9184bc61a9a284db80e4636c25b96174327d82761c26e329555f9290af4100000000000000749efd3763655500344bae34137f5ab0d534b8d63e4ca3b671f2de1cdf519192c6b59a601fd419adc16e2055b85058f793484305d7a1759782e4c571ee855a47bc00edf5e9020c09ab004321610b857e8717764b633b21cb32f0eb3280e097585ab91d20baca005472b79d7b574a247f1d2fe45b3c4e93da3d51de647c10dd49944dc87c92fe8bad99ca332af00f191b66b6a6f732a91f0e2e9190e4b448da7de018c58e950767f9b320be61e58c79d497247d278888901d442ad7f8536605a644e9e3d769db497c3960dfde12182334caee994adc38a436367a54b9e182b78e9a0ceb9a2c4f63902c1ad1a7c5a08d0920a23c2a86abbdf357849a651733e57f31019876026888c8ccb85c86b4f8ffffff7f000000002c331fca0e541b7ca211c28ed61c52573d9308a13d115b43f8b1894c8fa8a14dc4810f61ae96bf704526a8919bc700002100000000000000000001000027c9a46157a3609b6fd9843ee19ec647249a9375de5858818f3c4a4fa6ce46f4d42b07199de8b99231ace58c77819ee214e49666c464d35ca9b5143ed3b3dc8c17a23692759ccf5a205311b7ab22532697b861dfb50409fd88e6043bd52ae84c1bb0c8a6c769f952283a1f4e3842edb3d42c68a27ef6a1296dfff4a979369b0e8ebc62887aa46e820a74f91381ccc198e353047db70686d147357024eb3cb94f1e89cb5ba0a56aa046b4d8521a3d9356b4b8b5917c4c860495b240e80063bde261fd00000000007271e28ef6806bc8e139c49b91c76bea3858f78fbd8d31330d89069f9648a2ff93060fd2b0976cf2ec447c030931651dd315003b7a6a5433a2bb3c035fc6846abe389b25c988f0bbb889560ae99ec4b227eda2e63a1c31a2c2bd48a822cbe92b6524e0cd8020ecaa34e19e7141d5e221509342bfe7d294d1eb3de6a50ca0301f89c2ee627e949c68b3bca426a9b7d503a26e9a714ee5f72d8805dd1bfbd081f6a5d1f1289dfe14cb9194e26a44fac273461fc5c0e0a33db7f2d43ea8086cf059f40fa2640b6bfb74dd35f5a31059c01517cf4b6641fce9a24b96767b837ca037a1199735c375c705c798e0e208e4a5259d0bfa526b462af45a6eab34000000000000000000000000c4426344ec1a3366515dee221e747f55d7dd02534bc503b9b28277c253e410986bef2111a99cc448d652929f8a67a6a1d3f00dcad91aff428aade3f85714a1d3ef29acd4d49b62339c10c2ec0dac4728288e78980c1184d8223edbccbf9258b7374e79a1f8bf3fb73cfd1e76982f3d899f71e4a9f0ba8c6dbb7bbdfc399847a11921f97eba0ea14c4fed9a71eedb97c02461792e3a49dac16c60c3fcaab222025d78963c3ac899fa8b63f58a30212c9b2d7fe751e2046b78f86e22861b6504c667350244dd6d9189a8b9c45f8aaff9db694811ca86ed978f23eed7459c0382074170cf1e25b0e9ba3d1cc309353eea4cd8ab96bafda393276bdd8d32ead8db00000000000001f915268fc1a6ec566981bc8ca2a4583f3d40e817433d0f4f25cfe6cc1897449ba5f26a9d66ac73e6f5c401376f23a314e0b9ff997d22f3e34b7524642c248aa813edaa626f00000021f8547d393dabe616fbbde21c90be00b5a22671395c7a69c6dd4d022ffc97ddb6aa025131652d409da1d8cfc3d219d4b1c1b7b8170d7c33d91db2b73f7ae02485a209a2474b5d0790d05c01bec623056e4d3f4d3149373a28b26a15a1fcce73d57e6eaf7e6f315fe275ebc9ef7aeca277dde01dde724f419803a2172a7833ceab38d21ca4f1dea5e1f4d8824167b21dd289dd4e6ecfba9e163bdbc48e1e758ecde000006c06d4d551e81ee73459cf1c00000000000000000000628a663ed417be6ff5b172cba4a1ec629a39ec253c087b1e9ce84e25b8717ae8581bf28c16a8bbda8d69358e885ddf5387e419c64847b8953070cdefe7d6a35197638e929f8f3c005f9de3fe351def9ed5"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r0, 0x0, 0x62, 0xfffffffffffffe74, &(0x7f0000000140)="cb74445b7d4c0b24676c6c71ae37efcedaf40242309766deb4e793f90000000000000000dbc856cbc664650634231454ca2d8034c4ca29e0d99c3b6615e91835a600c08f989af45438a54981be310aad92ae545b1c961e5f3762a51fe4c736edec6f", &(0x7f0000000cc0)=""/265, 0xcb95, 0x0, 0xff, 0x194, &(0x7f0000000980)="ffc4438e5c3081d0e133e812196ec0ed923733aa8b5aba32c8650e7a66d6136853773dfbc6226be13039e230d511f1ac50cc7811aac0400e4c833fedf842ae2918e6fddb550729246fcf4c0a01bc64989ea3985fb362751a83991bd56e761379caa64f6148893ff25f38d5cd6dd695bbf9ca709a9960e0e6b054d5e2239bcb7c0fb2ac66dc4c8f534e439ff20ccaf0d48a98c19c92a3b437a699350f49606d21a403f8c112c46fea5486bf367a854b0f6c1e563b656e4794f6793a08bb3656c391643f6df71d0255054368a938d38503d064da82d5dbf395ad47ed3932669168d324ed0f6de8360d499042ddc7d02b6c0772128257702bfe6d0971f00fea85da062cdc", &(0x7f00000007c0)="4c87fe555ceb79157b1e507ff4d3cc053321e42ae89f596427188b4877ab8f1776c0685784f1174c6401ecc1dd6e2a77bc79238f87ad9215a92ff203a30099e77c543e702b4a4438d358616381745f24f74e585498af129c4b173b242f445b08135f7fa40eb7ba78160ff4f0c80e1b324d0c234cb7f43a3ff9e9535dc16000c797113a039f4508a09144090000009f38a90a24f173b3e68377e4272950a80cfcd3aa6850e917bc7e57370060f5e6db941d67fc98a1e98103830b821657438325578d2af822dd4fc13ea7a7eef8d9be4e715aec8fd6cadc41c8da5ce9da2b9e1559d92a1936fc2b3a00000000000000000072200e10ba6269b634f10f7098c65ba67ba65c0e2687637e131fb8d5ba6c12c09c8356853c434a44ff0878e496dcf9a4f5ca02c293279948f37ebb28843f92c87c057a3b410e04418557d5deda7ddd3bd1d384d64ec980187e8b64a0696571a49e847db79349c9b3c3fab5f1f977bde4d802d9026ae0c11744eb1525c5195fd215d7a432497f35c2f2cfcd2b6336b26dfef0cb968c910ea2af5cdd4d58cc08535d5514", 0x2, 0x0, 0x3ff}, 0x24) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f00000085000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000480)={0x800}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x16, 0x27, &(0x7f0000010800)=ANY=[@ANYRESOCT, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70800002cddffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000", @ANYRESDEC=r2, @ANYBLOB="0000000000000000b7080000000020007b8af8ff00000000bfa200000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b7020000000000008500000086000000af0a0600100000009500000000000000ff91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f00000007c0)='syzkaller\x00', 0x7, 0xac, &(0x7f0000010440)=""/172, 0x40f00, 0x6, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x0, 0x8}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xb, 0xfb5634, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000980)=[{0x4, 0x3, 0x10, 0x4}], 0x10, 0x3, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x5, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r3, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x3}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x4}, @typedef={0x0, 0x0, 0x0, 0x5}, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000101c0)={'bridge_slave_0\x00', @link_local}) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000000), 0x20000000}, 0x20) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000107c0)={0xffffffffffffffff, 0xe0, &(0x7f00000106c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000010500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000010540)=[0x0], 0x0, 0x2b, &(0x7f00000105c0), 0x0, 0x0, 0x0, &(0x7f0000010640), 0x8, 0x4000d5, 0x8, 0x8, &(0x7f0000010680)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x14, &(0x7f00000003c0)=ANY=[@ANYRES64, @ANYBLOB="0000000000000000b7080000410000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018010000786c492500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r4, 0x400454d1, &(0x7f00000000c0)={0x0, 0x0}) 14.606982297s ago: executing program 4 (id=3831): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000340)='module_request\x00'}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x2c, 0x3, 0x1, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='pids.events\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x6, &(0x7f0000000040)={&(0x7f0000000080)='ext4_evict_inode\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000500000005000000002000000000000000300000d0000000000000000000000000b000000000000000600000003000000000000000000000d000000000000000001000013040000007f4adfa0"], &(0x7f0000000c00)=""/262, 0x6a, 0x106, 0x1, 0x0, 0x0, @void, @value}, 0x20) syz_clone(0x200e9000, 0x0, 0x0, 0x0, 0x0, 0x0) 9.333019323s ago: executing program 3 (id=3767): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x19, 0x18, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018410000f9ffffff0000000000000000186600000b0001000000010000000000850000009b0000001846000001000000000000000000000018580000010000000000000000000000bf91000000000000b7020000000000008500000084000000b7"], &(0x7f00000003c0)='GPL\x00', 0x7, 0x52, &(0x7f00000004c0)=""/82, 0x41100, 0x41, '\x00', 0x0, @cgroup_sockopt, r0, 0x8, &(0x7f00000005c0)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000600)=[{0x4, 0x3}, {0x0, 0x1, 0x9, 0x8}], 0x10, 0x8, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 7.668760453s ago: executing program 3 (id=3767): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x19, 0x18, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018410000f9ffffff0000000000000000186600000b0001000000010000000000850000009b0000001846000001000000000000000000000018580000010000000000000000000000bf91000000000000b7020000000000008500000084000000b7"], &(0x7f00000003c0)='GPL\x00', 0x7, 0x52, &(0x7f00000004c0)=""/82, 0x41100, 0x41, '\x00', 0x0, @cgroup_sockopt, r0, 0x8, &(0x7f00000005c0)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000600)=[{0x4, 0x3}, {0x0, 0x1, 0x9, 0x8}], 0x10, 0x8, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 5.899777042s ago: executing program 3 (id=3767): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x19, 0x18, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018410000f9ffffff0000000000000000186600000b0001000000010000000000850000009b0000001846000001000000000000000000000018580000010000000000000000000000bf91000000000000b7020000000000008500000084000000b7"], &(0x7f00000003c0)='GPL\x00', 0x7, 0x52, &(0x7f00000004c0)=""/82, 0x41100, 0x41, '\x00', 0x0, @cgroup_sockopt, r0, 0x8, &(0x7f00000005c0)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000600)=[{0x4, 0x3}, {0x0, 0x1, 0x9, 0x8}], 0x10, 0x8, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 4.035128549s ago: executing program 3 (id=3767): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x19, 0x18, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018410000f9ffffff0000000000000000186600000b0001000000010000000000850000009b0000001846000001000000000000000000000018580000010000000000000000000000bf91000000000000b7020000000000008500000084000000b7"], &(0x7f00000003c0)='GPL\x00', 0x7, 0x52, &(0x7f00000004c0)=""/82, 0x41100, 0x41, '\x00', 0x0, @cgroup_sockopt, r0, 0x8, &(0x7f00000005c0)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000600)=[{0x4, 0x3}, {0x0, 0x1, 0x9, 0x8}], 0x10, 0x8, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 2.064408855s ago: executing program 3 (id=3767): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x19, 0x18, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018410000f9ffffff0000000000000000186600000b0001000000010000000000850000009b0000001846000001000000000000000000000018580000010000000000000000000000bf91000000000000b7020000000000008500000084000000b7"], &(0x7f00000003c0)='GPL\x00', 0x7, 0x52, &(0x7f00000004c0)=""/82, 0x41100, 0x41, '\x00', 0x0, @cgroup_sockopt, r0, 0x8, &(0x7f00000005c0)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000600)=[{0x4, 0x3}, {0x0, 0x1, 0x9, 0x8}], 0x10, 0x8, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 0s ago: executing program 3 (id=3767): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x19, 0x18, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018410000f9ffffff0000000000000000186600000b0001000000010000000000850000009b0000001846000001000000000000000000000018580000010000000000000000000000bf91000000000000b7020000000000008500000084000000b7"], &(0x7f00000003c0)='GPL\x00', 0x7, 0x52, &(0x7f00000004c0)=""/82, 0x41100, 0x41, '\x00', 0x0, @cgroup_sockopt, r0, 0x8, &(0x7f00000005c0)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000600)=[{0x4, 0x3}, {0x0, 0x1, 0x9, 0x8}], 0x10, 0x8, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.185' (ED25519) to the list of known hosts. [ 19.498400][ T28] audit: type=1400 audit(1729103907.354:66): avc: denied { mounton } for pid=281 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.499349][ T281] cgroup: Unknown subsys name 'net' [ 19.501537][ T28] audit: type=1400 audit(1729103907.354:67): avc: denied { mount } for pid=281 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.505709][ T28] audit: type=1400 audit(1729103907.354:68): avc: denied { unmount } for pid=281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.505890][ T281] cgroup: Unknown subsys name 'devices' [ 19.599485][ T281] cgroup: Unknown subsys name 'hugetlb' [ 19.604872][ T281] cgroup: Unknown subsys name 'rlimit' [ 19.733861][ T28] audit: type=1400 audit(1729103907.584:69): avc: denied { setattr } for pid=281 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=166 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.756818][ T28] audit: type=1400 audit(1729103907.584:70): avc: denied { mounton } for pid=281 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 19.781322][ T28] audit: type=1400 audit(1729103907.584:71): avc: denied { mount } for pid=281 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 19.809393][ T284] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 19.818186][ T28] audit: type=1400 audit(1729103907.674:72): avc: denied { relabelto } for pid=284 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.843646][ T28] audit: type=1400 audit(1729103907.674:73): avc: denied { write } for pid=284 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.869775][ T28] audit: type=1400 audit(1729103907.724:74): avc: denied { read } for pid=281 