last executing test programs: 3.486560231s ago: executing program 3 (id=4932): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000020000000000002000085000000ae00000095"], &(0x7f0000001b80)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x41, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000140)='kfree\x00', r1}, 0x18) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x109a42, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000040)=r0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x1, 0x7fe2, 0x1, 0x12}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000040), &(0x7f0000000080)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000340)='fdb_delete\x00', r5}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10002, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 3.401925349s ago: executing program 3 (id=4939): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x40011123) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRESDEC=r0, @ANYBLOB="cac985672a4388a0765f2ed5988f82e091758000a13462e63b4475f9832a202a5afee74a64aa5ab1b8724cfcf10a4ba173e949a0176597eafe44c7457b4dd7f5ec54de79df6c605e61d06a6cd2c70ebdddd185aa3a7b90d0d78898668fcb7f787b91bd5872616b83dac9049382d117ef4895f455c8c4f3fb6623647f382f84f6d71c2327d7f375e9089b51628e3b56a1209938113587a7d300238311753814ae595a08bc0b526822bb"], 0x48) 3.398893229s ago: executing program 3 (id=4942): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x4, @perf_bp={&(0x7f0000001080)}, 0x100, 0x8, 0x0, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x1d0842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079d}) mkdir(&(0x7f0000000580)='./file0\x00', 0xaa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000202070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) socketpair(0x9, 0x1, 0x6, &(0x7f0000001040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000a000000080000000200000f75ffffff0e000000000000000300000007000000030000ca75ffffff00000000000000002e"], 0x0, 0x46}, 0x20) r6 = openat$cgroup_procs(r2, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000880), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="1b0000000000000000000000008000000000", @ANYRESDEC=r0, @ANYRES16=r5, @ANYRES32=0x0, @ANYRES16, @ANYRES32=r7], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$tipc(r4, &(0x7f0000000540)={&(0x7f0000000340)=@id={0x1e, 0x3, 0x2, {0x4e23, 0x4}}, 0x10, &(0x7f00000004c0)=[{&(0x7f00000003c0)="ad2222b995009ad9048fe817443431a7d20bcb34f79b89d2542049476c5ee281a1550a84f9b3572e2b77028d4b8c8ffbf0af82d60b88c33a85066428d5091c2bf15c8e122f86ddeb1c61f2e3c971bcb706c19e3706a9cacdf25fd6f02b", 0x5d}], 0x1, &(0x7f0000000500)="74d304d5c46c49bc2dec88015a5a2cf5a22d0f71513dbf6f880cc198d5fce523ca9aeee4908372190ef9", 0x2a, 0x4000000}, 0x2000c041) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) 3.313423368s ago: executing program 4 (id=4946): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) close(r0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000006000000000000000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() sendmsg$unix(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="0000000014000000000000000100000001"], 0x38, 0x20008891}, 0x400c4) close(0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000180)='sys_enter\x00', r4}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000001010003007f0000cc000000000000001afc6d68403d559cf0f4235b3f7677a56a4dd2c734a9224c8b127816b824577e50c51a4e2ef64840018398fb2c9b664f6581596f4835f0f175662d7f1d3f6eb9e0c7be6656d8069e4c08", @ANYRES32, @ANYBLOB="0200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"/28], 0x50) 3.207685118s ago: executing program 4 (id=4947): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r1}, 0x10) (async, rerun: 64) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) mkdir(&(0x7f0000000000)='./file0\x00', 0xbe9bac6d2d0f4e0b) 2.379015742s ago: executing program 2 (id=4950): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x5, 0x2, 0x8, 0x40, 0xc0, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000080), 0x1003, r2}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500), 0x0, 0x2, r2}, 0x38) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd6372ce22667f2c"], 0xfdef) 2.09567278s ago: executing program 4 (id=4951): perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99, 0x2, @perf_config_ext, 0x100019, 0x9, 0xbad, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc2164000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000110b0008850000000800000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0x2a, 0x0, &(0x7f0000000dc0)="c1188e99000000000000000086dd79da59a9b07d2038eda4af1be4048e5bbb7d5d93b06bfb5ae14407d9", 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f00000010c0)='\x01\xef\x87\x05\x1b\xdf\xdd\xf1\xd1\xfc4|\xe0d\xc5\xc3\xff\xc9]\xc0d\xb0\x9a\x86\xbe\x9a@\x97\xbb\x8c\xa8\xc5\xf1Yt\xcb\x89\xd15\xb8*\x11\'[\xed\xe2L\xa3\xb4W\x13\x7f\xbafF/\xcf@0Z\xc1\v') openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8924, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000009c564a1602a36f300000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x25, 0x0, 0x3, 0xfffffffe}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xe, 0x16, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/3605], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1, 0x10, &(0x7f0000000000), 0x39}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001080)={&(0x7f0000001040)='ext4_update_sb\x00', r4, 0x0, 0x1}, 0x18) 2.040427536s ago: executing program 2 (id=4952): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x5}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="9fedcb7968ddc36c8f263408008daa"], 0xfdef) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r7, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x18, 0x1f, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, [@generic={0x6, 0x9, 0x2, 0x7fff, 0x7}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @map_val={0x18, 0xc, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @ldst={0x1, 0x0, 0x1, 0x5, 0x0, 0x20, 0xffffffffffffffff}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @alu={0x7, 0x0, 0x7, 0x0, 0x8, 0xffffffffffffffc0, 0x8}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9b}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x94, &(0x7f0000000540)=""/148, 0x41000, 0x20, '\x00', r4, 0x0, r6, 0x8, &(0x7f0000000240)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0xe, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r0, r0, r8, r1, r0, r0], 0x0, 0x10, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000200), &(0x7f00000003c0)=r9}, 0x20) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1800, 0x0, 0x0, 0x0, 0xeba, 0x6, 0x11}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x900000000000100, 0x7, 0x5, 0x0, 0x200000, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r0}, &(0x7f0000000080), &(0x7f00000000c0)=r9}, 0x20) 1.669723533s ago: executing program 0 (id=4956): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xd6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x40008000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8982, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0x3, 0xc, &(0x7f0000000080)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000000000000000000000104000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000019d84d00"/28], 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d000000180158c1c0226c2500000000002020097b1af8ff00000000bfa100000000800007010000b843a641645a79840bc7", @ANYRESHEX=r5, @ANYRESOCT=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r10}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)=@generic={&(0x7f0000000180)='./file0\x00', r0}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) 1.615839028s ago: executing program 0 (id=4959): r0 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x9, 0x5, 0xf, 0xa0, 0x0, 0x200000000000, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5a482dbd, 0x401}, 0x310a, 0x100, 0x0, 0x3, 0x3, 0xfff, 0x9, 0x0, 0x1d, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) r1 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x1, 0x12, 0x57, 0x0, 0x0, 0x6, 0x8020, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000000), 0xd}, 0x100000, 0x6, 0x80000000, 0x2, 0x7, 0x610, 0x0, 0x0, 0x7, 0x0, 0x9}, 0x0, 0x10, r0, 0x9) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xc3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f0000000240)=[0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x22, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0xd0, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@union={0xb, 0x5, 0x0, 0x5, 0x1, 0x7f, [{0xe, 0x3, 0x3}, {0x9, 0x2, 0x10001}, {0xa, 0x3, 0x7fffffff}, {0x1, 0x1, 0xfffffff5}, {0x1, 0x5, 0x5}]}, @func={0x9, 0x0, 0x0, 0xc, 0x4}, @typedef={0xa, 0x0, 0x0, 0x8, 0x3}]}, {0x0, [0x0]}}, &(0x7f00000005c0)=""/221, 0x7b, 0xdd, 0x0, 0xffffffff, 0x10000}, 0x28) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x50) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000800)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x3}, 0x50) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x1, 0x8}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0x0, 0xff, 0x10}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0x0, 0x8, 0x10}, 0xc) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000940)={0x0, 0x8, 0x10}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xa, 0x4, &(0x7f0000000140)=@raw=[@ldst={0x2, 0x3, 0x2, 0x3, 0x0, 0x15b, 0x1}, @btf_id={0x18, 0xa4af7e79ff66b10, 0x3, 0x0, 0x4}, @alu={0x4, 0x0, 0x7, 0x7, 0x9, 0x100, 0xfffffffffffffff0}], &(0x7f0000000180)='GPL\x00', 0x6, 0x35, &(0x7f00000001c0)=""/53, 0x41100, 0x66, '\x00', r2, @fallback=0x28, r3, 0x8, &(0x7f0000000700)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0x1, 0x5, 0x2}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0xa, &(0x7f00000009c0)=[r4, r5, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, r9, r10], &(0x7f0000000a00)=[{0x5, 0x5, 0x6, 0x8}, {0x3, 0x5, 0x0, 0x4}, {0x4, 0x2, 0xc, 0x8}, {0x2, 0x4, 0x5, 0x9}, {0x2, 0x3, 0xb, 0xa}, {0x3, 0x3, 0x8, 0x2}, {0x4, 0x1}, {0x2, 0x4, 0xc, 0x7}, {0x3, 0x1, 0x4, 0x7}, {0x4, 0x4, 0x6}], 0x10, 0x7}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r11, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000b80)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0], 0x0, 0x9c, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0xf8, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000e80)={0x1b, 0x0, 0x0, 0x38, 0x0, r4, 0x8001, '\x00', r12, r3, 0x2, 0x3, 0x2}, 0x50) r13 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000f40)=@generic={&(0x7f0000000f00)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001100)={r13, 0x0, 0x31, 0x5b, &(0x7f0000000f80)="1283fb7371a76e09fba2d0d992f44c7f63120fa02ea00b0808851c2bd4616415b1ce0ec3ad78eba371415b3ccb69c32696", &(0x7f0000000fc0)=""/91, 0xe2, 0x0, 0x52, 0x1c, &(0x7f0000001040)="d8e2a531d1aab059f87d33d394abcdb7867b86dbe986248b64127e5f5f0851dc4af7e0e28d99c468b868b56eeb51d68991737dd61f6debe2281bfd2d8ee1922f5eaf0ae0cad0b6073c506f9030772852336b", &(0x7f00000010c0)="61b5699632de29c18b4190c088e6d5536e5377db39bda072c7118d3c", 0x0, 0x0, 0xfff}, 0x50) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) r14 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001480)=@bpf_tracing={0x1a, 0x2e, &(0x7f0000001180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, [@printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffff80}}, @alu={0x4, 0x0, 0xa, 0x6, 0x9, 0x6, 0xfffffffffffffff0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @generic={0xb4, 0x2, 0x2, 0xffff, 0x4d16}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x7e}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x18, 0x1}]}, &(0x7f0000001300)='GPL\x00', 0x6, 0x5, &(0x7f0000001340)=""/5, 0x40f00, 0x47, '\x00', r2, 0x1c, r3, 0x8, &(0x7f0000001380)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000013c0)={0x2, 0x5, 0x9, 0xde}, 0x10, 0x1b3f4, r11, 0x2, &(0x7f0000001400)=[r5, r6, r10, r7], &(0x7f0000001440)=[{0x1, 0x2, 0xb, 0x6}, {0x5, 0x3, 0x4, 0x3}], 0x10, 0x9}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001640)={@fallback=r9, 0x2b, 0x1, 0x0, &(0x7f0000001540)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000001580)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000015c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001600)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000016c0)={0xdd8, 0x0}, 0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001680)={@ifindex=r2, r14, 0x11, 0x28, r13, @void, @void, @void, @value=r17, r16}, 0x20) r18 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=@bloom_filter={0x1e, 0x7, 0x9, 0x7fffffff, 0x1040, r4, 0x9, '\x00', r12, r15, 0x5, 0x2, 0x1}, 0x50) r19 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002940)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, r15, 0x3, 0x3, 0x2}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002a00)={0x6, 0x25, &(0x7f0000001780)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r18}}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @map_fd={0x18, 0x8, 0x1, 0x0, r6}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffff9}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffb}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}], &(0x7f00000018c0)='GPL\x00', 0xe41, 0x1000, &(0x7f0000001900)=""/4096, 0x41000, 0x9, '\x00', r2, 0x25, r15, 0x8, &(0x7f0000002900)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000029c0)=[r7, r19, r6], 0x0, 0x10, 0x40}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002ac0)) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000002b00)={r6, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000002b40)=r20, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002bc0)=@o_path={&(0x7f0000002b80)='./file0\x00', r15, 0x4000, r15}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000002c00)='!