last executing test programs: 4.855162859s ago: executing program 4 (id=2964): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9044, 0x0, 0x0, 0xc, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = gettid() bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={r0, &(0x7f0000000780)="c1b2d518a614def296aec69071219ac74161eec3f783c59f3dd92daf82facb901488b34bb032eb5dbde8a3ebb749f9d589e7954d3adbeda5e16fe109c346fc152e2cba9ed0278e70f30c68660413bc0978eb5c3ff39f44435a5e4f58b80d81264ef1f46c998affa73229e1e16a849e873387e611d94e832a21c3278246f76c6e7668747b17df6d349926ab252994b7ee33bf2d6521d13a599e1f85d5b2f7e09f45873ae4c43e480d9a1bb29d11e4fcaf7a8079ec21d6fad2e96d17e6aea371c5e42490deecfeee4d400ee7fa9e4a38c40f71a46babd8d0b2603a3a1d1f486b28ea5fa16a11793335a47ac17a5567eef5ef4b9008"}, 0x20) syz_open_procfs$namespace(r2, &(0x7f0000000680)='ns/cgroup\x00') syz_open_procfs$namespace(r2, &(0x7f00000002c0)='ns/time\x00') 4.292943184s ago: executing program 4 (id=2965): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="07000000040000001800000042a0000000000000", @ANYRES32, @ANYBLOB="21040000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f40)={r0, 0x0, 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xa0001f98, 0x0, 0x0, &(0x7f0000000440), 0x0, 0xa70a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002300000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000100)=ANY=[@ANYBLOB="8510000004000000950000000000000018000000000000000000000000000000950000000000000085100000fcffffff95"], &(0x7f00000000c0)='GPL\x00'}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) 3.342858725s ago: executing program 3 (id=2968): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800acfcaeeb000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="67800066b3ffff00000000220000000000000200000000", @ANYRES32, @ANYBLOB="0400"/20, @ANYRES32=0x0, @ANYRESHEX=r0, @ANYBLOB="000000f0ffffffffffffff000000000000"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000eeffffffffffffff00000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kfree\x00', r2}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r0, 0x0, 0x500000000000000}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd42"], 0xfdef) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000), 0xfdef) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r10, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) r12 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r13}, 0x18) setsockopt$sock_attach_bpf(r9, 0x1, 0x21, &(0x7f00000000c0)=r12, 0x4) sendmsg$tipc(r10, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000841}, 0x0) recvmsg(r9, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1, &(0x7f00000032c0)=""/4096, 0x1000}, 0x0) sendmsg$tipc(r9, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000400"/13, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) 3.203251421s ago: executing program 4 (id=2969): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, 0x0, 0x0}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') ioctl$TUNSETIFF(r2, 0xb701, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)}, 0x10) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x13, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000480)='syzkaller\x00'}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r4}, 0x10) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/18], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0189436, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 3.200612341s ago: executing program 1 (id=2932): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='rss_stat\x00', r3}, 0x18) syz_clone(0x200400, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000001c0)='(pu&\"\"\t&&') 2.974088071s ago: executing program 3 (id=2971): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2000000000000115, &(0x7f0000000400)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x6, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x10, 0x0, 0x0, 0x620a05f02ae12472, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x2, 0x5}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r6 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r4, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x27, &(0x7f00000003c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000580), &(0x7f0000000680), 0x8, 0x41, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000008c0)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0xfffffffe, '\x00', r7, r6, 0x3, 0x4, 0x1}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYRESDEC=r1], &(0x7f0000000240)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 2.973196921s ago: executing program 2 (id=2916): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x19}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 2.795205568s ago: executing program 0 (id=2972): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r0, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000058"], 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1e00000088000000ff0f00000c00000000080000", @ANYRES32, @ANYBLOB="7f00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0500000005000000000000000c00"/28], 0x50) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{}, &(0x7f00000008c0), &(0x7f0000000900)}, 0x20) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x21, 0x800, 0x6, &(0x7f0000000000)) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r6}, 0xc) (async) r7 = getpid() syz_open_procfs$namespace(r7, 0x0) (async) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x1, 0x40000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x1, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) recvmsg$unix(r8, &(0x7f0000003040)={0x0, 0x0, 0x0}, 0x0) 2.794883189s ago: executing program 1 (id=2932): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='rss_stat\x00', r3}, 0x18) syz_clone(0x200400, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000001c0)='(pu&\"\"\t&&') 2.515316761s ago: executing program 3 (id=2973): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000073011400000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffe, 0x0, @perf_config_ext={0x1, 0x8000000}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc$j\xfef;q1\x95\xf4\xe4\x13\x95k#Jz.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcf\x01t\r%\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') 2.514702561s ago: executing program 0 (id=2974): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000780)='ns/mnt\x00') r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f00000001c0)={[{0x6, 'cpu'}]}, 0x5) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x6, 0x15, &(0x7f0000001480)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {}, {0x85, 0x0, 0x0, 0x33}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r8, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x50) 2.512986311s ago: executing program 2 (id=2916): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x19}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 1.312970363s ago: executing program 0 (id=2975): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xc, 0x8}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9044, 0x0, 0x0, 0xc, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r0, 0x40047452, &(0x7f0000000180)) 1.312489873s ago: executing program 1 (id=2932): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='rss_stat\x00', r3}, 0x18) syz_clone(0x200400, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000001c0)='(pu&\"\"\t&&') 1.195337358s ago: executing program 3 (id=2976): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000102700000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0, 0x0, @void, @value=0x90}, 0x80) 1.194732158s ago: executing program 4 (id=2977): openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x8400, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x8400, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@o_path={&(0x7f0000000240)='./file0\x00'}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000280)="db", 0x1}], 0x1}, 0x41) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x18) recvmsg(r2, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x2040) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f00000002c0)=r1) (async) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f00000002c0)=r1) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_bp={0x0, 0x1}, 0x100410, 0x200, 0x2, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x30000000}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x6, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x30000000}, 0x94) 1.194351398s ago: executing program 0 (id=2978): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000600000000000000000000000000000000000039d4336c1175b31c4434380000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffe80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x3, '\x00', 0x0, @fallback=0xc968f2e2d69465da, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r0, 0x0, 0x500000000000000}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) 1.194142198s ago: executing program 2 (id=2916): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x19}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 976.225978ms ago: executing program 0 (id=2979): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000007214b182d57a22ad580b3d964c51dc78f77e8a500c234347d99bcf6a761acead3bb365fe62612396be95aeebe2a68164add6eab66fa81fc5b476fc00"/80, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107bed75ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="b40800000800000073114100000000008510000002000000b70000f98bbc00ac00000000009500c200000000009500001200000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x70) bpf$BPF_GET_PROG_INFO(0x1c, &(0x7f00000003c0)={r2, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000fd"], 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="07000000040000001800000042a0000000000000", @ANYRES32, @ANYBLOB="0114004000080000000000000000000001", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f40)={r3, 0x0, 0x0}, 0x20) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0xa0001f98, 0x0, 0x0, &(0x7f0000000440), 0x0, 0xa70a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000dd0000000000003b810000850000006d000000a50000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000100)=ANY=[@ANYBLOB="8510000004000000950000000000000018000000000000000000000000000000950000000000000085100000fcffffff95"], &(0x7f00000000c0)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x60000000}, 0x50) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) write$cgroup_freezer_state(r5, &(0x7f0000000040)='THAWED\x00', 0x7) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000040)={0x8000, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000000c0)=r8, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYRES32, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000f6eb4a24cfec355830273237c8edc736dbbf80e2e4fead3dcbcaf9ded729bdcedcc1127429c40b0bdec57520f14b88c1acf4c419b356227fe416a21e26bccdb260dfb6c618b0c921"], 0x48) 975.964268ms ago: executing program 1 (id=2932): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='rss_stat\x00', r3}, 0x18) syz_clone(0x200400, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000001c0)='(pu&\"\"\t&&') 738.484678ms ago: executing program 4 (id=2980): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd020f4c0c8c56147d66527da307bf731fef97861750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3665f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447c2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0000000000000003629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d7b90dfae158b94f50adab988dd8e12b1b56073d0d10f7067c881434af5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf77bfc95769a9294df517d90bdc01e73835efd98ad5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b31592479ecf2392548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbe1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5646ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4766e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec859c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f250057931d828ec78e116ae46c4897e2795b6ff92e9a1f63a6ed8fb4f8f3a6ec4e76f8621e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403f02734137ff47257f164391c673b6071b6ad0f05eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f5589829b6b0679b5d65a81826fc9b38f791c8f1892b51ad65a89bc84646ebf78f5d5d4804d9abb071fd711b5e7cc163b42a6510b8f5ee6747df0b560eabe0499bf1fef7c18bb9f55effa018679845c6598fb78bf1b8d9d9f04a5f6062c2bbb91952755b3f7c948268cb647d0a0bb1286480615941154a01d23734bcafe3b164474e2f2efa77850686ee4541f3e79efa63545a7ae53d5f0c40cc86473f7eb093980bd0d97bb4750128d9c519984c5f731ea259e71b2f12d67ce12e52c283e74594dfc933e625737ed231d61263721d46daf093f770357cd78fe1431aef52b4a0a933f1a5334ad03f3876fc8a8e187f80318427b4c922075cf829e3cc49d71d52137b48e1fb6b05dd1c7b251a7059f0a4b4f3431f67fc65b75c202e43816e34ff41db85bacd77b25242830b788ae1e00"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0xb0}, [@ldst={0x5}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x48) 737.581658ms ago: executing program 2 (id=2916): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x19}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 319.119556ms ago: executing program 1 (id=2932): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='rss_stat\x00', r3}, 0x18) syz_clone(0x200400, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000001c0)='(pu&\"\"\t&&') 167.987593ms ago: executing program 3 (id=2981): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x3}, 0x204, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="000c000000f406000001000000000000f7b3b75aa80c1509af7cee095dd070e662d5f2a6593a99dcfb7ab88aaa8fd11b303eb3bb99aee1054b98abad3f89569201fb205b484bd9896ecd6d6159019a8ef3e50b7bc6e70a3268248523239d8a03c0216336c7cb73b89f122cb46e865e6b670128542c6519e48bf98b0698a9f9b299a2211abb6f935966dcabeebbea5845c665f5eb571fa36bfb0195a4943bb686c870a00fc54070f3d87087eaa6b668", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000600), 0x5, r2}, 0x38) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r0, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x18, 0x3, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000440)='GPL\x00'}, 0x80) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='9p_client_req\x00', r5}, 0x10) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) setsockopt$sock_attach_bpf(r4, 0x1, 0x42, &(0x7f0000000040)=r7, 0x3b) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000005c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0xfe63, '\x00', r3, r7, 0x1, 0x1, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008bd6000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r8}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={r0, &(0x7f0000000180)="fe0b64caa33c3647676df75cbdc0a5f90f449e4133f4723b63f631e87c0d621a21db566cbe36eb5a4870a14631e907d14ce9fcc35510f2f21b72e88231f4acb5ee2482ac84ef35da435794772428ac2d4bc6cbea23c940be00b7c855dda1ef7566d71ce955c67698388fcc58a1764ec61e69977ed03d5b41f86fbe82a8e845af19cc5704cbe8"}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000000)=ANY=[], 0xfdef) 167.524523ms ago: executing program 4 (id=2982): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000d7f3be5d5f1729689ae97f0f9c", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r1}, 0x10) 167.257473ms ago: executing program 2 (id=2916): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x19}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 73.685227ms ago: executing program 0 (id=2983): socketpair(0xf, 0x5, 0xc2, &(0x7f0000000000)) r0 = perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x22001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000005, 0x0, @perf_bp={0x0, 0x1}, 0x4, 0x800000000000c8, 0x4, 0x9, 0x1000000000, 0x0, 0x1, 0x0, 0x81, 0x0, 0x1}, 0x0, 0x9, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xff, 0x3, 0x0, 0x0, 0x0, 0x40000000000, 0x8264, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x4, @perf_bp={0x0, 0x1f}, 0x2010, 0x0, 0xfffffffc, 0x2, 0x0, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000005c0)='kmem_cache_free\x00', r7}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) close(r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x2, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x8, 0x6}, 0xa104, 0xc8, 0x2, 0x1, 0x4, 0x0, 0x8, 0x0, 0xc38}, 0x0, 0x8, 0xffffffffffffffff, 0x1) close(r10) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYRES8=r0], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r11}, 0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r12, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x40000102) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$inet(r13, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r14, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781"], 0xfdef) 73.124117ms ago: executing program 1 (id=2932): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='rss_stat\x00', r3}, 0x18) syz_clone(0x200400, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000001c0)='(pu&\"\"\t&&') 441.73ТЕs ago: executing program 3 (id=2984): bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYRES64], 0x48) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r0}, 0x18) (async) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x40005}, 0x18) perf_event_open(0x0, 0x0, 0xffefffffffffffff, r1, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000040)=0xfffffffffffffffe, 0x12) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, &(0x7f0000000680)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x800}, 0x94) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r7) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r9], 0x18}, 0x0) (async) sendmsg$unix(r7, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r9], 0x18}, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x4d513aed11700013, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) (async) close(r10) (async) openat$cgroup_type(r2, &(0x7f0000000300), 0x2, 0x0) 0s ago: executing program 2 (id=2916): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x19}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.156' (ED25519) to the list of known hosts. [ 27.829659][ T30] audit: type=1400 audit(1763630989.621:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 27.831501][ T273] cgroup: Unknown subsys name 'net' [ 27.856029][ T30] audit: type=1400 audit(1763630989.621:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.898011][ T30] audit: type=1400 audit(1763630989.661:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.898498][ T273] cgroup: Unknown subsys name 'devices' [ 28.057864][ T273] cgroup: Unknown subsys name 'hugetlb' [ 28.064455][ T273] cgroup: Unknown subsys name 'rlimit' [ 28.334920][ T30] audit: type=1400 audit(1763630990.131:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.364536][ T30] audit: type=1400 audit(1763630990.131:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 28.403174][ T30] audit: type=1400 audit(1763630990.131:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 28.410145][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 28.452233][ T30] audit: type=1400 audit(1763630990.241:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 28.491471][ T30] audit: type=1400 audit(1763630990.241:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 28.533531][ T30] audit: type=1400 audit(1763630990.321:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 28.534354][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 28.571119][ T30] audit: type=1400 audit(1763630990.321:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 29.326720][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.341099][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.356689][ T281] device bridge_slave_0 entered promiscuous mode [ 29.382513][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.393046][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.402956][ T283] device bridge_slave_0 entered promiscuous mode [ 29.415028][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.426223][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.439385][ T281] device bridge_slave_1 entered promiscuous mode [ 29.448900][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.463844][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.475582][ T282] device bridge_slave_0 entered promiscuous mode [ 29.486000][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.495329][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.505375][ T282] device bridge_slave_1 entered promiscuous mode [ 29.520424][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.529638][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.541839][ T283] device bridge_slave_1 entered promiscuous mode [ 29.642299][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.651258][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.663366][ T284] device bridge_slave_0 entered promiscuous mode [ 29.675632][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.684462][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.696690][ T285] device bridge_slave_0 entered promiscuous mode [ 29.719820][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.730728][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.744941][ T284] device bridge_slave_1 entered promiscuous mode [ 29.759247][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.775940][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.788317][ T285] device bridge_slave_1 entered promiscuous mode [ 29.970816][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.981749][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.992067][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.000911][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.039930][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.049323][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.063990][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.074906][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.155418][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.165694][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.174443][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.186214][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.198540][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.208305][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.218238][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.228358][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.236970][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.251252][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.260472][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.294063][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.306040][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.318610][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.349140][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.362427][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.398429][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.408440][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.418409][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.427186][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.439573][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.452082][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.463905][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.477415][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.489144][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.502055][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.515612][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.527403][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.537650][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.548268][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.565843][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.575892][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.588891][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.602889][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.614788][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.624266][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.637596][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.653455][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.666096][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.675775][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.688888][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.701114][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.712404][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.722141][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.765492][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.775618][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.792199][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.807831][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.822128][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.836716][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.850085][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.864419][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.879233][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.893465][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.906795][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.917715][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.938554][ T281] device veth0_vlan entered promiscuous mode [ 30.950592][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.965423][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.976632][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.986064][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.995811][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 31.006721][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.017686][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.027781][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.037360][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 31.047241][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.060575][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.073443][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.085095][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 