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.895135][ T28] audit: type=1400 audit(1729103907.724:75): avc: denied { open } for pid=281 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.895185][ T281] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.408872][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.415706][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.422999][ T291] device bridge_slave_0 entered promiscuous mode [ 20.445025][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.451943][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.459177][ T291] device bridge_slave_1 entered promiscuous mode [ 20.490895][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.497822][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.504838][ T293] device bridge_slave_0 entered promiscuous mode [ 20.520765][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.527748][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.534965][ T293] device bridge_slave_1 entered promiscuous mode [ 20.571480][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.578364][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.585591][ T292] device bridge_slave_0 entered promiscuous mode [ 20.600626][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.607459][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.614804][ T292] device bridge_slave_1 entered promiscuous mode [ 20.652430][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.659302][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.666394][ T294] device bridge_slave_0 entered promiscuous mode [ 20.674426][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.681472][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.688785][ T294] device bridge_slave_1 entered promiscuous mode [ 20.758906][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.765753][ T295] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.773016][ T295] device bridge_slave_0 entered promiscuous mode [ 20.779747][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.786590][ T295] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.793925][ T295] device bridge_slave_1 entered promiscuous mode [ 20.889903][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.897012][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.904196][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.911152][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.919391][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.926230][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.933359][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.940126][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.980443][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.987292][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.994422][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.001193][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.021533][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.028399][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.035477][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.042303][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.068006][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.075387][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.083073][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.090686][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.098780][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.106859][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.113881][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.121159][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.128268][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.135372][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.158158][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.165633][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.173912][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.180766][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.187959][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.195853][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.202701][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.210695][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.232030][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.239914][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.247069][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.254367][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.262540][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.269387][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.276493][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.284432][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.291351][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.317197][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.327761][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.335605][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.346422][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.354038][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.361643][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.369020][ T293] device veth0_vlan entered promiscuous mode [ 21.387434][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.395566][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.403930][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.410782][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.418036][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.426073][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.434173][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.441109][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.458831][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.466595][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.474481][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.482377][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.490213][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.497389][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.504660][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 21.512722][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.520734][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.527552][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.534774][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.542847][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.550861][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.557715][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.564830][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.572760][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.588060][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.596208][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.609788][ T293] device veth1_macvtap entered promiscuous mode [ 21.622159][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.630096][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.637965][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.645878][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.654459][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.661911][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.669978][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.678147][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.686349][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.701287][ T294] device veth0_vlan entered promiscuous mode [ 21.715981][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.723855][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.732318][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.740265][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.748104][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.755941][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.763774][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.771859][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.781992][ T291] device veth0_vlan entered promiscuous mode [ 21.791804][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.799607][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.806828][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.814721][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.822634][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.830412][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.845897][ T292] device veth0_vlan entered promiscuous mode [ 21.864394][ T291] device veth1_macvtap entered promiscuous mode [ 21.871956][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.880093][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.888910][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.896499][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.904403][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.912493][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.920649][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.928355][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.936163][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.944313][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.952340][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.959742][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.968091][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.978627][ T295] device veth0_vlan entered promiscuous mode [ 21.990851][ T294] device veth1_macvtap entered promiscuous mode [ 22.010927][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.018969][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.026232][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.034918][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.038280][ C1] hrtimer: interrupt took 27660 ns [ 22.042335][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.054304][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.061871][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.070071][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.078350][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.086408][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.095841][ T292] device veth1_macvtap entered promiscuous mode [ 22.107052][ T295] device veth1_macvtap entered promiscuous mode [ 22.127919][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.135955][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.144550][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.152956][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.161471][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.181101][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.189891][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.198251][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.206328][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.264798][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.282554][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.356577][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.455567][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.754827][ T333] device pim6reg1 entered promiscuous mode [ 22.833039][ T339] device sit0 entered promiscuous mode [ 24.159092][ T355] syz.2.13 (355) used greatest stack depth: 22488 bytes left [ 24.542067][ T370] device macsec0 entered promiscuous mode [ 25.366542][ T385] device syzkaller0 entered promiscuous mode [ 25.375022][ T403] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.382106][ T403] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.391825][ T405] device bridge_slave_1 left promiscuous mode [ 25.400991][ T405] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.408720][ T405] device bridge_slave_0 left promiscuous mode [ 25.414696][ T405] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.518536][ T293] syz-executor (293) used greatest stack depth: 21040 bytes left [ 26.372075][ T432] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.379003][ T432] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.386708][ T432] device bridge_slave_0 entered promiscuous mode [ 26.393613][ T432] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.400664][ T432] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.407953][ T432] device bridge_slave_1 entered promiscuous mode [ 26.419196][ T431] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.426031][ T431] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.433635][ T431] device bridge_slave_0 entered promiscuous mode [ 26.444055][ T431] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.451036][ T431] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.458263][ T431] device bridge_slave_1 entered promiscuous mode [ 26.481196][ T436] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.488150][ T436] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.495458][ T436] device bridge_slave_0 entered promiscuous mode [ 26.517764][ T436] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.524616][ T436] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.531902][ T436] device bridge_slave_1 entered promiscuous mode [ 26.553263][ T28] kauditd_printk_skb: 36 callbacks suppressed [ 26.553278][ T28] audit: type=1400 audit(1729103914.404:112): avc: denied { create } for pid=456 comm="syz.4.