\x00') 1.589869621s ago: executing program 0 (id=4960): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x11, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb0ffffff}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) (async, rerun: 64) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f0000000240)=""/209, 0x26, 0xd1, 0x1}, 0x28) (async) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) (async, rerun: 64) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, &(0x7f0000000080)) 1.541959505s ago: executing program 3 (id=4961): bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/18, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000080), 0x1003}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500), 0x0, 0x2}, 0x38) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r2, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0b00000008000000020000000400000005000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000cb11ad46409f21cb652d04bd83a5ba5e83b17250e0ee382d7d95a0d4e33668216ef5cedbcf5614e7659addfb78af948b51ff096ade36a90879d3fca9b650deafea9fd3a75985d84d2df77b46ad4d09f0cb66273cd3bbe3ff1bd853d1646bc27991e8f6d3ecb9b48d1dcba1e1427ea2f3837e1cba9b4dad7c5391a3ba561bcb4d00"/159, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r5, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000840)={r6, 0x0, &(0x7f00000007c0)=""/79}, 0x20) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r8}, 0x10) 1.294833081s ago: executing program 0 (id=4962): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000400000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea033c00fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e260"], 0xfdef) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r0, 0x58, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r1, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000006c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000700)=[0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0], 0x0, 0x4e, &(0x7f0000000780)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0x2a, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xc, 0x16, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x80}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@jmp={0x5, 0x1, 0x7, 0x1, 0xb, 0x4, 0xcb54ccfd55e19c34}, @cb_func={0x18, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='GPL\x00', 0x4, 0x98, &(0x7f0000000300)=""/152, 0x41100, 0xc, '\x00', r8, @fallback=0xc, r7, 0x8, &(0x7f0000000640)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x3, 0x1, 0xfca, 0xfffff33e}, 0x10, r9, 0xffffffffffffffff, 0xa, 0x0, &(0x7f0000000a00)=[{0x5, 0x1, 0xe, 0x2}, {0x0, 0x3, 0x3, 0xc}, {0x1, 0x3, 0x8, 0xb}, {0x4, 0x5, 0xf, 0x4}, {0x1, 0x3, 0x0, 0x1}, {0x4, 0x2, 0x1, 0x4}, {0x3, 0x4, 0xd}, {0x0, 0x4, 0x0, 0x6}, {0x0, 0x5, 0x3, 0x8}, {0x4, 0xffff, 0xc, 0x9}], 0x10, 0x5}, 0x94) write$cgroup_devices(r7, &(0x7f0000000080)={'b', ' *:* ', 'rm\x00'}, 0x9) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) close(r4) 1.293446021s ago: executing program 1 (id=4963): ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_tracing={0x1a, 0x9, &(0x7f0000000000)=@raw=[@alu={0x4, 0x0, 0xc, 0x1, 0x3, 0x50}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5dd, 0x0, 0x0, 0x0, 0x40}, @map_fd={0x18, 0x2}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x2}], &(0x7f0000000080)='syzkaller\x00', 0x10000, 0xdd, &(0x7f00000000c0)=""/221, 0x41100, 0x14, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x5, 0x0, 0x101, 0x1}, 0x10, 0x13eb5, 0xffffffffffffffff, 0x5, 0x0, &(0x7f0000000200)=[{0x4, 0x5, 0x5, 0x4}, {0x1, 0x3, 0x10, 0x3}, {0x3, 0x2, 0x5, 0x2}, {0x4, 0x4, 0xe, 0x8}, {0x2, 0x5, 0x4, 0xc}]}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r0, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x6f, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0xd, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) r2 = perf_event_open$cgroup(&(0x7f00000006c0)={0x5, 0x80, 0x2, 0xa, 0xcd, 0xe, 0x0, 0x2, 0x215, 0x5, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd89f, 0x4, @perf_bp={&(0x7f0000000680), 0x2}, 0x0, 0x9, 0x200, 0x8, 0x210d, 0x27, 0x100, 0x0, 0x5, 0x0, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x2) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000740), 0x8) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000780)='syzkaller\x00') ioctl$TUNGETVNETLE(r3, 0x800454dd, &(0x7f00000007c0)) r4 = syz_clone(0x0, &(0x7f0000000800)="cabc818f4c6b19dd0aea7570bd8463d841ec7e6b4aa99af31c3881c8ee30d6d4058709e4a70859e11505ec85583ba669b5db5635e665b7047ab197320394f397f63a612de6e580bb863d34f5448113b37ac932da1b3129e79694a329974b79c1bbd579343861bd091dcd37939858544e293b3d14eeff1afb18d0405280", 0x7d, &(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)="07d53ea6feb1150601") write$cgroup_pid(r3, &(0x7f0000000940)=r4, 0x12) syz_open_procfs$namespace(r4, &(0x7f0000000980)='ns/net\x00') ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000ac0)={@fallback=r3, 0x36, 0x0, 0x0, &(0x7f00000009c0)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000a00)=[0x0, 0x0, 0x0], &(0x7f0000000a40)=[0x0, 0x0], &(0x7f0000000a80)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b00)={@cgroup=r3, r3, 0x7, 0x8, 0x0, @void, @value=r3, @void, @void, r6}, 0x20) socketpair(0x1a, 0x1, 0x7, &(0x7f0000000b40)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000bc0)={0x2, 0x80, 0x7, 0x21, 0x5, 0x0, 0x0, 0x81, 0xa0800, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000b80)}, 0x0, 0x21cc, 0x7, 0x5, 0x100, 0x8000, 0x7, 0x0, 0x4, 0x0, 0x7684}, r4, 0x10, r5, 0x2) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000f80)={&(0x7f0000000c40)="4c5049edafe5ca305ba79b2c097c893d930d9f2fea7fd97b0b0a582b847acd1546a68f2429d12ac126032a3e1318b067003d72f8f7618e8e26aec3d81a5b5ef629a23ddb2ee6519ae51cba6588357a7b85fb6be0f43c1d89d3044213808e471deb57f5e4fc6a5f5146572037b723d1c95af86d2e6e2049fe2a78e58ce595fd5eee353074e6805328bf680a420ee252f782b9d8d6cbf48d964c4756ccbb0c36d628ba301d25", &(0x7f0000000d00)=""/190, &(0x7f0000000dc0)="8e6f4599bb8fb2377efd9e30bceca8ed4a18b30bd7cfbc80a47c62cf2f771d25e6570fde50ffac0e756c4ab68625e6eb6f254aa50a152226cdd4c4ef1066bf366ca24908eb7431b54a671def2e19844e9b9356c6a97a2674f642cbc9bd9e299d33d9eb6f0877f7bcecedb40b3eac1198331937e09e2f7d48dbed4be2afc3d96bc0232ca84322d93c23c880131b60b7c7d232ec93e7e9d2889d9e50b62e980149029fcc8b76bf4e63f2d08a3c722c2d7e2e95e4b3822f308caf1306924d8bc9a25628915a3c15dd7e321b269b281a57845366639dd1075caa4da949cc2e8e28770fc1f4290bf9a0cbcb4cbfa99b6af0b7de00804a7f2ccf14bc", &(0x7f0000000ec0)="569b4bd9e5f8dddfbd8bba35c7726fba35380abe075937154eabfb69de8c57561ab2a8d5b080bdf993059308a9becf618f82a12d8671a8af7d7b984b8019559467b8a12fc027314065e9326164275d21d8d4727808a8e0ba896b64089b066bb74be4cda0ac47aacff7141f615cfe12b3ab430ff993ac5a5f0f77072791e40c8cc4015e8855dcad804018f5156f8709b637b98b60cded84966fb655009d", 0xe, r3, 0x4}, 0x38) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000fc0)='devices.deny\x00', 0x2, 0x0) sendmsg$sock(r5, &(0x7f0000002600)={&(0x7f0000001000)=@nfc={0x27, 0x0, 0xffffffffffffffff, 0x3}, 0x80, &(0x7f0000002500)=[{&(0x7f0000001080)="55a2af37d7f3dc5200926a1fea53ae377cfab19e5a8eb825563f137afcd07a97b008f8be90705ade5e59743ffaca15819f3232d1c0008d5841762b2b006f461829d8ffd65581939735bb467d1ce7c83508ef2912f821f78de43c68c3a03136546f1674a6ebe1af0f6deacd5d07681f195087ad431cf292cd01e7", 0x7a}, {&(0x7f0000001100)="4a3ba2e3053a3628a4f3d117b96052829fb394c4debfcd422bc868f651a38aaa5fbb857c93dc9b93b2aaeccdaea081b795623fc2ea34761a1df6f0f70317f56f0aa06ba068bb516d6ea5171d6b2eace91d407dd6575c15651f775954201a5a0ae9cf83f529c8e3d967a9b2fb73bf8cbd50c4d9ab4dc2119c4577c3a318547938c97a1fc9c92817604879f316c884fffeb4709717f4f2666570f42555", 0x9c}, {&(0x7f00000011c0)="96a9a112294c84ed1186bb3654eb24c6fc2b010746c30f8a0b1c3afd3586ebce7b10a893b3ba59cdfada5711aca8dac9fd08ccf166d321cc04e4aa0aa7f6af6f891588940154afd3ae6212af6be4bdb343cc004b10101d12fc862c88f565c8ad1a932355e1c2f6677954fd51d55b1e628f4845a5816f5c9151da4cc982987659e58732bc3d83ad205dc5ccf6ef68f9520826f8070696e871034b53d9adf5dfe0e7a0c8c3a4e948564fee8f6ff99fe4d27eda6fa807a6d3739c513b45c36416fea3fd3da1d9d46a10c1a82f70ed007b7a6981f1f715da3654a7dac53108d7213fccd645da493257784956d0d891909cebe8ee1e7abd2b", 0xf6}, {&(0x7f00000012c0)="29ca50cbfd08271907958529649c73b421913c5540a1d0ce5eb2dd2601e73f852b4e15beff0a450d8dfa617e75b1912863002f25067c926f", 0x38}, {&(0x7f0000001300)}, {&(0x7f0000001340)}, {&(0x7f0000001380)="1feda817bfa6670c822293160af9c0e136ab9c12169ac2374c048eb2f30961668868ef7f5eb984be63b05408ceae8357658be269a4c3772f14c2881394b76706ad3ec700861fd2d6616f7d8046b213e4728284c9159241aebd3aac6795a5425452b033582c99843e7a681d7b3dd353b25ac0c47b52e74807ba184b512d6449e1bc905646e1811cba7d52ae41ddfb17902353ff24b6989d5791027f98a1ac3b8a1126c2908b26da25076e8af275c90651c793e0a858d9d52e1608c57da871963f46c7dba8860cf6885abfe2797c75ebdd40e8bcfaa9f14559846bdd857a01932b7be55c6f9babba9de2a806efe4c1a62edd4a897d8bc896d266a5ae41874dd7a026a3477980b45be97e7f7363cf608a081a35b62d17be5ad8a49a16857c7069b5078c4bfb08ad44644a7650139f05901d9cdc5313465be485c5a9746493dacabd549a11cd3720d320c2c77ce2e18f92bf1759e6a2c983289ec7c7439f4d4b96bdef197834389ea8c942be8f5b3a43085404bd95f00c6f65848a8b783b8d3a5a7f3b4f268c286d7a6c5d9cdb41b8a7b9463292eb74a970c9625ffec20bd22ed5645aa6eb757d9c20d014cf852db9fe710881018ebbe3934cd22c0d04736379155a2a7588c088407a9ef2baf20dd4f86025ae3f67c07a04e665316165b6ec19c72723044cd2f94dee82fb5e3f47963baac39c68e6d7e9052cab95f7833c438b9b6c60e621aabd579edcacafd805bad0a3a778b734e46568a379643caa7be007895559e633be5431c5ef5ecdfeb2f93192faf15ccceccbd60bf741717737522530df325bdb5e5953e8dfe6441f25f6bc3dcaec79a18d5fa77f89c9fe7f7c2370b6b1acc071a648318faac05ade4d980d2ccd688c2c8fcefbd6f4cdd17083649ba990bcf33df3a9902dc835df9347e91191bf0b1db9cb4fa09c8e2ee5af70f920ad6784fa9371947b472ad2dd7f08bde51347e6de6f0108bf4add0bc0361bd2fb53c3b9b45aba5467d2c73a4a884147b62b701beff0dba7d14734b73d0b20711dd91db60586484197bf64b8dfa242b204aaeb7b2228036a97a580847af6e1f4d1c6bce95ef971fdc42a331920eaf9064add6300408e7a839386b4e4712d80775010ea6f5460bbf05bf1fd3947b626f1cce5ca3d15e1ddb0998a4a5b3b5379b48d5c0ddf4ecc68978574eda048605cf8f9530e29bcd96726ef254e859486a673cd5c646e33f32142ba90fe093c614fddae78d1e763ed8964a30a3444d7e05bbe02c23459b388343c1260216b1ee41088f5b9466c1007834f8e15f372aa432721b4cee55a1ceaf0ec23c05f56abc891ff8bdfc5c16b9c5df5bc1a0ef2157ccc5354a303615f12a89fb0888d9c9a1c715fdb4f58814ea56629b9ec5d52b386167ca13666c0417b1848213da5d1927fc3c72b640cafa1792fb90bfa1e627aeb7571886804916798a6a08b67b9500aa7b0e065d947be7719dc054a9657411e934d721ca508d8890116bafd31786ed77e0178d876be29d614dbc0d7c0235f9efea240b9f308ce89e7db2a9f1c85a89b83e9b45f51f976c525b66dc43109e52385a4e89466b4f44a6696bfc5cbd2fe5d9a40761675d41ca3185889e634f53ab3b842576603d1b81a2142ba2a9268014389d98c50fcb49026a0540a480aa192e2553735b8d4eca1486e60d7386efb3891d039e35f7eba5ffbaa4a986bad895dd628eb01b53c8b853311e58e8466db68d16315da80220b908defe1a476a5565e0c1e810d096b0b4cbe424ef65782213ce6fa6f270d614184790dcbb8e4b06c8b810378e37592e90742130dab0036ccfbe183a95b85d04fe20168a065ea68737a86257aab342993fc18326e43d812d1a2ca5fda049d8cc0f7c964a8e80232e8b67af7f01f52f52cc4b01e56727f3b780201e1b0a7eaa56f2bf78c5272d01fa1009f7c77bb7b1c3b586f37237a98f84a29cf1c8ceec5f867f582c4ea294579b0432bdd11918600e5297c5e08b37be36d3df1daaa0e3c3140e799f7d1db4575eea454bc3d67e95edb025c8f38d97f36aaeaf23e4e3189c6fda87ab0954ffd87f390bf3843073fc3edee521ced042869b6c6bf250599798724ee73bc768899b9abb2482c21179db47cbf18c22bf404971074431da676c64fd81c534291dd0c4bf4cc800d1b23f6f3bc5e6e6af9ef7844061753120204c23a5354a4a008c9c50e28e278aed7fdfe8931aef5aa0851ee78040d96f88456fb8cabe1a17e5b272f35648428e0dc7c3b044c0272e1acca25a7037b353ebe1b835fa5cd3ddfd8616c9e9ef3ee7753380fee37d6c39d2cddda8a6faba8505ddd94c3dab3724b3c6d10f03968bd1d8fa893cdd0f0f6997ee75bbee887c22c56e907452abb3d571fe0749e420c3b931a640244ffcacf752270f7cb1e89283e719db9e2d4a12712fcfc0b881bce6f9626e2983ebb480e116f5a1bcf85502a00ae597d14df9006aba6d3391ea46a7e017c6c9d4b3f3e10b577a11a02baef3b22b872135145a25f6ccc74fea629f2ca7b535f4ab2f1218bb419ca4b0784869cb9f17aa2b053b809b902649c02a2dd3f3f13b8414ec08666892e8d30a177fa458e88571f0a19bf9ed64f7ef644d7112b17058ec207d86a23f075b3aa51724b7e9808e9de7d88c60f3e99917b9132847eae2134ae6d66e8e04b8bd898399a7f7697d3d9085fd1383f640317464d04f6d123fb910727bff3e5e08f1480e19203c897222c3454c49a549f81811a4475627eb34ca9df3309dada94ca9e1beca144edeb3a05097170f65621e7f29098cbbe06a0f9edb9f43a44d84b8c95f455b2ebebfb85ecdaff333d0cf93bb5d4cb13b02e3b91355a623d5cef0f5f22b7a65b95442910b89ddd32d935e291bc1609a60fac798aa2d1ef53a13197464caaa9901c3118acdd25485a6cd2200417513f9843bedfc1303e8f9fa5d5f6bd2bce52c8610245d98d3f653d3443dc11c746dc53bf2667a6250c9bca3281c9cb541606b81b2fd28ecbdd9b232cacb5cd81fe9e1ef2599abcffdd9adbf730082d12d682a9859781b2e46e01c10b88e91550e6c11b132e4d95d1623a0dc7e347b5f2904b5b9bee5679f71db20961724108bf4ae466bbe4a4145d318156377b0169a7281dbfaaa03dced009840147bab2f6363cb9df8fbc41234af34047339483ffc27c0044740e637d8eb093a7ac9015b99d852ebe6f097aa319b9abef2ad78be09774bc52d6dd8525997b841e7bb30eefd3c0f9b296295f8d12fd9da8014e585389873592cf4e1e164384a6917bb42e9451d5c57700b358fb451be190697e417b1fe6d68fc2436d393e451d20a5517bc9f74973bd47637fb176d87fa34eeaba7e2cca01cb8fe2dfdaba77513e299f4e3ec9fa3ff982968231d97ecfbcaee0c67f19898325baab4a155eb03052e4b0336dc914785fe9c4aa39f3332f882894b77746f15dbb60a1b7a5b5dc7bf9ac9e32c6ac36675c87b3f3e43bfef61c2d51e7f4b210bc30e453ed8ef2dab94866761592e4395aa23e58c2717c3d706ce293458b8e6fd73956278f1a2ca9c5798697989b461081f715970af484b670878d8d1f2a397f183186072ca7d86d7e4544c9590dfbdbe91ed1892a2f04cd845ef90f7ead0bbf623ea082646496836d93ff23364ae32253f3986f470bcf37bfea69c641c389a787b162fb3844d6444e1f9d62b9f74feafa87bdfed5a293a0827a0fb5b09e809da508027073384f540b58d9307b779435701078086c81aba9caf370c1e69ae8738b5c2b9b435f5721d93b8ecfe5ddd15821c6e39a6d7b53ee4fd627da6e5e3c1cdcda622e9d3879587163cb04a67fbd22451de1c847ddb251a6ae7a766987dcb2ef828b5a41bfc1d62123c9e21f68f3512eaf897f10ec6b8db6b0796ea3286866e2e039bf0aa7e07efe7bf4cba896724f8aea68a4bc617c66b78d5cce4d8a2c916c1de56b11011237bfd1f9ce95de741ee5d3162b1b89d85ac4b5c145320035189b93bf0e58fa3888cecb18ac06b4e9c59ff1fae1a6ae58d7cba1288223f8c7e366c701fcedd5bb63df6c7b7f7fde48b765f7bbdc9f52fd813478f62943506b0c3dd06543236e1d17befe2e1da4835e7a503c3261fe8636ecfc0da6318305ffc9c7405f961eaf06513b45a89f56386faeea8c0f8396887a38b242b9d04a04c4a8e8e30a51d3abc0710ef527a3a465a8afda233de1e01410f8fcbf4d8683d249beeed400c1a201540390d04dc9b433821cac72190e8b1b3d9193d0048f6238f27676e95bd3946e9c9be09a61acdc6d3ce1c6cca5e4f9feda0f062710ac42ee88d00aeb8b1f4a723df85f632b8f94f9c193eef4d1d94f4d000953ec22e0c348ef314eca2703b90e6492a22a2bd6d8173990bbd9ec8180d437a8f5b05f5e379424c1fef5198afcd2581e505138c11e6a0949db7c5f0cf0728c2cea6df99aa9b95d60e9ecfee78478bf7cc778424f363e2c552a0e5a8f72283ca276b80eaccaaf43c0b8f1be96c69509a380fb31dc7c672752bd60afa6a1eee7c53ca40ce963dfdff7604d8848c76ccdc95750a573c79aefbf2fa6e1dff4664b43ec1eaad84124034eb7dc94b1192f681c51d6f0c9fd1707bacf66dc6d424eab1ef7019233639ca60d78d70d5c6de23d16cd229fe96d3491133d5a83c84ee85deb720875cf0b188a19bc28fb431c73574c72d22cb62b0011cdedecb3d3fcfcc3e4a6dad9951670acb016794e13991124222c1ccf4249b6991ee0d84937ef259c1b431b98cffe417e1c71f598f72860533624ea7c07f4a9e3aeab669ad5eb783910abad1f864b4afb7567c0e8700d03a94bfde33b8f791ed74334ff181a715cd2833289bd754f6c57c7e8ea1db289abb10a6e8e641460b474e2b2b3d364451f6cd545a97e55d5444b8e1abe5c9c7c5d52c732b7238cc8ac9745ee1b2a289ac5ee01424d7ae9c433a62c9095e9054e117d0a411a3b4e5ba09e538ae93e92374f1c6429f70874cffce1cffa2efcfb1c499fe6649fa0e86bd34b919a885ba4e5e81bef5986f3eaed31dc79f647ac56730f5a6ce199ac1935b4c7643dfa09db572d6b530bc058af8874bf00a1eead56d4500053b5f3a38dc8988c58233087d92ed7a3b7f230ac327b3b2d10083bacdea58cc17db6a4c8753c3b2244e816da92f503705a5d3496bff67c79ee9a3786e44729719873d73db47f0cdee969389a38bd0d0cfd3820c4fed7694f260d5b03d229d5ee74ad5d5f968c89fc13a0d56b9d87c153a6bbcdec9ba9857573d8cb3dcf369d3ebc267e6a9dbfdf8e260b79ca4d0f08893c342c52cd45260d8032ec02aea05a42b67a849db128f088d13bea245b2d8bb4f3c250c606fe9f6157454880052741f39c605bd485dbf74e9e30a9d59eea040fdc8b718903c74bcaabde22d02310b2b17240fffabb84dcf00c1fd827a0bcbf52468a8b72ee3e38027f40d1ab230bc049bc2afc8a55c6902e8f667e5bf0a4806ff7544727072a6fa60530318df5bc6bed70da921919660c4f6a6b8b04fac7037833852c74d38dc754de6de35af7054c4fe22c89ebc1c0084967da4e0a82e00b0d17734d6c53242bbdf563b84c3349e12f391a08620eb5718830fe5692f3f7c6f13190462d5ed70ba56d0939cc94fedaf7789138d5e1458c3421da72a129486faeea6a4604b6e7ba54f6e7f3e9d851b854862070bbcbeb1c6941804a07730a72de743f38f9ed1d7fb771bb589cae06df952282276427bb7381130b18acc52494163845deb0aac92685685d8d4651fb3ccb4193aefd51af5e91b9c6084a6be9ffb4f4c0bb", 0x1000}, {&(0x7f0000002380)="2b0980a109de76b23ac99361c6dacd8edd8c8d697e64e372272473b432705951a86028be637a78394466d497f52f93db7500408d8cd572ddd75b47f7ce7c074b428646b217e27709226f59cd3245a988552b91d876bfb12470a05ba3843873367f08eb5588a4dfd3e05ec20b17db35ecb084e125eb917a0bed99226ac63add4ae281906caa35387fb943a7d658bc6a9af9508e84e3cbc2976e3554ac27f8cb5dbe7bce586057e952b90821c1a7fa83c2c6a4be2f812ba7e65eb68ca7e56f92353b43769c841c3149f9e78bd19fce86771a93584727f5246f5a8551f06fc20dac31e65adf49e7e36363513db6af7b6f", 0xef}, {&(0x7f0000002480)="91e228db565a8479ff6de57b4277bcdfc3a6c8b7eac52bb52e785e6c11ae77fc446bc6640c01662e8ce427cdd86cef35d1d5e9838b2566c384cf89b74b50a04690d29302647c4820f14520f8f7", 0x4d}], 0x9, &(0x7f00000025c0)=[@txtime={{0x18, 0x1, 0x3d, 0x7ff}}], 0x18}, 0x44000) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002680)=@o_path={&(0x7f0000002640)='./file0\x00', r3, 0x4000, r7}, 0x18) perf_event_open$cgroup(&(0x7f0000002700)={0x3, 0x80, 0x18, 0x4a, 0x8, 0x7, 0x0, 0xe, 0x2051, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000026c0), 0x8}, 0x2620, 0x2, 0x5, 0x3, 0x2, 0x0, 0xc, 0x0, 0xa50, 0x0, 0x5}, r3, 0x3, r5, 