31.093648][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.106000][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.115177][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 31.124619][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.135105][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.144492][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.155973][ T283] device veth0_vlan entered promiscuous mode [ 31.172182][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 31.182840][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.195024][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.210626][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.220326][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.232757][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.243547][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.260032][ T282] device veth0_vlan entered promiscuous mode [ 31.275341][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.285688][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.295675][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.305946][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 31.317549][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.329275][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.338160][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.349267][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.359018][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.378717][ T281] device veth1_macvtap entered promiscuous mode [ 31.387263][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.402322][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.412958][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.430460][ T283] device veth1_macvtap entered promiscuous mode [ 31.444376][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.454337][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.463185][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.476043][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 31.488241][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.500895][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 31.511220][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.523371][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.536357][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.550986][ T282] device veth1_macvtap entered promiscuous mode [ 31.562744][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 31.572045][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.584758][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.597839][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.613111][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.625606][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.640090][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.659565][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.677097][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.690650][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.703882][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.718146][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.731994][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.751201][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.763599][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.775955][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.788214][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.800955][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.816624][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.833066][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.843209][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.858166][ T285] device veth0_vlan entered promiscuous mode [ 31.878780][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.895726][ T281] request_module fs-gadgetfs succeeded, but still no fs? [ 31.897310][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.923540][ T284] device veth0_vlan entered promiscuous mode [ 31.950239][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.968404][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.979687][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.990180][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.052442][ T285] device veth1_macvtap entered promiscuous mode [ 32.072776][ C0] hrtimer: interrupt took 306662 ns [ 32.090396][ T284] device veth1_macvtap entered promiscuous mode [ 32.104430][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 32.119760][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.132222][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 32.142652][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 32.164941][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.178256][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 32.306349][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.335333][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.383984][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.434530][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.493882][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.507967][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.521066][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.534852][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 33.131216][ T30] kauditd_printk_skb: 39 callbacks suppressed [ 33.131233][ T30] audit: type=1400 audit(1763630994.921:113): avc: denied { prog_run } for pid=355 comm="syz.4.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 33.234541][ T30] audit: type=1400 audit(1763630995.031:114): avc: denied { create } for pid=366 comm="syz.3.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 33.374917][ T30] audit: type=1400 audit(1763630995.171:115): avc: denied { relabelfrom } for pid=375 comm="syz.2.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 33.493752][ T30] audit: type=1400 audit(1763630995.171:116): avc: denied { relabelto } for pid=375 comm="syz.2.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 33.580916][ T30] audit: type=1400 audit(1763630995.241:117): avc: denied { read } for pid=374 comm="syz.3.10" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 33.634298][ T30] audit: type=1400 audit(1763630995.361:118): avc: denied { create } for pid=374 comm="syz.3.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 33.848422][ T30] audit: type=1400 audit(1763630995.641:119): avc: denied { ioctl } for pid=384 comm="syz.2.12" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 34.132808][ T30] audit: type=1400 audit(1763630995.921:120): avc: denied { cpu } for pid=391 comm="syz.0.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 34.344418][ T30] audit: type=1400 audit(1763630996.131:121): avc: denied { create } for pid=396 comm="syz.3.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 35.956039][ T424] device syzkaller0 entered promiscuous mode [ 36.379264][ T431] sock: sock_timestamping_bind_phc: sock not bind to device [ 36.484983][ T30] audit: type=1400 audit(1763630998.271:122): avc: denied { create } for pid=432 comm="syz.4.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 38.528900][ T30] audit: type=1400 audit(1763631000.321:123): avc: denied { tracepoint } for pid=443 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 39.612550][ T456] syz.1.31 uses obsolete (PF_INET,SOCK_PACKET) [ 40.225796][ T30] audit: type=1400 audit(1763631002.001:124): avc: denied { create } for pid=466 comm="syz.4.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 41.025719][ T484] device pim6reg1 entered promiscuous mode [ 41.979089][ T502] bond_slave_1: mtu less than device minimum [ 43.699906][ T509] syz.4.45 (509) used greatest stack depth: 21872 bytes left [ 44.002510][ T514] device syzkaller0 entered promiscuous mode [ 46.397957][ T30] audit: type=1400 audit(1763631008.191:125): avc: denied { create } for pid=549 comm="syz.1.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 48.038165][ T587] device macsec0 entered promiscuous mode [ 48.216091][ T588] device syzkaller0 entered promiscuous mode [ 48.276754][ T30] audit: type=1400 audit(1763631010.071:126): avc: denied { create } for pid=596 comm="syz.2.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 48.983155][ T608] device syzkaller0 entered promiscuous mode [ 49.173059][ T618] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.187350][ T618] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.555751][ T30] audit: type=1400 audit(1763631011.341:127): avc: denied { create } for pid=623 comm="syz.0.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 49.700209][ T30] audit: type=1400 audit(1763631011.441:128): avc: denied { append } for pid=652 comm="syz.2.85" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 50.160920][ T673] device sit0 entered promiscuous mode [ 50.794530][ T30] audit: type=1400 audit(1763631012.581:129): avc: denied { create } for pid=706 comm="syz.2.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 52.739328][ T767] ------------[ cut here ]------------ [ 52.764273][ T767] trace type BPF program uses run-time allocation [ 52.774384][ T30] audit: type=1400 audit(1763631014.561:130): avc: denied { create } for pid=768 comm="syz.1.119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 52.834742][ T767] WARNING: CPU: 0 PID: 767 at kernel/bpf/verifier.c:11722 check_map_prog_compatibility+0x6cd/0x870 [ 52.922204][ T30] audit: type=1400 audit(1763631014.621:131): avc: denied { create } for pid=771 comm="syz.3.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 52.957865][ T767] Modules linked in: [ 53.002812][ T767] CPU: 0 PID: 767 Comm: syz.4.118 Not tainted syzkaller #0 [ 53.043099][ T767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 53.091794][ T30] audit: type=1400 audit(1763631014.881:132): avc: denied { create } for pid=780 comm="syz.3.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 53.124618][ T767] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 53.185057][ T767] Code: ee ff 48 c7 c6 80 f5 47 85 4c 8b 65 d0 e9 fd fc ff ff e8 46 4b ee ff c6 05 54 99 6b 05 01 48 c7 c7 e0 f1 47 85 e8 73 69 25 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 53.455485][ T767] RSP: 0018:ffffc90000ce7428 EFLAGS: 00010246 [ 53.462889][ T767] RAX: 2f702b35bf168400 RBX: 0000000000000001 RCX: 0000000000080000 [ 53.518760][ T30] audit: type=1400 audit(1763631015.231:133): avc: denied { create } for pid=794 comm="syz.1.126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 53.968836][ T767] RDX: ffffc90003bb5000 RSI: 0000000000002e12 RDI: 0000000000002e13 [ 54.016551][ T767] RBP: ffffc90000ce7470 R08: dffffc0000000000 R09: ffffed103ee065e8 [ 54.045672][ T767] R10: ffffed103ee065e8 R11: 1ffff1103ee065e7 R12: ffff888129274000 [ 54.324478][ T767] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88810e950800 [ 54.433062][ T767] FS: 00007fa46f4216c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 54.544375][ T767] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 54.574446][ T767] CR2: 000000000000fff3 CR3: 000000010d2c3000 CR4: 00000000003506a0 [ 54.639661][ T767] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 54.712552][ T767] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 54.734624][ T767] Call Trace: [ 54.753115][ T767] [ 54.814837][ T767] resolve_pseudo_ldimm64+0x685/0x11d0 [ 54.822237][ T767] ? check_attach_btf_id+0xde0/0xde0 [ 54.894421][ T767] ? __mark_reg_known+0x1b0/0x1b0 [ 54.902596][ T767] ? security_capable+0x87/0xb0 [ 54.977883][ T767] bpf_check+0x2c25/0xf280 [ 55.046059][ T767] ? 