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 26.626835][ T441] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.633715][ T441] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.641405][ T441] device bridge_slave_0 entered promiscuous mode [ 26.649428][ T441] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.656444][ T441] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.664035][ T441] device bridge_slave_1 entered promiscuous mode [ 26.678643][ T28] audit: type=1400 audit(1729103914.534:113): avc: denied { write } for pid=463 comm="syz.4.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 26.784779][ T432] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.791874][ T432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.798976][ T432] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.805740][ T432] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.890978][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.898491][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.906689][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.934623][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.942589][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.950691][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.976817][ T43] device bridge_slave_1 left promiscuous mode [ 26.982812][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.990593][ T43] device bridge_slave_0 left promiscuous mode [ 26.996566][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.005382][ T43] device bridge_slave_1 left promiscuous mode [ 27.011403][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.018949][ T43] device bridge_slave_0 left promiscuous mode [ 27.024950][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.033312][ T43] device bridge_slave_1 left promiscuous mode [ 27.039578][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.047200][ T43] device bridge_slave_0 left promiscuous mode [ 27.053183][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.061879][ T43] device veth1_macvtap left promiscuous mode [ 27.067805][ T43] device veth0_vlan left promiscuous mode [ 27.073824][ T43] device veth1_macvtap left promiscuous mode [ 27.079872][ T43] device veth0_vlan left promiscuous mode [ 27.085768][ T43] device veth1_macvtap left promiscuous mode [ 27.091832][ T43] device veth0_vlan left promiscuous mode [ 27.098154][ T43] device veth1_macvtap left promiscuous mode [ 27.373579][ T432] device veth0_vlan entered promiscuous mode [ 27.394838][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.402887][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.442784][ T432] device veth1_macvtap entered promiscuous mode [ 27.450506][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.458790][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.477979][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.486067][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.494449][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.538487][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.546536][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.555856][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.564044][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.572175][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.579339][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.586620][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 27.594684][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.602685][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.609520][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.616633][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 27.624713][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.632621][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.639448][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.651396][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 27.686819][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.704365][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.712081][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 27.720292][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.728317][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.735223][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.742522][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.750542][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.759652][ T474] device wg2 entered promiscuous mode [ 27.781531][ T472] device wg2 left promiscuous mode [ 27.797921][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.807220][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 27.815423][ T28] audit: type=1400 audit(1729103915.644:114): avc: denied { ioctl } for pid=476 comm="syz.4.60" path="/dev/ppp" dev="devtmpfs" ino=138 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.816144][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 27.847997][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.855984][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.862747][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.869899][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.878006][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.885712][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.893600][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.905226][ T436] device veth0_vlan entered promiscuous mode [ 27.927769][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.935636][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.962112][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.969544][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.997400][ T431] device veth0_vlan entered promiscuous mode [ 28.007913][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.028332][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.036490][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.053090][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.069809][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.087754][ T28] audit: type=1400 audit(1729103915.934:115): avc: denied { cpu } for pid=484 comm="syz.2.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 28.111295][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.251056][ T436] device veth1_macvtap entered promiscuous mode [ 28.290460][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.319504][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.326812][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.399170][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.448468][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.493983][ T431] device veth1_macvtap entered promiscuous mode [ 28.520452][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.529055][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.537066][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.543946][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.551371][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.559943][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.568789][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.575646][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.607740][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.615754][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.623974][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.631694][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.639736][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.647517][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.655686][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.663648][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.671880][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.680246][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.688469][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.723937][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 28.731782][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.740128][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.749220][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.757294][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.769486][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.777842][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.795962][ T441] device veth0_vlan entered promiscuous mode [ 28.827489][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.864953][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.959215][ T490] device wg2 entered promiscuous mode [ 29.005601][ T441] device veth1_macvtap entered promiscuous mode [ 29.137743][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.155185][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.165375][ T28] audit: type=1400 audit(1729103917.014:116): avc: denied { read } for pid=497 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 29.251271][ T28] audit: type=1400 audit(1729103917.074:117): avc: denied { write } for pid=497 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 29.268887][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.278289][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.286278][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 29.318423][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.326533][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.433049][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.532390][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.852299][ T512] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 30.794446][ T531] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 31.177886][ T531] device syzkaller0 entered promiscuous mode [ 33.139411][ T574] Driver unsupported XDP return value 0 on prog (id 83) dev N/A, expect packet loss! [ 33.760342][ T599] device sit0 entered promiscuous mode [ 37.141265][ T28] audit: type=1400 audit(1729103924.994:118): avc: denied { tracepoint } for pid=662 comm="syz.0.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 38.639549][ T688] device wg2 entered promiscuous mode [ 38.790722][ T28] audit: type=1400 audit(1729103926.634:119): avc: denied { ioctl } for pid=691 comm="syz.4.127" path="pid:[4026532286]" dev="nsfs" ino=4026532286 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 38.960394][ T28] audit: type=1400 audit(1729103926.684:120): avc: denied { create } for pid=691 comm="syz.4.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 39.653819][ T714] device syzkaller0 entered promiscuous mode [ 39.735850][ T718] syz.0.136 (718) used greatest stack depth: 20616 bytes left [ 39.791573][ T719] device wg2 entered promiscuous mode [ 40.441134][ T28] audit: type=1400 audit(1729103928.294:121): avc: denied { create } for pid=743 comm="syz.4.