0x6) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000027c0)={&(0x7f0000002780)='f2fs_fiemap\x00', r5, 0x0, 0x7}, 0x18) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000002800)={0x2, 0x0, [0x0, 0x0]}) r9 = perf_event_open$cgroup(&(0x7f0000002880)={0x0, 0x80, 0x72, 0x8, 0x7, 0xf, 0x0, 0x0, 0x4000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000002840), 0x8}, 0x0, 0x1, 0x9, 0x0, 0x58, 0x1, 0x9, 0x0, 0xff, 0x0, 0x8000000000000000}, r7, 0x8, r8, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000002900)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) perf_event_open$cgroup(&(0x7f0000002980)={0x5, 0x80, 0x8, 0x7, 0x6, 0x2, 0x0, 0x0, 0x40004, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002940), 0x8}, 0x100049, 0x81, 0x5, 0x3, 0x0, 0x40, 0xc, 0x0, 0x6, 0x0, 0xfff}, r3, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d80)=@bpf_tracing={0x1a, 0x26, &(0x7f0000002a00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3a}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xa1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @map_val={0x18, 0xb, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000002b40)='syzkaller\x00', 0xffffff80, 0x96, &(0x7f0000002b80)=""/150, 0x41100, 0x0, '\x00', r1, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000002c40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000002c80)={0x5, 0x6, 0x100}, 0x10, 0x1d1b4, r0, 0x8, &(0x7f0000002cc0)=[r5], &(0x7f0000002d00)=[{0x5, 0x4, 0xc, 0xa}, {0x1, 0x5, 0x7, 0x2}, {0x3, 0x4, 0x0, 0x4}, {0x0, 0x2, 0x3, 0x9}, {0x4, 0x5, 0x1, 0x3}, {0x5, 0x3, 0x10, 0x1}, {0x1, 0x3, 0x10, 0x2}, {0x2, 0x3, 0x6, 0x4}], 0x10, 0x6}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002ec0)={{r3, 0xffffffffffffffff}, &(0x7f0000002e40), &(0x7f0000002e80)=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000003040)={r10, &(0x7f0000002f00)="4e42e7f90699a158a5e1cb1c3c6df927b778d7eb85f721def960e359fd7d6949d1e667f9b73ae36a7a6da6951f06b522eba45fe79fbdc5de0c2432e1e2a0a4dfe4a99a", &(0x7f0000002f80)=""/133}, 0x20) 1.274757302s ago: executing program 4 (id=4964): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000000088cfe004149c742e5bd0bf953b978eb9d11de5bf211a08162b29887991d2b0d991737b160d8cdbdd037a5a8f7b059dbb5905881c7fc364ca430dfef859c8ec7d480fdc2dd6b792290654920bd5bdc459d7e715c144308b34875d9bb8d2699375c83855eee887e1e2ada8b9228bed40cae152e4e5942b7592c343039dc1f35933461474e5159423f5158807665e2d26cb921338202630a40b13a23e82dfbd2eabe9c7ae9b0d69c79cae685388c34dda94f20042ad0de722c921502e719ee0"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x8}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x18000000000002a0, 0xd, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f008", 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xffbf) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000ffffff00000000"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@cgroup=r6, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='rss_stat\x00', r5}, 0x18) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) 1.19451351s ago: executing program 1 (id=4965): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86, 0x8, 0x0, 0x0}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000200)={&(0x7f0000000040)=@abs={0x1, 0x2e, 0xf6ffffff}, 0x6e, 0x0}, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fa, 0x22d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0x31, 0x8, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x18) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_subtree(r7, 0x0, 0x9) r8 = syz_clone(0xf5175b90c0fd38f6, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1700000000000000040000000300000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000052cd16a8b0010788c223a8d3c807000000f700000ed0b26f00000000000000e20adbfefba016035e49707fc02d7dee6aecb18749bc03c0b04132ea796d06a69ddacfcdf10e62fa33fbcc00fc5ab99e9b7c876a005f338bef5a97d6d3c6fdbecc7905e95b0e7830e48006e706000000b4f3cbe3747d35f931257d5b64674d3160a5bf234f29ac27bd9f01004eaeabc8da8553292c69ee67a7ae545ef16d11b05d69d211a14bd1801b860db985cc8a322f9ae0138dd1c9590ca84da790b363b989951746801e837289a8c2a24463d3d9f61cb4f6455c93d5344a60b14febd2ecc2fa1f5c6fec4b7fd8"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f00000005c0)=ANY=[@ANYRES16, @ANYRESHEX=r3, @ANYRESHEX=r8, @ANYRESDEC], &(0x7f0000000240)='GPL\x00', 0x72, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r9}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00'}, 0x10) 1.191905381s ago: executing program 2 (id=4966): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x3, &(0x7f0000000340)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x15, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000600)={0x1b, 0x0, 0x0, 0x7ffffffd, 0x0, 0xffffffffffffffff, 0xa, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x4}, 0xf64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000340)=r1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r2}, &(0x7f00000003c0), &(0x7f0000000400)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180800000000000000000000000000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x16, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="4eb9673c4734e6444eae0b7d6eb6404281d264db7f227d0500000000000071104e0000000000950000ffff000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) 1.190556371s ago: executing program 0 (id=4967): perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0)=0x60ff20038000, 0xfffffdef) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x49) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/16, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) 1.187741711s ago: executing program 2 (id=4968): r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) close(r1) r2 = getpid() perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xd, 0x4, 0x52, 0xe, 0x0, 0xfff, 0x2028, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xad5a, 0x1, @perf_config_ext={0x7, 0x100000000}, 0x102100, 0x8, 0x9, 0x9, 0xffffffff, 0x4, 0x9, 0x0, 0x0, 0x0, 0xa}, r2, 0x0, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0e00000004000000080000000180000004000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000081363c1df4c19773ffb5035efe87feec3601ba55198e69c05b68d0b2d691fa77470089755124e54faea76e60bcef144fe8bd603cca73022d4464874c82886d01704781c2b915722224fa2ef67ffa287c5e5bf60df67e370009d3ee2a6a7f69287464557750461667b9ad2ab5eb32ce90c211fb"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x8, 0xc, &(0x7f0000000880)=ANY=[@ANYBLOB="180000000000000000000000000000008500001801000020756c2500000000002020207b1af8ff00000000bfa1fd010000fcffffffbf02000008000000b70300000000a5df850000002d0000009500"/89], 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.147594465s ago: executing program 3 (id=4969): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0900000004000000dd0000000a00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28], 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x3) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x75, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x9c}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) 1.141945166s ago: executing program 1 (id=4970): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x5}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, 0x0, &(0x7f0000000380)}, 0x20) r1 = getpid() perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x1, 0xf9, 0x1, 0x1a, 0x0, 0x81, 0x2, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x800, 0x2, @perf_config_ext={0x200, 0x7}, 0x4, 0x3f8000000000, 0x401, 0x3, 0x8000000000000000, 0x7, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, r1, 0x8, 0xffffffffffffffff, 0xb) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000081"], 0x48) write$cgroup_subtree(r5, &(0x7f0000000000), 0xe) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000004080000000000000003000000000000000000000002000000000000000000000000000002000000000000000000000004"], 0x0, 0x56}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, r6, 0x0, 0x4}, 0x50) 1.040914246s ago: executing program 3 (id=4971): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="06000d00040000000400000012000000000000007ecc341e64", @ANYRES32, @ANYBLOB="0000000100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002e00"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x2b}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00'}, 0x10) close(r1) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) sendmsg$unix(r3, &(0x7f0000000680)={&(0x7f0000000780)=@abs={0x16fe129f5959faaf, 0x0, 0x4e21}, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000480)="5b58c298a9e52fff71f1eb784e40fb20489672e83c47c25635b8f9e2fac322df8e5884c14b89a628c3b164185dac2a9ffe", 0x31}, {&(0x7f0000000800)="6f2f7c07823e7e9ad2f833fd6b0f58e262cfbb09b155cd5263ed187b08da04a6bee5937cd7e5a30e3f3ac1a4a06cac584097dfecc0004950dd82da4e3c664232cfd59328b4ee12febf06e433d8d10b8e6ac68538e7", 0x55}, {&(0x7f0000000500)="aff7efb882007e97415f82e3e27275ce149558e6b6844554a6699b08975820bc09cb44feefa8", 0x26}], 0x3, 0x0, 0x0, 0x40}, 0x40) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000200)='rcu_utilization\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0xd, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5b", 0x0, 0xe160, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r1, r0, 0x0, r1}, 0x10) r5 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x8200, 0x0) r6 = perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x80, 0x8, 0x7, 0x8, 0x1, 0x0, 0x10000, 0x4, 0x6, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x7, 0x4}, 0x18840, 0x7, 0x0, 0x0, 0x6, 0x1c30946a, 0x2, 0x0, 0xc, 0x0, 0x1}, 0xffffffffffffffff, 0xc, r5, 0x17) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r5) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="09ffffffffffffff7f0000000000000000000000000000000000000000001408000000010000000000000000"]) 1.038248906s ago: executing program 1 (id=4972): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000700000085000000050000008500000008"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000080000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f28bd4218500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="7bedcb5d07081196f37538e486dd"], 0x66) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 631.898387ms ago: executing program 4 (id=4973): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x1, 0x7fe2, 0x1, 0x12}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r0}, &(0x7f0000000040), &(0x7f0000000080)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000340)='fdb_delete\x00', r2}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10002, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) (fail_nth: 4) 573.258513ms ago: executing program 2 (id=4974): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x616004, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x118) close(0x3) 409.648199ms ago: executing program 1 (id=4975): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000006"], 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000c00)={0x0, r2}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x0, 0xc, &(0x7f0000000a80)=ANY=[@ANYRESDEC=r0, @ANYRES64=r2, @ANYRES16=r2, @ANYRES8=r2, @ANYRES16=r0, @ANYRES64=r0, @ANYRES8=r2, @ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="e240fc638babc70954c07ef980953ba463c9c18173d9e9c59deb130f974279d6ac5b9310dceb5fc5ca5c2b9a53f58df5bdcfc1b5bff8073d1ff72b4ef2442cb3c4d21d3d97d9490fb3efbb0b71680a2c2d931fd0ebb364556150200f7b3d455b73662a06"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000000)='kfree\x00', r5}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x17, 0xb, &(0x7f0000000940)=ANY=[@ANYRESHEX, @ANYRES16, @ANYRES8, @ANYRESDEC, @ANYBLOB="ebec7e74a080127962d6771589b430627c9b34352d5045fc158862a30a3e4d25448ebb49cd2156fe0980c1b8145a6a08bdfd3a29c197d0c09d33"], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x41, 0x1, 0x0, 0x4, 0x0, 0x8}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4002, 0x0, 0xffffffffffffffff, 0x1e, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x15}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r3, 0x0, 0xb9, 0x65, &(0x7f0000000540)="1583b6428f7c4fe555651e9a42379345c4d410010bb5021ec8fd991eb08947037d7929e6ad26fe84e6d938752950f267ba1c902946003bb259e71686c7cfabbc843a78b5be024e27b7082a025c369d1f2fef7561512d595c3681914d4a79abce3cc83a38a4ade0525e37b3615e8fb1ade1a6f82fce90a2a5b32544b615dec4ba1ffa74adfa3997f5fd493f16aa040265442b03fddaeb4b30393b7181e5bf9e566524344d9e9619b497ee00b750c8527f352acf3000b1a67d7e", &(0x7f0000000600)=""/101, 0x8, 0x0, 0x1000, 0xf, &(0x7f0000000f80)="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", &(0x7f0000000280)="492be1e7e49f6e0446394b71acb4c9", 0x1, 0x0, 0xfff}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='\v\x00\x00\x00'], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0xff, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740), &(0x7f0000000840), 0x75, r8}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800040000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000a00)='fib_table_lookup\x00', r9}, 0x18) 407.814189ms ago: executing program 2 (id=4976): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000040000000000000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0x1}, 0x4) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="057100000000c0d8c37c", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x58, &(0x7f0000000380)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000480)=[0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0], 0x0, 0xb5, &(0x7f0000000500)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x9d, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001d00)={r2, 0xe0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000001a00)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa, &(0x7f0000001a40)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001a80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xfa, &(0x7f0000001ac0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000001b40), &(0x7f0000001b80), 0x8, 0x2a, 0x8, 0x8, &(0x7f0000001bc0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001f00)={&(0x7f0000003440)=ANY=[@ANYBLOB="9feb01001800000000000000680000006800000005000000060000000000000800000000000000000a00000d0000000009000000000000000e00000000000000020000000500000003000000020000000f0000000100000010000000050000000d00000000000000050000000100000006000000040000000c0000000500000000305f5f00ee774a66b1f03a53fdac5231a5eeea8cd6a8d628b8aa508282ecfd0863c9cf204a6437256fa9df647d16676cdfbff32be0d1c6c1b09124030dc22e435878d5fa78773f42"], &(0x7f0000001e00)=""/239, 0x85, 0xef, 0x0, 0x5c, 0x10000}, 0x28) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000031c0)=r4, 0x4) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x40000) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x4004743d, 0x110e22fff6) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000004080)=@base={0x3, 0x4, 0x4, 0xbf26, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3000000, 0x4}, 0x50) 13.120429ms ago: executing program 0 (id=4977): bpf$TOKEN_CREATE(0x24, &(0x7f0000000bc0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800001f1a0068099b3c0000000000001860000000000000824d086bb227733218120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000008000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000008000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) (async) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000200), &(0x7f00000003c0)=r1}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f00000003c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xa) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xa) r4 = gettid() perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0xb1, 0x2, 0x4, 0x0, 0x0, 0x80000000000, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x900000000000100, 