0xffffffffa000e0d8 [ 55.051542][ T767] ? is_bpf_text_address+0x177/0x190 [ 55.188069][ T767] ? bpf_get_btf_vmlinux+0x60/0x60 [ 55.252600][ T767] ? unwind_get_return_address+0x4d/0x90 [ 55.288837][ T767] ? stack_trace_save+0xe0/0xe0 [ 55.296318][ T767] ? arch_stack_walk+0xee/0x140 [ 55.305530][ T767] ? stack_trace_save+0x98/0xe0 [ 55.314728][ T767] ? __stack_depot_save+0x34/0x480 [ 55.321875][ T767] ? __kasan_slab_alloc+0x69/0xf0 [ 55.331419][ T767] ? _find_next_bit+0x1fa/0x200 [ 55.340623][ T767] ? __kasan_kmalloc+0xec/0x110 [ 55.354418][ T767] ? __kasan_kmalloc+0xda/0x110 [ 55.367752][ T767] ? kmem_cache_alloc_trace+0x119/0x270 [ 55.399041][ T767] ? selinux_bpf_prog_alloc+0x51/0x140 [ 55.413111][ T767] ? security_bpf_prog_alloc+0x62/0x90 [ 55.428475][ T767] ? bpf_prog_load+0x97c/0x1550 [ 55.441579][ T767] ? __sys_bpf+0x4c3/0x730 [ 55.451843][ T767] ? __x64_sys_bpf+0x7c/0x90 [ 55.462862][ T767] ? x64_sys_call+0x4b9/0x9a0 [ 55.470029][ T767] ? do_syscall_64+0x4c/0xa0 [ 55.477677][ T767] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 55.490675][ T767] ? check_stack_object+0x81/0x140 [ 55.517164][ T767] ? memset+0x35/0x40 [ 55.523043][ T767] ? bpf_obj_name_cpy+0x193/0x1e0 [ 55.554207][ T767] bpf_prog_load+0x1042/0x1550 [ 55.566436][ T767] ? __anon_inode_getfd+0x34b/0x3b0 [ 55.576936][ T767] ? map_freeze+0x360/0x360 [ 55.583957][ T767] ? selinux_bpf+0xc7/0xf0 [ 55.590999][ T767] ? security_bpf+0x82/0xa0 [ 55.598534][ T767] __sys_bpf+0x4c3/0x730 [ 55.605407][ T767] ? bpf_link_show_fdinfo+0x310/0x310 [ 55.616531][ T767] ? bpf_trace_run2+0xb5/0x1b0 [ 55.627345][ T767] ? __bpf_trace_sys_enter+0x62/0x70 [ 55.639783][ T767] __x64_sys_bpf+0x7c/0x90 [ 55.654365][ T767] x64_sys_call+0x4b9/0x9a0 [ 55.662056][ T767] do_syscall_64+0x4c/0xa0 [ 55.686010][ T767] ? clear_bhb_loop+0x50/0xa0 [ 55.700647][ T767] ? clear_bhb_loop+0x50/0xa0 [ 55.734223][ T767] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 55.743786][ T767] RIP: 0033:0x7fa4709da749 [ 55.842657][ T767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 55.926579][ T870] device team_slave_1 entered promiscuous mode [ 55.934376][ T767] RSP: 002b:00007fa46f421038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 55.948764][ T767] RAX: ffffffffffffffda RBX: 00007fa470c31090 RCX: 00007fa4709da749 [ 55.974352][ T219] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.989836][ T767] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 56.004937][ T219] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 56.014719][ T30] audit: type=1400 audit(1763631017.801:134): avc: denied { create } for pid=869 comm="syz.2.145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 56.072338][ T767] RBP: 00007fa470a5ef91 R08: 0000000000000000 R09: 0000000000000000 [ 56.103652][ T767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 56.137011][ T767] R13: 00007fa470c31128 R14: 00007fa470c31090 R15: 00007ffdd3ab9fd8 [ 56.150092][ T767] [ 56.155308][ T767] ---[ end trace 5d2e8f6cad0d7e55 ]--- [ 57.263344][ T916] FAULT_INJECTION: forcing a failure. [ 57.263344][ T916] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 57.427097][ T916] CPU: 1 PID: 916 Comm: syz.3.155 Tainted: G W syzkaller #0 [ 57.438326][ T916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 57.457474][ T916] Call Trace: [ 57.463173][ T916] [ 57.468197][ T916] __dump_stack+0x21/0x30 [ 57.475779][ T916] dump_stack_lvl+0xee/0x150 [ 57.481872][ T916] ? show_regs_print_info+0x20/0x20 [ 57.491527][ T916] ? has_cap_mac_admin+0x330/0x330 [ 57.498897][ T916] dump_stack+0x15/0x20 [ 57.506474][ T916] should_fail+0x3c1/0x510 [ 57.511550][ T916] should_fail_usercopy+0x1a/0x20 [ 57.520275][ T916] _copy_from_user+0x20/0xd0 [ 57.527040][ T916] get_user_ifreq+0x6c/0x180 [ 57.532187][ T916] sock_ioctl+0x605/0x6b0 [ 57.539254][ T916] ? sock_poll+0x3d0/0x3d0 [ 57.545635][ T916] ? security_file_ioctl+0x84/0xa0 [ 57.551715][ T916] ? sock_poll+0x3d0/0x3d0 [ 57.558355][ T916] __se_sys_ioctl+0x121/0x1a0 [ 57.564801][ T916] __x64_sys_ioctl+0x7b/0x90 [ 57.571948][ T916] x64_sys_call+0x2f/0x9a0 [ 57.581562][ T916] do_syscall_64+0x4c/0xa0 [ 57.586513][ T916] ? clear_bhb_loop+0x50/0xa0 [ 57.593437][ T916] ? clear_bhb_loop+0x50/0xa0 [ 57.600521][ T916] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 57.608673][ T916] RIP: 0033:0x7f3d3b05f749 [ 57.613765][ T916] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 57.642030][ T916] RSP: 002b:00007f3d39ac7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 57.653520][ T916] RAX: ffffffffffffffda RBX: 00007f3d3b2b5fa0 RCX: 00007f3d3b05f749 [ 57.663265][ T916] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000004 [ 57.675124][ T916] RBP: 00007f3d39ac7090 R08: 0000000000000000 R09: 0000000000000000 [ 57.686740][ T916] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 57.698577][ T916] R13: 00007f3d3b2b6038 R14: 00007f3d3b2b5fa0 R15: 00007ffcc1bdc6f8 [ 57.709123][ T916] [ 60.387078][ T971] FAULT_INJECTION: forcing a failure. [ 60.387078][ T971] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 60.445266][ T971] CPU: 1 PID: 971 Comm: syz.2.169 Tainted: G W syzkaller #0 [ 60.458672][ T971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 60.477925][ T971] Call Trace: [ 60.483004][ T971] [ 60.486149][ T971] __dump_stack+0x21/0x30 [ 60.492972][ T971] dump_stack_lvl+0xee/0x150 [ 60.501469][ T971] ? show_regs_print_info+0x20/0x20 [ 60.510744][ T971] ? _raw_spin_lock+0x8e/0xe0 [ 60.517003][ T971] ? _raw_spin_trylock_bh+0x130/0x130 [ 60.526500][ T971] dump_stack+0x15/0x20 [ 60.537248][ T971] should_fail+0x3c1/0x510 [ 60.544910][ T971] should_fail_usercopy+0x1a/0x20 [ 60.552544][ T971] _copy_from_user+0x20/0xd0 [ 60.560727][ T971] ip_tunnel_siocdevprivate+0xa3/0x1c0 [ 60.570976][ T971] ? ip_tunnel_update+0xca0/0xca0 [ 60.576589][ T971] ? full_name_hash+0xa0/0xf0 [ 60.584888][ T971] dev_ifsioc+0xaf5/0xe70 [ 60.590237][ T971] ? dev_ioctl+0xd10/0xd10 [ 60.596055][ T971] ? __mutex_lock_slowpath+0xe/0x10 [ 60.604477][ T971] ? mutex_lock+0x100/0x1a0 [ 60.612151][ T971] ? wait_for_completion_killable_timeout+0x10/0x10 [ 60.620714][ T971] ? dev_get_by_name_rcu+0xc8/0xf0 [ 60.627695][ T971] dev_ioctl+0x5fd/0xd10 [ 60.635136][ T971] sock_ioctl+0x64a/0x6b0 [ 60.641936][ T971] ? sock_poll+0x3d0/0x3d0 [ 60.647516][ T971] ? security_file_ioctl+0x84/0xa0 [ 60.653796][ T971] ? sock_poll+0x3d0/0x3d0 [ 60.660219][ T971] __se_sys_ioctl+0x121/0x1a0 [ 60.666085][ T971] __x64_sys_ioctl+0x7b/0x90 [ 60.671698][ T971] x64_sys_call+0x2f/0x9a0 [ 60.678308][ T971] do_syscall_64+0x4c/0xa0 [ 60.684045][ T971] ? clear_bhb_loop+0x50/0xa0 [ 60.691880][ T971] ? clear_bhb_loop+0x50/0xa0 [ 60.699644][ T971] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 60.708078][ T971] RIP: 0033:0x7f0310a20749 [ 60.715354][ T971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 60.747119][ T971] RSP: 002b:00007f030f467038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 60.757787][ T971] RAX: ffffffffffffffda RBX: 00007f0310c77090 RCX: 00007f0310a20749 [ 60.770738][ T971] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000004 [ 60.781699][ T971] RBP: 00007f030f467090 R08: 0000000000000000 R09: 0000000000000000 [ 60.795676][ T971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 60.806119][ T971] R13: 00007f0310c77128 R14: 00007f0310c77090 R15: 00007ffeff0a5368 [ 60.818057][ T971] [ 60.854835][ T978] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 61.733581][ C0] Illegal XDP return value 16128, expect packet loss! [ 62.192870][ T1006] device sit0 left promiscuous mode [ 62.567120][ T1017] device pim6reg1 entered promiscuous mode [ 62.681850][ T1025] FAULT_INJECTION: forcing a failure. [ 62.681850][ T1025] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 62.710399][ T1025] CPU: 1 PID: 1025 Comm: syz.4.184 Tainted: G W syzkaller #0 [ 62.721676][ T1025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 62.737703][ T1025] Call Trace: [ 62.750403][ T1025] [ 62.753622][ T1025] __dump_stack+0x21/0x30 [ 62.759408][ T1025] dump_stack_lvl+0xee/0x150 [ 62.766678][ T1025] ? show_regs_print_info+0x20/0x20 [ 62.773785][ T1025] dump_stack+0x15/0x20 [ 62.784281][ T1025] should_fail+0x3c1/0x510 [ 62.791948][ T1025] should_fail_usercopy+0x1a/0x20 [ 62.797825][ T1025] _copy_to_user+0x20/0x90 [ 62.805248][ T1025] simple_read_from_buffer+0xe9/0x160 [ 62.811694][ T1025] proc_fail_nth_read+0x19a/0x210 [ 62.818409][ T1025] ? proc_fault_inject_write+0x2f0/0x2f0 [ 62.826141][ T1025] ? security_file_permission+0x83/0xa0 [ 62.833764][ T1025] ? proc_fault_inject_write+0x2f0/0x2f0 [ 62.842910][ T1025] vfs_read+0x282/0xbe0 [ 62.847789][ T1025] ? kernel_read+0x1f0/0x1f0 [ 62.859690][ T1025] ? __kasan_check_write+0x14/0x20 [ 62.865445][ T1025] ? mutex_lock+0x95/0x1a0 [ 62.872999][ T1025] ? wait_for_completion_killable_timeout+0x10/0x10 [ 62.887897][ T1025] ? __fget_files+0x2c4/0x320 [ 62.894525][ T1025] ? __fdget_pos+0x2d2/0x380 [ 62.901635][ T1025] ? ksys_read+0x71/0x240 [ 62.907347][ T1025] ksys_read+0x140/0x240 [ 62.912838][ T1025] ? vfs_write+0xf70/0xf70 [ 62.919320][ T1025] ? __kasan_check_write+0x14/0x20 [ 62.928256][ T1025] ? switch_fpu_return+0x15d/0x2c0 [ 62.935314][ T1025] __x64_sys_read+0x7b/0x90 [ 62.942784][ T1025] x64_sys_call+0x96d/0x9a0 [ 62.949466][ T1025] do_syscall_64+0x4c/0xa0 [ 62.956449][ T1025] ? clear_bhb_loop+0x50/0xa0 [ 62.962925][ T1025] ? clear_bhb_loop+0x50/0xa0 [ 62.969408][ T1025] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 62.977686][ T1025] RIP: 0033:0x7fa4709d915c [ 62.983147][ T1025] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 63.012814][ T1025] RSP: 002b:00007fa46f442030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 63.027736][ T1025] RAX: ffffffffffffffda RBX: 00007fa470c30fa0 RCX: 00007fa4709d915c [ 63.038176][ T1025] RDX: 000000000000000f RSI: 00007fa46f4420a0 RDI: 0000000000000007 [ 63.049850][ T1025] RBP: 00007fa46f442090 R08: 0000000000000000 R09: 0000000000000000 [ 63.062991][ T1025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 63.077481][ T1025] R13: 00007fa470c31038 R14: 00007fa470c30fa0 R15: 00007ffdd3ab9fd8 [ 63.087808][ T1025] [ 63.519280][ T30] audit: type=1400 audit(1763631025.311:135): avc: denied { create } for pid=1033 comm="syz.3.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 63.560548][ T1042] device veth1_macvtap left promiscuous mode [ 64.239568][ T30] audit: type=1400 audit(1763631026.031:136): avc: denied { create } for pid=1059 comm="syz.4.194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 64.417978][ T1062] device syzkaller0 entered promiscuous mode [ 65.797059][ T1098] ЊЊЊЊЊЊў€: renamed from vlan0 [ 66.032812][ T30] audit: type=1400 audit(1763631027.821:137): avc: denied { create } for pid=1101 comm="syz.4.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 66.305608][ T30] audit: type=1400 audit(1763631027.911:138): avc: denied { create } for pid=1120 comm="syz.1.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 66.543708][ T1131] syz.3.213[1131] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.691326][ T30] audit: type=1400 audit(1763631028.471:139): avc: denied { create } for pid=1135 comm="syz.1.216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 66.970947][ T30] audit: type=1400 audit(1763631028.751:140): avc: denied { create } for pid=1142 comm="syz.4.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 67.106545][ T1145] bond_slave_1: mtu less than device minimum [ 68.998715][ T30] audit: type=1400 audit(1763631030.791:141): avc: denied { write } for pid=1206 comm="syz.1.234" name="cgroup.subtree_control" dev="cgroup2" ino=303 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 69.247323][ T30] audit: type=1400 audit(1763631030.791:142): avc: denied { open } for pid=1206 comm="syz.1.234" path="" dev="cgroup2" ino=303 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 69.486941][ T30] audit: type=1400 audit(1763631030.791:143): avc: denied { ioctl } for pid=1206 comm="syz.1.234" path="" dev="cgroup2" ino=303 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 69.566096][ T30] audit: type=1400 audit(1763631030.951:144): avc: denied { create } for pid=1206 comm="syz.1.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 69.972522][ T1249] device syzkaller0 entered promiscuous mode [ 70.018219][ T30] audit: type=1400 audit(1763631031.811:145): avc: denied { create } for pid=1252 comm="syz.1.247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 70.392363][ T1275] device pim6reg1 entered promiscuous mode [ 72.087847][ T1344] device veth0_vlan left promiscuous mode [ 72.097644][ T1344] device veth0_vlan entered promiscuous mode [ 74.023557][ T1395] device sit0 entered promiscuous mode [ 75.591934][ T1447] device syzkaller0 entered promiscuous mode [ 75.732301][ T1456] device veth0_vlan left promiscuous mode [ 75.796157][ T1456] device veth0_vlan entered promiscuous mode [ 76.123674][ T1473] device wg2 entered promiscuous mode [ 79.616633][ T1615] syz.0.344[1615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.616716][ T1615] syz.0.344[1615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.744508][ T1615] syz.0.344[1615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.814259][ T1615] syz.0.344[1615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.355045][ T1640] device sit0 left promiscuous mode [ 80.756230][ T1658] device wg2 entered promiscuous mode [ 81.346815][ T1672] device sit0 entered promiscuous mode [ 81.710564][ T1694] syz.2.367[1694] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.710640][ T1694] syz.2.367[1694] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.485555][ T1703] device sit0 entered promiscuous mode [ 83.026000][ T1734] device wg2 left promiscuous mode [ 83.114668][ T1734] device wg2 entered promiscuous mode [ 84.164432][ T1795] device veth1_macvtap left promiscuous mode [ 84.192647][ T1795] device veth1_macvtap entered promiscuous mode [ 84.328340][ T1795] device macsec0 entered promiscuous mode [ 86.162899][ T1901] device sit0 left promiscuous mode [ 86.234477][ T1902] device sit0 entered promiscuous mode [ 86.442348][ T1913] device pim6reg1 entered promiscuous mode [ 86.847221][ T1945] @џ: renamed from bond_slave_0 [ 87.197775][ T1967] device syzkaller0 entered promiscuous mode [ 87.489750][ T1987] syz.2.446[1987] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.493006][ T1987] syz.2.446[1987] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.028901][ T2008] device pim6reg1 entered promiscuous mode [ 90.177679][ T2083] device syzkaller0 entered promiscuous mode [ 90.335821][ T2125] sock: sock_set_timeout: `syz.3.478' (pid 2125) tries to set negative timeout [ 90.417887][ T30] audit: type=1400 audit(1763631052.211:146): avc: denied { create } for pid=2107 comm="syz.0.474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 91.461540][ T30] audit: type=1400 