last executing test programs: 12.025979023s ago: executing program 3 (id=3339): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{0x1}, &(0x7f0000000140), &(0x7f0000000200)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001740)={0xffffffffffffffff, 0x20, &(0x7f0000001700)={&(0x7f0000000640)=""/4096, 0x1000, 0x0, &(0x7f0000001640)=""/153, 0x99}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001780), 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1e00000002000000080000000008000004a00000", @ANYRES32=0x1, @ANYBLOB="010400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300000004000000000000000500000000000000", @ANYRES32, @ANYBLOB="00fd45ae1beb000000"], 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB="8000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200001002000000041d00000000000000000000000000000000b816610471a63e63ec7e4de435cc0000"], 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x85a, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0xc6, 0x0, 0x100, 0x800a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x6}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, r3, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) 10.056384791s ago: executing program 3 (id=3339): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{0x1}, &(0x7f0000000140), &(0x7f0000000200)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001740)={0xffffffffffffffff, 0x20, &(0x7f0000001700)={&(0x7f0000000640)=""/4096, 0x1000, 0x0, &(0x7f0000001640)=""/153, 0x99}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001780), 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1e00000002000000080000000008000004a00000", @ANYRES32=0x1, @ANYBLOB="010400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300000004000000000000000500000000000000", @ANYRES32, @ANYBLOB="00fd45ae1beb000000"], 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB="8000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200001002000000041d00000000000000000000000000000000b816610471a63e63ec7e4de435cc0000"], 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x85a, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0xc6, 0x0, 0x100, 0x800a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x6}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, r3, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) 8.253742716s ago: executing program 3 (id=3339): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{0x1}, &(0x7f0000000140), &(0x7f0000000200)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001740)={0xffffffffffffffff, 0x20, &(0x7f0000001700)={&(0x7f0000000640)=""/4096, 0x1000, 0x0, &(0x7f0000001640)=""/153, 0x99}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001780), 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1e00000002000000080000000008000004a00000", @ANYRES32=0x1, @ANYBLOB="010400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300000004000000000000000500000000000000", @ANYRES32, @ANYBLOB="00fd45ae1beb000000"], 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB="8000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200001002000000041d00000000000000000000000000000000b816610471a63e63ec7e4de435cc0000"], 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x85a, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0xc6, 0x0, 0x100, 0x800a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x6}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, r3, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) 6.491697387s ago: executing program 0 (id=3477): bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000340)='kmem_cache_free\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) (async) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67152944, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc8}, 0x100) (async) recvmsg$unix(r4, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc8}, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) (async) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r3, 0x89f0, &(0x7f0000002280)={'ip6tnl0\x00', @link_local}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r2, 0x18000000000002a0, 0xf, 0x0, &(0x7f00000009c0)="b9ef0300600d698cff9eab0668bfa7", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 6.246051058s ago: executing program 2 (id=3480): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES64=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffd04) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x7, 0x0, 0x6, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 6.22110323s ago: executing program 3 (id=3339): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{0x1}, &(0x7f0000000140), &(0x7f0000000200)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001740)={0xffffffffffffffff, 0x20, &(0x7f0000001700)={&(0x7f0000000640)=""/4096, 0x1000, 0x0, &(0x7f0000001640)=""/153, 0x99}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001780), 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1e00000002000000080000000008000004a00000", @ANYRES32=0x1, @ANYBLOB="010400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300000004000000000000000500000000000000", @ANYRES32, @ANYBLOB="00fd45ae1beb000000"], 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB="8000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200001002000000041d00000000000000000000000000000000b816610471a63e63ec7e4de435cc0000"], 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x85a, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0xc6, 0x0, 0x100, 0x800a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x6}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, r3, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) 4.386649277s ago: executing program 0 (id=3481): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000007d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) ioctl$SIOCSIFHWADDR(r4, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8943, &(0x7f0000000080)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r6}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200), 0x81, r8}, 0x38) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r7, 0x18000000000002a0, 0xe40, 0x0, &(0x7f00000002c0)="f6eb094549002060009b8538a4ba", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r10}, 0x10) 4.385682687s ago: executing program 2 (id=3483): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000800073012f000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc0, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2620}, 0x80) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x100002, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r6}, 0x10) write$cgroup_int(r5, &(0x7f0000000040)=0x3, 0x12) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0x39, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001000}, 0x31}, 0x0, 0x0, 0xffffffffffffffff, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x275a, 0x0) socketpair(0x2, 0x1, 0x0, &(0x7f0000000000)) r7 = openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) write$cgroup_subtree(r7, &(0x7f0000000040)={[{0x2d, 'pids'}, {0x2d, 'cpu'}]}, 0xb) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff85000000040000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 4.295479935s ago: executing program 4 (id=3485): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x100, 0x34120, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000280), 0x1}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000003"], 0x48) r7 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r8}, &(0x7f0000000180), &(0x7f00000001c0)=r7}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) close(r10) setsockopt$sock_attach_bpf(r11, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) 4.295090815s ago: executing program 3 (id=3339): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{0x1}, &(0x7f0000000140), &(0x7f0000000200)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001740)={0xffffffffffffffff, 0x20, &(0x7f0000001700)={&(0x7f0000000640)=""/4096, 0x1000, 0x0, &(0x7f0000001640)=""/153, 0x99}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001780), 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1e00000002000000080000000008000004a00000", @ANYRES32=0x1, @ANYBLOB="010400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300000004000000000000000500000000000000", @ANYRES32, @ANYBLOB="00fd45ae1beb000000"], 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB="8000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200001002000000041d00000000000000000000000000000000b816610471a63e63ec7e4de435cc0000"], 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x85a, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0xc6, 0x0, 0x100, 0x800a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x6}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, r3, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) 2.378160949s ago: executing program 0 (id=3486): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x48) r1 = perf_event_open$cgroup(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x9, 0x5, 0x18, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_config_ext={0x154, 0x3}, 0x9400, 0x9, 0x5, 0x7, 0x2, 0x5, 0x9, 0x0, 0x1400, 0x0, 0xfffffffffffffaa6}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0xc) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r2}, 0x10) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000005c0)='F', 0x1}], 0x1}, 0x0) recvmsg(r6, &(0x7f0000000680)={&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0, 0x0, &(0x7f0000001340)=""/4096, 0x1000}, 0x4001a000) r7 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="85000000070000006a0a00ff000000000c00000000000000950000000000000018100000", @ANYRES32, @ANYBLOB="000000000000000005000000000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e}, 0x2d) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000540)={@ifindex, r7, 0x11, 0x4, 0x0, @void, @value=r4}, 0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000580)='kmem_cache_free\x00', r9}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000000)='./file1\x00', 0x0, 0x10}, 0x18) 2.376610469s ago: executing program 1 (id=3487): bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000c8f140a0aad331ff6754696f74e1762653685eb8aa6fdc977fd66da5e2d388ee253e3714255e2b", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000c8f140a0aad331ff6754696f74e1762653685eb8aa6fdc977fd66da5e2d388ee253e3714255e2b", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="f200000000000000b7043569353e43dd45cf9a0800000000ff00938af8ff00000000bfa24988f56d29360ea7eb409de3b1bc3f00000000000007029037caecc9eed98f5103d4f544d462040000000000f085000000210000e0a63f6469ea45daa843d752b6dc97dcdf6787b7ce44e7d46779a4272318a81fdd48f2a9cf36fd72c227e2014baacb9280112c74654c21948e62fd8bca60299334cd2bdde72ef721c0b4f52ef71ecb92b6"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRESOCT=r2], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x2aa40, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) (async) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 2.375603239s ago: executing program 2 (id=3488): r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="0a00000007000000ff0f000007"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="0a00000007000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x18) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x210, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8, 0x0, 0x58c4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYRES32=r3], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, r4, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0xfffffffc}, 0x10}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYRES32=r3], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, r4, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0xfffffffc}, 0x10}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() (async) r5 = gettid() syz_open_procfs$namespace(r5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 2.374375449s ago: executing program 4 (id=3489): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffc0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1600000000000000040000000500000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/20], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) recvmsg$unix(r3, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 2.326015323s ago: executing program 2 (id=3490): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="17000000000000000084000001"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r6, 0x0, &(0x7f0000002240)=""/4097}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x5, 0x1, 0x40}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x800) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010005000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x5d, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r12}, 0x10) close(r1) 2.288045086s ago: executing program 0 (id=3491): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffed7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r2}, &(0x7f0000000000), &(0x7f00000000c0)=r3}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x80) socketpair(0xf, 0x1, 0x4, 0x0) 2.286885656s ago: executing program 1 (id=3492): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) recvmsg(r0, &(0x7f0000000400)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000006c0)=""/170, 0xaa}], 0x1}, 0x101) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) (async) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 2.286489696s ago: executing program 4 (id=3493): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000400000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) r3 = perf_event_open(&(0x7f0000000100)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="180800000000000000000000000000008500000023000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) sendmsg$unix(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800001f1a0068099b3c0000000000001860000000000000824d086bb227733218120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x4}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x50}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x42}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x85}, 0x52) r11 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) write$cgroup_int(r11, &(0x7f00000001c0)=0x10000000, 0xfffffdef) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000440)={0x1b, 0x0, 0x0, 0x80000003, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x80}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0x1c, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000001340)=""/4096, 0x40f00, 0x4b, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000300)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[r8, r11, r11, r12, r8], &(0x7f0000000680)=[{0x4, 0x2, 0x3, 0xa}], 0x10, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x8c67ab19eb1a487f, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xffffffff, 0x4}, 0x4, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) 2.243023819s ago: executing program 1 (id=3494): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1900000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000ab85000000e81864a794b06d4600000000000000000000bcf1c63da6cd84175f99acb572b9ae4c7092c889d08dd6f8776e8b359ed4d22dfdd63e6600"/77], 0x48) (async) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x9, [@int={0x5, 0x0, 0x0, 0x1, 0x0, 0x1e, 0x0, 0x7b, 0x2}]}, {0x0, [0x30, 0x0, 0x30, 0x5768b4971c328390, 0x30, 0x0, 0x5f]}}, &(0x7f0000000440)=""/64, 0x31, 0x40, 0x1, 0x1}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0xc, &(0x7f0000000200)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffff9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @alu={0x7, 0x1, 0xd, 0x2, 0x1, 0xfffffffffffffec9, 0x1}, @generic={0x5, 0xe, 0x1, 0x800, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x4}, @jmp={0x5, 0x1, 0x5, 0x7, 0x7, 0xffffffffffffffff}], &(0x7f00000002c0)='GPL\x00', 0xffff, 0x0, 0x0, 0xc2c00, 0x46, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000540)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x3, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[r1, r1], 0x0, 0x10, 0x1}, 0x94) (async) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0500000004000000ff0f000007000000000000003056fbefbe6fdaaf591d17c79c757fe3f26caf7e19071e83b9c729b5691949fc2f40340a3a9909a0424b1e000d7157622c321ad32aa3965d73b6f6e04a63f4860a8108781a663679c7a7f85e1044f7e975be02e0a1b0ad2482a13f975b4aacd817695af13af3", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000080850000008200000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f00000021c0)={r5, 0x0, 0x0}, 0x10) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000fc0)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0xfffffffb}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x800, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f40)={r6, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110e22fff6) (async) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0xb, &(0x7f0000001140)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000010a850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) ioctl$TUNSETOFFLOAD(r9, 0x4004743d, 0x110e22fff6) 2.24244593s ago: executing program 2 (id=3495): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0100000001000000050008000100000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r0}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f7ff0000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) (async, rerun: 64) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) (rerun: 64) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000700)='mm_lru_insertion\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) 2.189702944s ago: executing program 1 (id=3496): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x10000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x10000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ad0000010000000068cce52bb4e7040d97e49788354ce2cc6cd9f1a1c9a0"], 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r4 = bpf$ITER_CREATE(0xb, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) (async) close(r4) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3d, &(0x7f0000002600), 0x8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x3, 0xfd, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x21}]}, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x21}]}, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a40)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="9feb01001800000000000000200000002000000003000000000000000100f604000000000000000000000000010000000000000c01000000006100"], &(0x7f0000000940)=""/222, 0x3b, 0xde, 0x1}, 0x28) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a40)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="9feb01001800000000000000200000002000000003000000000000000100f604000000000000000000000000010000000000000c01000000006100"], &(0x7f0000000940)=""/222, 0x3b, 0xde, 0x1}, 0x28) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r5}, 0x8) (async) r6 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r5}, 0x8) close(r6) (async) close(r6) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r5, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) mkdir(&(0x7f0000000340)='./file0\x00', 0x9) bpf$LINK_DETACH(0x22, &(0x7f0000000000)=r6, 0x4) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 2.187523084s ago: executing program 3 (id=3339): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{0x1}, &(0x7f0000000140), &(0x7f0000000200)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001740)={0xffffffffffffffff, 0x20, &(0x7f0000001700)={&(0x7f0000000640)=""/4096, 0x1000, 0x0, &(0x7f0000001640)=""/153, 0x99}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001780), 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1e00000002000000080000000008000004a00000", @ANYRES32=0x1, @ANYBLOB="010400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300000004000000000000000500000000000000", @ANYRES32, @ANYBLOB="00fd45ae1beb000000"], 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB="8000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200001002000000041d00000000000000000000000000000000b816610471a63e63ec7e4de435cc0000"], 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x85a, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0xc6, 0x0, 0x100, 0x800a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x6}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, r3, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) 86.437033ms ago: executing program 0 (id=3497): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_pressure(r1, &(0x7f0000000340)='cpu.pressure\x00', 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}, @volatile={0x0, 0x0, 0x0, 0x9, 0x3}, @restrict={0x0, 0x0, 0x0, 0x4}]}}, 0x0, 0x4a}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000002c0)={'rose0\x00', 0x112}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000070000002800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000007d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r7}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r6}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r9, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) bpf$ITER_CREATE(0x21, 0x0, 0x0) close(0xffffffffffffffff) 85.526673ms ago: executing program 1 (id=3498): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) (async) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000680)=ANY=[@ANYRESDEC, @ANYBLOB], 0x31) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) (async, rerun: 32) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 32) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001a40)=ANY=[@ANYBLOB="b70200000f000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000bf0000000000000095000000000000005ecefab8f2e85c6c1ca711fc206bb8ad6ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bd04000000000000009c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5f683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891184604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e101d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe151acc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394b9ba1a836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429ba63903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6d6fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f25005798ca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9958fad67ccaba76408da35c9f1534c8bd48bbdf9594e8b4ce73febaefb7eee403502734137ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb3b379e221a5318849b6b0679b5d65ab855fc9f1d10022cc20603480ffb1e3392fad690ce56aaa717e56fd55aec3d9d6671f55d7bc33830a4095497586e8d15c2a32d3176d45b783cb27112a69c14134488b6dd302c3e92a7e659351b610ed5ba022f92d4bf26b0a5c10a3c8eb0fabdf0017995ea0c06b41fe6dda769729328d6ee80ab3b4aeeeee7926575d526431184b2034b5cdacc8eaab03cf45af6ec451f65705d8a4375d559e4c3ad80e942d237616d8f2fdd5afe4fdf21478228d9f6299bf67cf1e62fc11c285e18fb65eeb657bc7375401bb175f6d2625195ce8647945dbdfb7eacc06a24832d155059b0f0c36b9433eff190f4c4c160f0484d4d39f5f92e8bd49ad3df23b961fe7bf9e506c5098ca79deb7906257e4ce9035f3a6b29453ee41640ade8b5916f38d19ab6f2fd51a9fd9a2559411967460952acf5c549e5466ee2d8563397a5f028486220fae69611d9bc0f1a68d31ad1a4e387de687ab1537bd46703e4e5ae0f096f731916628bf743a49ea7b7d22c04d738ca439343aaab682d45dc91187e9ff08005358e1f3d864f36ee590fb0da9c958f15f9105c41add43a7c28874e58c31a7acb0467e0bd97f2ccd78615b5144267772381e7498bb98d9e8a3f98b505e5c9645e19d011dd86a1dc134fa4b21ff8ec2d054ae7e0044b4700cd54ce392c2ee515e86070f2df561c15f331a1babfa60504410fa56a848ba1f501c8eb0bd6856451d150cfaf95d6dc889be27e8915bb3670fc76bcbeb390f3cefb5429c84907a92c6eab2b15758194ece4b1461f622510bcff5c0f8354637856f94d71a0841180e78a3a837ae7847c479f5c9c54859cb85393f190042a5dc31197f2c463be8affe29869d71df330b3466fc79b3488b4a2a3e2aae9af6421cd0902347103f2384bf08e5230b37297b668be11b4428b9a8e8c259afa6c73dd87fcc165b2fea66a180bf048530a5849f849d37aca6874cb1d50defdb90b3da04a575db38825db87f6bb0013a5dabcc0e9783aaac0cbb5d6fc437f1e77bf69cae31a213ca2b90ece8cc70fa320c9ffd05618e7a6e6cf8ada6b3e62557174b6d3516cc0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) (async, rerun: 32) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000a50000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r7}, 0x10) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x6b, 0x60000000}, 0x2c) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0xe, 0x0, &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport}, 0x94) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r8}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000005c0)='kmem_cache_free\x00', r9}, 0x10) (async) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x1ff) (async) recvmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000380)=""/12, 0xc}, {&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f00000003c0)=""/15, 0xf}, {&(0x7f0000000540)=""/91, 0x5b}, {&(0x7f00000005c0)=""/240, 0xf0}, {&(0x7f0000000700)=""/42, 0x2a}, {&(0x7f0000000740)=""/64, 0x40}], 0x7, &(0x7f0000000940)=""/238, 0xee}, 0x40) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4}, 0x48) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001c40)={0x14, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b702000001bc6500850000008600000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 83.500723ms ago: executing program 2 (id=3499): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x4000, 0x0, 0x0}, 0x30) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000e40)=""/4096, 0x1000}], 0x1}, 0x0) (async) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000e40)=""/4096, 0x1000}], 0x1}, 0x0) 82.568753ms ago: executing program 4 (id=3500): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x22}, 0x44) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002f0000009500000200000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8921, &(0x7f0000000140)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x01\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x04.\x9aL\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 59.619645ms ago: executing program 1 (id=3501): r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) close(0xffffffffffffffff) r2 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r5, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000540)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xdd, &(0x7f0000000600)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0xffffffd8, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0xe4, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x1e, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000008a0000009500000000000000b168b4b870498302941407543dc7ac62a5dea98279da035f50a760e12f334501ce49b95e75e3ff2f"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x88) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x18) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000040)=""/155, 0x1000000, 0x9b, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x30, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000080000000000000000080100018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001897f3293f20752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000600000018000000020000000000000007000000dd04400008000000183000000400000000000000000000001862000007000000000000000300000018620000010000000000000001800000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000fcffffff8500000006000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000440)='GPL\x00', 0x2, 0x95, &(0x7f0000000480)=""/149, 0x40f00, 0x4a, '\x00', r6, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x3, 0x8, 0x904e, 0x400}, 0x10, 0x0, 0x0, 0xa, &(0x7f00000008c0)=[r0, r1, r0], &(0x7f0000000900)=[{0x0, 0x3, 0x5, 0x2}, {0x1, 0x3, 0xe, 0x8}, {0x5, 0x3, 0x0, 0xa}, {0x0, 0x2, 0x4, 0x1}, {0x5, 0x4, 0xb, 0x3}, {0x2, 0x4, 0x3, 0xc}, {0x2, 0x4, 0xa, 0xa}, {0x3, 0x3, 0x7, 0x6}, {0x0, 0x4, 0x4, 0x3}, {0x2, 0x1, 0xc, 0x2}], 0x10, 0x1}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000cc0)={&(0x7f0000000a80)="7b41466db51349fc1c160fb878142d77493fc3f388091d6ec173e075", &(0x7f00000014c0)=""/4096, &(0x7f0000000ac0)="02a72e50467b294e485818694d84541c5b5a865a4a2aa89dc59cf9db3e2f957c8dc089f2be3d65e61554220dc924bace26eee2734561f77f83ee8fbeeae39545598a38a2471483166eeb3883be8f82caeff56bfd4069874baedc9b57b822b4149108d2cca5c5badbbd414eee16a7c0e1e419dfc87aa4db01a80650914d5bdc3469e682a1c48b8ba938914334b70d8a96be7782eade98eb7db076219601bd9fffc905c28ce3d6efda1ca1f5aa300e0b6527e0125f8cb1ce1212f46975ab50a79c199a20", &(0x7f0000000bc0)="9dcf9be2ef2eb51a8fd4da11ae18709f32e1793ae268a137864b2028114c467f5ac818434f8ef2dd142bd223f8c1b7f7d6363fc85de164b16f1b10ddf9c2bc6e3c4f41bc02b810be13128f8e2f87652cb4a80ef6331595ba6ccb16b53fdad9f049baf7a48262cdf4da862b7fc92f0794184b81218f3c1504d90cf1cb6d01696fc9fbd2d9ab2a0d36acf92d4e79e738a6c2c00c12331db7b9cff318ced06b6e1bba90fa28b45f32d4be621c3f5737e6a2144b28cf9ce19a3349bf0f2973c1984ec7ca170872b0ca66315d3db8195b357cb9776deddc6623f7ae252cc44374352e19a5f2c1cdbbfcfa115b4687e61b3545271e013f8159512f", 0x0, r2}, 0x38) socketpair(0x1d, 0x4, 0x1, 0x0) close(r3) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x1) 2.34361ms ago: executing program 0 (id=3502): r0 = perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x200, 0x0, 0x7, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.61726ms ago: executing program 4 (id=3503): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001180)={0x6, 0x7, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x8}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x2}, @alu={0x4, 0x1, 0x0, 0xb, 0x9, 0xfffffffffffffffe}, @func={0x85, 0x0, 0x1, 0x0, 0x3}], &(0x7f0000000040)='GPL\x00', 0xa9e8, 0x1000, &(0x7f0000000080)=""/4096, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001080)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000010c0)={0x3, 0x2, 0x3ff, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000001100)=[0x1, 0x1, 0xffffffffffffffff], &(0x7f0000001140)=[{0x0, 0x1, 0x2, 0xe}, {0x2, 0x3, 0xc, 0x3}, {0x2, 0x4, 0xa, 0xc}], 0x10, 0x401}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001500)={r0, 