0x7, 0x5, 0x0, 0x200000, 0x0, 0x0, 0x8000}, r4, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r0}, &(0x7f0000000080), &(0x7f00000000c0)=r1}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r0, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r7}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r10 = getpid() syz_open_procfs$namespace(r10, &(0x7f0000000180)='ns/pid\x00') bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00004216ab85e69d4d00"/28], 0x50) (async) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00004216ab85e69d4d00"/28], 0x50) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0xe24, 0x8}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)=@generic={&(0x7f0000001340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x10}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b00)=@bpf_ext={0x1c, 0x10, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x487}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000300)='syzkaller\x00', 0xfffffffe, 0x62, &(0x7f0000000340)=""/98, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2a1d3, 0xffffffffffffffff, 0x9, &(0x7f0000000940)=[r5, r11, 0xffffffffffffffff, r8, r9, r2, r5, r12, r13, r0], &(0x7f0000000a40)=[{0x4, 0x2, 0x9, 0x6}, {0x1, 0x5, 0x4, 0x6}, {0x5, 0x4, 0x3, 0x5}, {0x0, 0x2, 0x4, 0x8}, {0x3, 0x4, 0xe, 0x5}, {0x1, 0x1, 0x7, 0x8}, {0x2, 0x3, 0xa, 0x1}, {0x4, 0x1, 0x0, 0x6}, {0x5, 0x2, 0xd, 0xa}], 0x10, 0x1}, 0x94) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b00)=@bpf_ext={0x1c, 0x10, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x487}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000300)='syzkaller\x00', 0xfffffffe, 0x62, &(0x7f0000000340)=""/98, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2a1d3, 0xffffffffffffffff, 0x9, &(0x7f0000000940)=[r5, r11, 0xffffffffffffffff, r8, r9, r2, r5, r12, r13, r0], &(0x7f0000000a40)=[{0x4, 0x2, 0x9, 0x6}, {0x1, 0x5, 0x4, 0x6}, {0x5, 0x4, 0x3, 0x5}, {0x0, 0x2, 0x4, 0x8}, {0x3, 0x4, 0xe, 0x5}, {0x1, 0x1, 0x7, 0x8}, {0x2, 0x3, 0xa, 0x1}, {0x4, 0x1, 0x0, 0x6}, {0x5, 0x2, 0xd, 0xa}], 0x10, 0x1}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r14, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r15, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000300000000000000000000000071123300000000001500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 12.564559ms ago: executing program 1 (id=4978): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x18) (async) syz_open_procfs$namespace(0x0, 0x0) (async) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) (async) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) 0s ago: executing program 4 (id=4979): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffe}, [@jmp={0x5, 0x1, 0x7, 0x4, 0x9, 0x6, 0xfffffffffffffffc}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x17, 0x0, 0x134, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r2}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x7fffffff}, 0x48) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r7) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r9) perf_event_open$cgroup(&(0x7f0000000300)={0x4, 0x80, 0x2, 0xe, 0x3c, 0x4, 0x0, 0x1000, 0x4810, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x889e82155560324a, @perf_bp={&(0x7f00000002c0), 0xc}, 0x4000, 0x2d66, 0xfffffff8, 0x6, 0x7, 0x6, 0x400, 0x0, 0xb4, 0x0, 0x1}, 0xffffffffffffffff, 0x8, r3, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r6) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r11) r12 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r12, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r11, 0x40047452, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.95' (ED25519) to the list of known hosts. [ 18.059467][ T24] audit: type=1400 audit(1763496596.270:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 18.060404][ T267] cgroup: Unknown subsys name 'net' [ 18.062600][ T24] audit: type=1400 audit(1763496596.270:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.066519][ T24] audit: type=1400 audit(1763496596.270:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.066659][ T267] cgroup: Unknown subsys name 'devices' [ 18.220408][ T267] cgroup: Unknown subsys name 'hugetlb' [ 18.225982][ T267] cgroup: Unknown subsys name 'rlimit' [ 18.392960][ T24] audit: type=1400 audit(1763496596.600:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 18.416125][ T24] audit: type=1400 audit(1763496596.600:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 18.422253][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 18.440934][ T24] audit: type=1400 audit(1763496596.600:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 18.472432][ T24] audit: type=1400 audit(1763496596.660:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.497798][ T24] audit: type=1400 audit(1763496596.660:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.497978][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 18.523327][ T24] audit: type=1400 audit(1763496596.680:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.523343][ T24] audit: type=1400 audit(1763496596.680:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.096958][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.104104][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.111458][ T275] device bridge_slave_0 entered promiscuous mode [ 19.118915][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.125968][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.133287][ T275] device bridge_slave_1 entered promiscuous mode [ 19.212268][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.219494][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.226806][ T277] device bridge_slave_0 entered promiscuous mode [ 19.234873][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.242192][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.249487][ T277] device bridge_slave_1 entered promiscuous mode [ 19.289860][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.296991][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.304357][ T281] device bridge_slave_0 entered promiscuous mode [ 19.312100][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.319183][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.326486][ T281] device bridge_slave_1 entered promiscuous mode [ 19.340291][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.347303][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.354737][ T276] device bridge_slave_0 entered promiscuous mode [ 19.362601][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.369676][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.376856][ T276] device bridge_slave_1 entered promiscuous mode [ 19.383474][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.390491][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.397718][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.404745][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.425841][ T280] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.432874][ T280] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.440332][ T280] device bridge_slave_0 entered promiscuous mode [ 19.448836][ T280] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.456195][ T280] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.463516][ T280] device bridge_slave_1 entered promiscuous mode [ 19.553157][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.560199][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.567420][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.574451][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.600535][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.607556][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.614795][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.621812][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.630900][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.638056][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.645506][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.652606][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.659767][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.666841][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.674545][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 19.681943][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.701939][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.710157][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.717167][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.740003][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.748063][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.755075][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.766412][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.777502][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 19.791165][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 19.799348][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.807394][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.814405][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.835550][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 19.843470][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.850878][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.858918][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.865930][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.873408][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.881633][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.888623][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.895975][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.904027][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.911038][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.918284][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 19.926158][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 19.933963][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.941302][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.949382][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.956378][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.972721][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.980504][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 19.988297][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 19.996243][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.004873][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.011893][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.019352][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.027387][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.034406][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.041687][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.049815][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.056810][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.064466][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.078879][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 20.086912][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.095316][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 20.103774][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.117599][ T277] device veth0_vlan entered promiscuous mode [ 20.132987][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.141363][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.149666][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.157855][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.166425][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.174472][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.182394][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 20.190337][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.198141][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 20.206278][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.214191][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.221578][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.232009][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.239894][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.247713][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.256013][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.271013][ T281] device veth0_vlan entered promiscuous mode [ 20.277402][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.285014][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.292473][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.300977][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.309447][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.317591][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.325839][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.333876][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.341863][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.349251][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.359857][ T276] device veth0_vlan entered promiscuous mode [ 20.366515][ T280] device veth0_vlan entered promiscuous mode [ 20.373257][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.381084][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.388903][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.396811][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.406887][ T277] device veth1_macvtap entered promiscuous mode [ 20.419560][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.427669][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.435818][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.443471][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.451829][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.461258][ T275] device veth0_vlan entered promiscuous mode [ 20.470076][ T281] device veth1_macvtap entered promiscuous mode [ 20.477069][ T280] device veth1_macvtap entered promiscuous mode [ 20.485009][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.492718][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.500753][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.508653][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.516883][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.524997][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.532861][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.541021][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.549274][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.556606][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.568234][ T276] device veth1_macvtap entered promiscuous mode [ 20.577478][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.585587][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.593883][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.601501][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.609700][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.617872][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.626150][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.645194][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.653543][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.653750][ T277] request_module fs-gadgetfs succeeded, but still no fs? [ 20.662357][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.677372][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.685949][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.694197][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.702523][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.710785][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.723123][ T277] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 20.734562][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.747136][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.758120][ T275] device veth1_macvtap entered promiscuous mode [ 20.773246][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.784115][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.793091][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.825909][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.836186][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.917881][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.959730][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.153414][ C1] hrtimer: interrupt took 27386 ns [ 21.513239][ T316] device pim6reg1 entered promiscuous mode [ 21.555445][ T306] bridge0: port 3(veth0) entered blocking state [ 21.561994][ T306] bridge0: port 3(veth0) entered disabled state [ 21.592846][ T306] device veth0 entered promiscuous mode [ 21.598768][ T306] bridge0: port 3(veth0) entered blocking state [ 21.605091][ T306] bridge0: port 3(veth0) entered forwarding state [ 23.249323][ T24] kauditd_printk_skb: 39 callbacks suppressed [ 23.249332][ T24] audit: type=1400 audit(1763496601.460:113): avc: denied { create } for pid=374 comm="syz.4.