audit(1763631053.251:147): avc: denied { create } for pid=2170 comm="syz.0.490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 91.693837][ T30] audit: type=1400 audit(1763631053.481:148): avc: denied { read } for pid=2189 comm="syz.1.496" dev="nsfs" ino=4026532286 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 91.844577][ T30] audit: type=1400 audit(1763631053.531:149): avc: denied { open } for pid=2189 comm="syz.1.496" path="pid:[4026532286]" dev="nsfs" ino=4026532286 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 92.398961][ T2216] device sit0 left promiscuous mode [ 92.580169][ T2217] device syzkaller0 entered promiscuous mode [ 92.725155][ T2223] device sit0 entered promiscuous mode [ 93.206418][ T30] audit: type=1400 audit(1763631055.001:150): avc: denied { create } for pid=2231 comm="syz.0.507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 93.309822][ T2237] bond_slave_1: mtu less than device minimum [ 93.856516][ T2245] device syzkaller0 entered promiscuous mode [ 94.009791][ T2260] device syzkaller0 entered promiscuous mode [ 96.191544][ T2335] device wg2 left promiscuous mode [ 96.254190][ T2333] device veth1_macvtap left promiscuous mode [ 96.346967][ T2339] device veth1_macvtap left promiscuous mode [ 96.426314][ T2339] device macsec0 left promiscuous mode [ 97.246689][ T2376] device veth1_macvtap left promiscuous mode [ 98.070299][ T2393] syz.1.553[2393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.070403][ T2393] syz.1.553[2393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.420241][ T2460] device veth0_vlan left promiscuous mode [ 100.471262][ T2460] device veth0_vlan entered promiscuous mode [ 100.537959][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.562576][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЊў€: link becomes ready [ 100.579718][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 102.567186][ T2535] device wg2 left promiscuous mode [ 102.619685][ T2536] device wg2 entered promiscuous mode [ 103.164920][ T2588] device wg2 left promiscuous mode [ 106.464701][ T2666] џџџџџџ: renamed from vlan1 [ 106.678879][ T30] audit: type=1400 audit(1763631068.471:151): avc: denied { ioctl } for pid=2667 comm="syz.3.640" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 107.994348][ T30] audit: type=1400 audit(1763631069.791:152): avc: denied { setattr } for pid=2685 comm="syz.4.645" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 108.147112][ T2691] device sit0 left promiscuous mode [ 108.608836][ T2731] device sit0 entered promiscuous mode [ 109.068817][ T2747] bond_slave_1: mtu less than device minimum [ 111.400923][ T2805] device veth0_vlan left promiscuous mode [ 111.460794][ T2805] device veth0_vlan entered promiscuous mode [ 112.066780][ T2815] device syzkaller0 entered promiscuous mode [ 112.771724][ T2852] syzkaller0: refused to change device tx_queue_len [ 112.966045][ T2856] kfree: port 1(veth1) entered blocking state [ 112.994850][ T2856] kfree: port 1(veth1) entered disabled state [ 113.048556][ T2856] device veth1 entered promiscuous mode [ 114.015650][ T30] audit: type=1400 audit(1763631075.811:153): avc: denied { setattr } for pid=2872 comm="syz.3.696" path="pipe:[14843]" dev="pipefs" ino=14843 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 114.064550][ T2876] device veth0_vlan left promiscuous mode [ 114.071951][ T2876] device veth0_vlan entered promiscuous mode [ 114.109562][ T219] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 114.147200][ T219] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 114.293855][ T219] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 116.314075][ T2922] device pim6reg1 entered promiscuous mode [ 118.098138][ T2989] device pim6reg1 entered promiscuous mode [ 118.126215][ T2987] device veth1_macvtap entered promiscuous mode [ 118.135870][ T2987] device macsec0 entered promiscuous mode [ 118.178165][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 118.860022][ T3016] device syzkaller0 entered promiscuous mode [ 119.061904][ T3028] device syzkaller0 entered promiscuous mode [ 119.193871][ T30] audit: type=1400 audit(1763631080.981:154): avc: denied { create } for pid=3036 comm="syz.1.744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 119.806015][ T3050] device syzkaller0 entered promiscuous mode [ 120.418674][ T3075] device syzkaller0 entered promiscuous mode [ 120.821581][ T30] audit: type=1400 audit(1763631082.611:155): avc: denied { create } for pid=3100 comm="syz.3.761" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 122.537696][ T30] audit: type=1400 audit(1763631084.331:156): avc: denied { create } for pid=3180 comm="syz.4.784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 122.581152][ T3179] device wg2 entered promiscuous mode [ 122.630983][ T3185] QБ6уз\b‹ЁY­4: renamed from lo [ 122.772836][ T3192] device sit0 entered promiscuous mode [ 123.113899][ T3209] syz.4.790[3209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.113977][ T3209] syz.4.790[3209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.206859][ T30] audit: type=1400 audit(1763631087.001:157): avc: denied { create } for pid=3274 comm="syz.2.808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 125.254285][ T3275] device sit0 left promiscuous mode [ 125.307593][ T3275] device sit0 entered promiscuous mode [ 125.938494][ T3308] device sit0 entered promiscuous mode [ 126.441102][ T3313] device syzkaller0 entered promiscuous mode [ 126.496839][ T3327] device veth1_macvtap entered promiscuous mode [ 126.516816][ T3327] device macsec0 entered promiscuous mode [ 126.584891][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 126.950481][ T3340] device sit0 entered promiscuous mode [ 127.910101][ T3376] device syzkaller0 entered promiscuous mode [ 128.800720][ T3417] device veth0_vlan left promiscuous mode [ 128.815042][ T3417] device veth0_vlan entered promiscuous mode [ 128.834522][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 128.889930][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 128.930928][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 129.576654][ T3428] device veth0_vlan left promiscuous mode [ 129.617145][ T3428] device veth0_vlan entered promiscuous mode [ 130.449607][ T3436] device syzkaller0 entered promiscuous mode [ 130.534226][ T30] audit: type=1400 audit(1763631092.321:158): avc: denied { create } for pid=3475 comm="syz.2.870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 133.229206][ T3536] device veth1_macvtap left promiscuous mode [ 133.314178][ T3536] device macsec0 left promiscuous mode [ 134.182388][ T3536] device veth1_macvtap entered promiscuous mode [ 134.192173][ T3536] device macsec0 entered promiscuous mode [ 134.303228][ T219] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 134.458536][ T3561] device pim6reg1 entered promiscuous mode [ 134.478730][ T3561] device syzkaller0 entered promiscuous mode [ 135.869193][ T3614] device syzkaller0 entered promiscuous mode [ 139.469435][ T3672] device bridge_slave_1 left promiscuous mode [ 139.559698][ T3672] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.644870][ T3672] device bridge_slave_0 left promiscuous mode [ 139.662006][ T3672] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.782217][ T3670] device veth0_vlan left promiscuous mode [ 139.788648][ T3670] device veth0_vlan entered promiscuous mode [ 139.821100][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 139.829834][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЊў€: link becomes ready [ 139.838461][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 140.194766][ T3713] device wg2 entered promiscuous mode [ 140.207663][ T3711] bond_slave_1: mtu less than device minimum [ 140.373776][ T3713] device pim6reg1 entered promiscuous mode [ 141.184634][ T3768] device wg2 entered promiscuous mode [ 141.301448][ T3780] ip6_vti0: mtu greater than device maximum [ 141.741573][ T30] audit: type=1400 audit(1763631103.531:159): avc: denied { create } for pid=3816 comm="syz.0.973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 142.246988][ T3844] џџџџџџў€: renamed from vlan1 [ 142.640669][ T3859] device wg2 entered promiscuous mode [ 142.902127][ T3866] device syzkaller0 entered promiscuous mode [ 143.800494][ T3921] syz.1.999[3921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.800573][ T3921] syz.1.999[3921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.434390][ T3975] device wg2 left promiscuous mode [ 145.468443][ T3978] device wg2 entered promiscuous mode [ 145.755416][ T3983] bond_slave_1: mtu less than device minimum [ 146.618201][ T4035] GPL: port 1(erspan0) entered blocking state [ 146.666864][ T4035] GPL: port 1(erspan0) entered disabled state [ 146.684578][ T4035] device erspan0 entered promiscuous mode [ 148.494039][ C0] sched: RT throttling activated [ 149.172019][ T4091] device sit0 left promiscuous mode [ 149.257044][ T4091] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.954811][ T4114] syz.1.1052[4114] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.954894][ T4114] syz.1.1052[4114] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.317363][ T4119] device syzkaller0 entered promiscuous mode [ 150.407702][ T4129] device sit0 left promiscuous mode [ 150.574049][ T4131] device sit0 entered promiscuous mode [ 151.024133][ T4132] : renamed from veth0_vlan [ 152.786092][ T4180] device wg2 left promiscuous mode [ 152.869912][ T4180] device wg2 entered promiscuous mode [ 154.165227][ T4217] syz.1.1082[4217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.165303][ T4217] syz.1.1082[4217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.205442][ T4216] device syzkaller0 entered promiscuous mode [ 154.234528][ T4223] tap0: tun_chr_ioctl cmd 1074025677 [ 154.240037][ T4223] tap0: linktype set to 804 [ 155.391088][ T4268] device sit0 entered promiscuous mode [ 155.858607][ T4279] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.865960][ T4279] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.318814][ T4307] device syzkaller0 entered promiscuous mode [ 156.694895][ T4321] device veth0_vlan left promiscuous mode [ 156.702977][ T4321] device veth0_vlan entered promiscuous mode [ 156.718648][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.727587][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.737173][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџў€: link becomes ready [ 157.245563][ T4351] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.339272][ T4350] device bridge_slave_1 left promiscuous mode [ 157.411585][ T4350] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.466797][ T4363] syz.3.1124[4363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.466887][ T4363] syz.3.1124[4363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.509340][ T4350] device bridge_slave_0 left promiscuous mode [ 157.595866][ T4350] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.316227][ T4404] Т: renamed from pim6reg1 [ 160.706178][ T30] audit: type=1400 audit(1763631122.501:160): avc: denied { create } for pid=4440 comm="syz.3.1148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 160.756634][ T4441] device veth0_vlan left promiscuous mode [ 160.787094][ T4441] device veth0_vlan entered promiscuous mode [ 160.890776][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 160.914952][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 160.943131][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 161.534172][ T4483] device veth0_vlan left promiscuous mode [ 161.545879][ T4483] device veth0_vlan entered promiscuous mode [ 161.578116][ T219] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 161.715414][ T4495] device sit0 left promiscuous mode [ 161.753350][ T4493] device sit0 entered promiscuous mode [ 161.948510][ T4503] device sit0 left promiscuous mode [ 161.968274][ T4503] device sit0 entered promiscuous mode [ 164.082442][ T4575] device syzkaller0 entered promiscuous mode [ 164.094002][ T4577] device pim6reg1 entered promiscuous mode [ 164.101175][ T4575] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 165.184485][ T4623] device veth0_vlan left promiscuous mode [ 165.245734][ T4623] device veth0_vlan entered promiscuous mode [ 165.280270][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 165.305456][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 165.313091][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 165.471956][ T4636] device wg2 left promiscuous mode [ 165.480786][ T4634] device veth1_macvtap left promiscuous mode [ 165.502339][ T4636] device wg2 entered promiscuous mode [ 166.548437][ T4683] device wg2 left promiscuous mode [ 166.585248][ T4683] device wg2 entered promiscuous mode [ 167.414907][ T4730] device wg2 left promiscuous mode [ 167.430458][ T4730] device wg2 entered promiscuous mode [ 167.473932][ T30] audit: type=1400 audit(1763631129.261:161): avc: denied { create } for pid=4724 comm="syz.2.1225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 167.658917][ T4727] device wg2 left promiscuous mode [ 167.684462][ T4727] device wg2 entered promiscuous mode [ 168.122187][ T4763] device pim6reg1 entered promiscuous mode [ 168.389849][ T4759] device syzkaller0 entered promiscuous mode [ 