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 40.494770][ T28] audit: type=1400 audit(1729103928.314:122): avc: denied { create } for pid=741 comm="syz.2.145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 40.514474][ T28] audit: type=1400 audit(1729103928.364:123): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 42.738050][ T783] device syzkaller0 entered promiscuous mode [ 43.562219][ T828] syz.2.171[828] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.562292][ T828] syz.2.171[828] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.873679][ T818] device syzkaller0 entered promiscuous mode [ 45.655901][ T846] device syzkaller0 entered promiscuous mode [ 46.666702][ T868] device syzkaller0 entered promiscuous mode [ 46.963032][ T876] device syzkaller0 entered promiscuous mode [ 48.778534][ T909] device syzkaller0 entered promiscuous mode [ 49.102793][ T919] device syzkaller0 entered promiscuous mode [ 52.505105][ T990] device syzkaller0 entered promiscuous mode [ 56.143165][ T1039] device syzkaller0 entered promiscuous mode [ 57.581817][ T1051] device syzkaller0 entered promiscuous mode [ 58.617302][ T1073] device syzkaller0 entered promiscuous mode [ 61.184261][ T1120] device syzkaller0 entered promiscuous mode [ 62.456431][ T1141] device syzkaller0 entered promiscuous mode [ 62.532347][ T1146] device wg2 left promiscuous mode [ 62.649437][ T1147] device wg2 entered promiscuous mode [ 64.576139][ T1185] device veth1_macvtap left promiscuous mode [ 64.588808][ T1192] device veth1_macvtap entered promiscuous mode [ 64.605309][ T1192] device macsec0 entered promiscuous mode [ 64.688030][ T1205] device wg2 left promiscuous mode [ 64.795299][ T1211] device wg2 entered promiscuous mode [ 67.888935][ T28] audit: type=1400 audit(1729103955.744:124): avc: denied { create } for pid=1272 comm="syz.1.321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 68.348369][ T1282] syz.3.314[1282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.348438][ T1282] syz.3.314[1282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.005440][ T28] audit: type=1400 audit(1729103956.854:125): avc: denied { write } for pid=1307 comm="syz.2.324" name="ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 70.356004][ T1348] syz.4.334[1348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.356073][ T1348] syz.4.334[1348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.624127][ T1397] ------------[ cut here ]------------ [ 72.640491][ T1397] WARNING: CPU: 0 PID: 1397 at kernel/bpf/btf.c:1957 btf_type_id_size+0x8c4/0x950 [ 72.649482][ T1397] Modules linked in: [ 72.653198][ T1397] CPU: 0 PID: 1397 Comm: syz.1.349 Not tainted 6.1.99-syzkaller-00017-g752034bc8702 #0 [ 72.662687][ T1397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 72.672573][ T1397] RIP: 0010:btf_type_id_size+0x8c4/0x950 [ 72.678038][ T1397] Code: 89 f2 e9 21 fa ff ff 44 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 4a fa ff ff 4c 89 ff e8 66 94 29 00 e9 3d fa ff ff e8 4c 53 e2 ff <0f> 0b 31 db e9 39 fa ff ff 44 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c [ 72.697580][ T1397] RSP: 0018:ffffc90000a47b90 EFLAGS: 00010287 [ 72.703444][ T1397] RAX: ffffffff81934ff4 RBX: 0000000011000000 RCX: 0000000000040000 [ 72.711355][ T1397] RDX: ffffc90006955000 RSI: 000000000000007c RDI: 000000000000007d [ 72.719170][ T1397] RBP: ffffc90000a47bf0 R08: ffffffff81934b3f R09: ffffffff81934ac0 [ 72.726968][ T1397] R10: 0000000000000005 R11: ffff8881186f8000 R12: 0000000000000009 [ 72.734789][ T1397] R13: dffffc0000000000 R14: ffff888113680e00 R15: 0000000000000001 [ 72.742601][ T1397] FS: 00007ff3f8d446c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 72.751381][ T1397] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 72.757787][ T1397] CR2: 000000110c2bda7f CR3: 000000011d82a000 CR4: 00000000003506b0 [ 72.765589][ T1397] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 72.773415][ T1397] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 72.781231][ T1397] Call Trace: [ 72.784333][ T1397] [ 72.787112][ T1397] ? show_regs+0x58/0x60 [ 72.791291][ T1397] ? __warn+0x160/0x3d0 [ 72.795268][ T1397] ? btf_type_id_size+0x8c4/0x950 [ 72.800156][ T1397] ? report_bug+0x4d5/0x7d0 [ 72.804473][ T1397] ? btf_type_id_size+0x8c4/0x950 [ 72.809370][ T1397] ? handle_bug+0x41/0x70 [ 72.813497][ T1397] ? exc_invalid_op+0x1b/0x50 [ 72.818028][ T1397] ? asm_exc_invalid_op+0x1b/0x20 [ 72.822871][ T1397] ? btf_type_id_size+0x390/0x950 [ 72.828701][ T1397] ? btf_type_id_size+0x40f/0x950 [ 72.833545][ T1397] ? btf_type_id_size+0x8c4/0x950 [ 72.838431][ T1397] ? btf_type_id_size+0x8c4/0x950 [ 72.843269][ T1397] map_check_btf+0x134/0xb90 [ 72.847708][ T1397] ? __fget_files+0x2cb/0x330 [ 72.852207][ T1397] ? bpf_prog_bind_map+0x970/0x970 [ 72.857157][ T1397] ? btf_get_by_fd+0x13e/0x180 [ 72.861774][ T1397] map_create+0x78c/0xcf0 [ 72.865926][ T1397] __sys_bpf+0x2e6/0x7f0 [ 72.870382][ T1397] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 72.875556][ T1397] ? fpregs_restore_userregs+0x130/0x290 [ 72.881049][ T1397] __x64_sys_bpf+0x7c/0x90 [ 72.885273][ T1397] x64_sys_call+0x87f/0x9a0 [ 72.889627][ T1397] do_syscall_64+0x3b/0xb0 [ 72.893863][ T1397] ? clear_bhb_loop+0x55/0xb0 [ 72.898396][ T1397] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 72.904107][ T1397] RIP: 0033:0x7ff3f7f7dff9 [ 72.908382][ T1397] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 72.927916][ T1397] RSP: 002b:00007ff3f8d44038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 72.936135][ T1397] RAX: ffffffffffffffda RBX: 00007ff3f8136058 RCX: 00007ff3f7f7dff9 [ 72.943961][ T1397] RDX: 0000000000000048 RSI: 0000000020000500 RDI: 0000000000000000 [ 72.951769][ T1397] RBP: 00007ff3f7ff0296 R08: 0000000000000000 R09: 0000000000000000 [ 72.959679][ T1397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 72.967552][ T1397] R13: 0000000000000000 R14: 00007ff3f8136058 R15: 00007ffc73233ec8 [ 72.975473][ T1397] [ 72.978337][ T1397] ---[ end trace 0000000000000000 ]--- [ 73.328845][ T1418] device wg2 entered promiscuous mode [ 76.065054][ T1464] device veth1_macvtap left promiscuous mode [ 79.904299][ T28] audit: type=1400 audit(1729103967.754:126): avc: denied { create } for pid=1529 comm="syz.1.389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 80.559430][ T1546] syz.0.393[1546] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.559502][ T1546] syz.0.393[1546] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.749901][ T1552] tap0: tun_chr_ioctl cmd 35108 [ 82.997959][ T1594] syz.1.411[1594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.998033][ T1594] syz.1.411[1594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.239717][ T1604] device wg2 entered promiscuous mode [ 84.081131][ T1625] tap0: tun_chr_ioctl cmd 35108 [ 84.237632][ T1627] device veth1_macvtap left promiscuous mode [ 88.164582][ T1702] syz.4.443[1702] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.164662][ T1702] syz.4.443[1702] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.131116][ T28] audit: type=1400 audit(1729103978.984:127): avc: denied { create } for pid=1744 comm="syz.4.456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 93.327486][ T1803] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.334586][ T1803] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.571270][ T28] audit: type=1400 audit(1729103981.424:128): avc: denied { create } for pid=1802 comm="syz.2.476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 93.679450][ T1797] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.686566][ T1797] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.770298][ T1801] device bridge_slave_1 left promiscuous mode [ 93.776277][ T1801] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.788417][ T1801] device bridge_slave_0 left promiscuous mode [ 93.796177][ T1801] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.928000][ T1804] device bridge_slave_1 left promiscuous mode [ 93.934030][ T1804] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.988225][ T1804] device bridge_slave_0 left promiscuous mode [ 94.097945][ T1804] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.468278][ T1826] device veth1_macvtap left promiscuous mode [ 95.474087][ T1826] device macsec0 left promiscuous mode [ 95.725093][ T1821] device veth1_macvtap entered promiscuous mode [ 95.809203][ T1821] device macsec0 entered promiscuous mode [ 96.009278][ T28] audit: type=1400 audit(1729103983.864:129): avc: denied { create } for pid=1827 comm="syz.3.483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 96.079927][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 98.718809][ T1871] device veth1_macvtap left promiscuous mode [ 101.211193][ T394] device bridge_slave_1 left promiscuous mode [ 101.217223][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.307568][ T394] device bridge_slave_0 left promiscuous mode [ 101.356438][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.437793][ T394] device veth1_macvtap left promiscuous mode [ 101.527543][ T1933] device veth1_macvtap entered promiscuous mode [ 101.536540][ T1933] device macsec0 entered promiscuous mode [ 101.658831][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 101.728873][ T1940] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.735861][ T1940] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.743721][ T1940] device bridge_slave_0 entered promiscuous mode [ 101.754549][ T1941] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.762105][ T1941] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.769928][ T1941] device bridge_slave_0 entered promiscuous mode [ 101.776541][ T1940] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.783679][ T1940] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.791208][ T1940] device bridge_slave_1 entered promiscuous mode [ 101.813670][ T1941] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.820624][ T1941] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.827900][ T1941] device bridge_slave_1 entered promiscuous mode [ 101.979141][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 101.986475][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.039695][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 102.048391][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 102.056379][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.063248][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.078905][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 102.087080][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 102.095825][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.102683][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.306437][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 102.388645][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.395961][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 102.541595][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 102.616533][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.623414][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.768354][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 102.851853][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 103.919351][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.926196][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.933437][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 103.941198][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 103.951195][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 103.958961][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 103.986069][ T1941] device veth0_vlan entered promiscuous mode [ 104.006003][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 104.014450][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 104.023939][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 104.033081][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 104.053400][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 104.061715][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 104.077955][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 104.088050][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 104.116193][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 104.124401][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 104.167759][ T1941] device veth1_macvtap entered promiscuous mode [ 104.197486][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 104.206024][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 104.244340][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 104.318676][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 104.369111][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 104.419742][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 104.481743][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 104.851836][ T1967] device syzkaller0 entered promiscuous mode [ 104.865637][ T1940] device veth0_vlan entered promiscuous mode [ 104.878522][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 104.885852][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 104.914470][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 104.923100][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 104.931611][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 104.939996][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 104.970467][ T28] audit: type=1400 audit(1729103992.824:130): avc: denied { mounton } for pid=1941 comm="syz-executor" path="/root/syzkaller.nDvwGo/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 105.008192][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 105.018061][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 105.027388][ T1940] device veth1_macvtap entered promiscuous mode [ 105.193270][ T28] audit: type=1400 audit(1729103992.854:131): avc: denied { mount } for pid=1941 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 105.332359][ T28] audit: type=1400 audit(1729103992.864:132): avc: denied { mounton } for pid=1941 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=370 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 105.454217][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 105.463029][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 105.532653][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 105.561705][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 105.570060][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 105.700188][ T394] device bridge_slave_1 left promiscuous mode [ 105.716953][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.847483][ T394] device bridge_slave_0 left promiscuous mode [ 105.950060][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.094862][ T394] device veth0_vlan left promiscuous mode [ 107.448569][ T2031] device