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 23.395770][ T24] audit: type=1400 audit(1763496601.600:114): avc: denied { tracepoint } for pid=388 comm="syz.0.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 23.416607][ T24] audit: type=1400 audit(1763496601.620:115): avc: denied { cpu } for pid=388 comm="syz.0.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 23.712212][ T410] tap0: tun_chr_ioctl cmd 2148553947 [ 23.831870][ T24] audit: type=1400 audit(1763496602.010:116): avc: denied { read } for pid=402 comm="syz.2.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 23.975294][ T24] audit: type=1400 audit(1763496602.180:117): avc: denied { create } for pid=412 comm="syz.4.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 24.390638][ T24] audit: type=1400 audit(1763496602.600:118): avc: denied { create } for pid=425 comm="syz.4.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 24.467770][ T24] audit: type=1400 audit(1763496602.670:119): avc: denied { ioctl } for pid=422 comm="syz.1.31" path="mnt:[4026532367]" dev="nsfs" ino=4026532367 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 24.874788][ T24] audit: type=1400 audit(1763496603.080:120): avc: denied { ioctl } for pid=433 comm="syz.2.34" path="/dev/ppp" dev="devtmpfs" ino=153 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.538711][ T24] audit: type=1400 audit(1763496603.740:121): avc: denied { create } for pid=470 comm="syz.4.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 25.727074][ T94] udevd[94]: worker [300] terminated by signal 33 (Unknown signal 33) [ 25.758060][ T94] udevd[94]: worker [300] failed while handling '/devices/virtual/block/loop3' [ 25.969046][ T471] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.036896][ T473] device wg2 entered promiscuous mode [ 26.387029][ T24] audit: type=1400 audit(1763496604.590:122): avc: denied { setopt } for pid=511 comm="syz.4.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 26.464392][ T516] device pim6reg1 entered promiscuous mode [ 27.207105][ T540] device veth0_vlan left promiscuous mode [ 27.229312][ T540] device veth0_vlan entered promiscuous mode [ 27.355532][ T544] device syzkaller0 entered promiscuous mode [ 28.261887][ T556] ------------[ cut here ]------------ [ 28.352908][ T556] trace type BPF program uses run-time allocation [ 28.509583][ T556] WARNING: CPU: 1 PID: 556 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 28.615183][ T556] Modules linked in: [ 28.648917][ T556] CPU: 0 PID: 556 Comm: syz.3.64 Not tainted syzkaller #0 [ 28.946256][ T24] audit: type=1400 audit(1763496607.150:123): avc: denied { create } for pid=570 comm="syz.4.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 28.966251][ T556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 29.095171][ T556] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 29.102054][ T556] Code: 85 e9 14 fe ff ff e8 99 fa ef ff 31 c0 e9 15 fe ff ff e8 8d fa ef ff c6 05 34 c9 2c 05 01 48 c7 c7 80 7a 05 85 e8 7a a4 fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 29.122955][ T556] RSP: 0018:ffffc90001197468 EFLAGS: 00010246 [ 29.129217][ T556] RAX: d84a24c7faff6b00 RBX: 0000000000000001 RCX: 0000000000080000 [ 29.137250][ T556] RDX: ffffc90003172000 RSI: 0000000000002cd5 RDI: 0000000000002cd6 [ 29.145546][ T556] RBP: ffffc900011974b0 R08: dffffc0000000000 R09: ffffed103ee2a5f8 [ 29.279120][ T556] R10: ffffed103ee2a5f8 R11: 1ffff1103ee2a5f7 R12: ffff8881142a8000 [ 29.419374][ T556] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888115c9e800 [ 29.427367][ T556] FS: 00007faa3d5e76c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 29.621974][ T556] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 29.724691][ T588] device veth1_macvtap left promiscuous mode [ 29.730792][ T556] CR2: 0000000000000000 CR3: 0000000112e6c000 CR4: 00000000003506a0 [ 29.738771][ T556] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 29.743579][ T24] audit: type=1400 audit(1763496607.940:124): avc: denied { create } for pid=578 comm="syz.4.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 29.766401][ T556] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 29.826703][ T556] Call Trace: [ 29.833167][ T556] ? __fdget+0x1a1/0x230 [ 29.837484][ T556] resolve_pseudo_ldimm64+0x526/0x1020 [ 29.843350][ T556] ? bpf_check+0xd680/0xd680 [ 29.847995][ T556] ? kvmalloc_node+0x88/0x130 [ 29.894812][ T556] bpf_check+0x8d4b/0xd680 [ 29.969337][ T556] ? bpf_get_btf_vmlinux+0x60/0x60 [ 29.974464][ T556] ? 0xffffffffa002a000 [ 29.978606][ T556] ? is_bpf_text_address+0x177/0x190 [ 30.126588][ T556] ? selinux_bpf_prog_alloc+0x51/0x140 [ 30.207590][ T556] ? __kernel_text_address+0xa0/0x100 [ 30.287601][ T556] ? unwind_get_return_address+0x4d/0x90 [ 30.317567][ T24] audit: type=1400 audit(1763496608.520:125): avc: denied { write } for pid=601 comm="syz.4.77" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.439110][ T556] ? stack_trace_save+0xe0/0xe0 [ 30.519308][ T556] ? arch_stack_walk+0xee/0x140 [ 30.585323][ T556] ? stack_trace_save+0x98/0xe0 [ 30.601898][ T556] ? stack_trace_snprint+0xf0/0xf0 [ 30.607395][ T556] ? __kasan_slab_alloc+0x69/0xf0 [ 30.612924][ T556] ? selinux_bpf_prog_alloc+0x51/0x140 [ 30.619334][ T556] ? __kasan_kmalloc+0xec/0x110 [ 30.625075][ T556] ? __kasan_kmalloc+0xda/0x110 [ 30.630120][ T556] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 30.635742][ T556] ? selinux_bpf_prog_alloc+0x51/0x140 [ 30.641383][ T556] ? security_bpf_prog_alloc+0x62/0x90 [ 30.646918][ T556] ? bpf_prog_load+0x949/0x1420 [ 30.657318][ T556] ? __se_sys_bpf+0x442/0x680 [ 30.662154][ T556] ? __x64_sys_bpf+0x7b/0x90 [ 30.666774][ T556] ? do_syscall_64+0x31/0x40 [ 30.671554][ T556] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 30.677668][ T556] ? memset+0x35/0x40 [ 30.681839][ T556] ? bpf_obj_name_cpy+0x193/0x1e0 [ 30.686881][ T556] bpf_prog_load+0xf5a/0x1420 [ 30.691702][ T556] ? map_freeze+0x320/0x320 [ 30.696286][ T556] ? selinux_bpf+0xc7/0xf0 [ 30.700863][ T556] ? security_bpf+0x82/0xa0 [ 30.705400][ T556] __se_sys_bpf+0x442/0x680 [ 30.710872][ T556] ? __x64_sys_bpf+0x90/0x90 [ 30.715632][ T556] ? ____fput+0x15/0x20 [ 30.720987][ T556] ? __kasan_check_read+0x11/0x20 [ 30.726057][ T556] __x64_sys_bpf+0x7b/0x90 [ 30.730709][ T556] do_syscall_64+0x31/0x40 [ 30.735186][ T556] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 30.741238][ T556] RIP: 0033:0x7faa3eb7f6c9 [ 30.745718][ T556] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 30.791262][ T556] RSP: 002b:00007faa3d5e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 30.806271][ T556] RAX: ffffffffffffffda RBX: 00007faa3edd5fa0 RCX: 00007faa3eb7f6c9 [ 30.821444][ T556] RDX: 0000000000000094 RSI: 00002000000004c0 RDI: 0000000000000005 [ 30.836127][ T556] RBP: 00007faa3ec01f91 R08: 0000000000000000 R09: 0000000000000000 [ 30.849070][ T556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 30.861378][ T556] R13: 00007faa3edd6038 R14: 00007faa3edd5fa0 R15: 00007ffd293168c8 [ 30.876971][ T556] ---[ end trace d54cb3a177aeacb9 ]--- [ 30.985186][ T616] device syzkaller0 entered promiscuous mode [ 31.619241][ T24] audit: type=1400 audit(1763496609.820:126): avc: denied { create } for pid=623 comm="syz.1.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 32.587436][ T24] audit: type=1400 audit(1763496610.790:127): avc: denied { create } for pid=674 comm="syz.3.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 32.607645][ T677] cgroup: syz.0.96 (677) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 32.624665][ T677] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 32.722708][ T693] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 32.766991][ T24] audit: type=1400 audit(1763496610.970:128): avc: denied { relabelfrom } for pid=700 comm="syz.3.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 32.788818][ T24] audit: type=1400 audit(1763496610.970:129): avc: denied { relabelto } for pid=700 comm="syz.3.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 32.839491][ T24] audit: type=1400 audit(1763496611.050:130): avc: denied { create } for pid=713 comm="syz.4.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 33.012769][ T733] device syzkaller0 entered promiscuous mode [ 33.114492][ T24] audit: type=1400 audit(1763496611.320:131): avc: denied { create } for pid=745 comm="syz.1.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 33.542977][ T770] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.550164][ T770] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.756904][ T785] device wg2 entered promiscuous mode [ 35.566700][ T860] device syzkaller0 entered promiscuous mode [ 35.585862][ T855] device syzkaller0 entered promiscuous mode [ 36.069215][ T868] device wg2 entered promiscuous mode [ 36.256009][ T24] audit: type=1400 audit(1763496614.460:132): avc: denied { create } for pid=893 comm="syz.2.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 36.405130][ T903] device syzkaller0 entered promiscuous mode [ 36.728910][ T908] device wg2 left promiscuous mode [ 38.209313][ T926] ÿÿÿÿÿÿ: renamed from vlan1 [ 38.834471][ T979] device sit0 entered promiscuous mode [ 39.579616][ T994] device syzkaller0 entered promiscuous mode [ 39.653816][ T1010] device wg2 entered promiscuous mode [ 39.741687][ T24] audit: type=1400 audit(1763496617.950:133): avc: denied { append } for pid=1022 comm="syz.1.187" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 40.450551][ T1058] veth1_to_batadv: mtu less than device minimum [ 40.793619][ T1070] device pim6reg1 entered promiscuous mode [ 41.539298][ T1094] device syzkaller0 entered promiscuous mode [ 41.895521][ T1092] device syzkaller0 entered promiscuous mode [ 41.917273][ T24] audit: type=1400 audit(1763496620.120:134): avc: denied { create } for pid=1101 comm="syz.1.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 43.144205][ T1167] device syzkaller0 entered promiscuous mode [ 44.440664][ T1219] syz.0.237 uses obsolete (PF_INET,SOCK_PACKET) [ 44.508371][ T24] audit: type=1400 audit(1763496622.710:135): avc: denied { create } for pid=1217 comm="syz.0.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 45.265068][ T1240] device wg2 left promiscuous mode [ 45.488044][ T1243] device wg2 entered promiscuous mode [ 46.043926][ T1251] device syzkaller0 entered promiscuous mode [ 46.904149][ T1270] device wg2 left promiscuous mode [ 47.044139][ T1270] device wg2 entered promiscuous mode [ 48.459582][ T1283] GPL: port 1(erspan0) entered blocking state [ 48.568220][ T1283] GPL: port 1(erspan0) entered disabled state [ 48.719252][ T1283] device erspan0 entered promiscuous mode [ 48.951361][ T1284] GPL: port 1(erspan0) entered blocking state [ 48.957438][ T1284] GPL: port 1(erspan0) entered forwarding state [ 49.769358][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 51.618003][ T24] audit: type=1400 audit(1763496629.820:136): avc: denied { create } for pid=1369 comm="syz.4.275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 51.660230][ T1399] device syzkaller0 entered promiscuous mode [ 52.288633][ T24] audit: type=1400 audit(1763496630.490:137): avc: denied { create } for pid=1444 comm="syz.0.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 52.335466][ T1451] syzkaller0: tun_chr_ioctl cmd 35111 [ 53.459748][ T24] audit: type=1400 audit(1763496631.670:138): avc: denied { ioctl } for pid=1470 comm="syz.1.306" path="socket:[19459]" dev="sockfs" ino=19459 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 54.313840][ T1509] device wg2 left promiscuous mode [ 55.275204][ T1544] device veth1_macvtap left promiscuous mode [ 55.284633][ T1544] device macsec0 entered promiscuous mode [ 55.386657][ T1543] device pim6reg1 entered promiscuous mode [ 56.630893][ T24] audit: type=1400 audit(1763496634.810:139): avc: denied { create } for pid=1595 comm="syz.2.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 57.405378][ T1636] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 57.491217][ T24] audit: type=1400 audit(1763496635.700:140): avc: denied { create } for pid=1645 comm="syz.4.348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 57.565284][ T1636] device syzkaller0 entered promiscuous mode [ 58.174853][ T1679] tap0: tun_chr_ioctl cmd 1074025677 [ 58.180482][ T1679] tap0: linktype set to 24 [ 58.596042][ T1694] device wg2 left promiscuous mode [ 58.608750][ T1699] device wg2 entered promiscuous mode [ 58.819661][ T24] audit: type=1400 audit(1763496637.030:141): avc: denied { create } for pid=1702 comm="syz.2.363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 58.988462][ T24] audit: type=1400 audit(1763496637.030:142): avc: denied { create } for pid=1702 comm="syz.2.363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 59.178232][ T24] audit: type=1400 audit(1763496637.380:143): avc: denied { create } for pid=1723 comm="syz.3.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 59.398183][ T24] audit: type=1400 audit(1763496637.570:144): avc: denied { create } for pid=1728 comm="syz.3.370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 60.100554][ T24] audit: type=1400 audit(1763496638.310:145): avc: denied { create } for pid=1756 comm="syz.4.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 60.152743][ T1754] device syzkaller0 entered promiscuous mode [ 60.560820][ T1782] device wg2 left promiscuous mode [ 60.931005][ T1813] device syzkaller0 entered promiscuous mode [ 61.504921][ T1830] device wg2 entered promiscuous mode [ 62.909550][ T1912] device pim6reg1 entered promiscuous mode [ 63.318141][ T1960] device pim6reg1 entered promiscuous mode [ 63.604477][ T24] audit: type=1400 audit(1763496641.810:146): avc: denied { attach_queue } for pid=1974 comm="syz.2.