168.438850][ T4774] device wg2 left promiscuous mode [ 168.454701][ T4774] device wg2 entered promiscuous mode [ 168.506689][ T4781] device pim6reg1 entered promiscuous mode [ 168.529503][ T4785] device sit0 left promiscuous mode [ 168.600000][ T4785] device sit0 entered promiscuous mode [ 169.029579][ T4804] bond_slave_1: mtu less than device minimum [ 169.130610][ T4808] device syzkaller0 entered promiscuous mode [ 169.315170][ T4820] device wg2 left promiscuous mode [ 169.366372][ T4820] device wg2 entered promiscuous mode [ 169.427709][ T4827] syz.3.1253[4827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.427789][ T4827] syz.3.1253[4827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.772425][ T4830] device pim6reg1 entered promiscuous mode [ 171.759288][ T4859] џ: renamed from bond_slave_0 [ 171.767586][ T4862] device wg2 left promiscuous mode [ 171.823986][ T4862] device wg2 entered promiscuous mode [ 173.672936][ T4925] device syzkaller0 entered promiscuous mode [ 175.041266][ T4964] syz.3.1288[4964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.041345][ T4964] syz.3.1288[4964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.209580][ T4977] device syzkaller0 entered promiscuous mode [ 176.025737][ T5010] џ: renamed from bond_slave_0 [ 176.259475][ T5017] device pim6reg1 entered promiscuous mode [ 176.409452][ T5023] syz.0.1306[5023] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.409557][ T5023] syz.0.1306[5023] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.946557][ T5091] device pim6reg1 entered promiscuous mode [ 178.008675][ T5093] ip6_vti0: mtu less than device minimum [ 178.154564][ T5096] device pim6reg1 entered promiscuous mode [ 178.534451][ T5115] device veth1_macvtap left promiscuous mode [ 179.319701][ T5131] syz.2.1332[5131] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.319816][ T5131] syz.2.1332[5131] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.444660][ T5165] device pim6reg1 entered promiscuous mode [ 182.519475][ T5226] device bridge0 entered promiscuous mode [ 182.842099][ T5248] device pim6reg1 entered promiscuous mode [ 182.882780][ T5241] device sit0 left promiscuous mode [ 183.035420][ T5251] device sit0 entered promiscuous mode [ 185.940182][ T5369] device pim6reg1 entered promiscuous mode [ 186.254871][ T5378] device veth0_vlan left promiscuous mode [ 186.284429][ T5378] device veth0_vlan entered promiscuous mode [ 187.567575][ T5442] device wg2 left promiscuous mode [ 187.596469][ T5444] device syzkaller0 entered promiscuous mode [ 187.831006][ T5442] device wg2 entered promiscuous mode [ 187.918888][ T5448] device veth0_vlan left promiscuous mode [ 187.993456][ T5448] device veth0_vlan entered promiscuous mode [ 188.432899][ T5485] device wg2 left promiscuous mode [ 188.453171][ T5485] device wg2 entered promiscuous mode [ 188.736592][ T5501] veth0_macvtap: mtu greater than device maximum [ 189.300586][ T5534] device wg2 entered promiscuous mode [ 189.971319][ T5551] bond_slave_1: mtu less than device minimum [ 190.157786][ T5564] device wg2 left promiscuous mode [ 190.171131][ T5564] device wg2 entered promiscuous mode [ 190.516383][ T5583] device veth1_macvtap entered promiscuous mode [ 190.522886][ T5583] device macsec0 entered promiscuous mode [ 190.536665][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 191.435733][ T5595] device syzkaller0 entered promiscuous mode [ 191.701353][ T5606] device wg2 left promiscuous mode [ 191.734333][ T5610] device wg2 entered promiscuous mode [ 191.999184][ T5622] device syzkaller0 entered promiscuous mode [ 192.517863][ T5642] device syzkaller0 entered promiscuous mode [ 193.740516][ T5689] device pim6reg1 entered promiscuous mode [ 194.522283][ T5737] device wg2 left promiscuous mode [ 194.526465][ T5739] syz.3.1504[5739] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.527601][ T5739] syz.3.1504[5739] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.552614][ T5740] device wg2 entered promiscuous mode [ 194.580607][ T5739] syz.3.1504[5739] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.580684][ T5739] syz.3.1504[5739] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.600225][ T5739] device pim6reg1 entered promiscuous mode [ 196.060645][ T5789] device wg2 left promiscuous mode [ 196.145104][ T5789] device wg2 entered promiscuous mode [ 196.373913][ T5801] device syzkaller0 entered promiscuous mode [ 196.475499][ T5807] device sit0 left promiscuous mode [ 196.496713][ T5807] device sit0 entered promiscuous mode [ 196.843413][ T5836] device wg2 left promiscuous mode [ 196.907482][ T5836] device wg2 entered promiscuous mode [ 196.932644][ T890] syzkaller0: tun_net_xmit 76 [ 196.937800][ T890] syzkaller0: tun_net_xmit 48 [ 197.024674][ T5849] device veth0_vlan left promiscuous mode [ 197.041101][ T5849] device veth0_vlan entered promiscuous mode [ 197.073039][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.086260][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 197.104944][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 197.229759][ T5856] device sit0 left promiscuous mode [ 197.279826][ T5867] device wg2 left promiscuous mode [ 197.469223][ T5870] device pim6reg1 entered promiscuous mode [ 197.546179][ T5879] device wg2 entered promiscuous mode [ 197.972834][ T5899] device syzkaller0 entered promiscuous mode [ 198.150762][ T5905] syz.4.1552[5905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.150844][ T5905] syz.4.1552[5905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.675049][ T5938] device wg2 left promiscuous mode [ 199.741947][ T5942] device wg2 entered promiscuous mode [ 200.629854][ T5975] device wg2 left promiscuous mode [ 200.639609][ T5975] device wg2 entered promiscuous mode [ 201.254332][ T6001] device sit0 left promiscuous mode [ 201.328045][ T6004] device sit0 entered promiscuous mode [ 201.445611][ T6009] syz.0.1580[6009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.445690][ T6009] syz.0.1580[6009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.532457][ T6012] syz.0.1580[6012] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.544161][ T6012] syz.0.1580[6012] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.575110][ T6009] device pim6reg1 entered promiscuous mode [ 201.663096][ T6016] device wg2 left promiscuous mode [ 201.670996][ T6016] device wg2 entered promiscuous mode [ 202.939849][ T6057] device veth0_vlan left promiscuous mode [ 202.954604][ T6057] device veth0_vlan entered promiscuous mode [ 203.023933][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 203.042996][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 203.064670][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџў€: link becomes ready [ 204.603893][ T6132] device pim6reg1 entered promiscuous mode [ 204.778612][ T6149] device pim6reg1 entered promiscuous mode [ 204.809142][ T6141] device sit0 left promiscuous mode [ 204.936294][ T6150] device sit0 entered promiscuous mode [ 205.319266][ T6168] device pim6reg1 entered promiscuous mode [ 206.162840][ T6189] device syzkaller0 entered promiscuous mode [ 206.266198][ T6194] device wg2 left promiscuous mode [ 206.281785][ T6195] device wg2 entered promiscuous mode [ 206.378836][ T6198] device syzkaller0 entered promiscuous mode [ 207.070040][ T6242] device wg2 left promiscuous mode [ 207.081555][ T6242] device wg2 entered promiscuous mode [ 207.836988][ T6271] device syzkaller0 entered promiscuous mode [ 208.304770][ T6280] device wg2 left promiscuous mode [ 208.330847][ T6280] device wg2 entered promiscuous mode [ 208.450062][ T6289] device sit0 left promiscuous mode [ 209.679472][ T30] audit: type=1400 audit(1763631171.471:162): avc: denied { create } for pid=6342 comm="syz.3.1674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 210.121338][ T6373] device syzkaller0 entered promiscuous mode [ 211.202408][ T6418] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 211.283925][ T6418] pim6reg0: linktype set to 6 [ 211.874178][ T6438] device pim6reg1 entered promiscuous mode [ 212.864645][ T6467] device wg2 left promiscuous mode [ 212.887811][ T6467] device wg2 entered promiscuous mode [ 216.076397][ T6512] device wg2 left promiscuous mode [ 216.168103][ T6515] device wg2 entered promiscuous mode [ 216.313249][ T6519] device wg2 left promiscuous mode [ 216.405313][ T6519] device wg2 entered promiscuous mode [ 220.206994][ T6549] syz.2.1730[6549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.207074][ T6549] syz.2.1730[6549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.256545][ T6549] syz.2.1730[6549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.314468][ T6549] syz.2.1730[6549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.734466][ T6568] device wg2 left promiscuous mode [ 220.939013][ T6568] device wg2 entered promiscuous mode [ 221.453858][ T6582] device sit0 left promiscuous mode [ 221.544998][ T6584] device sit0 entered promiscuous mode [ 221.842017][ T6598] syz.0.1746[6598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.842091][ T6598] syz.0.1746[6598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.994699][ T6604] syz.0.1746[6604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.151922][ T6604] syz.0.1746[6604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.855882][ T6660] syz.3.1764[6660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.934234][ T6660] syz.3.1764[6660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.440905][ T6707] bpf_get_probe_write_proto: 2 callbacks suppressed [ 225.440926][ T6707] syz.0.1776[6707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.486617][ T6707] syz.0.1776[6707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.516066][ T6707] syz.0.1776[6707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.527782][ T6707] syz.0.1776[6707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.703138][ T6726] device wg2 left promiscuous mode [ 225.734959][ T6731] syz.0.1784[6731] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.735046][ T6731] syz.0.1784[6731] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.815516][ T6727] device wg2 left promiscuous mode [ 225.970691][ T6732] device wg2 entered promiscuous mode [ 226.558913][ T6745] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.567435][ T6745] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.620547][ T6753] syz.4.1791[6753] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.624661][ T6753] syz.4.1791[6753] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.708433][ T6753] syz.4.1791[6753] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.775657][ T6753] syz.4.1791[6753] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.862436][ T6771] bridge0: port 3(veth0) entered blocking state [ 226.904205][ T6771] bridge0: port 3(veth0) entered disabled state [ 226.918638][ T6771] device veth0 entered promiscuous mode [ 227.456625][ T6807] device sit0 left promiscuous mode [ 227.526813][ T6807] device sit0 entered promiscuous mode [ 227.710527][ T6816] ip6_vti0: mtu greater than device maximum [ 228.325494][ T30] audit: type=1400 audit(1763631190.111:163): avc: denied { create } for pid=6842 comm="syz.3.1817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 229.236806][ T6926] device sit0 left promiscuous mode [ 231.773947][ T7028] bpf_get_probe_write_proto: 9 callbacks suppressed [ 231.773967][ T7028] syz.1.1870[7028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.788202][ T7028] syz.1.1870[7028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.824650][ T7036] syz.1.1870[7036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.836240][ T7036] syz.1.1870[7036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.382106][ T7058] џџџџџџ_“–џ’Џ: renamed from vlan1 [ 232.845337][ T7104] bond_slave_1: mtu less than device minimum [ 233.393191][ T7119] device sit0 entered promiscuous mode [ 233.542506][ T7125] device wg2 entered promiscuous mode [ 233.742412][ T7134] device veth1_macvtap left promiscuous mode [ 233.760619][ T7134] device macsec0 left promiscuous mode [ 233.795136][ T7134] device veth1_macvtap entered promiscuous mode [ 233.817780][ T7134] device macsec0 entered promiscuous mode [ 233.847861][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 233.921200][ T7151] syz.4.1906[7151] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.921274][ T7151] syz.4.1906[7151] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.061456][ T7159] device wg2 left promiscuous mode [ 234.145475][ T7165] device wg2 entered promiscuous mode [ 234.895141][ T7209] device wg2 left promiscuous mode [ 235.002886][ T7209] device wg2 entered promiscuous mode [ 238.174806][ T7270] device veth0_vlan left promiscuous mode [ 238.195766][ T7270] device veth0_vlan entered promiscuous mode [ 238.251031][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.285859][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 238.344465][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ_“–џ’Џ: link becomes ready [ 242.280084][ T7382] device sit0 entered promiscuous mode [ 244.827906][ T7414] syz.4.1980[7414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.827987][ T7414] syz.4.1980[7414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.900111][ T7414] syz.4.1980[7414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.990321][ T7414] syz.4.1980[7414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.637294][ T7444] device wg2 left promiscuous mode [ 245.853437][ T7453] syz.0.1992[7453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.853516][ T7453] syz.0.1992[7453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.876564][ T7451] device wg2 left promiscuous mode [ 245.905230][ T7458] syz.0.1992[7458] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.905310][ T7458] syz.0.1992[7458] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.013240][ T7451] device wg2 entered promiscuous mode [ 246.243069][ T7466] ref_ctr_offset mismatch. inode: 0x772 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 246.354040][ T7466] GPL: port 1(erspan0) entered blocking state [ 246.367248][ T7466] GPL: port 1(erspan0) entered disabled state [ 246.389165][ T7466] device erspan0 entered promiscuous mode [ 246.634984][ T7475] GPL: port 1(erspan0) entered blocking state [ 246.641135][ T7475] GPL: port 1(erspan0) entered forwarding state [ 246.680155][ T7494] device wg2 left promiscuous mode [ 246.692680][ T7494] device wg2 entered promiscuous mode [ 246.699496][ T7504] syz.2.2006[7504] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.699575][ T7504] syz.2.2006[7504] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.603628][ T7550] device wg2 entered promiscuous mode [ 247.723662][ T7556] device sit0 left promiscuous mode [ 247.808315][ T7556] device sit0 entered promiscuous mode [ 247.995776][ T7566] device wg2 left promiscuous mode [ 248.668243][ T7605] device wg2 left promiscuous mode [ 248.716962][ T7605] device wg2 entered promiscuous mode [ 249.184144][ T7633] device sit0 left promiscuous mode [ 249.871675][ T7651] device sit0 left promiscuous mode [ 249.920854][ T7656] bpf_get_probe_write_proto: 12 callbacks suppressed [ 249.920874][ T7656] syz.3.2050[7656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.961052][ T7656] syz.3.2050[7656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.055086][ T7656] syz.3.2050[7656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.071446][ T7656] syz.3.2050[7656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.124604][ T7657] device sit0 entered promiscuous mode [ 250.232494][ T7663] device wg2 left promiscuous mode [ 250.310492][ T7664] device wg2 entered promiscuous mode [ 251.533489][ T7688] device macsec0 entered promiscuous mode [ 251.613409][ T7687] device veth1_macvtap entered promiscuous mode [ 251.683369][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 252.265103][ T7697] syz.0.2063[7697] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.265184][ T7697] syz.0.2063[7697] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.386743][ T7699] syz.0.2063[7699] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.424329][ T7699] syz.0.2063[7699] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.404355][ T7731] device veth0_vlan left promiscuous mode [ 253.430128][ T7731] device veth0_vlan entered promiscuous mode [ 253.474449][ T7733] syz.1.2072[7733] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.474531][ T7733] syz.1.2072[7733] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.669873][ T7741] device wg2 entered promiscuous mode [ 254.008320][ T7750] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.015639][ T7750] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.074296][ T7750] device bridge0 left promiscuous mode [ 254.413414][ T7754] device veth0_vlan left promiscuous mode [ 254.493173][ T7754] device veth0_vlan entered promiscuous mode [ 254.652378][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.668687][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 254.690254][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 255.827214][ T7781] bond_slave_1: mtu less than device minimum [ 256.806172][ T7796] device wg2 left promiscuous mode [ 256.954105][ T7808] device wg2 entered promiscuous mode [ 257.094664][ T7815] bpf_get_probe_write_proto: 8 callbacks suppressed [ 257.094685][ T7815] syz.4.2094[7815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.101450][ T7815] syz.4.2094[7815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.274324][ T7833] syz.4.2094[7833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.354552][ T7833] syz.4.2094[7833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.070506][ T7862] device wg2 left promiscuous mode [ 258.218691][ T7866] device wg2 entered promiscuous mode [ 258.950620][ T7886] syz.2.2118[7886] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.950677][ T7886] syz.2.2118[7886] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.975347][ T7886] syz.2.2118[7886] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.993276][ T7886] syz.2.2118[7886] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.644478][ T7905] device sit0 left promiscuous mode [ 260.793354][ T7906] device sit0 entered promiscuous mode [ 260.954141][ T7923] syz.4.2132[7923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.954225][ T7923] syz.4.2132[7923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.814624][ T7935] device wg2 left promiscuous mode [ 261.945092][ T7936] device wg2 entered promiscuous mode [ 263.165117][ T7964] bpf_get_probe_write_proto: 2 callbacks suppressed [ 263.165138][ T7964] syz.2.2143[7964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.172110][ T7964] syz.2.2143[7964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.238777][ T7965] syz.2.2143[7965] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.384182][ T7965] syz.2.2143[7965] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.490683][ T7970] device wg2 left promiscuous mode [ 263.554478][ T7970] device wg2 entered promiscuous mode [ 263.771722][ T7981] bond_slave_1: mtu less than device minimum [ 265.103073][ T8032] syz.3.2165[8032] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.103152][ T8032] syz.3.2165[8032] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.118454][ T8032] syz.3.2165[8032] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.137796][ T8032] syz.3.2165[8032] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.119348][ T8118] device veth0_vlan left promiscuous mode [ 270.137604][ T8118] device veth0_vlan entered promiscuous mode [ 270.185549][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.194666][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 270.202308][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџў€: link becomes ready [ 271.450448][ T8139] syz.4.2197[8139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.450532][ T8139] syz.4.2197[8139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.566265][ T8139] syz.4.2197[8139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.754842][ T8139] syz.4.2197[8139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.481877][ T8159] bond_slave_1: mtu less than device minimum [ 272.745634][ T8171] syz.2.2208[8171] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.745739][ T8171] syz.2.2208[8171] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.880450][ T8171] syz.2.2208[8171] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.984508][ T8171] syz.2.2208[8171] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.460331][ T8194] device sit0 left promiscuous mode [ 274.454923][ T8200] device sit0 entered promiscuous mode [ 274.745084][ T8214] syz.4.2220[8214] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.745166][ T8214] syz.4.2220[8214] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.294569][ T8230] bond_slave_1: mtu less than device minimum [ 276.931475][ T8285] bpf_get_probe_write_proto: 6 callbacks suppressed [ 276.931494][ T8285] syz.0.2245[8285] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.980642][ T8285] syz.0.2245[8285] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.082381][ T8289] syz.0.2245[8289] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.190999][ T8289] syz.0.2245[8289] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.886579][ T8311] device sit0 entered promiscuous mode [ 280.445399][ T8340] syz.2.2262[8340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.445483][ T8340] syz.2.2262[8340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.500680][ T8340] syz.2.2262[8340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.568689][ T8344] device wg2 left promiscuous mode [ 280.584585][ T8340] syz.2.2262[8340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.625252][ T8347] device wg2 entered promiscuous mode [ 282.815068][ T8385] syz.4.2275[8385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.815151][ T8385] syz.4.2275[8385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.922531][ T8385] syz.4.2275[8385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.999168][ T8385] syz.4.2275[8385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.492896][ T8397] device wg2 left promiscuous mode [ 283.588797][ T8406] ip6_vti0: mtu greater than device maximum [ 283.630000][ T8397] device wg2 entered promiscuous mode [ 284.846445][ T8449] device wg2 left promiscuous mode [ 284.870960][ T8449] device wg2 entered promiscuous mode [ 285.930087][ T8475] syz.4.2301[8475] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.930167][ T8475] syz.4.2301[8475] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.302190][ T8489] device wg2 left promiscuous mode [ 286.364541][ T8494] device wg2 entered promiscuous mode [ 286.625954][ T8518] syz.3.2313[8518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.626125][ T8518] syz.3.2313[8518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.589375][ T8546] device wg2 left promiscuous mode [ 287.613704][ T8548] device wg2 entered promiscuous mode [ 287.702294][ T8558] syz.2.2324[8558] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.702373][ T8558] syz.2.2324[8558] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.381215][ T8595] device wg2 left promiscuous mode [ 288.474343][ T8597] device wg2 entered promiscuous mode [ 288.725112][ T8605] syz.0.2337[8605] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.725199][ T8605] syz.0.2337[8605] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.740374][ T8607] device sit0 left promiscuous mode [ 288.799645][ T8605] syz.0.2337[8605] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.799722][ T8605] syz.0.2337[8605] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.370641][ T8630] device wg2 left promiscuous mode [ 289.444076][ T8633] device wg2 entered promiscuous mode [ 289.863641][ T8652] syz.4.2352[8652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.863720][ T8652] syz.4.2352[8652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.953830][ T8657] syz.4.2352[8657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.100982][ T8657] syz.4.2352[8657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.532562][ T8670] device veth0_vlan left promiscuous mode [ 290.570194][ T8670] device veth0_vlan entered promiscuous mode [ 290.604034][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 290.612836][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 290.644280][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 291.212012][ T8690] device wg2 left promiscuous mode [ 291.245241][ T8691] device wg2 entered promiscuous mode [ 291.823257][ T8705] syz.2.2366[8705] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.823336][ T8705] syz.2.2366[8705] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.830098][ T8744] bond_slave_1: mtu less than device minimum [ 293.514015][ T8762] device sit0 left promiscuous mode [ 293.814924][ T8778] device veth0_vlan left promiscuous mode [ 293.886862][ T8778] device veth0_vlan entered promiscuous mode [ 293.976239][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.009318][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 294.062992][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџў€: link becomes ready [ 295.020736][ T8840] device wg2 left promiscuous mode [ 295.072247][ T8842] device veth0_vlan left promiscuous mode [ 295.093957][ T8842] device veth0_vlan entered promiscuous mode [ 295.131522][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 295.157823][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 295.206033][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 296.173054][ T8877] bpf_get_probe_write_proto: 4 callbacks suppressed [ 296.173072][ T8877] syz.0.2421[8877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.180700][ T8877] syz.0.2421[8877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.228706][ T8877] syz.0.2421[8877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.274232][ T8877] syz.0.2421[8877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.463192][ T8932] syz.0.2435[8932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.509918][ T8932] syz.0.2435[8932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.523401][ T8932] syz.0.2435[8932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.583506][ T8932] syz.0.2435[8932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.213238][ T8942] syz.3.2438[8942] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.250730][ T8942] syz.3.2438[8942] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.288772][ T8942] bond_slave_1: mtu less than device minimum [ 300.033730][ T9026] device wg2 left promiscuous mode [ 300.113017][ T9026] device wg2 entered promiscuous mode [ 300.165121][ T9021] device sit0 entered promiscuous mode [ 301.522543][ T9079] device wg2 left promiscuous mode [ 301.603689][ T9081] device wg2 entered promiscuous mode [ 301.930132][ T9097] syz.2.2482[9097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.930214][ T9097] syz.2.2482[9097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.074601][ T9097] syz.2.2482[9097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.105939][ T9097] syz.2.2482[9097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.374407][ T9132] device wg2 left promiscuous mode [ 303.473863][ T9132] device wg2 entered promiscuous mode [ 303.909698][ T9144] syz.3.2495[9144] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.909778][ T9144] syz.3.2495[9144] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.025286][ T9144] syz.3.2495[9144] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.052597][ T9144] syz.3.2495[9144] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.963063][ T9167] device wg2 left promiscuous mode [ 304.982071][ T9167] device wg2 entered promiscuous mode [ 305.664268][ T9174] device wg2 left promiscuous mode [ 305.734738][ T9174] device wg2 entered promiscuous mode [ 308.723747][ T9264] syz.3.2533[9264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.723829][ T9264] syz.3.2533[9264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.836657][ T9264] syz.3.2533[9264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.878796][ T9264] syz.3.2533[9264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.081127][ T9277] bond_slave_1: mtu less than device minimum [ 310.122931][ T9306] syz.1.2549[9306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.123012][ T9306] syz.1.2549[9306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.310494][ T9306] syz.1.2549[9306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.463227][ T9306] syz.1.2549[9306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.176887][ T9351] syz.2.2563[9351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.188495][ T9351] syz.2.2563[9351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.467040][ T9385] device sit0 left promiscuous mode [ 313.773026][ T9387] device sit0 entered promiscuous mode [ 313.911840][ T9394] bpf_get_probe_write_proto: 2 callbacks suppressed [ 313.911858][ T9394] syz.2.2575[9394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.982318][ T9394] syz.2.2575[9394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.044748][ T9395] syz.2.2575[9395] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.098475][ T9395] syz.2.2575[9395] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.459326][ T9438] syz.0.2588[9438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.528967][ T9438] syz.0.2588[9438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.608470][ T9440] syz.0.2588[9440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.680054][ T9440] syz.0.2588[9440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.169187][ T9466] device wg2 left promiscuous mode [ 316.371356][ T9466] device wg2 entered promiscuous mode [ 317.143053][ T9504] device wg2 left promiscuous mode [ 317.203213][ T9504] device wg2 entered promiscuous mode [ 317.330207][ T9513] device wg2 left promiscuous mode [ 317.347309][ T9513] syz.4.2609[9513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.347415][ T9513] syz.4.2609[9513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.404305][ T9513] device wg2 entered promiscuous mode [ 318.523276][ T9550] device wg2 left promiscuous mode [ 318.583476][ T9550] device wg2 entered promiscuous mode [ 319.894039][ T9600] device wg2 left promiscuous mode [ 319.900568][ T9601] device wg2 entered promiscuous mode [ 322.187399][ T9632] device macsec0 left promiscuous mode [ 322.414596][ T9643] device wg2 left promiscuous mode [ 322.426110][ T9643] device wg2 entered promiscuous mode [ 323.953502][ T9674] device wg2 left promiscuous mode [ 324.027052][ T9674] device wg2 entered promiscuous mode [ 324.732099][ T9686] device wg2 left promiscuous mode [ 324.746950][ T9686] device wg2 entered promiscuous mode [ 326.971903][ T9711] syz.1.2669[9711] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.971999][ T9711] syz.1.2669[9711] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.055409][ T9713] syz.1.2669[9713] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.134765][ T9713] syz.1.2669[9713] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.421376][ T9719] device wg2 left promiscuous mode [ 327.640332][ T9719] device wg2 entered promiscuous mode [ 327.957152][ T9733] bond_slave_1: mtu less than device minimum [ 328.100273][ T9736] device veth0_vlan left promiscuous mode [ 328.164485][ T9736] device veth0_vlan entered promiscuous mode [ 328.249049][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 328.289143][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 328.321336][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 329.545884][ T9767] device wg2 left promiscuous mode [ 329.594958][ T9767] device wg2 entered promiscuous mode [ 329.870151][ T9776] device veth0_vlan left promiscuous mode [ 329.964445][ T9776] device veth0_vlan entered promiscuous mode [ 329.971789][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 329.990286][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 329.998027][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџў€: link becomes ready [ 332.108067][ T9800] device wg2 entered promiscuous mode [ 332.274888][ T9808] device veth0_vlan left promiscuous mode [ 332.352329][ T9808] device veth0_vlan entered promiscuous mode [ 332.484149][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 332.493116][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 332.571273][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 334.050295][ T9821] device veth0_vlan left promiscuous mode [ 334.071162][ T9821] device veth0_vlan entered promiscuous mode [ 334.163862][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 334.182621][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 334.232947][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ_“–џ’Џ: link becomes ready [ 335.776177][ T9843] device veth0_vlan left promiscuous mode [ 335.794329][ T9843] device veth0_vlan entered promiscuous mode [ 335.888053][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 335.902186][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 335.910143][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ_“–џ’Џ: link becomes ready [ 335.920107][ T9850] device wg2 left promiscuous mode [ 335.958840][ T9851] device wg2 entered promiscuous mode [ 336.087017][ T9853] device wg2 left promiscuous mode [ 337.346844][ T9872] syz.2.2720[9872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.348825][ T9872] syz.2.2720[9872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.445173][ T9872] syz.2.2720[9872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.589386][ T9872] syz.2.2720[9872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.815064][ T9879] syz.2.2722[9879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.935813][ T9879] syz.2.2722[9879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.308440][ T9879] device sit0 left promiscuous mode [ 338.518933][ T9889] device wg2 left promiscuous mode [ 338.557013][ T9891] device wg2 entered promiscuous mode [ 338.643654][ T9906] syz.3.2731[9906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.643735][ T9906] syz.3.2731[9906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.706050][ T9906] syz.3.2731[9906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.794136][ T9906] syz.3.2731[9906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.945573][ T9940] device wg2 left promiscuous mode [ 340.154286][ T9944] device wg2 entered promiscuous mode [ 340.651520][ T9973] device sit0 entered promiscuous mode [ 341.178274][ T9991] device wg2 left promiscuous mode [ 341.224276][ T9991] device wg2 entered promiscuous mode [ 341.317819][T10002] device wg2 left promiscuous mode [ 342.182033][T10033] device wg2 entered promiscuous mode [ 342.641812][T10053] bpf_get_probe_write_proto: 12 callbacks suppressed [ 342.641832][T10053] syz.0.2778[10053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.674237][T10053] syz.0.2778[10053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.695059][T10055] syz.0.2778[10055] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.734114][T10055] syz.0.2778[10055] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.343079][T10074] device wg2 left promiscuous mode [ 343.693266][T10096] syz.3.2791[10096] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.693344][T10096] syz.3.2791[10096] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.776772][T10096] syz.3.2791[10096] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.828410][T10096] syz.3.2791[10096] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.199186][T10116] device wg2 entered promiscuous mode [ 344.663506][T10138] syz.4.2803[10138] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.663584][T10138] syz.4.2803[10138] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.757173][T10208] device wg2 entered promiscuous mode [ 348.533089][T10241] bpf_get_probe_write_proto: 10 callbacks suppressed [ 348.533111][T10241] syz.0.2838[10241] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.555635][T10241] syz.0.2838[10241] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.583871][T10246] syz.0.2838[10246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.595930][T10246] syz.0.2838[10246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.217902][T10292] syz.4.2852[10292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.243654][T10292] syz.4.2852[10292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.273334][T10292] syz.4.2852[10292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.293302][T10292] syz.4.2852[10292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.573231][T10337] syz.3.2864[10337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.610789][T10337] syz.3.2864[10337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.439433][T10355] device sit0 left promiscuous mode [ 351.686763][T10355] device sit0 entered promiscuous mode [ 352.055840][T10370] device wg2 left promiscuous mode [ 352.118458][T10370] device wg2 entered promiscuous mode [ 352.664896][T10382] ЊЊЊЊЊЊ: renamed from vlan0 [ 353.624093][T10415] device wg2 left promiscuous mode [ 353.693197][T10416] device wg2 entered promiscuous mode [ 355.166821][T10468] device wg2 left promiscuous mode [ 355.216036][T10468] device wg2 entered promiscuous mode [ 356.240543][ T30] audit: type=1400 audit(1763631318.031:164): avc: denied { mounton } for pid=10519 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 356.315784][ T284] syz-executor (284) used greatest stack depth: 21760 bytes left [ 356.323711][T10520] device sit0 left promiscuous mode [ 358.039740][ T341] device bridge_slave_1 left promiscuous mode [ 358.058162][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.091744][ T341] device bridge_slave_0 left promiscuous mode [ 358.112709][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.269257][T10639] device wg2 left promiscuous mode [ 360.626078][ T341] device veth0 left promiscuous mode [ 360.631487][ T341] bridge0: port 3(veth0) entered disabled state [ 360.642326][ T341] device bridge_slave_1 left promiscuous mode [ 360.683524][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.728499][ T341] device bridge_slave_0 left promiscuous mode [ 360.775581][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.696452][T10742] device wg2 entered promiscuous mode SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=2 req=2916 state=3 status=67 (errno 32: Broken pipe) [ 367.616518][ T30] audit: type=1400 audit(1763631329.401:165): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[487]" dev="pipefs" ino=487 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 367.885024][ T283] syz-executor (283) used greatest stack depth: 21216 bytes left [ 369.466003][ T341] GPL: port 1(erspan0) entered disabled state [ 369.473686][ T341] device erspan0 left promiscuous mode [ 369.479258][ T341] GPL: port 1(erspan0) entered disabled state [ 369.487027][ T341] device erspan0 left promiscuous mode [ 369.492495][ T341] GPL: port 1(erspan0) entered disabled state [ 369.886230][ T341] device veth1 left promiscuous mode [ 369.891616][ T341] kfree: port 1(veth1) entered disabled state [ 369.898641][ T341] device bridge_slave_1 left promiscuous mode [ 369.904829][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.912245][ T341] device bridge_slave_0 left promiscuous mode [ 369.918691][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.929977][ T341] device veth1_macvtap left promiscuous mode [ 369.937047][ T341] device veth1_macvtap left promiscuous mode [ 369.943748][ T341] device veth1_macvtap left promiscuous mode