veth1_macvtap entered promiscuous mode [ 107.454662][ T2031] device macsec0 entered promiscuous mode [ 107.498032][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 109.465592][ T2074] device sit0 entered promiscuous mode [ 110.177867][ T2087] device sit0 left promiscuous mode [ 110.230752][ T2091] device sit0 entered promiscuous mode [ 112.112563][ T2122] device macsec0 entered promiscuous mode [ 112.737720][ T2133] device sit0 entered promiscuous mode [ 115.029417][ T2173] device wg2 left promiscuous mode [ 115.203000][ T2174] device wg2 entered promiscuous mode [ 115.908369][ T2188] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.915371][ T2188] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.040428][ T2191] device bridge_slave_1 left promiscuous mode [ 116.110010][ T2191] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.178332][ T2191] device bridge_slave_0 left promiscuous mode [ 116.347233][ T2191] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.386530][ T2241] device syzkaller0 entered promiscuous mode [ 123.775476][ T2289] device syzkaller0 entered promiscuous mode [ 124.094481][ T2294] device syzkaller0 entered promiscuous mode [ 124.102691][ T2296] device sit0 left promiscuous mode [ 124.156199][ T2297] device sit0 entered promiscuous mode [ 124.739053][ T2305] device sit0 entered promiscuous mode [ 126.077614][ C1] sched: RT throttling activated [ 127.107705][ T2315] device macsec0 entered promiscuous mode [ 128.701761][ T2348] device sit0 left promiscuous mode [ 129.040445][ T2351] device sit0 entered promiscuous mode [ 130.140872][ T2363] device syzkaller0 entered promiscuous mode [ 130.228963][ T2368] device syzkaller0 entered promiscuous mode [ 131.228994][ T2384] device veth1_macvtap left promiscuous mode [ 131.492788][ T2386] device veth1_macvtap entered promiscuous mode [ 131.602140][ T2386] device macsec0 entered promiscuous mode [ 132.170680][ T2397] device sit0 left promiscuous mode [ 132.388264][ T2397] device sit0 entered promiscuous mode [ 135.392328][ T2427] device veth0_vlan left promiscuous mode [ 135.609447][ T2427] device veth0_vlan entered promiscuous mode [ 135.729571][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 135.749504][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 135.818411][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 137.425193][ T2457] device sit0 entered promiscuous mode [ 138.214718][ T2465] device veth1_macvtap left promiscuous mode [ 138.226970][ T2465] device macsec0 left promiscuous mode [ 138.372011][ T2467] device veth1_macvtap entered promiscuous mode [ 138.386885][ T2467] device macsec0 entered promiscuous mode [ 140.764325][ T2485] device syzkaller0 entered promiscuous mode [ 141.836384][ T2503] device sit0 left promiscuous mode [ 141.915363][ T2506] device sit0 entered promiscuous mode [ 143.017329][ T2519] device sit0 left promiscuous mode [ 146.135820][ T2567] tap0: tun_chr_ioctl cmd 35108 [ 147.298167][ T2574] device wg2 entered promiscuous mode [ 150.647744][ T2621] device sit0 left promiscuous mode [ 151.044810][ T2624] device sit0 entered promiscuous mode [ 151.746698][ T2639] device wg2 left promiscuous mode [ 151.886328][ T2638] device wg2 entered promiscuous mode [ 152.559620][ T2645] device veth1_macvtap left promiscuous mode [ 152.566621][ T2645] device macsec0 left promiscuous mode [ 152.940593][ T2648] device veth1_macvtap entered promiscuous mode [ 152.948048][ T2648] device macsec0 entered promiscuous mode [ 152.957831][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 154.537661][ T2672] device sit0 left promiscuous mode [ 154.797364][ T2677] device wg2 left promiscuous mode [ 154.808320][ T2672] device sit0 entered promiscuous mode [ 154.835360][ T2684] device wg2 entered promiscuous mode [ 154.876322][ T2689] device sit0 left promiscuous mode [ 154.940092][ T2689] device sit0 entered promiscuous mode [ 160.229620][ T2729] device wg2 left promiscuous mode [ 160.490307][ T2737] device wg2 entered promiscuous mode [ 160.498411][ T2742] tap0: tun_chr_ioctl cmd 35108 [ 163.735183][ T2782] syz.0.773[2782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.735247][ T2782] syz.0.773[2782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.083978][ T2808] device veth1_macvtap left promiscuous mode [ 165.228027][ T2808] device macsec0 left promiscuous mode [ 165.479087][ T2809] device veth1_macvtap entered promiscuous mode [ 165.595329][ T2809] device macsec0 entered promiscuous mode [ 170.909108][ T2864] device veth1_macvtap left promiscuous mode [ 170.914920][ T2864] device macsec0 left promiscuous mode [ 171.103544][ T2864] device veth1_macvtap entered promiscuous mode [ 171.261672][ T2864] device macsec0 entered promiscuous mode [ 171.428074][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 172.458852][ T28] audit: type=1400 audit(1729104060.304:133): avc: denied { create } for pid=2886 comm="syz.3.795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 173.482250][ T2897] device syzkaller0 entered promiscuous mode [ 174.168951][ T2911] device wg2 left promiscuous mode [ 176.443483][ T2938] device pim6reg1 entered promiscuous mode [ 178.178158][ T2963] syz.3.816[2963] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.178239][ T2963] syz.3.816[2963] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.670679][ T28] audit: type=1400 audit(1729104068.524:134): avc: denied { remove_name } for pid=85 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 181.138330][ T28] audit: type=1400 audit(1729104068.524:135): avc: denied { rename } for pid=85 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 184.188109][ T3057] syz.4.843[3057] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.188179][ T3057] syz.4.843[3057] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.881977][ T3088] device veth1_macvtap left promiscuous mode [ 186.938607][ T3088] device macsec0 left promiscuous mode [ 187.035330][ T3096] device veth1_macvtap entered promiscuous mode [ 187.041777][ T3096] device macsec0 entered promiscuous mode [ 193.763072][ T3208] device syzkaller0 entered promiscuous mode [ 194.088851][ T3220] device syzkaller0 entered promiscuous mode [ 194.102069][ T39] syzkaller0: tun_net_xmit 48 [ 198.371336][ T3272] device syzkaller0 entered promiscuous mode [ 198.794837][ T3284] syz.2.906[3284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.794913][ T3284] syz.2.906[3284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.560924][ T3369] syz.1.936[3369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.779259][ T3369] syz.1.936[3369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.198571][ T3379] device veth1_macvtap left promiscuous mode [ 206.623422][ T3379] device macsec0 left promiscuous mode [ 206.715044][ T3375] device veth1_macvtap entered promiscuous mode [ 206.767984][ T3375] device macsec0 entered promiscuous mode [ 206.847712][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 210.526216][ T28] audit: type=1400 audit(1729104098.374:136): avc: denied { create } for pid=3443 comm="syz.3.953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 212.103481][ T3467] syz.0.975[3467] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.103576][ T3467] syz.0.975[3467] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.764480][ T3499] device syzkaller0 entered promiscuous mode [ 219.715955][ T3596] device veth1_macvtap left promiscuous mode [ 219.727479][ T3596] device macsec0 left promiscuous mode [ 220.073084][ T3611] tap0: tun_chr_ioctl cmd 1074025677 [ 220.078804][ T3611] tap0: linktype set to 512 [ 221.535436][ T3637] syz.0.1018[3637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.535507][ T3637] syz.0.1018[3637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.293656][ T3686] tap0: tun_chr_ioctl cmd 1074025677 [ 225.470561][ T3686] tap0: linktype set to 512 [ 226.975746][ T3707] device syzkaller0 entered promiscuous mode [ 227.973199][ T28] audit: type=1400 audit(1729104115.824:137): avc: denied { create } for pid=3720 comm="syz.0.1054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 235.041305][ T3766] device veth1_macvtap left promiscuous mode [ 235.102648][ T3766] device macsec0 left promiscuous mode [ 236.267235][ T3784] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.274162][ T3784] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.282326][ T3784] device bridge_slave_0 entered promiscuous mode [ 236.293159][ T3784] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.300151][ T3784] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.307494][ T3784] device bridge_slave_1 entered promiscuous mode [ 236.497797][ T3795] device sit0 left promiscuous mode [ 237.212531][ T3805] device syzkaller0 entered promiscuous mode [ 237.692837][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.715108][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.760814][ T10] device veth1_macvtap left promiscuous mode [ 238.410726][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.443418][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.525975][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.532845][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.558451][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.566689][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.574685][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.581532][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.588806][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 238.596591][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.604412][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 238.612560][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.627104][ T3784] device veth0_vlan entered promiscuous mode [ 238.673100][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.694095][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 238.738308][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 238.789505][ T28] audit: type=1400 audit(1729104126.644:138): avc: denied { create } for pid=3826 comm="syz.4.1075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 238.842445][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 238.870448][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.887499][ T28] audit: type=1400 audit(1729104126.674:139): avc: denied { write } for pid=3826 comm="syz.4.1075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 238.992856][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 239.049590][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 239.157936][ T28] audit: type=1400 audit(1729104126.684:140): avc: denied { create } for pid=3826 comm="syz.4.1075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 239.213043][ T3784] device veth1_macvtap entered promiscuous mode [ 239.419056][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 239.437235][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 239.475797][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 239.555536][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 239.587981][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 239.631009][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 239.641903][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 239.722534][ T28] audit: type=1400 audit(1729104127.574:141): avc: denied { read } for pid=3842 comm="syz.4.1078" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 240.844780][ T28] audit: type=1400 audit(1729104128.684:142): avc: denied { setopt } for pid=3856 comm="syz.2.1091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 242.414600][ T3879] device veth1_macvtap left promiscuous mode [ 245.337986][ T3932] device veth1_macvtap left promiscuous mode [ 245.379773][ T3932] device macsec0 left promiscuous mode [ 246.633398][ T3954] device sit0 entered promiscuous mode [ 250.063143][ T4020] device sit0 entered promiscuous mode [ 251.062091][ T4031] device syzkaller0 entered promiscuous mode [ 251.124927][ T4038] device sit0 left promiscuous mode [ 251.150031][ T4041] syz.3.1134[4041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.150102][ T4041] syz.3.1134[4041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.898378][ T4092] syz.2.1152[4092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.999244][ T4092] syz.2.1152[4092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.817516][ T4189] device syzkaller0 entered promiscuous mode [ 261.568691][ T4193] device syzkaller0 entered promiscuous mode [ 266.331358][ T28] audit: type=1400 audit(1729104154.184:143): avc: denied { create } for pid=4243 comm="syz.1.1203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 266.503826][ T4248] device sit0 left promiscuous mode [ 266.518251][ T4252] device sit0 entered promiscuous mode [ 266.656622][ T4251] device sit0 entered promiscuous mode [ 268.996815][ T4291] device sit0 entered promiscuous mode [ 278.613221][ T4422] device syzkaller0 entered promiscuous mode [ 279.235858][ T4439] device syzkaller0 entered