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 63.822350][ T1979] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.829530][ T1979] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.942233][ T2044] device sit0 left promiscuous mode [ 64.979082][ T2044] device sit0 entered promiscuous mode [ 66.219606][ T2075] device pim6reg1 entered promiscuous mode [ 67.645786][ T2127] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.659673][ T2127] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.870134][ T2141] device bridge_slave_1 left promiscuous mode [ 67.876294][ T2141] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.890567][ T2141] device bridge_slave_0 left promiscuous mode [ 67.896719][ T2141] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.962017][ T2137] device syzkaller0 entered promiscuous mode [ 68.656869][ T2157] device syzkaller0 entered promiscuous mode [ 70.270239][ T2202] device syzkaller0 entered promiscuous mode [ 70.367423][ T24] audit: type=1400 audit(1763496648.570:147): avc: denied { associate } for pid=2212 comm="syz.1.500" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 70.503907][ T2217] syz.4.502[2217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.503959][ T2217] syz.4.502[2217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.563004][ T2217] device pim6reg1 entered promiscuous mode [ 70.934308][ T2232] device wg2 left promiscuous mode [ 71.291615][ T2268] device syzkaller0 entered promiscuous mode [ 71.313204][ T24] audit: type=1400 audit(1763496649.520:148): avc: denied { create } for pid=2272 comm="syz.1.518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 72.966572][ T2342] device syzkaller0 entered promiscuous mode [ 75.458227][ T24] audit: type=1400 audit(1763496653.510:149): avc: denied { ioctl } for pid=2388 comm="syz.4.546" path="" dev="cgroup2" ino=129 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 76.181219][ T2413] bridge0: port 4(gretap0) entered blocking state [ 76.269308][ T2413] bridge0: port 4(gretap0) entered disabled state [ 76.276109][ T2413] device gretap0 entered promiscuous mode [ 76.295798][ T2413] bridge0: port 4(gretap0) entered blocking state [ 76.302246][ T2413] bridge0: port 4(gretap0) entered forwarding state [ 76.326972][ T2427] device wg2 entered promiscuous mode [ 77.375718][ T24] audit: type=1400 audit(1763496655.580:150): avc: denied { create } for pid=2459 comm="syz.1.566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 77.577078][ T2463] device wg2 left promiscuous mode [ 77.720883][ T2463] device wg2 entered promiscuous mode [ 78.837501][ T2489] device syzkaller0 entered promiscuous mode [ 78.951019][ T24] audit: type=1400 audit(1763496657.160:151): avc: denied { create } for pid=2495 comm="syz.1.577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 79.715832][ T2521] sit0: mtu less than device minimum [ 80.541204][ T24] audit: type=1400 audit(1763496658.750:152): avc: denied { create } for pid=2534 comm="syz.1.590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 80.846345][ T2539] syz.1.591[2539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.243186][ T2550] device pim6reg1 entered promiscuous mode [ 82.109150][ T2571] device veth0_vlan left promiscuous mode [ 82.115452][ T2571] device veth0_vlan entered promiscuous mode [ 82.122654][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 82.132976][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 82.208807][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 84.243499][ T2688] device sit0 left promiscuous mode [ 84.277451][ T2688] device sit0 entered promiscuous mode [ 85.687799][ T2714] device pim6reg1 entered promiscuous mode [ 87.174169][ T24] audit: type=1400 audit(1763496665.380:153): avc: denied { create } for pid=2750 comm="syz.4.652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 87.775506][ T2771] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.782690][ T2771] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.900428][ T2771] device bridge_slave_1 left promiscuous mode [ 87.908004][ T2771] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.915555][ T2771] device bridge_slave_0 left promiscuous mode [ 87.921796][ T2771] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.134033][ T2792] device sit0 entered promiscuous mode [ 88.728077][ T2817] pimreg: tun_chr_ioctl cmd 2147767507 [ 88.778657][ T2821] device syzkaller0 entered promiscuous mode [ 89.676747][ T2848] cgroup: fork rejected by pids controller in /syz0 [ 89.835301][ T2974] device bridge_slave_1 left promiscuous mode [ 89.843121][ T2974] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.852627][ T2974] device bridge_slave_0 left promiscuous mode [ 89.858750][ T2974] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.155509][ T2880] device syzkaller0 entered promiscuous mode [ 90.775734][ T3006] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.782999][ T3006] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.791380][ T3006] device bridge_slave_0 entered promiscuous mode [ 90.804194][ T3006] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.811562][ T3006] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.818971][ T3006] device bridge_slave_1 entered promiscuous mode [ 90.894402][ T24] audit: type=1400 audit(1763496669.100:154): avc: denied { write } for pid=3006 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 90.898093][ T3014] device sit0 entered promiscuous mode [ 90.922055][ T24] audit: type=1400 audit(1763496669.120:155): avc: denied { read } for pid=3006 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 91.059008][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 91.076450][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 91.092576][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 91.101107][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 91.109614][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.116637][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.136775][ T3028] bridge0: port 4(gretap0) entered disabled state [ 91.143243][ T3028] bridge0: port 3(veth0) entered disabled state [ 91.149558][ T3028] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.163243][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.170947][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 91.179839][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 91.188069][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.195099][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.202526][ T3036] device gretap0 left promiscuous mode [ 91.208140][ T3036] bridge0: port 4(gretap0) entered disabled state [ 91.215420][ T3036] device veth0 left promiscuous mode [ 91.220833][ T3036] bridge0: port 3(veth0) entered disabled state [ 91.227362][ T3036] device bridge_slave_1 left promiscuous mode [ 91.233504][ T3036] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.240769][ T3036] device bridge_slave_0 left promiscuous mode [ 91.246856][ T3036] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.304535][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 91.312615][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.321327][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.329648][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.344264][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 91.354773][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 91.366215][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 91.374194][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 91.382404][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 91.389855][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 91.404202][ T3006] device veth0_vlan entered promiscuous mode [ 91.416418][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 91.432292][ T3006] device veth1_macvtap entered promiscuous mode [ 91.446306][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 91.455028][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 91.476245][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 91.484588][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 91.617513][ T3074] device sit0 left promiscuous mode [ 91.628969][ T3074] device sit0 entered promiscuous mode [ 91.736562][ T112] device veth1_macvtap left promiscuous mode [ 91.744829][ T112] device veth0_vlan left promiscuous mode [ 92.101376][ T3107] device sit0 left promiscuous mode [ 92.379548][ T3107] device sit0 entered promiscuous mode [ 94.321507][ T3217] device pim6reg1 entered promiscuous mode [ 94.450069][ T3224] device veth0_vlan left promiscuous mode [ 94.457756][ T3224] device veth0_vlan entered promiscuous mode [ 94.833053][ T3250] device bridge_slave_1 left promiscuous mode [ 94.840253][ T3250] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.850416][ T3250] device bridge_slave_0 left promiscuous mode [ 94.856539][ T3250] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.994181][ T3259] device macsec0 entered promiscuous mode [ 95.359898][ T3280] device pim6reg1 entered promiscuous mode [ 98.332577][ T3389] device sit0 left promiscuous mode [ 98.541497][ T3391] device sit0 entered promiscuous mode [ 100.357524][ T3449] device syzkaller0 entered promiscuous mode [ 101.587051][ T3514] device veth0_vlan left promiscuous mode [ 101.602855][ T3514] device veth0_vlan entered promiscuous mode [ 101.614457][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 101.632802][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 101.655284][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 102.058203][ T3524] device pim6reg1 entered promiscuous mode [ 102.518079][ T3547] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.525258][ T3547] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.550684][ T3547] device bridge_slave_1 left promiscuous mode [ 102.566449][ T3547] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.606028][ T3547] device bridge_slave_0 left promiscuous mode [ 102.616611][ T3547] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.862959][ T3565] device pim6reg1 entered promiscuous mode [ 102.946229][ T3568] device sit0 left promiscuous mode [ 103.347836][ T3571] device sit0 entered promiscuous mode [ 103.610070][ T3578] device pim6reg1 entered promiscuous mode [ 103.784261][ T3574] device pim6reg1 entered promiscuous mode [ 103.896030][ T3589] device wg2 left promiscuous mode [ 104.010227][ T3597] device wg2 entered promiscuous mode [ 104.062363][ T3603] device syzkaller0 entered promiscuous mode [ 104.116173][ T3594] device syzkaller0 entered promiscuous mode [ 105.398496][ T3666] device wg2 entered promiscuous mode [ 105.433700][ T3672] device pim6reg1 entered promiscuous mode [ 105.476110][ T3681] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 105.482149][ T3681] syzkaller0: linktype set to 804 [ 105.948097][ T3724] syz.4.904[3724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.948173][ T3724] syz.4.904[3724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.044250][ T3744] device veth1_macvtap entered promiscuous mode [ 107.134492][ T3751] device syzkaller0 entered promiscuous mode [ 107.173969][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 108.333691][ T3790] device wg2 entered promiscuous mode [ 108.688739][ T3824] device syzkaller0 entered promiscuous mode [ 110.702137][ T3909] device veth0_vlan left promiscuous mode [ 110.735831][ T3909] device veth0_vlan entered promiscuous mode [ 110.742912][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 110.751252][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 110.758785][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 111.445593][ T3970] device syzkaller0 entered promiscuous mode [ 111.511152][ T3980] device pim6reg1 entered promiscuous mode [ 113.099300][ T4050] syz.0.1000[4050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.099352][ T4050] syz.0.1000[4050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.304805][ T4063] device syzkaller0 entered promiscuous mode [ 115.546354][ T4108] device syzkaller0 entered promiscuous mode [ 115.856459][ T4130] device veth0_vlan left promiscuous mode [ 115.878059][ T4130] device veth0_vlan entered promiscuous mode [ 117.038406][ T4204] device pim6reg1 entered promiscuous mode [ 118.389185][ T4248] device syzkaller0 entered promiscuous mode [ 119.677266][ T4323] device veth1_macvtap entered promiscuous mode [ 119.743174][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 122.152198][ T4405] device veth0_vlan left promiscuous mode [ 122.171171][ T4405] device veth0_vlan entered promiscuous mode [ 122.313305][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 122.321966][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 122.329675][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 124.849968][ T4489] device pim6reg1 entered promiscuous mode [ 126.047752][ T4535] device sit0 left promiscuous mode [ 126.107144][ T4538] device sit0 entered promiscuous mode [ 127.090648][ T4543] device pim6reg1 entered promiscuous mode [ 127.490928][ T4578] A6±ÿ: renamed from team_slave_1 [ 128.669452][ T24] audit: type=1400 audit(1763496706.880:156): avc: denied { create } for pid=4733 comm="syz.3.1174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 128.900285][ T4757] device wg2 left promiscuous mode [ 128.924072][ T4757] device wg2 entered promiscuous mode [ 129.779781][ T4813] device wg2 entered promiscuous mode [ 131.042583][ T4918] device veth1_macvtap left promiscuous mode [ 132.203310][ T4928] device syzkaller0 entered promiscuous mode [ 132.264272][ T4927] device sit0 left promiscuous mode [ 134.461286][ T4978] device sit0 left promiscuous mode [ 134.701086][ T4982] device sit0 entered promiscuous mode [ 139.476170][ T5107] device wg2 left promiscuous mode [ 140.451265][ T5129] device pim6reg1 entered promiscuous mode [ 140.696128][ T5134] device macsec0 entered promiscuous mode [ 142.000824][ T5191] device sit0 entered promiscuous mode [ 142.255279][ T5187] device syzkaller0 entered promiscuous mode [ 142.595306][ T5211] device pim6reg1 entered promiscuous mode [ 144.679047][ T5285] device syzkaller0 entered promiscuous mode [ 145.333573][ T5303] device syzkaller0 entered promiscuous mode [ 145.616049][ T5322] device veth0_vlan left promiscuous mode [ 145.698174][ T5322] device veth0_vlan entered promiscuous mode [ 147.603140][ T5357] device pim6reg1 entered promiscuous mode [ 147.865533][ T5376] device pim6reg1 entered promiscuous mode [ 149.096556][ T5401] syz.0.1362[5401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.096632][ T5401] syz.0.1362[5401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.408926][ T5407] device syzkaller0 entered promiscuous mode [ 150.672987][ T5454] device pim6reg1 entered promiscuous mode [ 151.245050][ T5487] device dummy0 entered promiscuous mode [ 152.317406][ T5536] device syzkaller0 entered promiscuous mode [ 154.241628][ T5605] syz.4.1419[5605] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.241697][ T5605] syz.4.1419[5605] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.275284][ T5592] device veth0_vlan left promiscuous mode [ 154.304314][ T5592] device veth0_vlan entered promiscuous mode [ 154.315089][ T5605] syz.4.1419[5605] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.700966][ T5602] device syzkaller0 entered promiscuous mode [ 154.963507][ T5619] device macsec0 entered promiscuous mode [ 155.259536][ T5648] syz.0.1433[5648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.259603][ T5648] syz.0.1433[5648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.183302][ T5785] device sit0 left promiscuous mode [ 157.304933][ T5796] device syzkaller0 entered promiscuous mode [ 157.974521][ T5828] device pim6reg1 entered promiscuous mode [ 158.597608][ T5852] syz.4.1475[5852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.597670][ T5852] syz.4.1475[5852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.228445][ T5880] device sit0 left promiscuous mode [ 159.872554][ T5894] device wg2 left promiscuous mode [ 159.936330][ T5909] device pim6reg1 entered promiscuous mode [ 161.211443][ T5950] device syzkaller0 entered promiscuous mode [ 162.146934][ T5972] syz.4.1512 (5972) used obsolete PPPIOCDETACH ioctl [ 162.207461][ T5978] device syzkaller0 entered promiscuous mode [ 162.770199][ T5999] device syzkaller0 entered promiscuous mode [ 164.075983][ T6039] device syzkaller0 entered promiscuous mode [ 165.186357][ T6062] tap0: tun_chr_ioctl cmd 1074025680 [ 165.396907][ T6063] ªªªªªª: renamed from vlan0 [ 166.578049][ T6112] device syzkaller0 entered promiscuous mode [ 166.927902][ T6120] device sit0 left promiscuous mode [ 167.014681][ T6127] : renamed from bond_slave_0 [ 167.214422][ T6147] device veth0_vlan left promiscuous mode [ 167.252562][ T6147] device veth0_vlan entered promiscuous mode [ 167.335249][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 167.354250][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 167.450515][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 