0xe0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001240)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000001280)=[0x0, 0x0, 0x0], &(0x7f00000012c0)=[0x0, 0x0], 0x0, 0x45, &(0x7f0000001300)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001340), &(0x7f0000001380), 0x8, 0xcd, 0x8, 0x8, &(0x7f00000013c0)}}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001580), 0x8) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000015c0)={&(0x7f0000001540)='fsi_master_acf_cmd_rel_addr\x00', r3, 0x0, 0x9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x18, 0x12, &(0x7f0000001600)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000016c0)='syzkaller\x00', 0x8000, 0x3f, &(0x7f0000001700)=""/63, 0x40f00, 0x41, '\x00', r1, 0x0, r3, 0x8, &(0x7f0000001740)={0x4, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000001780)=[{0x1, 0x5, 0x4, 0x9}, {0x2, 0x1, 0x5, 0x4}, {0x3, 0x1, 0x4}, {0x4, 0x4, 0x2, 0xc}, {0x3, 0x3, 0x9, 0x4}, {0x4, 0x3, 0x7, 0x1}, {0x1, 0x5, 0x6, 0x6}, {0x2, 0x4, 0xa, 0x2}], 0x10, 0x71}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001a80)={r0, 0x0, 0x29, 0x82, &(0x7f00000018c0)="177e39f7cb73e408ab8b90a1882b11c6a58efcde0cc5fb76be6389f62c169c89594e54cd0874dfd56e", &(0x7f0000001900)=""/130, 0x42db, 0x0, 0x3c, 0x41, &(0x7f00000019c0)="6ec1257a9af1a25e3f5f7aee7432fde47e2d4d5a5ad6ffd91be921a35ff1776a4a1b7fd19b8dc4b3e4449b74d390fdb0fe24cc1dc870aee9173964d9", &(0x7f0000001a00)="b45664e9606c67d24e2f596fc766180c2b2b79fa8fcd75abad7f1b8b07e3981382dd77eca0cd3bf1bd5ba28c2e8ccfaa3463a7fc51d0b51ca6fc38c9e66ac1acfe", 0x4, 0x0, 0x1}, 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001b40)=@o_path={&(0x7f0000001b00)='./file0\x00', r3, 0x4000, r4}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c00)={{r3, 0xffffffffffffffff}, &(0x7f0000001b80), &(0x7f0000001bc0)=r3}, 0x20) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001f40)=@bpf_tracing={0x1a, 0xc, &(0x7f0000001d40)=@raw=[@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0xd3a}, @jmp={0x5, 0x1, 0xd, 0x0, 0x1, 0x1, 0x1}, @exit], &(0x7f0000001dc0)='GPL\x00', 0x4, 0xb7, &(0x7f0000001e00)=""/183, 0x41000, 0x0, '\x00', 0x0, 0x18, r3, 0x8, &(0x7f0000001ec0)={0xa, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x19c03, r3, 0x0, &(0x7f0000001f00)=[r5, r3, r3, 0x1, r5], 0x0, 0x10, 0x8000}, 0x94) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002080)=@bpf_ext={0x1c, 0x7, &(0x7f0000001c40)=@raw=[@btf_id={0x18, 0x8, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @alu={0x7, 0x1, 0x0, 0x7, 0x0, 0x0, 0x1}, @generic={0x5, 0x8, 0x2, 0x79d6}, @exit], &(0x7f0000001c80)='syzkaller\x00', 0x1, 0x7, &(0x7f0000001cc0)=""/7, 0x41000, 0x60, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000001d00)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x185e7, r6, 0x1, &(0x7f0000002000)=[r3, r5], &(0x7f0000002040)=[{0x3, 0x1, 0x9}], 0x10, 0xc70b}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002240)={@ifindex=r1, 0x2e, 0x1, 0xfffffffa, &(0x7f0000002140)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000002180)=[0x0, 0x0], &(0x7f00000021c0)=[0x0, 0x0, 0x0], &(0x7f0000002200)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000002280)={@cgroup=r3, r3, 0x8, 0x2010, r0, @value=r3, @void, @void, @void, r9}, 0x20) r10 = openat$cgroup_ro(r3, &(0x7f00000022c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002300)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x3c, '\x00', r1, r3, 0x3, 0x2, 0x5}, 0x50) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000023c0)={0x1b, 0x0, 0x0, 0xfff, 0x0, r11, 0x300, '\x00', r8, r3, 0x5, 0x2, 0x2}, 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002440)=@generic={&(0x7f0000002380)='./file0\x00', r12}, 0x18) r13 = syz_clone(0x200, &(0x7f0000002500)="2d61d9701601011c180af7855f51dfdbbc5ca98521525cb9415b3ddb2dbda454abd4648e55b4374bb017ea12d06f05af756cb08789121c93128bfe843afc01dc305a", 0x42, &(0x7f0000002580), &(0x7f00000025c0), &(0x7f0000002600)="40ca71cd400f039f4a2006e7") r14 = perf_event_open(&(0x7f0000002480)={0x4, 0x80, 0xfe, 0xe, 0x1, 0x0, 0x0, 0x3, 0xc04, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x7, 0x8}, 0x240, 0x9, 0x4d, 0xc, 0x1, 0x2, 0x4d61, 0x0, 0x6, 0x0, 0x3}, r13, 0x9, r4, 0x9) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002800)={r10, 0x20, &(0x7f00000027c0)={&(0x7f0000002640)=""/198, 0xc6, 0x0, &(0x7f0000002740)=""/84, 0x54}}, 0x10) r15 = openat$cgroup_ro(r3, &(0x7f0000002840)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002b40)={r7, 0xe0, &(0x7f0000002a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000002880)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f00000028c0)=[0x0, 0x0], &(0x7f0000002900)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x7c, &(0x7f0000002940)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000002980), &(0x7f00000029c0), 0x8, 0x3f, 0x8, 0x8, &(0x7f0000002a00)}}, 0x10) ioctl$TUNSETOFFLOAD(r15, 0x400454d0, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000002b80)={0xffffffffffffffff}) sendmsg$tipc(r16, &(0x7f0000002e80)={&(0x7f0000002bc0)=@nameseq={0x1e, 0x1, 0x2, {0x42, 0x2, 0x3}}, 0x10, &(0x7f0000002d40)=[{&(0x7f0000002c00)="c432c5ee770c214d3b77b6acab3f8e010b91d6a09e32e35401f5d8ba249ef26c8b4f1b1eab3d3d19e1dcdb2ec999be15f474a5b42870054bdc3d2959ffc1b373d39a136065678880", 0x48}, {&(0x7f0000002c80)="b47f55426b6d5b8269f0463af99dfa709dbd397496a4705d230cf44a573e8e8f32d880", 0x23}, {&(0x7f0000002cc0)="b39181bbe459718ce192c46ba256808bd7f61e89017d40919a51381fb58eb7c0bdd701fa01366aed47f9a5f4ebc2d9069f206cd0", 0x34}, {&(0x7f0000002d00)="818da5854418f699d0f85178c6eed8eecd", 0x11}], 0x4, &(0x7f0000002d80)="e0407bfaff5d94c82feee637042ebc1aff36ab70d46c58c71d7b70bd3c2a61ca9a1fdbb953a66cf1c17ed28e86800b7e2aeb74c2e23c047e013e8b0533bccdfe5c33ec4384412a40102ce5d7d527da5853e9e52bd23d788ee3fec9d25440937c79a85b09d57d3ca94947eefbcbb96d54992d2530d7123f9d060066ca240a3c083aafc017108db0acadcf572bb8fa860285e306cf8ddb6f9e4094452525d8f7180eaaf7a3b90b9a530216a9ff4d6fdc4d44c287b33783e821902e47591abfea3fe4c1006f01f4a1855a2e7a7773dc3f4710c632a654b071c6c570207a26a8625852f30434c7d62672785917752967dfec93ef52", 0xf3, 0x4800}, 0x20000000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002f80)={r12, &(0x7f0000002ec0)="f1e0baf58e23c4f4aabcb9718eecbdf40c93780926dce3a9a6c7528197e59abfb8b12bc873ba91f922d1dca645d58121", &(0x7f0000002f00)=""/71}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000003280)={r10, 0x0, 0x6f, 0xa6, &(0x7f0000002fc0)="0abb8a11849381e19349e973eee588f601ba1c73baf0621c41c9f572d11ce04bb929022d093017b7d33ab6b303842054f14f279600b9847756cda738947b537bc08ed0bddcd28336a60fb688795aaacd3757189ed707937a40b14dd6ce562e265ea9102334488983fefab57515b61c", &(0x7f0000003040)=""/166, 0x0, 0x0, 0xfb, 0x50, &(0x7f0000003100)="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", &(0x7f0000003200)="c433bf11c502c562cae1e2d1c2b227cf60e5015326a82953566d956b662496f3366392611b6b5184c98256704480c3146adbe8dccb4767c51625ca4aadbb19f18fba7f1d5df43fce562a489f43d23d24", 0x3, 0x0, 0x4}, 0x50) ioctl$TUNSETDEBUG(r15, 0x400454c9, &(0x7f0000003300)=0x3) recvmsg(r14, &(0x7f0000004800)={&(0x7f0000003340)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000004740)=[{&(0x7f00000033c0)=""/180, 0xb4}, {&(0x7f0000003480)=""/52, 0x34}, {&(0x7f00000034c0)=""/41, 0x29}, {&(0x7f0000003500)=""/4096, 0x1000}, {&(0x7f0000004500)=""/12, 0xc}, {&(0x7f0000004540)=""/62, 0x3e}, {&(0x7f0000004580)=""/60, 0x3c}, {&(0x7f00000045c0)=""/58, 0x3a}, {&(0x7f0000004600)=""/45, 0x2d}, {&(0x7f0000004640)=""/225, 0xe1}], 0xa}, 0x40000042) r17 = bpf$PROG_LOAD(0x5, &(0x7f0000004a40)={0x20, 0x7, &(0x7f0000004840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@map_idx={0x18, 0xb, 0x5, 0x0, 0x2}, @map_val={0x18, 0x5, 0x2, 0x0, r10, 0x0, 0x0, 0x0, 0xa0}]}, &(0x7f0000004880)='syzkaller\x00', 0x10000, 0xa2, &(0x7f00000048c0)=""/162, 0x41000, 0x8, '\x00', r1, @fallback=0x28, 0xffffffffffffffff, 0x8, &(0x7f0000004980)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000049c0)={0x5, 0x10, 0xfffffffd, 0x8}, 0x10, r2, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000004a00)=[{0x2, 0x5, 0x10, 0x6}, {0x2, 0x4, 0x6, 0x2}], 0x10, 0xffffffff}, 0x94) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000004b00)={r3, r17, 0x0, r3}, 0x10) 0s ago: executing program 4 (id=3504): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32=0x0, @ANYBLOB], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, 0x0, 0x17) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffe90}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x800}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(r3, 0x0) (async) syz_open_procfs$namespace(r3, &(0x7f0000000280)='ns/mnt\x00') close(r2) (async) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1e00000009000000030000000900000001000000", @ANYRES32, @ANYBLOB="0100000000000000000000000000000000000000cd8c49fc25f92aa50a3cff2e3e4a35182f0e039ba03a6602f810fd98cfae0000f3ff00"/65, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003000000040000000c00"/28], 0x48) (async) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) (async) close(r5) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.17' (ED25519) to the list of known hosts. [ 21.763758][ T24] audit: type=1400 audit(1755348248.620:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.764789][ T267] cgroup: Unknown subsys name 'net' [ 21.786423][ T24] audit: type=1400 audit(1755348248.620:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.813679][ T24] audit: type=1400 audit(1755348248.650:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.813850][ T267] cgroup: Unknown subsys name 'devices' [ 21.984698][ T267] cgroup: Unknown subsys name 'hugetlb' [ 21.990395][ T267] cgroup: Unknown subsys name 'rlimit' [ 22.157150][ T24] audit: type=1400 audit(1755348249.010:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.180463][ T24] audit: type=1400 audit(1755348249.010:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.205618][ T24] audit: type=1400 audit(1755348249.010:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.210995][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 22.237761][ T24] audit: type=1400 audit(1755348249.090:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.263224][ T24] audit: type=1400 audit(1755348249.090:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.295266][ T24] audit: type=1400 audit(1755348249.150:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.320799][ T24] audit: type=1400 audit(1755348249.150:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.320846][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.135382][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.142985][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.150486][ T275] device bridge_slave_0 entered promiscuous mode [ 23.175066][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.182110][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.189488][ T275] device bridge_slave_1 entered promiscuous mode [ 23.253027][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.260113][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.267601][ T278] device bridge_slave_0 entered promiscuous mode [ 23.276113][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.283142][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.290495][ T278] device bridge_slave_1 entered promiscuous mode [ 23.307131][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.314223][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.321465][ T277] device bridge_slave_0 entered promiscuous mode [ 23.329292][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.336422][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.343768][ T277] device bridge_slave_1 entered promiscuous mode [ 23.374526][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.381655][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.389189][ T276] device bridge_slave_0 entered promiscuous mode [ 23.398102][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.405541][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.412888][ T276] device bridge_slave_1 entered promiscuous mode [ 23.468139][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.475266][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.482623][ T279] device bridge_slave_0 entered promiscuous mode [ 23.513254][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.520297][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.527740][ T279] device bridge_slave_1 entered promiscuous mode [ 23.542593][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.549885][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.557221][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.564497][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.599003][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.606062][ T278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.613309][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.620326][ T278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.629148][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.636202][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.643465][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.650469][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.658728][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.665786][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.673039][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.680120][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.706025][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.713778][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.721253][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.728678][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.736156][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.743502][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.750790][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.758025][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.765644][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.773073][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.785412][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.805163][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.813518][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.820568][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.829002][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.837417][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.844486][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.876367][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.884336][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.892124][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.900587][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.907655][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.915420][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.923634][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.930750][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.938128][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.946061][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.954141][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.962224][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.969261][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.976580][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.984740][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.991755][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.999129][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.007335][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.014354][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.024107][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.046201][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.055004][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.062873][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.070957][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.079390][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.086456][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.094075][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.113963][ T275] device veth0_vlan entered promiscuous mode [ 24.125896][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.134908][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.142842][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.150484][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.158520][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.167409][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.175611][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.182611][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.190157][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.198310][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.205357][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.212842][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.222605][ T276] device veth0_vlan entered promiscuous mode [ 24.235461][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.243695][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.251650][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.259920][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.267922][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.276202][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.284581][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.292513][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.300568][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.308678][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.316793][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.325086][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.333225][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.340664][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.350634][ T275] device veth1_macvtap entered promiscuous mode [ 24.359264][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.367001][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.375781][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.386291][ T277] device veth0_vlan entered promiscuous mode [ 24.395152][ T276] device veth1_macvtap entered promiscuous mode [ 24.402477][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.410374][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.418515][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.426699][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.434878][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.442728][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.450416][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.463600][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.471856][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.484436][ T277] device veth1_macvtap entered promiscuous mode [ 24.494493][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.502620][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.510941][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.518603][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.527069][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.535858][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.544303][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.565041][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.574664][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.583087][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.591390][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.600061][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.608429][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.616862][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.625135][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.633420][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.641768][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.650296][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.658209][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.669537][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.677246][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.684662][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.692479][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.707205][ T278] device veth0_vlan entered promiscuous mode [ 24.713856][ T277] request_module fs-gadgetfs succeeded, but still no fs? [ 24.718951][ T278] device veth1_macvtap entered promiscuous mode [ 24.728650][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.736467][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.744504][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.752863][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.761137][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.769461][ T279] device veth0_vlan entered promiscuous mode [ 24.776320][ T277] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 24.792706][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.806480][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.820224][ T279] device veth1_macvtap entered promiscuous mode [ 24.833445][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.842557][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.851195][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.859658][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.872887][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.907653][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.920924][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.933538][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.941892][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.143795][ C1] hrtimer: interrupt took 27284 ns [ 25.343670][ T304] device pim6reg1 entered promiscuous mode [ 25.618981][ T345] cgroup: syz.1.13 (345) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 25.659024][ T345] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 25.949236][ T348] -1: renamed from syzkaller0 [ 26.459458][ C0] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 26.572588][ T382] device syzkaller0 entered promiscuous mode [ 26.754789][ T25] syzkaller0: tun_net_xmit 48 [ 26.759710][ T383] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 27.148110][ T396] device pim6reg1 entered promiscuous mode [ 27.216720][ T24] kauditd_printk_skb: 50 callbacks suppressed [ 27.216730][ T24] audit: type=1400 audit(1755348254.060:124): avc: denied { ioctl } for pid=407 comm="syz.4.27" path="net:[4026531999]" dev="nsfs" ino=4026531999 ioctlcmd=0x54e3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 27.458712][ T24] audit: type=1400 audit(1755348254.300:125): avc: denied { append } for pid=412 comm="syz.3.29" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 29.839641][ T461] device pim6reg1 entered promiscuous mode [ 32.333817][ T24] audit: type=1400 audit(1755348259.190:126): avc: denied { create } for pid=610 comm="syz.2.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 34.114820][ T669] device syzkaller0 entered promiscuous mode [ 35.143968][ T24] audit: type=1400 audit(1755348262.000:127): avc: denied { tracepoint } for pid=707 comm="syz.4.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 35.217687][ T24] audit: type=1400 audit(1755348262.070:128): avc: denied { create } for pid=724 comm="syz.0.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 35.429710][ T727] device pim6reg1 entered promiscuous mode [ 37.283595][ T785] device sit0 entered promiscuous mode [ 37.347156][ T786] device syzkaller0 entered promiscuous mode [ 37.445385][ T24] audit: type=1400 audit(1755348264.300:129): avc: denied { create } for pid=793 comm="syz.2.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 37.605649][ T24] audit: type=1400 audit(1755348264.430:130): avc: denied { write } for pid=798 comm="syz.2.131" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 37.803625][ T786] device veth0_vlan left promiscuous mode [ 37.830468][ T786] device veth0_vlan entered promiscuous mode [ 38.125856][ T24] audit: type=1400 audit(1755348264.980:131): avc: denied { create } for pid=820 comm="syz.4.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 39.733708][ T24] audit: type=1400 audit(1755348266.590:132): avc: denied { create } for pid=889 comm="syz.1.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 40.220153][ T917] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.227502][ T917] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.342768][ T24] audit: type=1400 audit(1755348267.190:133): avc: denied { create } for pid=904 comm="syz.1.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 40.388607][ T917] device bridge_slave_1 left promiscuous mode [ 40.394853][ T917] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.404363][ T917] device bridge_slave_0 left promiscuous mode [ 40.410571][ T917] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.534205][ T933] device syzkaller0 entered promiscuous mode [ 41.296305][ T946] device wg2 entered promiscuous mode [ 41.769487][ T24] audit: type=1400 audit(1755348268.620:134): avc: denied { create } for pid=968 comm="syz.1.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 41.960167][ T24] audit: type=1400 audit(1755348268.800:135): avc: denied { create } for pid=968 comm="syz.1.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 42.036963][ T975] device syzkaller0 entered promiscuous mode [ 42.885315][ T1032] device pim6reg1 entered promiscuous mode [ 45.012549][ T24] audit: type=1400 audit(1755348271.860:136): avc: denied { create } for pid=1120 comm="syz.1.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 45.064829][ T1140] device syzkaller0 entered promiscuous mode [ 45.236777][ T1147] device veth0_vlan left promiscuous mode [ 45.427078][ T1147] device veth0_vlan entered promiscuous mode [ 45.988183][ T24] audit: type=1400 audit(1755348272.840:137): avc: denied { associate } for pid=1176 comm="syz.1.239" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 46.165757][ T1187] ------------[ cut here ]------------ [ 46.171335][ T1187] trace type BPF program uses run-time allocation [ 46.212039][ T1182] device veth0_vlan left promiscuous mode [ 46.390297][ T1182] device veth0_vlan entered promiscuous mode [ 46.410606][ T1187] WARNING: CPU: 0 PID: 1187 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 46.468520][ T1187] Modules linked in: [ 46.511559][ T1187] CPU: 0 PID: 1187 Comm: syz.1.242 Not tainted 5.10.240-syzkaller #0 [ 46.675554][ T1187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 46.686247][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.703378][ T1187] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 46.710079][ T1187] Code: 85 e9 14 fe ff ff e8 89 f9 ef ff 31 c0 e9 15 fe ff ff e8 7d f9 ef ff c6 05 13 bd 2c 05 01 48 c7 c7 c0 76 05 85 e8 6a 40 fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 46.733072][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.752668][ T1187] RSP: 0018:ffffc90007a27468 EFLAGS: 00010246 [ 46.754040][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.759154][ T1187] RAX: 5cbfec7e303e8e00 RBX: 0000000000000001 RCX: 0000000000080000 [ 46.836932][ T1187] RDX: ffffc90001d1d000 RSI: 0000000000002f47 RDI: 0000000000002f48 [ 46.850299][ T1187] RBP: ffffc90007a274b0 R08: dffffc0000000000 R09: ffffed103ee0a5f8 [ 46.858831][ T1187] R10: ffffed103ee0a5f8 R11: 1ffff1103ee0a5f7 R12: ffff88810a968000 [ 46.867095][ T1187] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88810f7c3000 [ 46.875810][ T1187] FS: 00007f83601ea6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 46.890454][ T1187] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 46.903945][ T1187] CR2: 0000000000000000 CR3: 000000011038a000 CR4: 00000000003506a0 [ 46.922804][ T1187] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 47.021362][ T1187] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 47.048205][ T1187] Call Trace: [ 47.051530][ T1187] ? __fdget+0x1a1/0x230 [ 47.055898][ T1187] resolve_pseudo_ldimm64+0x526/0x1020 [ 47.061379][ T1187] ? bpf_check+0xd680/0xd680 [ 47.066287][ T1187] ? kvmalloc_node+0x88/0x130 [ 47.071169][ T1187] bpf_check+0x8d4b/0xd680 [ 47.076064][ T1187] ? bpf_get_btf_vmlinux+0x60/0x60 [ 47.081231][ T1187] ? is_bpf_text_address+0x177/0x190 [ 47.123390][ T1187] ? selinux_bpf_prog_alloc+0x51/0x140 [ 47.134450][ T1187] ? __kernel_text_address+0xa0/0x100 [ 47.143310][ T1187] ? unwind_get_return_address+0x4d/0x90 [ 47.148966][ T1187] ? stack_trace_save+0xe0/0xe0 [ 47.193956][ T1215] bridge0: port 3(veth1) entered blocking state [ 47.200391][ T1187] ? arch_stack_walk+0xee/0x140 [ 47.238192][ T1215] bridge0: port 3(veth1) entered disabled state [ 47.244919][ T1187] ? stack_trace_save+0x98/0xe0 [ 47.249775][ T1187] ? stack_trace_snprint+0xf0/0xf0 [ 47.263706][ T1215] device veth1 entered promiscuous mode [ 47.269458][ T1215] bridge0: port 3(veth1) entered blocking state [ 47.275729][ T1215] bridge0: port 3(veth1) entered forwarding state [ 47.292571][ T1187] ? __kasan_slab_alloc+0x69/0xf0 [ 47.297859][ T1187] ? pcpu_block_update+0x53b/0x900 [ 47.303031][ T1187] ? selinux_bpf_prog_alloc+0x51/0x140 [ 47.329408][ T1187] ? __kasan_kmalloc+0xec/0x110 [ 47.353816][ T1187] ? __kasan_kmalloc+0xda/0x110 [ 47.409609][ T1187] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 47.488435][ T1187] ? selinux_bpf_prog_alloc+0x51/0x140 [ 47.551807][ T1187] ? security_bpf_prog_alloc+0x62/0x90 [ 47.583452][ T1187] ? bpf_prog_load+0x949/0x1420 [ 47.598482][ T1187] ? __se_sys_bpf+0x442/0x680 [ 47.613230][ T1187] ? __x64_sys_bpf+0x7b/0x90 [ 47.617895][ T1187] ? do_syscall_64+0x31/0x40 [ 47.636939][ T1187] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 47.650298][ T1187] ? memset+0x35/0x40 [ 47.663785][ T1187] ? bpf_obj_name_cpy+0x193/0x1e0 [ 47.668917][ T1187] bpf_prog_load+0xf5a/0x1420 [ 47.774294][ T1187] ? map_freeze+0x320/0x320 [ 47.778840][ T1187] ? selinux_bpf+0xc7/0xf0 [ 47.833366][ T1187] ? security_bpf+0x82/0xa0 [ 47.837943][ T1187] __se_sys_bpf+0x442/0x680 [ 47.842444][ T1187] ? __x64_sys_bpf+0x90/0x90 [ 47.873912][ T24] audit: type=1400 audit(1755348274.730:138): avc: denied { create } for pid=1237 comm="syz.2.257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 47.893466][ T1187] ? fpu__clear_all+0x20/0x20 [ 47.893486][ T1187] __x64_sys_bpf+0x7b/0x90 [ 47.902694][ T1187] do_syscall_64+0x31/0x40 [ 47.977162][ T1187] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 48.073233][ T1187] RIP: 0033:0x7f83617a2be9 [ 48.082149][ T1187] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 48.154727][ T1187] RSP: 002b:00007f83601ea038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 48.241166][ T1187] RAX: ffffffffffffffda RBX: 00007f83619ca090 RCX: 00007f83617a2be9 [ 48.321907][ T1187] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 48.352989][ T1255] syz.0.261[1255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.353064][ T1255] syz.0.261[1255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.364723][ T1187] RBP: 00007f8361825e19 R08: 0000000000000000 R09: 0000000000000000 [ 48.479566][ T1187] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 48.533447][ T1187] R13: 00007f83619ca128 R14: 00007f83619ca090 R15: 00007ffc6bdd6608 [ 48.575750][ T1187] ---[ end trace 6a8b70110dfbaed3 ]--- [ 48.644422][ T1271] device wg2 entered promiscuous mode [ 48.880415][ T1304] syz.0.275[1304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.880480][ T1304] syz.0.275[1304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.941145][ T1303] device sit0 entered promiscuous mode [ 51.512032][ T24] audit: type=1400 audit(1755348278.360:139): avc: denied { create } for pid=1415 comm="syz.2.306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 51.696036][ T1430] device syzkaller0 entered promiscuous mode [ 51.755726][ T24] audit: type=1400 audit(1755348278.610:140): avc: denied { create } for pid=1435 comm="syz.4.