promiscuous mode [ 281.018344][ T4469] device syzkaller0 entered promiscuous mode [ 283.868515][ T4497] device veth0_vlan left promiscuous mode [ 283.970771][ T4497] device veth0_vlan entered promiscuous mode [ 284.051576][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 284.079392][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 284.086755][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 285.566185][ T28] audit: type=1400 audit(1729104173.414:144): avc: denied { create } for pid=4533 comm="syz.1.1279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 286.621640][ T4555] syz.0.1287[4555] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.621710][ T4555] syz.0.1287[4555] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.694477][ T4556] device veth0_vlan left promiscuous mode [ 286.928523][ T4556] device veth0_vlan entered promiscuous mode [ 287.114960][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 287.148474][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 287.239756][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 288.068755][ T4574] device macsec0 entered promiscuous mode [ 289.400042][ T4599] syz.0.1297 (4599) used obsolete PPPIOCDETACH ioctl [ 291.097764][ T4612] device sit0 left promiscuous mode [ 291.116087][ T4614] device sit0 left promiscuous mode [ 291.193125][ T4611] device sit0 entered promiscuous mode [ 291.295094][ T4614] device sit0 entered promiscuous mode [ 292.939165][ T4653] device syzkaller0 entered promiscuous mode [ 299.096135][ T4722] device sit0 left promiscuous mode [ 301.102888][ T4751] device sit0 entered promiscuous mode [ 301.845158][ T4755] device veth0_vlan left promiscuous mode [ 301.897293][ T4755] device veth0_vlan entered promiscuous mode [ 302.080083][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 302.092660][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 302.189340][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 303.091946][ T4790] syz.1.1351[4790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.092024][ T4790] syz.1.1351[4790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.205156][ T4814] device veth0_vlan left promiscuous mode [ 304.249156][ T4814] device veth0_vlan entered promiscuous mode [ 307.610540][ T4850] device sit0 left promiscuous mode [ 307.710302][ T4854] device sit0 entered promiscuous mode [ 311.391001][ T4917] device sit0 left promiscuous mode [ 311.757878][ T4919] device sit0 entered promiscuous mode [ 321.943945][ T5046] device syzkaller0 entered promiscuous mode [ 328.528387][ T5145] device sit0 left promiscuous mode [ 328.638834][ T5146] device sit0 entered promiscuous mode [ 329.196221][ T5148] device veth0_vlan left promiscuous mode [ 329.260172][ T5148] device veth0_vlan entered promiscuous mode [ 329.430704][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 329.448945][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 329.466479][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 333.820787][ T5196] device sit0 left promiscuous mode [ 333.946725][ T5199] device sit0 entered promiscuous mode [ 335.077695][ T28] audit: type=1400 audit(1729104222.924:145): avc: denied { write } for pid=5213 comm="syz.2.1480" name="cgroup.subtree_control" dev="cgroup2" ino=232 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 335.471152][ T28] audit: type=1400 audit(1729104222.934:146): avc: denied { open } for pid=5213 comm="syz.2.1480" path="" dev="cgroup2" ino=232 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 338.126430][ T5242] device veth0_vlan left promiscuous mode [ 338.626390][ T5242] device veth0_vlan entered promiscuous mode [ 338.918514][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 338.938385][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 338.945722][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 342.621055][ T5301] device syzkaller0 entered promiscuous mode [ 345.233099][ T5328] device syzkaller0 entered promiscuous mode [ 347.594273][ T5371] device wg2 entered promiscuous mode [ 356.428239][ T5460] device syzkaller0 entered promiscuous mode [ 360.925400][ T5515] device syzkaller0 entered promiscuous mode [ 373.445749][ T5636] device syzkaller0 entered promiscuous mode [ 373.557719][ T5632] device veth0_vlan left promiscuous mode [ 373.607767][ T5632] device veth0_vlan entered promiscuous mode [ 373.828331][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 373.838676][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 373.878493][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 374.082090][ T5650] device veth0_vlan left promiscuous mode [ 374.326186][ T5650] device veth0_vlan entered promiscuous mode [ 374.548287][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 374.577038][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 374.799103][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 374.845827][ T5647] device veth0_vlan left promiscuous mode [ 375.034168][ T5647] device veth0_vlan entered promiscuous mode [ 375.727156][ T5677] device wg2 entered promiscuous mode [ 378.301626][ T5707] device veth0_vlan left promiscuous mode [ 378.419016][ T5707] device veth0_vlan entered promiscuous mode [ 378.667735][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 378.675844][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 378.895406][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 380.235047][ T5731] device veth0_vlan left promiscuous mode [ 380.363490][ T5731] device veth0_vlan entered promiscuous mode [ 380.373663][ T28] audit: type=1400 audit(1729104268.204:147): avc: denied { create } for pid=5734 comm="syz.4.1633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 380.541836][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 380.608414][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 380.666696][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 380.809225][ T5756] device wg2 left promiscuous mode [ 380.922958][ T5758] device wg2 entered promiscuous mode [ 381.941102][ T5779] device veth0_vlan left promiscuous mode [ 382.213360][ T5779] device veth0_vlan entered promiscuous mode [ 382.539984][ T5780] device sit0 left promiscuous mode [ 382.565123][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 382.589661][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 382.597387][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 383.722713][ T28] audit: type=1400 audit(1729104271.574:148): avc: denied { ioctl } for pid=5805 comm="syz.2.1653" path="socket:[32385]" dev="sockfs" ino=32385 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 383.933020][ T5811] device wg2 entered promiscuous mode [ 384.588552][ T5821] device syzkaller0 entered promiscuous mode [ 386.060662][ T28] audit: type=1400 audit(1729104273.914:149): avc: denied { create } for pid=5835 comm="syz.3.1659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 387.799766][ T5857] device wg2 left promiscuous mode [ 387.998619][ T5861] device wg2 entered promiscuous mode [ 388.301630][ T5866] device wg2 left promiscuous mode [ 388.444819][ T5869] device wg2 entered promiscuous mode [ 388.469214][ T5871] device syzkaller0 entered promiscuous mode [ 389.010698][ T5893] device veth0_vlan left promiscuous mode [ 389.222351][ T5893] device veth0_vlan entered promiscuous mode [ 389.497361][ T5897] tun0: tun_chr_ioctl cmd 1074025677 [ 389.525813][ T5897] tun0: linktype set to 513 [ 394.757709][ T5925] device syzkaller0 entered promiscuous mode [ 394.930319][ T5942] device veth0_vlan left promiscuous mode [ 394.995140][ T5942] device veth0_vlan entered promiscuous mode [ 395.223040][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 395.244469][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 395.409095][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 395.430716][ T5946] bridge0: port 3(team_slave_1) entered blocking state [ 395.524507][ T5946] bridge0: port 3(team_slave_1) entered disabled state [ 395.635877][ T5946] device team_slave_1 entered promiscuous mode [ 395.740035][ T5952] device team_slave_1 left promiscuous mode [ 395.745912][ T5952] bridge0: port 3(team_slave_1) entered disabled state [ 395.974368][ T5960] device veth0_vlan left promiscuous mode [ 396.040273][ T5960] device veth0_vlan entered promiscuous mode [ 396.048568][ T5961] device sit0 left promiscuous mode [ 396.093539][ T5959] device sit0 entered promiscuous mode [ 398.535475][ T6017] device veth0_vlan left promiscuous mode [ 398.630461][ T6017] device veth0_vlan entered promiscuous mode [ 400.130207][ T6052] device sit0 left promiscuous mode [ 400.373947][ T6043] device sit0 entered promiscuous mode [ 400.626264][ T6057] device veth0_vlan left promiscuous mode [ 400.936920][ T6057] device veth0_vlan entered promiscuous mode [ 401.293270][ T6062] device veth0_vlan left promiscuous mode [ 401.424782][ T6062] device veth0_vlan entered promiscuous mode [ 401.700709][ T6066] device syzkaller0 entered promiscuous mode [ 401.714699][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 401.728108][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 401.735282][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 404.049131][ T6111] device veth0_vlan left promiscuous mode [ 404.308974][ T6111] device veth0_vlan entered promiscuous mode [ 405.918852][ T6147] device wg2 left promiscuous mode [ 406.055614][ T6152] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 406.095694][ T6152] device syzkaller0 entered promiscuous mode [ 407.280486][ T6173] bridge0: port 3(team_slave_1) entered blocking state [ 407.302388][ T6173] bridge0: port 3(team_slave_1) entered disabled state [ 407.344267][ T6173] device team_slave_1 entered promiscuous mode [ 407.361809][ T6176] device team_slave_1 left promiscuous mode [ 407.367856][ T6176] bridge0: port 3(team_slave_1) entered disabled state [ 408.262997][ T6201] device wg2 left promiscuous mode [ 411.135228][ T6242] device sit0 left promiscuous mode [ 412.005379][ T28] audit: type=1400 audit(1729104299.854:150): avc: denied { create } for pid=6240 comm="syz.1.1768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 414.291256][ T6276] device veth0_vlan left promiscuous mode [ 414.403478][ T6276] device veth0_vlan entered promiscuous mode [ 414.479595][ T28] audit: type=1400 audit(1729104302.334:151): avc: denied { create } for pid=6283 comm="syz.4.1780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 415.179951][ T28] audit: type=1400 audit(1729104303.024:152): avc: denied { create } for pid=6297 comm="syz.2.1783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 417.214935][ T6338] bridge0: port 2(bridge_slave_1) entered disabled state [ 418.737387][ T6368] tun0: tun_chr_ioctl cmd 1074025677 [ 418.807838][ T6368] tun0: linktype set to 513 [ 419.048854][ T6373] device veth0_vlan left promiscuous mode [ 419.257640][ T6373] device veth0_vlan entered promiscuous mode [ 419.427895][ T6373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 419.534320][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 419.573102][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 419.686396][ T475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 419.864873][ T6378] device sit0 left promiscuous mode [ 420.440317][ T6409] device macsec0 left promiscuous mode [ 420.969599][ T6414] device pim6reg1 entered promiscuous mode [ 422.007383][ T6425] tun0: tun_chr_ioctl cmd 1074025677 [ 422.025207][ T6425] tun0: linktype set to 513 [ 425.888088][ T6455] device sit0 left promiscuous mode [ 426.463528][ T6455] device sit0 entered promiscuous mode [ 426.569755][ T6466] syz.4.1827[6466] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.569824][ T6466] syz.4.1827[6466] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.582707][ T6466] syz.4.1827[6466] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.594421][ T6466] syz.4.1827[6466] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 427.787428][ T6489] bridge0: port 1(bridge_slave_0) entered disabled state [ 428.338031][ T6491] bridge0: port 2(bridge_slave_1) entered disabled state [ 428.388127][ T6491] device bridge_slave_0 left promiscuous mode [ 428.458443][ T6491] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.146818][ T6542] device syzkaller0 entered promiscuous mode [ 435.423996][ T6574] device veth0_vlan left promiscuous mode [ 435.463882][ T6574] device veth0_vlan entered promiscuous mode [ 435.583165][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 435.593644][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 435.610270][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 439.650488][ T6600] device veth0_vlan left promiscuous mode [ 439.744095][ T6600] device veth0_vlan entered promiscuous mode [ 440.901841][ T6617] device syzkaller0 entered promiscuous mode [ 441.245782][ T6632] device veth0_vlan left promiscuous mode [ 441.303346][ T6632] device veth0_vlan entered promiscuous mode [ 441.854273][ T6642] device sit0 entered promiscuous mode [ 442.471068][ T6650] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.480716][ T6662] device sit0 entered promiscuous mode [ 443.280118][ T6677] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 443.297369][ T6677] device syzkaller0 entered promiscuous mode [ 446.090835][ T6727] device sit0 left promiscuous mode [ 446.338129][ T6724] device sit0 entered promiscuous mode [ 448.489860][ T6746] tap0: tun_chr_ioctl cmd 1074025673 [ 449.566555][ T6763] device veth0_vlan left promiscuous mode [ 449.798520][ T6763] device veth0_vlan entered promiscuous mode [ 450.226571][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 450.262093][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 450.412941][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 450.469454][ T6770] device syzkaller0 entered promiscuous mode [ 450.915049][ T6785] device sit0 entered promiscuous mode [ 453.888297][ T6829] device syzkaller0 entered promiscuous mode [ 454.462089][ T6843] device veth0_vlan left promiscuous mode [ 454.500988][ T6843] device veth0_vlan entered promiscuous mode [ 454.644591][ T6854] device syzkaller0 entered promiscuous mode [ 454.670289][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 454.680652][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 454.688080][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 457.127926][ T6903] tun0: tun_chr_ioctl cmd 1074025677 [ 457.133163][ T6903] tun0: linktype set to 513 [ 460.012540][ T6953] device sit0 left promiscuous mode [ 460.037313][ T6953] device sit0 entered promiscuous mode [ 461.978344][ T6994] device wg2 left promiscuous mode [ 462.054953][ T6994] device wg2 entered promiscuous mode [ 463.226034][ T7024] tap0: tun_chr_ioctl cmd 1074025673 [ 464.166653][ T7040] syz.1.1988 uses obsolete (PF_INET,SOCK_PACKET) [ 465.467510][ T7061] device syzkaller0 entered promiscuous mode [ 465.583015][ T7063] device sit0 left promiscuous mode [ 465.738129][ T7065] device sit0 entered promiscuous mode [ 466.603916][ T7080] device sit0 left promiscuous mode [ 466.627117][ T7081] device sit0 entered promiscuous mode [ 469.303445][ T7147] device sit0 left promiscuous mode [ 469.354391][ T7147] device sit0 entered promiscuous mode [ 472.262311][ T7209] device wg2 entered promiscuous mode [ 473.966005][ T7241] device wg2 left promiscuous mode [ 475.850482][ T28] audit: type=1400 audit(1729104363.704:153): avc: denied { attach_queue } for pid=7264 comm="syz.2.2064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 477.649660][ T7318] device wg2 left promiscuous mode [ 477.671677][ T7318] device wg2 entered promiscuous mode [ 481.959247][ T7394] bridge0: port 3(team_slave_1) entered blocking state [ 481.989304][ T7394] bridge0: port 3(team_slave_1) entered disabled state [ 482.239325][ T7394] device team_slave_1 entered promiscuous mode [ 482.447368][ T7399] device team_slave_1 left promiscuous mode [ 482.517846][ T7399] bridge0: port 3(team_slave_1) entered disabled state [ 484.713533][ T7467] device sit0 left promiscuous mode [ 484.739605][ T7467] device sit0 entered promiscuous mode [ 485.677331][ T7482] device sit0 left promiscuous mode [ 485.947279][ T7482] device sit0 entered promiscuous mode [ 488.340838][ T7531] device sit0 left promiscuous mode [ 488.378001][ T7537] device sit0 entered promiscuous mode [ 488.653493][ T7547] device sit0 left promiscuous mode [ 488.781670][ T7550] device sit0 entered promiscuous mode [ 492.290586][ T7620] syz.3.2148[7620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 492.290660][ T7620] syz.3.2148[7620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 492.515749][ T7626] device veth0_vlan left promiscuous mode [ 492.634255][ T7626] device veth0_vlan entered promiscuous mode [ 492.792526][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 492.950855][ T7631] device syzkaller0 entered promiscuous mode [ 493.024993][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 493.033230][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 493.099742][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 493.446135][ T7639] device sit0 left promiscuous mode [ 494.055132][ T7639] device sit0 entered promiscuous mode [ 495.503001][ T7684] device macsec0 entered promiscuous mode [ 497.185697][ T7723] device wg2 left promiscuous mode [ 497.513053][ T7738] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 497.761468][ T7738] device syzkaller0 entered promiscuous mode [ 498.602748][ T7760] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 498.879928][ T7760] device syzkaller0 entered promiscuous mode [ 499.128925][ T7773] bridge0: port 2(bridge_slave_1) entered disabled state [ 499.145886][ T7773] bridge0: port 1(bridge_slave_0) entered disabled state [ 499.511569][ T7772] device veth0_vlan left promiscuous mode [ 499.597848][ T7772] device veth0_vlan entered promiscuous mode [ 499.728919][ T7782] device syzkaller0 entered promiscuous mode [ 500.100808][ T7793] device sit0 left promiscuous mode [ 500.326571][ T7796] device sit0 entered promiscuous mode [ 501.112437][ T7811] device veth1_macvtap entered promiscuous mode [ 501.190474][ T5958] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 502.591338][ T7841] device syzkaller0 entered promiscuous mode [ 506.060199][ T7908] device wg2 left promiscuous mode [ 508.219583][ T7934] syz.1.2238[7934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 508.219654][ T7934] syz.1.2238[7934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 515.963184][ T8038] bridge0: port 1(bridge_slave_0) entered blocking state [ 516.004872][ T8038] bridge0: port 1(bridge_slave_0) entered disabled state [ 516.059246][ T8038] device bridge_slave_0 entered promiscuous mode [ 516.171616][ T8038] bridge0: port 2(bridge_slave_1) entered blocking state [ 516.178669][ T8038] bridge0: port 2(bridge_slave_1) entered disabled state [ 516.185998][ T8038] device bridge_slave_1 entered promiscuous mode [ 516.953808][ T8071] syz.3.2264[8071] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 516.953895][ T8071] syz.3.2264[8071] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 517.382157][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 517.648362][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 517.655657][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 517.663858][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 517.671905][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 517.678770][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 517.692130][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 517.700500][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 517.708765][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 517.715604][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 517.723515][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 517.802142][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 517.816661][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 517.824742][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 517.833155][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 517.841270][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 517.849625][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 517.857987][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 517.865714][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 517.878930][ T8038] device veth0_vlan entered promiscuous mode [ 517.958352][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 517.965670][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 517.981035][ T8082] device sit0 left promiscuous mode [ 518.088881][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 518.096976][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 518.326058][ T8038] device veth1_macvtap entered promiscuous mode [ 518.419267][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 518.426751][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 518.618094][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 518.761421][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 518.787389][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 519.085745][ T8094] device sit0 entered promiscuous mode [ 525.547306][ T8158] device vxcan1 entered promiscuous mode [ 526.623768][ T8180] device sit0 left promiscuous mode [ 527.902239][ T8192] device syzkaller0 entered promiscuous mode [ 533.062587][ T8274] syz.2.2323[8274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.062659][ T8274] syz.2.2323[8274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 534.463090][ T8292] device sit0 left promiscuous mode [ 534.836219][ T8295] device sit0 entered promiscuous mode [ 541.310867][ T8365] device syzkaller0 entered promiscuous mode [ 541.552442][ T8372] syz.4.2350[8372] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 541.552513][ T8372] syz.4.2350[8372] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 542.267331][ T8383] device sit0 left promiscuous mode [ 542.356545][ T8384] device sit0 entered promiscuous mode [ 543.861231][ T8420] syz.0.2362[8420] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 543.861313][ T8420] syz.0.2362[8420] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 545.839271][ T8459] device sit0 entered promiscuous mode [ 546.422810][ T8478] syz.1.2379[8478] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 546.422889][ T8478] syz.1.2379[8478] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 547.939014][ T8500] device syzkaller0 entered promiscuous mode [ 548.052993][ T8511] tun0: tun_chr_ioctl cmd 1074025675 [ 548.058283][ T8511] tun0: persist enabled [ 548.231566][ T8521] device veth1_macvtap left promiscuous mode [ 553.280455][ T28] audit: type=1400 audit(1729104441.134:154): avc: denied { create } for pid=8559 comm="syz.4.2401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 554.453226][ T8575] device syzkaller0 entered promiscuous mode [ 555.944815][ T8611] syz.4.2417[8611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 555.944888][ T8611] syz.4.2417[8611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 556.690191][ T8626] syz.1.2430[8626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 556.717092][ T8626] syz.1.2430[8626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 557.454846][ T8637] device syzkaller0 entered promiscuous mode [ 561.517236][ T8693] device syzkaller0 entered promiscuous mode [ 562.380323][ T8721] device sit0 left promiscuous mode [ 566.152487][ T8775] syz.3.2460[8775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 566.152560][ T8775] syz.3.2460[8775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 568.328148][ T8816] device bridge0 entered promiscuous mode [ 569.265609][ T8830] device syzkaller0 entered promiscuous mode [ 569.878281][ T8845] bridge0: port 3(team_slave_1) entered blocking state [ 569.885027][ T8845] bridge0: port 3(team_slave_1) entered disabled state [ 569.998356][ T8845] device team_slave_1 entered promiscuous mode [ 570.152039][ T8841] device team_slave_1 left promiscuous mode [ 570.176030][ T8841] bridge0: port 3(team_slave_1) entered disabled state [ 572.872500][ T8908] syz.1.2505[8908] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 572.872572][ T8908] syz.1.2505[8908] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 576.243617][ T8964] syz.4.2535[8964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 576.292304][ T8964] syz.4.2535[8964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 584.138853][ T9082] device wg2 entered promiscuous mode [ 585.056598][ T9101] device sit0 left promiscuous mode [ 585.282505][ T9100] device sit0 entered promiscuous mode [ 588.162204][ T9156] device sit0 left promiscuous mode [ 588.465309][ T9156] device sit0 entered promiscuous mode [ 609.072995][ T43] device bridge_slave_1 left promiscuous mode [ 609.095789][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 609.207846][ T43] device bridge_slave_0 left promiscuous mode [ 609.257085][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 609.449096][ T43] device veth0_vlan left promiscuous mode [ 621.549033][ T9738] device sit0 left promiscuous mode [ 621.756028][ T9738] device sit0 entered promiscuous mode [ 622.407910][ T9742] device wg2 entered promiscuous mode [ 625.482441][ T9797] device wg2 entered promiscuous mode [ 625.535670][ T9799] device bridge_slave_0 entered promiscuous mode [ 625.560132][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 627.112422][ T9829] device veth0_vlan left promiscuous mode [ 627.520331][ T9829] device veth0_vlan entered promiscuous mode [ 627.721409][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 627.734530][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 627.751097][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 628.506643][ T9862] device sit0 left promiscuous mode [ 628.599218][ T9862] device sit0 entered promiscuous mode [ 631.181599][ T9899] syz.2.2809[9899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 631.181675][ T9899] syz.2.2809[9899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 