168.361621][ T6201] device pim6reg1 entered promiscuous mode [ 168.388976][ T24] audit: type=1400 audit(1763496746.590:157): avc: denied { create } for pid=6193 comm="syz.2.1572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 169.014662][ T6228] device wg2 left promiscuous mode [ 169.210987][ T24] audit: type=1400 audit(1763496747.410:158): avc: denied { read } for pid=6251 comm="syz.4.1588" dev="nsfs" ino=4026532460 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 169.399108][ T24] audit: type=1400 audit(1763496747.440:159): avc: denied { open } for pid=6251 comm="syz.4.1588" path="uts:[4026532460]" dev="nsfs" ino=4026532460 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 171.684092][ T6312] device syzkaller0 entered promiscuous mode [ 171.734116][ T6321] device pim6reg1 entered promiscuous mode [ 171.785506][ T6319] device pim6reg1 entered promiscuous mode [ 172.518500][ T6356] device pim6reg1 entered promiscuous mode [ 173.878357][ T6405] device pim6reg1 entered promiscuous mode [ 173.890382][ T6406] device sit0 entered promiscuous mode [ 174.110092][ T6418] device pim6reg1 entered promiscuous mode [ 175.287144][ T6454] syz.2.1646[6454] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.287220][ T6454] syz.2.1646[6454] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.434926][ T6493] device veth1_macvtap left promiscuous mode [ 176.484215][ T6493] device macsec0 left promiscuous mode [ 176.510094][ T6485] device pim6reg1 entered promiscuous mode [ 176.521714][ T6502] device veth1_macvtap entered promiscuous mode [ 176.536017][ T6502] device macsec0 entered promiscuous mode [ 177.981560][ T6582] device pim6reg1 entered promiscuous mode [ 178.259085][ T24] audit: type=1400 audit(1763496756.460:160): avc: denied { create } for pid=6613 comm="syz.2.1688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 178.755669][ T6638] device sit0 entered promiscuous mode [ 179.943503][ T6730] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 180.891846][ T6789] device pim6reg1 entered promiscuous mode [ 181.271087][ T6801] cgroup: fork rejected by pids controller in /syz1 [ 182.429167][ T6833] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.440537][ T6833] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.447988][ T6833] device bridge_slave_0 entered promiscuous mode [ 182.455154][ T6833] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.462367][ T6833] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.469860][ T6833] device bridge_slave_1 entered promiscuous mode [ 182.780824][ T6833] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.787856][ T6833] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.795118][ T6833] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.802136][ T6833] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.078094][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.100506][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.149067][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 183.184009][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.340810][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.379540][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.386603][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.394247][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.406969][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.414014][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.429693][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.439713][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.495452][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 183.569510][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 183.616497][ T24] audit: type=1400 audit(1763496761.820:161): avc: denied { create } for pid=6893 comm="syz.2.1768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 183.639185][ T6833] device veth0_vlan entered promiscuous mode [ 183.653222][ T6833] device veth1_macvtap entered promiscuous mode [ 183.665200][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 183.674387][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.683225][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 183.691954][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 183.701875][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 183.730555][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 183.739884][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 183.747191][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 183.755414][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 183.763816][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 183.772418][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 184.319018][ T444] device veth0_vlan left promiscuous mode [ 187.401285][ T7123] device syzkaller0 entered promiscuous mode [ 192.467243][ T7243] device sit0 entered promiscuous mode [ 193.654277][ T7255] device pim6reg1 entered promiscuous mode [ 195.141000][ T7329] device syzkaller0 entered promiscuous mode [ 195.282081][ T7336] device syzkaller0 entered promiscuous mode [ 195.293460][ T7329] device syzkaller0 left promiscuous mode [ 195.413228][ T7341] device wg2 entered promiscuous mode [ 197.279340][ T7382] device wg2 entered promiscuous mode [ 198.064939][ T24] audit: type=1400 audit(1763496776.270:162): avc: denied { create } for pid=7424 comm="syz.4.1917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 199.908693][ T7557] device wg2 left promiscuous mode [ 199.960425][ T7557] device wg2 entered promiscuous mode [ 201.718879][ T7698] device syzkaller0 entered promiscuous mode [ 202.189042][ T7719] device veth1_macvtap left promiscuous mode [ 202.199332][ T7719] device macsec0 left promiscuous mode [ 202.517719][ T7734] syz.1.1986[7734] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.517782][ T7734] syz.1.1986[7734] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.980270][ T7754] device pim6reg1 entered promiscuous mode [ 204.134918][ T7787] device pim6reg1 entered promiscuous mode [ 204.300115][ T7789] device syzkaller0 entered promiscuous mode [ 204.802287][ T7815] device veth1_macvtap left promiscuous mode [ 204.865963][ T7815] device macsec0 left promiscuous mode [ 204.946214][ T7817] device veth1_macvtap entered promiscuous mode [ 204.959246][ T7817] device macsec0 entered promiscuous mode [ 205.624534][ T7848] syz.3.2018[7848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.624583][ T7848] syz.3.2018[7848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.852106][ T7878] device syzkaller0 entered promiscuous mode [ 206.195653][ T7906] device syzkaller0 entered promiscuous mode [ 207.299138][ T7915] device sit0 left promiscuous mode [ 207.339864][ T7915] device sit0 entered promiscuous mode [ 208.970654][ T7939] device pim6reg1 entered promiscuous mode [ 211.543553][ T8083] syz.4.2081[8083] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.543626][ T8083] syz.4.2081[8083] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.407755][ T8150] device syzkaller0 entered promiscuous mode [ 213.817410][ T8167] device syzkaller0 entered promiscuous mode [ 214.206319][ T8206] syz.3.2116[8206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.206367][ T8206] syz.3.2116[8206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.323780][ T8208] device pim6reg1 entered promiscuous mode [ 214.515109][ T8218] device pim6reg1 entered promiscuous mode [ 214.522074][ T8218] device vlan0 entered promiscuous mode [ 215.364553][ T8270] device sit0 left promiscuous mode [ 215.407092][ T8270] device sit0 entered promiscuous mode [ 216.377070][ T8320] syz.4.2145[8320] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.377113][ T8320] syz.4.2145[8320] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.854172][ T8365] device syzkaller0 entered promiscuous mode [ 217.905207][ T8415] device syzkaller0 entered promiscuous mode [ 219.206379][ T8489] device sit0 entered promiscuous mode [ 220.354550][ T24] audit: type=1400 audit(1763496798.560:163): avc: denied { ioctl } for pid=8573 comm="syz.0.2217" path="pid:[4026532406]" dev="nsfs" ino=4026532406 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 220.448076][ T24] audit: type=1400 audit(1763496798.640:164): avc: denied { create } for pid=8596 comm="syz.3.2224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 220.685593][ T8606] device syzkaller0 entered promiscuous mode [ 221.159718][ T8616] device veth0_vlan left promiscuous mode [ 221.224336][ T8616] device veth0_vlan entered promiscuous mode [ 221.406993][ T8608] device syzkaller0 entered promiscuous mode [ 221.464379][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 221.499571][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 221.507120][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.456849][ T8667] device syzkaller0 entered promiscuous mode [ 224.150962][ T8716] device pim6reg1 entered promiscuous mode [ 225.954145][ T8832] device sit0 left promiscuous mode [ 226.142057][ T8836] device sit0 entered promiscuous mode [ 230.100158][ T8953] device sit0 left promiscuous mode [ 230.291254][ T8953] device sit0 entered promiscuous mode [ 230.658145][ T8970] device lo entered promiscuous mode [ 230.694988][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 233.457288][ T9042] device syzkaller0 entered promiscuous mode [ 233.465101][ T9045] device sit0 left promiscuous mode [ 233.475612][ T9046] device sit0 entered promiscuous mode [ 233.849089][ T9084] device sit0 left promiscuous mode [ 233.902218][ T9090] device pim6reg1 entered promiscuous mode [ 234.033741][ T9085] device sit0 left promiscuous mode [ 234.187991][ T9106] device wg2 left promiscuous mode [ 234.210347][ T9106] device wg2 entered promiscuous mode [ 235.117471][ T9171] device syzkaller0 entered promiscuous mode [ 235.171912][ T9173] pimreg: tun_chr_ioctl cmd 1074025677 [ 235.177392][ T9173] pimreg: linktype set to 270 [ 235.247400][ T9178] pimreg: tun_chr_ioctl cmd 2147767506 [ 237.249037][ T9296] device syzkaller0 entered promiscuous mode [ 237.335955][ T9305] device veth1_macvtap entered promiscuous mode [ 237.349287][ T9305] device macsec0 entered promiscuous mode [ 237.373513][ T9311] device veth0_vlan left promiscuous mode [ 237.381973][ T9311] device veth0_vlan entered promiscuous mode [ 237.417286][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 237.441593][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 237.470632][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 237.478235][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.365307][ T9371] device pim6reg1 entered promiscuous mode [ 241.309203][ T9507] device veth1_to_hsr entered promiscuous mode [ 243.220319][ T9537] device wg2 left promiscuous mode [ 245.933058][ T9584] device wg2 left promiscuous mode [ 246.008728][ T9583] device veth1_macvtap left promiscuous mode [ 246.029655][ T9583] device macsec0 left promiscuous mode [ 246.224625][ T9586] device wg2 entered promiscuous mode [ 249.278849][ T9674] device syzkaller0 entered promiscuous mode [ 250.189238][ T9681] device sit0 left promiscuous mode [ 250.362940][ T9682] device sit0 entered promiscuous mode [ 251.416367][ T9693] tap0: tun_chr_ioctl cmd 1074025677 [ 251.429902][ T9693] tap0: linktype set to 769 [ 251.518944][ T9715] device pim6reg1 left promiscuous mode [ 251.912647][ T9749] device veth0_vlan left promiscuous mode [ 251.920919][ T9749] device veth0_vlan entered promiscuous mode [ 251.971600][ T9763] device veth1_macvtap left promiscuous mode [ 252.031545][ T9763] device veth1_macvtap entered promiscuous mode [ 252.041889][ T9763] device macsec0 entered promiscuous mode [ 252.190812][ T9782] device pim6reg1 entered promiscuous mode [ 253.216550][ T9815] cgroup: fork rejected by pids controller in /syz2 [ 253.252811][ T9819] device veth1_macvtap left promiscuous mode [ 253.270461][ T9819] device veth1_macvtap entered promiscuous mode [ 253.276869][ T9819] device macsec0 entered promiscuous mode [ 253.290044][ T9823] device veth1_macvtap left promiscuous mode [ 253.685457][ T9828] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.693020][ T9828] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.701489][ T9828] device bridge_slave_0 entered promiscuous mode [ 253.770123][ T9828] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.809128][ T9828] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.847220][ T9828] device bridge_slave_1 entered promiscuous mode [ 254.355942][ T9828] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.363009][ T9828] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.370279][ T9828] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.377284][ T9828] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.442022][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.450048][ T444] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.457349][ T444] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.490115][ T9828] device veth0_vlan entered promiscuous mode [ 254.501615][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 254.510504][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.518421][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 254.526450][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 254.536364][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.544686][ T444] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.551724][ T444] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.559372][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.567509][ T444] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.574547][ T444] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.582241][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.590208][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.602929][ T9828] device veth1_macvtap entered promiscuous mode [ 254.620388][ T7] GPL: port 1(erspan0) entered disabled state [ 254.627117][ T7] device erspan0 left promiscuous mode [ 254.632754][ T7] GPL: port 1(erspan0) entered disabled state [ 254.640881][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 254.649875][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 254.658339][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 254.952233][ T7] device veth1_macvtap left promiscuous mode [ 255.110195][ T9879] device wg2 entered promiscuous mode [ 255.118711][ T9881] device sit0 entered promiscuous mode [ 255.130514][ T9879] device sit0 entered promiscuous mode [ 256.321488][ T9907] device syzkaller0 entered promiscuous mode [ 256.664729][ T9941] ÿÿÿÿÿÿ: renamed from vlan1 [ 256.789702][ T9963] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.797999][ T9963] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.783765][ T24] audit: type=1400 audit(1763496835.980:165): avc: denied { create } for pid=10010 comm="syz.0.2615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 257.976781][T10009] device wg2 entered promiscuous mode [ 258.260366][T10061] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.267465][T10061] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.276102][T10061] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.283165][T10061] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.514108][T10061] device bridge0 entered promiscuous mode [ 258.972606][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 259.361057][T10101] device wg2 left promiscuous mode [ 260.454004][ T24] audit: type=1400 audit(1763496838.660:166): avc: denied { setattr } for pid=10151 comm="syz.0.2653" path="pipe:[24615]" dev="pipefs" ino=24615 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 261.666863][T10170] device pim6reg1 entered promiscuous mode [ 262.479441][T10217] device syzkaller0 entered promiscuous mode [ 263.327612][T10267] device veth0_vlan left promiscuous mode [ 263.450836][T10267] device