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 52.321074][ T1434] device syzkaller0 entered promiscuous mode [ 52.397284][ T1450] device pim6reg1 entered promiscuous mode [ 52.754240][ T1470] device sit0 entered promiscuous mode [ 54.009331][ T1539] device sit0 left promiscuous mode [ 54.115647][ T1550] device sit0 entered promiscuous mode [ 54.914405][ T1577] ÿÿÿÿÿÿ: renamed from vlan1 [ 55.409461][ T24] audit: type=1400 audit(1755348282.260:141): avc: denied { create } for pid=1614 comm="syz.4.360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 55.584729][ T1646] device veth1_macvtap left promiscuous mode [ 56.105715][ T24] audit: type=1400 audit(1755348282.960:142): avc: denied { create } for pid=1657 comm="syz.3.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 56.657083][ T1670] device syzkaller0 entered promiscuous mode [ 56.847522][ T1718] device syzkaller0 entered promiscuous mode [ 56.862096][ T1721] device sit0 entered promiscuous mode [ 57.488392][ T1774] device lo entered promiscuous mode [ 57.504330][ T1774] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 57.596787][ T1771] device syzkaller0 entered promiscuous mode [ 57.835401][ T1784] syz.0.408[1784] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.835455][ T1784] syz.0.408[1784] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.471111][ T1789] device wg2 entered promiscuous mode [ 61.036151][ T1859] device syzkaller0 entered promiscuous mode [ 61.525789][ T1880] FAULT_INJECTION: forcing a failure. [ 61.525789][ T1880] name failslab, interval 1, probability 0, space 0, times 1 [ 61.584916][ T1880] CPU: 1 PID: 1880 Comm: syz.0.433 Tainted: G W 5.10.240-syzkaller #0 [ 61.594395][ T1880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 61.604456][ T1880] Call Trace: [ 61.607761][ T1880] __dump_stack+0x21/0x24 [ 61.612087][ T1880] dump_stack_lvl+0x169/0x1d8 [ 61.616760][ T1880] ? thaw_kernel_threads+0x220/0x220 [ 61.622027][ T1880] ? show_regs_print_info+0x18/0x18 [ 61.627214][ T1880] dump_stack+0x15/0x1c [ 61.631345][ T1880] should_fail+0x3c1/0x510 [ 61.635733][ T1880] ? __alloc_skb+0x9e/0x520 [ 61.640209][ T1880] __should_failslab+0xa4/0xe0 [ 61.644948][ T1880] should_failslab+0x9/0x20 [ 61.649434][ T1880] kmem_cache_alloc+0x3d/0x2e0 [ 61.654172][ T1880] __alloc_skb+0x9e/0x520 [ 61.658478][ T1880] ? addrconf_ifdown+0x152f/0x1800 [ 61.663575][ T1880] inet6_netconf_notify_devconf+0xd6/0x190 [ 61.669373][ T1880] addrconf_ifdown+0x1545/0x1800 [ 61.674284][ T1880] ? __kasan_check_write+0x14/0x20 [ 61.679376][ T1880] ? addrconf_cleanup+0x1c0/0x1c0 [ 61.684374][ T1880] ? __kasan_check_write+0x14/0x20 [ 61.689475][ T1880] ? mutex_lock+0x8c/0xe0 [ 61.693795][ T1880] ? mutex_trylock+0xa0/0xa0 [ 61.698366][ T1880] ? _raw_spin_lock+0x8e/0xe0 [ 61.703106][ T1880] ? _raw_spin_trylock_bh+0x130/0x130 [ 61.708636][ T1880] ? rt_flush_dev+0x2bc/0x300 [ 61.713394][ T1880] ? __kasan_check_write+0x14/0x20 [ 61.718584][ T1880] addrconf_notify+0x3bd/0xe90 [ 61.723326][ T1880] raw_notifier_call_chain+0x90/0x100 [ 61.728676][ T1880] unregister_netdevice_many+0xf8b/0x1980 [ 61.734394][ T1880] ? alloc_netdev_mqs+0xc80/0xc80 [ 61.739399][ T1880] ? kernfs_put+0x310/0x480 [ 61.743969][ T1880] ? kmem_cache_free+0x100/0x2d0 [ 61.748908][ T1880] ? __kasan_check_read+0x11/0x20 [ 61.753975][ T1880] unregister_netdevice_queue+0x31c/0x360 [ 61.759799][ T1880] ? list_netdevice+0x4c0/0x4c0 [ 61.764634][ T1880] br_dev_delete+0xfc/0x110 [ 61.769144][ T1880] ? br_del_bridge+0xb6/0x120 [ 61.773793][ T1880] br_del_bridge+0xc0/0x120 [ 61.778272][ T1880] br_ioctl_deviceless_stub+0x27f/0x600 [ 61.783796][ T1880] ? __kasan_slab_free+0x11/0x20 [ 61.788712][ T1880] ? br_handle_local_finish+0x1f0/0x1f0 [ 61.794230][ T1880] ? __kasan_check_write+0x14/0x20 [ 61.799319][ T1880] ? mutex_lock+0x8c/0xe0 [ 61.803748][ T1880] ? mutex_trylock+0xa0/0xa0 [ 61.808323][ T1880] ? selinux_file_ioctl+0x377/0x480 [ 61.813523][ T1880] ? mutex_trylock+0xa0/0xa0 [ 61.818184][ T1880] ? __fget_files+0x2c4/0x320 [ 61.822840][ T1880] ? br_handle_local_finish+0x1f0/0x1f0 [ 61.828539][ T1880] sock_ioctl+0x357/0x710 [ 61.832856][ T1880] ? sock_poll+0x360/0x360 [ 61.837277][ T1880] ? __fget_files+0x2c4/0x320 [ 61.841988][ T1880] ? security_file_ioctl+0x84/0xa0 [ 61.847156][ T1880] ? sock_poll+0x360/0x360 [ 61.851566][ T1880] __se_sys_ioctl+0x121/0x1a0 [ 61.856232][ T1880] __x64_sys_ioctl+0x7b/0x90 [ 61.860798][ T1880] do_syscall_64+0x31/0x40 [ 61.865277][ T1880] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 61.871520][ T1880] RIP: 0033:0x7f78662c9be9 [ 61.875926][ T1880] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 61.895565][ T1880] RSP: 002b:00007f7864d32038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 61.904062][ T1880] RAX: ffffffffffffffda RBX: 00007f78664f0fa0 RCX: 00007f78662c9be9 [ 61.912109][ T1880] RDX: 0000200000000080 RSI: 00000000000089a1 RDI: 0000000000000007 [ 61.920061][ T1880] RBP: 00007f7864d32090 R08: 0000000000000000 R09: 0000000000000000 [ 61.928014][ T1880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 61.935966][ T1880] R13: 00007f78664f1038 R14: 00007f78664f0fa0 R15: 00007ffccf879218 [ 62.079665][ T24] audit: type=1400 audit(1755348288.930:143): avc: denied { create } for pid=1883 comm="syz.4.434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 62.146033][ T1890] syz.0.436[1890] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.146100][ T1890] syz.0.436[1890] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.532293][ T24] audit: type=1400 audit(1755348289.380:144): avc: denied { create } for pid=1910 comm="syz.4.443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 62.564513][ T1915] device veth1_macvtap left promiscuous mode [ 62.606752][ T1928] device pim6reg1 entered promiscuous mode [ 63.286717][ T24] audit: type=1400 audit(1755348290.130:145): avc: denied { create } for pid=1941 comm="syz.3.451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 63.657486][ T1965] device wg2 left promiscuous mode [ 63.691279][ T1960] device wg2 entered promiscuous mode [ 64.909316][ T2011] bridge0: port 3(veth1) entered disabled state [ 65.469644][ T2043] ÿÿÿÿÿÿ: renamed from vlan1 [ 66.400932][ T2079] device veth0_vlan left promiscuous mode [ 66.511102][ T2079] device veth0_vlan entered promiscuous mode [ 66.673284][ T94] udevd[94]: worker [298] terminated by signal 33 (Unknown signal 33) [ 66.788964][ T94] udevd[94]: worker [298] failed while handling '/devices/virtual/block/loop4' [ 66.877554][ T94] udevd[94]: worker [401] terminated by signal 33 (Unknown signal 33) [ 66.972688][ T24] audit: type=1400 audit(1755348293.810:146): avc: denied { create } for pid=2092 comm="syz.0.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 67.012265][ T94] udevd[94]: worker [401] failed while handling '/devices/virtual/block/loop0' [ 69.219037][ T2171] device veth0_vlan left promiscuous mode [ 69.312314][ T2171] device veth0_vlan entered promiscuous mode [ 69.449267][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.489311][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 69.586781][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 70.738415][ T2217] device wg2 left promiscuous mode [ 70.845942][ T24] audit: type=1400 audit(1755348297.700:147): avc: denied { create } for pid=2226 comm="syz.1.530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 70.937893][ T2217] device wg2 entered promiscuous mode [ 71.081962][ T2232] device veth0_vlan left promiscuous mode [ 71.088983][ T2232] device veth0_vlan entered promiscuous mode [ 71.197962][ T2237] device wg2 left promiscuous mode [ 71.304119][ T2237] device wg2 entered promiscuous mode [ 71.589981][ T24] audit: type=1400 audit(1755348298.440:148): avc: denied { setattr } for pid=2272 comm="syz.2.540" path="/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 71.689170][ T2282] syz.2.544[2282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.689222][ T2282] syz.2.544[2282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.531823][ T2373] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.550353][ T2373] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.158584][ T2389] device syzkaller0 entered promiscuous mode [ 76.028479][ T24] audit: type=1400 audit(1755348302.850:149): avc: denied { create } for pid=2472 comm="syz.2.597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 76.097580][ T2488] device pim6reg1 entered promiscuous mode [ 78.627237][ T2610] device syzkaller0 entered promiscuous mode [ 78.878083][ T2616] syz.1.635 (2616) used obsolete PPPIOCDETACH ioctl [ 80.445908][ T2702] device pim6reg1 entered promiscuous mode [ 80.642205][ T2719] device wg2 left promiscuous mode [ 81.506350][ T2772] device macsec0 entered promiscuous mode [ 82.015296][ T2808] device pim6reg1 entered promiscuous mode [ 82.802489][ T2851] device nr0 entered promiscuous mode [ 83.236729][ T2888] device veth0_vlan left promiscuous mode [ 83.242570][ T2888] device veth0_vlan entered promiscuous mode [ 83.364635][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.393857][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.468803][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 86.857730][ T3002] device syzkaller0 entered promiscuous mode [ 87.274172][ T3019] device veth0_vlan left promiscuous mode [ 87.285437][ T3019] device veth0_vlan entered promiscuous mode [ 89.337798][ T3039] ÿÿÿÿÿÿ: renamed from vlan1 [ 89.980428][ T24] audit: type=1400 audit(1755348316.830:150): avc: denied { ioctl } for pid=3077 comm="syz.1.765" path="socket:[24608]" dev="sockfs" ino=24608 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 90.890239][ T3109] device veth1_macvtap left promiscuous mode [ 90.921117][ T3109] device veth1_macvtap entered promiscuous mode [ 90.929920][ T3109] device macsec0 entered promiscuous mode [ 92.351121][ T3130] syz.4.779[3130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.362285][ T3130] syz.4.779[3130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.892402][ T3136] 7B’ç÷ï: renamed from syzkaller0 [ 93.987551][ T24] audit: type=1400 audit(1755348320.840:151): avc: denied { create } for pid=3217 comm="syz.3.803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 94.910494][ T3300] device sit0 left promiscuous mode [ 95.092519][ T3300] device sit0 entered promiscuous mode [ 95.468790][ T3339] device pim6reg1 entered promiscuous mode [ 95.786662][ T3358] device syzkaller0 entered promiscuous mode [ 96.137843][ T3376] device syzkaller0 entered promiscuous mode [ 96.687879][ T3418] device sit0 left promiscuous mode [ 96.699388][ T3417] device wg2 entered promiscuous mode [ 96.885374][ T3418] device sit0 entered promiscuous mode [ 98.099412][ T3456] syz.1.873[3456] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.099466][ T3456] syz.1.873[3456] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.860909][ T3451] device syzkaller0 entered promiscuous mode [ 98.890662][ T3474] device veth0_vlan left promiscuous mode [ 98.897639][ T3474] device veth0_vlan entered promiscuous mode [ 98.912755][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 98.925229][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 98.941726][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 101.107645][ T3585] !€ÿ: renamed from bond_slave_0 [ 101.861604][ T3584] device syzkaller0 entered promiscuous mode [ 102.142874][ T3614] syz.1.917[3614] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.142950][ T3614] syz.1.917[3614] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.329648][ T3623] device pim6reg1 entered promiscuous mode [ 104.516172][ T3656] device syzkaller0 entered promiscuous mode [ 105.897242][ T3705] device veth1_macvtap left promiscuous mode [ 105.916636][ T3705] device macsec0 entered promiscuous mode [ 105.955464][ T3708] device veth0_vlan left promiscuous mode [ 105.998493][ T3708] device veth0_vlan entered promiscuous mode [ 106.009744][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 106.018769][ T3704] device veth1_macvtap entered promiscuous mode [ 106.543599][ T3728] device bridge_slave_1 left promiscuous mode [ 106.549937][ T3728] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.558309][ T3728] device bridge_slave_0 left promiscuous mode [ 106.564966][ T3728] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.606165][ T3736] device veth0_vlan left promiscuous mode [ 106.620053][ T3736] device veth0_vlan entered promiscuous mode [ 106.632330][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 106.646965][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 106.654843][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 106.877841][ T3766] device veth1_macvtap left promiscuous mode [ 106.936189][ T3766] device macsec0 left promiscuous mode [ 107.380282][ T3791] device veth0_vlan left promiscuous mode [ 107.434919][ T3791] device veth0_vlan entered promiscuous mode [ 107.620953][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 107.671094][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 107.831894][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 108.156554][ T3815] device pim6reg1 entered promiscuous mode [ 108.261514][ T3827] device wg2 left promiscuous mode [ 108.269138][ T3827] device wg2 entered promiscuous mode [ 109.380186][ T3887] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.387410][ T3887] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.434985][ T24] audit: type=1400 audit(1755348336.280:152): avc: denied { create } for pid=3885 comm="syz.1.994" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 110.372806][ T3961] syz.2.1013[3961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.372886][ T3961] syz.2.1013[3961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.953533][ T3969] device sit0 entered promiscuous mode [ 112.010276][ T3987] tap0: tun_chr_ioctl cmd 2147767507 [ 114.152803][ T4038] device pim6reg1 entered promiscuous mode [ 114.703676][ T4067] device wg2 entered promiscuous mode [ 115.179440][ T4094] device sit0 left promiscuous mode [ 115.240134][ T4094] device sit0 entered promiscuous mode [ 115.473249][ T4098] device sit0 left promiscuous mode [ 116.159724][ T4141] device sit0 left promiscuous mode [ 116.175496][ T4141] device sit0 entered promiscuous mode [ 116.275634][ T4164] tun0: tun_chr_ioctl cmd 1074025681 [ 116.333751][ T4169] FAULT_INJECTION: forcing a failure. [ 116.333751][ T4169] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 116.348385][ T4169] CPU: 1 PID: 4169 Comm: syz.3.1073 Tainted: G W 5.10.240-syzkaller #0 [ 116.357937][ T4169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 116.368076][ T4169] Call Trace: [ 116.371372][ T4169] __dump_stack+0x21/0x24 [ 116.375727][ T4169] dump_stack_lvl+0x169/0x1d8 [ 116.380404][ T4169] ? show_regs_print_info+0x18/0x18 [ 116.385615][ T4169] ? vfs_write+0xac8/0xd60 [ 116.390039][ T4169] dump_stack+0x15/0x1c [ 116.394183][ T4169] should_fail+0x3c1/0x510 [ 116.398587][ T4169] should_fail_usercopy+0x1a/0x20 [ 116.403964][ T4169] _copy_from_user+0x20/0xd0 [ 116.408558][ T4169] __se_sys_bpf+0x181/0x680 [ 116.413048][ T4169] ? __x64_sys_bpf+0x90/0x90 [ 116.417626][ T4169] __x64_sys_bpf+0x7b/0x90 [ 116.422039][ T4169] do_syscall_64+0x31/0x40 [ 116.426441][ T4169] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 116.432313][ T4169] RIP: 0033:0x7fa9e362dbe9 [ 116.436713][ T4169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 116.456424][ T4169] RSP: 002b:00007fa9e2096038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 116.464910][ T4169] RAX: ffffffffffffffda RBX: 00007fa9e3854fa0 RCX: 00007fa9e362dbe9 [ 116.472880][ T4169] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 2000000000000000 [ 116.480838][ T4169] RBP: 00007fa9e2096090 R08: 0000000000000000 R09: 0000000000000000 [ 116.488939][ T4169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 116.496902][ T4169] R13: 00007fa9e3855038 R14: 00007fa9e3854fa0 R15: 00007ffd2cac5728 [ 116.710164][ T4201] device sit0 left promiscuous mode [ 117.128773][ T4230] FAULT_INJECTION: forcing a failure. [ 117.128773][ T4230] name failslab, interval 1, probability 0, space 0, times 0 [ 117.141702][ T4230] CPU: 0 PID: 4230 Comm: syz.0.1091 Tainted: G W 5.10.240-syzkaller #0 [ 117.151344][ T4230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 117.161389][ T4230] Call Trace: [ 117.164664][ T4230] __dump_stack+0x21/0x24 [ 117.168968][ T4230] dump_stack_lvl+0x169/0x1d8 [ 117.173617][ T4230] ? thaw_kernel_threads+0x220/0x220 [ 117.178891][ T4230] ? show_regs_print_info+0x18/0x18 [ 117.184083][ T4230] ? selinux_capable+0x29c/0x380 [ 117.189003][ T4230] ? selinux_capset+0xf0/0xf0 [ 117.193657][ T4230] dump_stack+0x15/0x1c [ 117.197844][ T4230] should_fail+0x3c1/0x510 [ 117.202278][ T4230] ? bpf_map_area_alloc+0x49/0xe0 [ 117.207304][ T4230] __should_failslab+0xa4/0xe0 [ 117.212148][ T4230] should_failslab+0x9/0x20 [ 117.216659][ T4230] __kmalloc+0x60/0x330 [ 117.220897][ T4230] ? __kasan_check_write+0x14/0x20 [ 117.225992][ T4230] bpf_map_area_alloc+0x49/0xe0 [ 117.230987][ T4230] array_map_alloc+0x330/0x7c0 [ 117.235724][ T4230] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 117.241330][ T4230] ? kernel_write+0x3c0/0x3c0 [ 117.245978][ T4230] ? array_map_alloc_check+0x2c2/0x390 [ 117.251409][ T4230] map_create+0x44e/0x2090 [ 117.255796][ T4230] __se_sys_bpf+0x203/0x680 [ 117.260313][ T4230] ? __x64_sys_bpf+0x90/0x90 [ 117.264877][ T4230] ? fpu__clear_all+0x20/0x20 [ 117.269529][ T4230] __x64_sys_bpf+0x7b/0x90 [ 117.273917][ T4230] do_syscall_64+0x31/0x40 [ 117.278315][ T4230] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 117.284343][ T4230] RIP: 0033:0x7f78662c9be9 [ 117.288736][ T4230] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 117.308312][ T4230] RSP: 002b:00007f7864d32038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 117.316696][ T4230] RAX: ffffffffffffffda RBX: 00007f78664f0fa0 RCX: 00007f78662c9be9 [ 117.324643][ T4230] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 2000000000000000 [ 117.332599][ T4230] RBP: 00007f7864d32090 R08: 0000000000000000 R09: 0000000000000000 [ 117.340610][ T4230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 117.348603][ T4230] R13: 00007f78664f1038 R14: 00007f78664f0fa0 R15: 00007ffccf879218 [ 118.096620][ T4246] device veth0_vlan left promiscuous mode [ 118.105207][ T4246] device veth0_vlan entered promiscuous mode [ 118.119090][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 118.127299][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 118.135289][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 118.169590][ T4254] device wg2 entered promiscuous mode [ 118.372529][ T4285] device sit0 left promiscuous mode [ 118.458217][ T4290] device sit0 entered promiscuous mode [ 119.323970][ T4310] device pim6reg1 entered promiscuous mode [ 119.513388][ T4331] device pim6reg1 entered promiscuous mode [ 120.764673][ T4357] device syzkaller0 entered promiscuous mode [ 123.226278][ T4476] device pim6reg1 entered promiscuous mode [ 125.770213][ T4564] device pim6reg1 entered promiscuous mode [ 126.856279][ T4602] device wg2 left promiscuous mode [ 126.864200][ T4603] device wg2 entered promiscuous mode [ 127.063416][ T4608] device veth0_vlan left promiscuous mode [ 127.100077][ T4608] device veth0_vlan entered promiscuous mode [ 127.182995][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 127.218796][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 127.253640][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 127.382168][ T4611] geneve1: tun_chr_ioctl cmd 35108 [ 128.560414][ T4615] device syzkaller0 entered promiscuous mode [ 128.820083][ T4625] device wg2 left promiscuous mode [ 128.854004][ T24] audit: type=1400 audit(1755348355.700:153): avc: denied { create } for pid=4626 comm="syz.3.1205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 128.875267][ T4628] device wg2 entered promiscuous mode [ 129.131220][ T4636] device pim6reg1 entered promiscuous mode [ 129.319941][ T4650] device wg2 left promiscuous mode [ 129.331164][ T4650] device wg2 entered promiscuous mode [ 129.547422][ T4690] device veth1_macvtap entered promiscuous mode [ 129.601882][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 129.643249][ T4692] device sit0 left promiscuous mode [ 130.420725][ T4699] device sit0 entered promiscuous mode [ 132.438939][ T4781] device veth0_vlan left promiscuous mode [ 132.564588][ T4781] device veth0_vlan entered promiscuous mode [ 132.739988][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.756048][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 132.789304][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 132.800178][ T4799] sit0: mtu less than device minimum [ 133.233579][ T4823] device pim6reg1 entered promiscuous mode [ 133.770038][ T4846] device veth1_macvtap left promiscuous mode [ 133.946656][ T4854] device sit0 left promiscuous mode [ 136.453892][ T4920] device pim6reg1 entered promiscuous mode [ 138.374844][ T5003] device wg2 left promiscuous mode [ 138.380575][ T24] audit: type=1400 audit(1755348365.230:154): avc: denied { create } for pid=4994 comm="syz.3.1305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 138.638065][ T5009] device syzkaller0 entered promiscuous mode [ 138.644554][ T5014] device sit0 entered promiscuous mode [ 138.656189][ T5003] device wg2 entered promiscuous mode [ 138.807781][ T5033] device syzkaller0 entered promiscuous mode [ 139.105408][ T5061] device pim6reg1 entered promiscuous mode [ 139.294226][ T24] audit: type=1400 audit(1755348366.150:155): avc: denied { create } for pid=5083 comm="syz.0.1330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 139.874579][ T5099] device sit0 left promiscuous mode [ 140.386334][ T24] audit: type=1400 audit(1755348367.240:156): avc: denied { create } for pid=5137 comm="syz.3.1349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 140.713935][ T5158] device pim6reg1 entered promiscuous mode [ 141.458577][ T5191] device syzkaller0 entered promiscuous mode [ 142.740395][ T5226] device syzkaller0 entered promiscuous mode [ 143.578821][ T5242] device pim6reg1 entered promiscuous mode [ 144.085972][ T5267] device sit0 left promiscuous mode [ 144.239817][ T5267] tap0: tun_chr_ioctl cmd 1074025675 [ 144.246047][ T5267] tap0: persist enabled [ 144.256375][ T5267] tap0: tun_chr_ioctl cmd 1074025675 [ 144.261978][ T5267] tap0: persist enabled [ 144.356313][ T5301] device syzkaller0 entered promiscuous mode [ 144.695536][ T5309] device wg2 left promiscuous mode [ 145.645344][ T5374] device pim6reg1 entered promiscuous mode [ 145.667987][ T5381] device pim6reg1 entered promiscuous mode [ 145.698895][ T5385] device pim6reg1 entered promiscuous mode [ 145.855919][ T5405] device syzkaller0 entered promiscuous mode [ 146.427522][ T5423] device wg2 left promiscuous mode [ 146.674953][ T5443] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.682176][ T5443] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.862409][ T5458] device sit0 entered promiscuous mode [ 147.044002][ T5460] device bridge_slave_1 left promiscuous mode [ 147.050149][ T5460] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.063006][ T5460] device bridge_slave_0 left promiscuous mode [ 147.069302][ T5460] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.259665][ T5501] device pim6reg1 entered promiscuous mode [ 147.304795][ T5498] device pim6reg1 entered promiscuous mode [ 147.619301][ T5524] device syzkaller0 entered promiscuous mode [ 147.637014][ T5526] device syzkaller0 entered promiscuous mode [ 147.871383][ T5540] device syzkaller0 entered promiscuous mode [ 148.371770][ T5560] device syzkaller0 entered promiscuous mode [ 148.511698][ T5577] device syzkaller0 entered promiscuous mode [ 148.540102][ T5581] device veth0_vlan left promiscuous mode [ 148.546994][ T5581] device veth0_vlan entered promiscuous mode [ 148.555896][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.568363][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.576198][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 149.175658][ T5583] device syzkaller0 entered promiscuous mode [ 149.527698][ T5616] device sit0 entered promiscuous mode [ 151.484657][ T5669] device syzkaller0 entered promiscuous mode [ 151.507616][ T5680] device syzkaller0 entered promiscuous mode [ 151.599578][ T5706] device syzkaller0 entered promiscuous mode [ 153.246073][ T5803] device veth1_macvtap entered promiscuous mode [ 153.260158][ T5803] device macsec0 entered promiscuous mode [ 153.378885][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 154.482148][ T5847] ÿ: renamed from bond_slave_0 [ 154.760811][ T5888] device syzkaller0 entered promiscuous mode [ 154.899367][ T5908] device syzkaller0 entered promiscuous mode [ 155.082713][ T5912] device pim6reg1 entered promiscuous mode [ 155.396610][ T24] audit: type=1400 audit(1755348382.250:157): avc: denied { create } for pid=5915 comm="syz.1.1556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 155.697457][ T5938] device syzkaller0 entered promiscuous mode [ 156.929100][ T5970] syz.3.1573[5970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.929154][ T5970] syz.3.1573[5970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.839246][ T6062] device sit0 left promiscuous mode [ 161.190596][ T6089] device syzkaller0 entered promiscuous mode [ 161.226312][ T6116] device syzkaller0 entered promiscuous mode [ 162.170044][ T6138] device syzkaller0 entered promiscuous mode [ 162.351797][ T6151] device syzkaller0 entered promiscuous mode [ 162.377723][ T6161] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.384928][ T6161] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.596489][ T24] audit: type=1400 audit(1755348390.450:158): avc: denied { create } for pid=6227 comm="syz.4.1647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 164.523912][ T6247] device pim6reg1 entered promiscuous mode [ 165.067602][ T6250] device veth0_vlan left promiscuous mode [ 165.125222][ T6250] device veth0_vlan entered promiscuous mode [ 165.356746][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 165.376361][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 165.401190][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 166.790048][ T24] audit: type=1400 audit(1755348393.640:159): avc: denied { read } for pid=6304 comm="syz.3.1672" dev="nsfs" ino=4026532545 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 166.885547][ T24] audit: type=1400 audit(1755348393.640:160): avc: denied { open } for pid=6304 comm="syz.3.1672" path="cgroup:[4026532545]" dev="nsfs" ino=4026532545 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 168.220513][ T6367] device syzkaller0 entered promiscuous mode [ 170.286117][ T6421] device syzkaller0 entered promiscuous mode [ 171.153810][ T6455] @0Ù: renamed from bond_slave_1 [ 171.198807][ T6457] device sit0 entered promiscuous mode [ 172.535954][ T6485] device pim6reg1 entered promiscuous mode [ 174.159964][ T6519] device sit0 left promiscuous mode [ 174.359460][ T6522] device sit0 entered promiscuous mode [ 175.229651][ T6550] device veth0_vlan left promiscuous mode [ 175.236121][ T6550] device veth0_vlan entered promiscuous mode [ 175.461749][ T6581] device pim6reg1 entered promiscuous mode [ 175.933696][ T6591] device veth0_vlan left promiscuous mode [ 175.993125][ T6591] device veth0_vlan entered promiscuous mode [ 176.283430][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.310921][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.418504][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.603028][ T6614] syz.4.1761[6614] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.603781][ T6614] syz.4.1761[6614] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.621491][ T6626] ÿÿÿÿÿÿ: renamed from vlan1 [ 178.080903][ T6691] device pim6reg1 entered promiscuous mode [ 179.227506][ T6740] device wg2 left promiscuous mode [ 179.320008][ T6738] device syzkaller0 entered promiscuous mode [ 179.761309][ T6749] tap0: tun_chr_ioctl cmd 1074025675 [ 179.768380][ T6749] tap0: persist enabled [ 179.868656][ T6751] device wg2 entered promiscuous mode [ 180.274351][ T6757] device syzkaller0 entered promiscuous mode [ 180.650668][ T6769] device syzkaller0 entered promiscuous mode [ 181.772142][ T6813] device veth1_macvtap left promiscuous mode [ 181.986716][ T6816] device wg2 left promiscuous mode [ 182.354425][ T6827] device syzkaller0 entered promiscuous mode [ 183.728907][ T6858] device wg2 entered promiscuous mode [ 183.985557][ T24] audit: type=1400 audit(1755348410.840:161): avc: denied { create } for pid=6874 comm="syz.0.1834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 185.384570][ T6927] device veth0_vlan left promiscuous mode [ 185.435123][ T6927] device veth0_vlan entered promiscuous mode [ 185.454611][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.462793][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.473983][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 185.821385][ T6943] device sit0 left promiscuous mode [ 186.624315][ T6982] device wg2 left promiscuous mode [ 186.856376][ T6982] device wg2 entered promiscuous mode [ 186.896192][ T7001] syz.4.1865[7001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.896250][ T7001] syz.4.1865[7001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.062525][ T7007] device syzkaller0 entered promiscuous mode [ 187.087238][ T7005] device sit0 entered promiscuous mode [ 187.535260][ T7031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 187.713667][ T24] audit: type=1400 audit(1755348414.570:162): avc: denied { setattr } for pid=7058 comm="syz.3.1888" path="pipe:[14344]" dev="pipefs" ino=14344 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 188.025025][ T24] audit: type=1400 audit(1755348414.880:163): avc: denied { create } for pid=7064 comm="syz.0.1889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 188.114914][ T7069] syz.0.1891[7069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.114983][ T7069] syz.0.1891[7069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.192344][ T7070] syz.0.1891[7070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.325123][ T7072] device veth0_vlan left promiscuous mode [ 188.353128][ T7072] device veth0_vlan entered promiscuous mode [ 188.360541][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.415088][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.437834][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 188.507439][ T7086] syz.2.1895[7086] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.509668][ T7086] syz.2.1895[7086] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.555040][ T7085] syz.2.1895[7085] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.364211][ T7098] device syzkaller0 entered promiscuous mode [ 189.933334][ T7195] syz.3.1922[7195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.933430][ T7195] syz.3.1922[7195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.104941][ T7266] device veth1_macvtap left promiscuous mode [ 192.131897][ T7266] device macsec0 left promiscuous mode [ 192.708208][ T7293] device syzkaller0 entered promiscuous mode [ 193.618611][ T7324] device macsec0 entered promiscuous mode [ 195.801886][ T7387] device sit0 entered promiscuous mode [ 198.834289][ T7526] device pim6reg1 entered promiscuous mode [ 199.364754][ T7547] device syzkaller0 entered promiscuous mode [ 199.910149][ T7576] device pim6reg1 entered promiscuous mode [ 200.591293][ T7603] : renamed from pim6reg1 [ 202.098736][ T24] audit: type=1400 audit(1755348428.950:164): avc: denied { ioctl } for pid=7671 comm="syz.1.2049" path="uts:[4026532366]" dev="nsfs" ino=4026532366 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 202.956124][ T7744] device pim6reg1 entered promiscuous mode [ 203.252289][ T7773] device sit0 left promiscuous mode [ 203.495210][ T7774] device sit0 left promiscuous mode [ 204.077927][ T7781] device sit0 entered promiscuous mode [ 204.093366][ T7782] device sit0 entered promiscuous mode [ 204.114458][ T7792] device syzkaller0 entered promiscuous mode [ 204.155926][ T7808] syz.1.2090[7808] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.155995][ T7808] syz.1.2090[7808] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.639908][ T7834] device wg2 entered promiscuous mode [ 205.115410][ T7865] syz.3.2106[7865] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.115489][ T7865] syz.3.2106[7865] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.239669][ T7865] device pim6reg1 entered promiscuous mode [ 205.274564][ T7865] device syzkaller0 entered promiscuous mode [ 206.660924][ T7912] syz.0.2117[7912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.660972][ T7912] syz.0.2117[7912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.776229][ T7915] device veth0_vlan left promiscuous mode [ 206.801692][ T7915] device veth0_vlan entered promiscuous mode [ 206.810200][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.818873][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.826638][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 207.384521][ T7956] device pim6reg1 entered promiscuous mode [ 210.253361][ T8017] ªªªªªª: renamed from vlan0 [ 214.043512][ T8050] device syzkaller0 entered promiscuous mode [ 214.073450][ T8069] device wg2 left promiscuous mode [ 214.165772][ T8084] device pim6reg1 entered promiscuous mode [ 215.180924][ T8165] device sit0 left promiscuous mode [ 215.388944][ T8163] device sit0 entered promiscuous mode [ 216.256150][ T8217] device pim6reg1 entered promiscuous mode [ 216.941468][ T8253] device sit0 left promiscuous mode [ 217.071056][ T8255] device sit0 entered promiscuous mode [ 218.726834][ T8298] device syzkaller0 entered promiscuous mode [ 218.856249][ T8308] device wg2 left promiscuous mode [ 219.199216][ T8335] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 219.831599][ T8436] device pim6reg1 entered promiscuous mode [ 219.973804][ T8472] device veth0_vlan left promiscuous mode [ 219.989052][ T8472] device veth0_vlan entered promiscuous mode [ 220.253610][ T8504] device sit0 left promiscuous mode [ 220.328270][ T8518] device pim6reg1 entered promiscuous mode [ 220.777073][ T8587] syz.4.2287[8587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.777128][ T8587] syz.4.2287[8587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.167034][ T8580] device syzkaller0 entered promiscuous mode [ 221.203471][ T8604] device pim6reg1 entered promiscuous mode [ 221.756941][ T8630] device syzkaller0 entered promiscuous mode [ 222.526144][ T8646] device syzkaller0 entered promiscuous mode [ 222.532245][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 223.424478][ T8667] device macsec0 left promiscuous mode [ 223.514235][ T8667] device veth1_macvtap entered promiscuous mode [ 223.552755][ T8667] device macsec0 entered promiscuous mode [ 223.561096][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 223.607183][ T8667] device wg2 entered promiscuous mode [ 224.057087][ T8725] device pim6reg1 entered promiscuous mode [ 224.090094][ T8728] device syzkaller0 entered promiscuous mode [ 224.677261][ T8743] device syzkaller0 entered promiscuous mode [ 225.053965][ T8798] device pim6reg1 entered promiscuous mode [ 225.459799][ T8813] device syzkaller0 entered promiscuous mode [ 225.517633][ T8830] device veth0_vlan left promiscuous mode [ 225.526689][ T8830] device veth0_vlan entered promiscuous mode [ 225.536664][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 225.551089][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 225.602945][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 226.261241][ T8885] device pim6reg1 entered promiscuous mode [ 227.007893][ T8938] syz.3.2387[8938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.258215][ T8940] device wg2 left promiscuous mode [ 227.461539][ T8957] device pim6reg1 entered promiscuous mode [ 227.567521][ T8938] device veth0_vlan left promiscuous mode [ 227.616687][ T8938] device veth0_vlan entered promiscuous mode [ 227.646707][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 227.659433][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 227.667340][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 228.340436][ T8991] device wg2 left promiscuous mode [ 228.347483][ T8994] device wg2 entered promiscuous mode [ 228.773596][ T9004] device pim6reg1 entered promiscuous mode [ 229.122499][ T9006] device syzkaller0 entered promiscuous mode [ 229.323257][ T9018] device veth1_macvtap left promiscuous mode [ 230.287070][ T9079] device sit0 left promiscuous mode [ 230.885336][ T9081] device sit0 entered promiscuous mode [ 231.569144][ T9142] device syzkaller0 entered promiscuous mode [ 231.591837][ T9143] device syzkaller0 entered promiscuous mode [ 232.315104][ T9160] device syzkaller0 entered promiscuous mode [ 232.451316][ T9172] €Â0: renamed from pim6reg1 [ 233.875796][ T9263] device sit0 left promiscuous mode [ 234.391814][ T9302] device pim6reg1 entered promiscuous mode [ 234.464171][ T24] audit: type=1400 audit(1755348461.320:165): avc: denied { create } for pid=9310 comm="syz.3.2483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 235.923025][ T9356] device sit0 entered promiscuous mode [ 238.496778][ T9445] syz.0.2518[9445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.496829][ T9445] syz.0.2518[9445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.288219][ T24] audit: type=1400 audit(1755348466.120:166): avc: denied { create } for pid=9458 comm="syz.2.2522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 239.728474][ T9475] device sit0 left promiscuous mode [ 239.752460][ T9475] device sit0 entered promiscuous mode [ 241.062195][ T9512] syz.2.2537[9512] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.062276][ T9512] syz.2.2537[9512] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.580916][ T9520] device sit0 entered promiscuous mode [ 243.397675][ T9578] ªªªªªª: renamed from vlan0 [ 244.471873][ T9605] device pim6reg1 entered promiscuous mode [ 244.873983][ T9642] device veth1 left promiscuous mode [ 244.879354][ T9642] bridge0: port 3(veth1) entered disabled state [ 244.886156][ T9642] device bridge_slave_1 left promiscuous mode [ 244.892273][ T9642] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.899808][ T9642] device bridge_slave_0 left promiscuous mode [ 244.906077][ T9642] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.144619][ T9673] device veth0_vlan left promiscuous mode [ 245.150681][ T9673] device veth0_vlan entered promiscuous mode [ 245.157688][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 245.168821][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 245.177014][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.205360][ T9731] device syzkaller0 entered promiscuous mode [ 247.745821][ T9812] syz.0.2619[9812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.745856][ T9812] syz.0.2619[9812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.860790][ T9812] device veth0_vlan left promiscuous mode [ 247.879035][ T9812] device veth0_vlan entered promiscuous mode [ 247.888791][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.898303][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 247.906792][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 248.602647][ T9877] device veth0_vlan left promiscuous mode [ 248.625573][ T9877] device veth0_vlan entered promiscuous mode [ 249.029091][ T9902] device wg2 left promiscuous mode [ 249.110211][ T9914] device sit0 left promiscuous mode [ 252.477253][T10030] device pim6reg1 entered promiscuous mode [ 252.745418][ T24] audit: type=1400 audit(1755348479.590:167): avc: denied { create } for pid=10043 comm="syz.0.2682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 253.845124][T10107] device veth0_vlan left promiscuous mode [ 253.983256][T10107] device veth0_vlan entered promiscuous mode [ 254.147749][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.179307][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 254.255335][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 255.833153][T10195] device wg2 entered promiscuous mode [ 255.909276][T10202] device syzkaller0 entered promiscuous mode [ 256.004411][T10222] p: renamed from pim6reg1 [ 256.454291][T10254] device wg2 entered promiscuous mode [ 256.508760][T10256] device wg2 left promiscuous mode [ 256.603857][T10261] device wg2 entered promiscuous mode [ 256.618038][T10259] device wg2 entered promiscuous mode [ 256.664085][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 256.686523][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 256.920933][T10273] device sit0 left promiscuous mode [ 258.202693][T10329] device sit0 entered promiscuous mode [ 259.409078][T10339] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.551640][T10339] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.568740][T10339] device bridge_slave_0 entered promiscuous mode [ 259.705214][T10339] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.745960][T10339] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.793600][T10339] device bridge_slave_1 entered promiscuous mode [ 260.193943][ T24] audit: type=1400 audit(1755348487.050:168): avc: denied { write } for pid=10339 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 260.234605][ T24] audit: type=1400 audit(1755348487.050:169): avc: denied { read } for pid=10339 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 260.306571][T10400] device veth0_vlan left promiscuous mode [ 260.449161][T10400] device veth0_vlan entered promiscuous mode [ 260.740875][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 260.748736][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 260.856375][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 260.936964][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 261.020360][T10417] cgroup: fork rejected by pids controller in /syz4 [ 261.021506][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.034091][ T353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 261.041757][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 261.064907][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 261.073918][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 261.082336][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.089404][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 261.116193][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 261.125066][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 261.135497][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 261.144233][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 261.283033][T10440] device wg2 left promiscuous mode [ 261.310444][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 261.326741][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 261.389005][T10339] device veth0_vlan entered promiscuous mode [ 261.403392][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 261.429970][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 261.483627][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 261.523519][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 261.636491][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 261.644782][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 262.014197][T10459] device veth0_vlan left promiscuous mode [ 262.033742][T10459] device veth0_vlan entered promiscuous mode [ 262.052616][T10339] device veth1_macvtap entered promiscuous mode [ 262.081147][T10444] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.089565][T10444] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.103525][T10444] device bridge_slave_0 entered promiscuous mode [ 262.110501][T10444] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.127775][T10444] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.140711][T10444] device bridge_slave_1 entered promiscuous mode [ 262.194897][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 262.204225][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 262.214608][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 262.245510][T10467] device syzkaller0 entered promiscuous mode [ 262.257531][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 262.287624][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 262.446637][T10475] device wg2 entered promiscuous mode [ 262.531128][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.544720][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.609637][T10486] device syzkaller0 entered promiscuous mode [ 262.632489][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 262.647966][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 262.666106][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.673210][ T353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.732397][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 262.745439][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 262.754304][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.761456][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.770528][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 262.779057][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 262.787444][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 262.795771][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 262.812411][T10444] device veth0_vlan entered promiscuous mode [ 262.834431][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 262.847669][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 262.865900][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 262.898652][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 262.995957][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 263.104058][T10444] device veth1_macvtap entered promiscuous mode [ 263.133206][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 263.141107][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 263.153943][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 263.163424][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 263.171876][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 263.252609][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 263.262639][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 263.275658][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 263.292435][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 263.697973][T10532] device syzkaller0 entered promiscuous mode [ 263.879389][ T296] device veth1_macvtap left promiscuous mode [ 263.886233][ T296] device veth0_vlan left promiscuous mode [ 264.115271][T10554] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.122405][T10554] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.130535][T10554] device bridge_slave_0 entered promiscuous mode [ 264.140451][T10554] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.147663][T10554] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.155423][T10554] device bridge_slave_1 entered promiscuous mode [ 264.208304][T10554] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.215396][T10554] bridge0: port 2(bridge_slave_1) entered forwarding state [ 264.222705][T10554] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.229751][T10554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 264.257747][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 264.278235][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 264.360457][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 264.466048][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 264.477959][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 264.486243][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 264.521587][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 264.553956][T10554] device veth0_vlan entered promiscuous mode [ 264.571733][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 264.583635][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 264.599881][T10554] device veth1_macvtap entered promiscuous mode [ 264.615439][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 264.633520][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 264.642106][ T520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 265.254689][ T296] device veth0_vlan left promiscuous mode [ 265.643102][ T24] audit: type=1400 audit(1755348492.490:170): avc: denied { create } for pid=10627 comm="syz.4.2839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 266.225697][T10619] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.253951][T10619] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.261270][T10619] device bridge_slave_0 entered promiscuous mode [ 266.285567][T10619] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.292608][T10619] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.303832][T10619] device bridge_slave_1 entered promiscuous mode [ 266.813847][T10619] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.821072][T10619] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.828496][T10619] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.835518][T10619] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.113828][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.143753][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.207133][T10668] device syzkaller0 entered promiscuous mode [ 267.242134][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 267.250181][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 267.265703][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 267.276840][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 267.289163][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.296255][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.322590][T10619] device veth0_vlan entered promiscuous mode [ 267.448559][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 267.457164][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 267.470885][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.477973][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.488744][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 267.498968][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 267.521601][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 267.530247][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 267.539810][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 267.548654][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 267.557475][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 267.565605][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 267.607849][T10619] device veth1_macvtap entered promiscuous mode [ 267.724797][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 267.732453][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 267.740652][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 267.749110][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 267.759484][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 267.880129][T10696] device xfrm0 entered promiscuous mode [ 267.895559][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 267.904286][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 267.912802][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 267.922043][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 267.945210][T10705] device pim6reg1 entered promiscuous mode [ 268.055846][T10723] device veth1_macvtap left promiscuous mode [ 268.091890][T10725] device veth0_vlan left promiscuous mode [ 268.098373][T10725] device veth0_vlan entered promiscuous mode [ 268.271054][ T296] device veth0_vlan left promiscuous mode [ 269.810344][T10841] device sit0 entered promiscuous mode [ 270.279292][T10893] syz.2.2913[10893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.279375][T10893] syz.2.2913[10893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.803165][T10899] device veth0_vlan left promiscuous mode [ 270.829573][T10899] device veth0_vlan entered promiscuous mode [ 270.894074][T10924] device dummy0 entered promiscuous mode [ 271.962275][T10971] device syzkaller0 entered promiscuous mode [ 272.954908][T11008] syz.0.2941[11008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.955082][T11008] syz.0.2941[11008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.261159][T11071] device sit0 left promiscuous mode [ 274.388885][T11075] device sit0 entered promiscuous mode [ 275.354419][T11103] device syzkaller0 entered promiscuous mode [ 275.376826][T11107] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 275.496283][T11113] tap0: tun_chr_ioctl cmd 1074025677 [ 275.501711][T11113] tap0: linktype set to 780 [ 275.584182][T11126] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.591415][T11126] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.619592][T11130] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.626893][T11130] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.645716][T11126] device bridge_slave_1 left promiscuous mode [ 275.651997][T11126] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.668804][T11126] device bridge_slave_0 left promiscuous mode [ 275.675113][T11126] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.102626][T11164] syz.3.2987[11164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.102680][T11164] syz.3.2987[11164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.137125][T11164] syz.3.2987[11164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.149605][T11164] syz.3.2987[11164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.247390][T11164] device wg2 entered promiscuous mode [ 276.311512][T11179] device wg2 left promiscuous mode [ 276.374645][T11185] device wg2 entered promiscuous mode [ 277.425008][T11223] syz.3.3003[11223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.425056][T11223] syz.3.3003[11223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.545031][T11234] device sit0 entered promiscuous mode [ 278.761478][T11289] device syzkaller0 entered promiscuous mode [ 279.004265][T11311] syz.2.3026[11311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.011301][T11311] syz.2.3026[11311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.143575][T11351] syz.2.3037[11351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.155795][T11351] syz.2.3037[11351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.875803][T11427] device veth0_vlan left promiscuous mode [ 282.012333][T11427] device veth0_vlan entered promiscuous mode [ 283.370169][T11520] device syzkaller0 entered promiscuous mode [ 283.385344][T11515] device syzkaller0 entered promiscuous mode [ 283.391953][T11529] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.399178][T11529] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.965798][T11563] device sit0 left promiscuous mode [ 286.588284][T11656] syz.4.3120 uses obsolete (PF_INET,SOCK_PACKET) [ 286.954204][T11688] device syzkaller0 entered promiscuous mode [ 288.437982][T11755] device wg2 left promiscuous mode [ 288.666840][T11764] device macsec0 entered promiscuous mode [ 288.787263][T11784] device sit0 entered promiscuous mode [ 289.753545][T11825] syz.1.3167[11825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.753618][T11825] syz.1.3167[11825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.497596][T11840] ªªªªªª: renamed from vlan0 [ 291.108462][T11869] device wg2 entered promiscuous mode [ 291.744794][T11903] device veth0_vlan left promiscuous mode [ 291.764113][T11903] device veth0_vlan entered promiscuous mode [ 291.771243][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 291.837625][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 291.892585][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 292.074616][T11914] device veth1_to_team entered promiscuous mode [ 292.136956][T11930] syz.0.3194[11930] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.137035][T11930] syz.0.3194[11930] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.982294][T11954] syz.0.3200[11954] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.002724][T11954] syz.0.3200[11954] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.032747][T11955] syz.0.3200[11955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.095736][T11955] syz.0.3200[11955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.436810][T11969] device veth1_macvtap left promiscuous mode [ 293.473179][T11969] device macsec0 left promiscuous mode [ 296.083179][T12127] device sit0 entered promiscuous mode [ 296.894989][T12148] syz.2.3257[12148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.895045][T12148] syz.2.3257[12148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.096664][T12148] device veth1_macvtap left promiscuous mode [ 297.699534][T12151] device veth1_macvtap entered promiscuous mode [ 297.723182][T12151] device macsec0 entered promiscuous mode [ 297.747980][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 298.248568][T12198] syz.1.3271[12198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.248650][T12198] syz.1.3271[12198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.501700][T12198] device wg2 left promiscuous mode [ 303.099242][T12385] device sit0 left promiscuous mode [ 309.463871][ T24] audit: type=1400 audit(1755348536.320:171): avc: denied { create } for pid=12614 comm="syz.0.3385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 309.595025][ T24] audit: type=1400 audit(1755348536.450:172): avc: denied { mounton } for pid=12635 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 312.009161][T12709] syz.1.3413[12709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.009220][T12709] syz.1.3413[12709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.573122][T12921] device sit0 left promiscuous mode [ 321.655937][T12921] device sit0 entered promiscuous mode [ 327.582932][T12981] device wg2 entered promiscuous mode SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=3 req=3339 state=3 status=67 (errno 32: Broken pipe) [ 329.963671][ T24] audit: type=1400 audit(1755348556.800:173): avc: denied { write } for pid=267 comm="syz-executor" path="pipe:[1551]" dev="pipefs" ino=1551 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 331.813836][ T7] device bridge_slave_1 left promiscuous mode [ 331.820019][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.827583][ T7] device bridge_slave_0 left promiscuous mode [ 331.833710][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.841696][ T7] device bridge_slave_1 left promiscuous mode [ 331.847942][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.855247][ T7] device bridge_slave_0 left promiscuous mode [ 331.861355][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.869109][ T7] device bridge_slave_1 left promiscuous mode [ 331.875235][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.882594][ T7] device bridge_slave_0 left promiscuous mode [ 331.888852][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.897395][ T7] device veth1_macvtap left promiscuous mode [ 331.903835][ T7] device veth0_vlan left promiscuous mode [ 331.909711][ T7] device veth1_macvtap left promiscuous mode