631.460772][ T9900] device wg2 left promiscuous mode [ 631.839655][ T9904] device wg2 entered promiscuous mode [ 631.846956][ T9905] device wg2 entered promiscuous mode [ 631.981988][ T9915] bridge0: port 1(bridge_slave_0) entered disabled state [ 632.169279][ T5958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 632.238166][ T5958] bridge0: port 1(bridge_slave_0) entered blocking state [ 632.245273][ T5958] bridge0: port 1(bridge_slave_0) entered forwarding state [ 632.925543][ T9932] device sit0 left promiscuous mode [ 633.158939][ T9938] device sit0 entered promiscuous mode [ 635.978431][ T9977] bridge0: port 1(bridge_slave_0) entered disabled state [ 636.248772][ T9978] bridge0: port 1(bridge_slave_0) entered blocking state [ 636.255653][ T9978] bridge0: port 1(bridge_slave_0) entered forwarding state [ 642.786571][T10047] device sit0 entered promiscuous mode [ 643.996244][T10067] syz.3.2858[10067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 643.996320][T10067] syz.3.2858[10067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 646.169544][T10077] device sit0 left promiscuous mode [ 650.026749][T10127] syz.4.2878[10127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 650.026823][T10127] syz.4.2878[10127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 659.919770][ T28] audit: type=1400 audit(1729104547.774:155): avc: denied { setattr } for pid=10218 comm="syz.4.2904" path="/dev/ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 661.957981][T10242] device sit0 left promiscuous mode [ 662.329019][T10243] device sit0 entered promiscuous mode [ 666.822432][T10293] device veth0_vlan left promiscuous mode [ 666.866714][T10293] device veth0_vlan entered promiscuous mode [ 666.988869][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 667.009108][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 667.018187][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 667.066374][T10295] device wg2 left promiscuous mode [ 667.230699][T10296] device wg2 entered promiscuous mode [ 674.729817][T10406] device sit0 entered promiscuous mode [ 678.494939][T10478] device veth0_vlan left promiscuous mode [ 678.622737][T10478] device veth0_vlan entered promiscuous mode [ 678.781187][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 678.798877][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 678.928926][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 682.395702][T10536] device sit0 left promiscuous mode [ 682.560673][T10536] device sit0 entered promiscuous mode [ 684.380148][T10589] device sit0 left promiscuous mode [ 684.565763][T10595] device sit0 left promiscuous mode [ 687.257465][T10647] device veth0_vlan left promiscuous mode [ 687.422722][T10647] device veth0_vlan entered promiscuous mode [ 687.632515][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 687.655288][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 687.789037][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 687.864486][T10657] device veth0_vlan left promiscuous mode [ 688.008524][T10657] device veth0_vlan entered promiscuous mode [ 688.148512][T10657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 688.328485][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 688.336261][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 688.510409][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 688.735355][T10676] device veth0_vlan left promiscuous mode [ 688.919625][T10676] device veth0_vlan entered promiscuous mode [ 689.778248][T10702] sock: sock_set_timeout: `syz.4.3049' (pid 10702) tries to set negative timeout [ 692.280926][T10743] device veth0_vlan left promiscuous mode [ 692.450115][T10743] device veth0_vlan entered promiscuous mode [ 692.744885][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 692.841678][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 692.987190][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 700.962288][T10905] bridge0: port 2(bridge_slave_1) entered disabled state [ 700.977135][T10905] bridge0: port 1(bridge_slave_0) entered disabled state [ 701.226264][T10899] device veth0_vlan left promiscuous mode [ 701.427867][T10899] device veth0_vlan entered promiscuous mode [ 701.919994][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 701.939411][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 701.946721][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 702.445033][T10932] device veth0_vlan left promiscuous mode [ 702.593856][T10932] device veth0_vlan entered promiscuous mode [ 703.323797][T10941] sock: sock_set_timeout: `syz.2.3120' (pid 10941) tries to set negative timeout [ 708.491814][ T28] audit: type=1400 audit(1729104596.344:156): avc: denied { create } for pid=11038 comm="syz.4.3148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 709.426646][ T28] audit: type=1400 audit(1729104597.274:157): avc: denied { append } for pid=85 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 709.670651][ T28] audit: type=1400 audit(1729104597.274:158): avc: denied { open } for pid=85 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 709.698011][ T28] audit: type=1400 audit(1729104597.274:159): avc: denied { getattr } for pid=85 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 710.208351][T11071] bridge0: port 1(bridge_slave_0) entered disabled state [ 710.246435][T11069] sock: sock_set_timeout: `syz.0.3159' (pid 11069) tries to set negative timeout [ 710.311970][T11071] device bridge0 left promiscuous mode [ 710.370900][T11071] bridge0: port 1(bridge_slave_0) entered blocking state [ 710.377812][T11071] bridge0: port 1(bridge_slave_0) entered forwarding state [ 710.532240][T11071] device bridge0 entered promiscuous mode [ 711.357966][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 712.460736][T11107] device veth0_vlan left promiscuous mode [ 712.537444][T11107] device veth0_vlan entered promiscuous mode [ 712.871249][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 712.935941][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 713.028211][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 713.827687][T11133] sock: sock_set_timeout: `syz.3.3172' (pid 11133) tries to set negative timeout [ 714.398958][T11141] device wg2 left promiscuous mode [ 714.621110][T11143] device wg2 entered promiscuous mode [ 720.664744][T11256] device sit0 left promiscuous mode [ 721.379161][T11279] bridge0: port 2(bridge_slave_1) entered blocking state [ 721.386042][T11279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 721.393165][T11279] bridge0: port 1(bridge_slave_0) entered blocking state [ 721.400014][T11279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 721.483404][T11279] device bridge0 entered promiscuous mode [ 721.927721][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 727.173586][T11361] device wg2 left promiscuous mode [ 729.780260][T11398] sock: sock_set_timeout: `syz.1.3246' (pid 11398) tries to set negative timeout [ 731.238898][T11424] syz.0.3267[11424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 731.238971][T11424] syz.0.3267[11424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 732.835183][T11463] device sit0 entered promiscuous mode [ 733.960667][T11486] sock: sock_set_timeout: `syz.2.3275' (pid 11486) tries to set negative timeout [ 752.447251][T11846] device sit0 entered promiscuous mode [ 753.527259][T11862] device sit0 entered promiscuous mode [ 755.030588][T11892] device veth0_vlan left promiscuous mode [ 755.177218][T11892] device veth0_vlan entered promiscuous mode [ 755.346035][ T5958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 755.356992][ T5958] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 755.364663][ T5958] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 755.406555][T11897] device sit0 left promiscuous mode [ 755.592708][T11898] device sit0 entered promiscuous mode [ 760.375503][T11991] device sit0 entered promiscuous mode [ 761.626116][T12024] syz.4.3417[12024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 761.626198][T12024] syz.4.3417[12024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 762.652163][T12048] device sit0 left promiscuous mode [ 762.928630][T12047] device sit0 entered promiscuous mode [ 770.950958][T12200] bridge0: port 3(team_slave_1) entered blocking state [ 770.992287][T12200] bridge0: port 3(team_slave_1) entered disabled state [ 771.074004][T12200] device team_slave_1 entered promiscuous mode [ 775.746528][T12307] device veth0_vlan left promiscuous mode [ 775.891910][T12307] device veth0_vlan entered promiscuous mode [ 776.017714][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 776.025513][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 776.192960][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 779.243697][T12359] device wg2 left promiscuous mode [ 784.560422][ T28] audit: type=1400 audit(1729104672.414:160): avc: denied { create } for pid=12468 comm="syz.0.3548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 785.840765][ T28] audit: type=1400 audit(1729104673.694:161): avc: denied { create } for pid=12485 comm="syz.0.3554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 788.482893][T12527] device wg2 left promiscuous mode [ 790.423346][T12568] device wg2 left promiscuous mode [ 790.609247][T12572] device wg2 entered promiscuous mode [ 791.340498][T12586] device wg2 left promiscuous mode [ 791.805703][T12592] device wg2 entered promiscuous mode [ 793.588441][T12637] device veth0_vlan left promiscuous mode [ 793.631589][T12637] device veth0_vlan entered promiscuous mode [ 793.804867][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 793.835880][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 794.058089][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 794.615324][ T28] audit: type=1400 audit(1729104682.464:162): avc: denied { rename } for pid=85 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 794.848616][ T28] audit: type=1400 audit(1729104682.464:163): avc: denied { unlink } for pid=85 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 795.207946][ T28] audit: type=1400 audit(1729104682.464:164): avc: denied { create } for pid=85 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 803.965993][T12765] device sit0 left promiscuous mode [ 804.586301][T12770] device sit0 entered promiscuous mode [ 806.812081][T12807] bridge0: port 2(bridge_slave_1) entered disabled state [ 806.825051][T12807] bridge0: port 1(bridge_slave_0) entered disabled state [ 806.975972][T12807] device bridge0 left promiscuous mode [ 820.271714][ T28] audit: type=1400 audit(1729104708.104:165): avc: denied { create } for pid=12972 comm="syz.4.3675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 820.897339][T12996] syz.3.3680[12996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 820.897410][T12996] syz.3.3680[12996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 828.378887][T13085] device sit0 left promiscuous mode [ 828.654882][T13085] device sit0 entered promiscuous mode [ 830.391732][T13114] device veth0_vlan left promiscuous mode [ 830.397923][T13114] device veth0_vlan entered promiscuous mode [ 831.684469][T13144] device veth0_vlan left promiscuous mode [ 831.794127][T13144] device veth0_vlan entered promiscuous mode [ 831.864456][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 831.899959][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 831.972902][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 837.818831][T13240] device sit0 left promiscuous mode [ 837.934284][T13241] device sit0 entered promiscuous mode [ 838.606969][T13247] device wg2 entered promiscuous mode [ 855.384268][T13385] device sit0 left promiscuous mode [ 855.506281][T13386] device sit0 entered promiscuous mode [ 861.262529][T13447] device veth1_macvtap left promiscuous mode [ 861.277764][T13447] device macsec0 left promiscuous mode [ 864.472760][T13490] device veth0_vlan left promiscuous mode [ 864.538872][T13490] device veth0_vlan entered promiscuous mode [ 864.658927][ T5958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 864.667640][ T5958] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 864.716805][ T5958] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=3 req=3767 state=3 status=67 (errno 9: Bad file descriptor) [ 884.298813][ T43] device bridge_slave_1 left promiscuous mode [ 884.304722][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 884.312042][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 884.321424][ T43] device team_slave_1 left promiscuous mode [ 884.327157][ T43] bridge0: port 3(team_slave_1) entered disabled state [ 884.334446][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 884.341719][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 884.350001][ T43] device veth0_vlan left promiscuous mode [ 884.355956][ T43] device veth0_vlan left promiscuous mode [ 884.361882][ T43] device veth1_macvtap left promiscuous mode [ 884.367741][ T43] device veth0_vlan left promiscuous mode