veth0_vlan entered promiscuous mode [ 263.546154][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 263.558685][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 263.672534][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 264.642292][T10365] device pim6reg1 entered promiscuous mode [ 265.647544][T10425] ±ÿ: renamed from team_slave_1 [ 265.919284][T10439] device pim6reg1 entered promiscuous mode [ 265.994453][T10449] device pim6reg1 entered promiscuous mode [ 266.365734][T10461] syz.2.2745[10461] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.365812][T10461] syz.2.2745[10461] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.687958][T10476] syz.1.2751[10476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.726157][T10476] syz.1.2751[10476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.191667][ T24] audit: type=1400 audit(1763496845.400:167): avc: denied { create } for pid=10502 comm="syz.4.2757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 267.457419][T10509] device wg2 left promiscuous mode [ 267.706373][T10512] device wg2 entered promiscuous mode [ 268.911097][T10565] device wg2 left promiscuous mode [ 270.097086][T10623] device syzkaller0 entered promiscuous mode [ 271.861239][T10677] syz.2.2806[10677] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.861319][T10677] syz.2.2806[10677] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.065689][T10677] syz.2.2806[10677] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.183207][T10677] syz.2.2806[10677] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.622679][T10694] device pim6reg1 entered promiscuous mode [ 274.190696][T10759] device wg2 left promiscuous mode [ 274.634841][T10782] device pim6reg1 entered promiscuous mode [ 274.696175][T10790] device syzkaller0 entered promiscuous mode [ 274.746434][T10809] device veth1_macvtap entered promiscuous mode [ 274.753742][T10809] device macsec0 entered promiscuous mode [ 274.760860][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 276.299293][T10921] device wg2 entered promiscuous mode [ 276.515559][T10927] device veth0_vlan left promiscuous mode [ 276.533489][T10927] device veth0_vlan entered promiscuous mode [ 276.698664][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 276.706913][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 276.714768][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 276.867555][T10941] tap0: tun_chr_ioctl cmd 1074025681 [ 280.275269][T11037] device veth1_to_team entered promiscuous mode [ 280.337308][T11037] device wg2 entered promiscuous mode [ 281.263493][T11054] device syzkaller0 entered promiscuous mode [ 282.149437][T11108] device wg2 entered promiscuous mode [ 282.248195][T11141] syz.2.2935[11141] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.248265][T11141] syz.2.2935[11141] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.440650][T11142] syz.2.2935[11142] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.760664][T11159] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.779987][T11159] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.788033][T11159] device bridge0 left promiscuous mode [ 283.342684][T11215] device veth0_vlan left promiscuous mode [ 283.419647][T11215] device veth0_vlan entered promiscuous mode [ 283.892974][T11274] syz.1.2955[11274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.893024][T11274] syz.1.2955[11274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.775821][T11333] device pim6reg1 entered promiscuous mode [ 285.987612][T11341] device syzkaller0 entered promiscuous mode [ 286.284604][T11343] device sit0 entered promiscuous mode [ 287.039144][T11377] device sit0 left promiscuous mode [ 290.517442][T11544] device wg2 left promiscuous mode [ 290.561353][T11544] device wg2 entered promiscuous mode [ 290.815191][T11561] device syzkaller0 entered promiscuous mode [ 292.968879][T11634] device veth0_vlan left promiscuous mode [ 293.052238][T11634] device veth0_vlan entered promiscuous mode [ 293.365389][T11631] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.372541][T11631] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.380361][T11631] device bridge_slave_0 entered promiscuous mode [ 293.387819][T11631] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.395308][T11631] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.402896][T11631] device bridge_slave_1 entered promiscuous mode [ 293.451628][T11631] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.458657][T11631] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.465920][T11631] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.472942][T11631] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.517098][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 293.569447][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.608340][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.709896][T11631] device veth0_vlan entered promiscuous mode [ 293.812436][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 293.825648][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 293.834009][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.841043][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.855993][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 293.864437][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 293.872717][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.879750][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.887219][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 293.895538][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 293.903635][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 293.911910][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 293.920073][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 293.928325][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 293.937434][ T24] audit: type=1400 audit(1763496872.140:168): avc: denied { create } for pid=11648 comm="syz.0.3061" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 293.937983][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 293.966504][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 293.974683][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 293.982230][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 293.995131][T11631] device veth1_macvtap entered promiscuous mode [ 294.017319][T11657] device syzkaller0 entered promiscuous mode [ 294.025061][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 294.042516][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 294.050775][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 294.076646][ T24] audit: type=1400 audit(1763496872.280:169): avc: denied { unmount } for pid=11631 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 294.098025][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 294.109221][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 294.118159][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 294.187617][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 294.636956][T11680] device pim6reg1 entered promiscuous mode [ 295.084319][T11704] device syzkaller0 entered promiscuous mode [ 295.481499][T11720] batadv0: tun_chr_ioctl cmd 2147767511 [ 295.865611][ T24] audit: type=1400 audit(1763496873.990:170): avc: denied { mounton } for pid=11738 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 296.332939][T11738] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.368669][T11738] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.376309][T11738] device bridge_slave_0 entered promiscuous mode [ 296.383350][T11738] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.390541][T11738] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.398031][T11738] device bridge_slave_1 entered promiscuous mode [ 296.457687][T11738] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.464747][T11738] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.472026][T11738] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.479048][T11738] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.569196][ T6895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 296.602975][ T6895] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.673872][ T6895] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.733735][ T6895] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 296.741941][ T6895] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.748969][ T6895] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.756313][ T6895] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 296.796202][ T6895] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.803255][ T6895] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.884334][ T6895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 296.932881][ T6895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 297.006982][ T6895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 297.095072][ T6895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 297.159297][ T6895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 297.255493][T11738] device veth0_vlan entered promiscuous mode [ 297.282334][ T6895] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 297.355823][ T6895] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 297.388022][T11738] device veth1_macvtap entered promiscuous mode [ 297.394849][ T6895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 297.470951][ T6895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 297.531825][ T6895] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 297.667380][ T6895] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 297.697713][ T6895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 297.797245][ T6895] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 297.805535][ T6895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 298.951512][T11840] device veth0_to_hsr entered promiscuous mode [ 302.555469][T11929] device syzkaller0 entered promiscuous mode [ 302.945600][T11960] device sit0 left promiscuous mode [ 303.314900][T11966] device sit0 entered promiscuous mode [ 303.326758][T11972] device pim6reg1 entered promiscuous mode [ 303.581905][T11987] device sit0 left promiscuous mode [ 304.680317][T12024] : renamed from veth0_vlan [ 305.496477][T12066] tap0: tun_chr_ioctl cmd 1074025677 [ 305.505183][T12066] tap0: linktype set to 769 [ 305.527687][T12068] ÿÿÿÿÿÿ: renamed from vlan1 [ 306.929542][T12119] device pim6reg1 entered promiscuous mode [ 309.674309][T12233] device syzkaller0 entered promiscuous mode [ 309.769678][ T6895] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 310.592365][T12268] device sit0 left promiscuous mode [ 310.704213][T12270] device sit0 entered promiscuous mode [ 312.311503][T12310] device syzkaller0 entered promiscuous mode [ 316.246826][T12420] device syzkaller0 entered promiscuous mode [ 316.919119][T12425] device sit0 left promiscuous mode [ 317.385323][T12438] device pim6reg1 entered promiscuous mode [ 317.408699][T12427] device syzkaller0 entered promiscuous mode [ 317.718443][T12464] device veth1_macvtap left promiscuous mode [ 318.189648][T12510] syz.3.3294[12510] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.189693][T12510] syz.3.3294[12510] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.196744][T12508] syz.3.3294[12508] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.727813][T12639] device veth1_macvtap left promiscuous mode [ 320.837001][T12639] device macsec0 left promiscuous mode [ 320.918944][T12655] device veth1_macvtap entered promiscuous mode [ 320.926064][T12655] device macsec0 entered promiscuous mode [ 320.960866][T12661] device pim6reg1 entered promiscuous mode [ 321.064298][T12667] device pim6reg1 entered promiscuous mode [ 321.790180][T12718] device pim6reg1 entered promiscuous mode [ 322.409181][T12722] device syzkaller0 entered promiscuous mode [ 322.922054][T12753] ÿ: renamed from team_slave_1 [ 323.086887][T12766] device veth1_macvtap left promiscuous mode [ 323.107943][T12773] device pim6reg1 entered promiscuous mode [ 323.115223][T12766] device veth1_macvtap entered promiscuous mode [ 323.132281][T12766] device macsec0 entered promiscuous mode [ 323.332668][T12778] GPL: port 1(erspan0) entered blocking state [ 323.340395][T12778] GPL: port 1(erspan0) entered disabled state [ 323.346908][T12778] device erspan0 entered promiscuous mode [ 323.421268][T12779] GPL: port 1(erspan0) entered blocking state [ 323.427370][T12779] GPL: port 1(erspan0) entered forwarding state [ 324.369370][T12803] device veth1_macvtap left promiscuous mode [ 324.410275][T12803] device macsec0 left promiscuous mode [ 325.893473][T12841] device syzkaller0 left promiscuous mode [ 326.389892][T12850] device macsec0 entered promiscuous mode [ 328.961877][T12949] device syzkaller0 entered promiscuous mode [ 329.185014][T12952] device pim6reg1 entered promiscuous mode [ 329.259634][T12971] device wg2 entered promiscuous mode [ 330.803374][T13033] device syzkaller0 entered promiscuous mode [ 332.323157][T13081] device wg2 entered promiscuous mode [ 332.452854][T13093] device veth1_macvtap left promiscuous mode [ 332.472809][T13093] device macsec0 left promiscuous mode [ 332.528775][T13092] device veth1_macvtap entered promiscuous mode [ 332.559915][T13092] device macsec0 entered promiscuous mode [ 333.215783][T13119] device pim6reg1 entered promiscuous mode [ 333.362030][T13125] device wg2 left promiscuous mode [ 333.495667][T13128] device veth1_to_team entered promiscuous mode [ 333.569302][T13125] device wg2 entered promiscuous mode [ 334.557150][T13188] device veth1_to_team entered promiscuous mode [ 334.961450][T13191] device wg2 entered promiscuous mode [ 335.188700][T13198] device veth1_macvtap left promiscuous mode [ 336.246379][T13229] device syzkaller0 entered promiscuous mode [ 336.794117][T13240] device wg2 left promiscuous mode [ 336.953273][T13247] device veth1_to_team entered promiscuous mode [ 337.131995][T13253] device wg2 entered promiscuous mode [ 337.721254][T13300] device veth0_vlan left promiscuous mode [ 337.786957][T13300] device veth0_vlan entered promiscuous mode [ 337.812668][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 337.828391][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 337.880787][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 340.896635][T13362] device wg2 left promiscuous mode [ 340.906518][T13362] device wg2 entered promiscuous mode [ 342.100349][T13408] device wg2 left promiscuous mode [ 342.199776][T13408] device wg2 entered promiscuous mode [ 343.164187][T13490] 7B’ç÷ï: renamed from syzkaller0 [ 344.274410][ T94] udevd[94]: worker [795] terminated by signal 33 (Unknown signal 33) [ 344.304991][ T94] udevd[94]: worker [795] failed while handling '/devices/virtual/block/loop4' [ 344.319532][T13545] device pim6reg1 entered promiscuous mode [ 344.378505][ T94] udevd[94]: worker [490] terminated by signal 33 (Unknown signal 33) [ 344.479216][ T94] udevd[94]: worker [490] failed while handling '/devices/virtual/block/loop1' [ 344.952523][ T94] udevd[94]: worker [13570] terminated by signal 33 (Unknown signal 33) [ 344.961050][ T94] udevd[94]: worker [13570] failed while handling '/devices/virtual/block/loop0' [ 346.552290][T13615] device pim6reg1 entered promiscuous mode [ 346.658879][T13620] device syzkaller0 entered promiscuous mode [ 348.426295][T13660] device syzkaller0 entered promiscuous mode [ 348.493463][T13661] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.504240][T13661] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.765926][T13680] device wg2 left promiscuous mode [ 348.898402][T13687] device wg2 entered promiscuous mode [ 351.597375][T13755] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 351.853992][T13755] device syzkaller0 entered promiscuous mode [ 352.003140][T13770] device syzkaller0 entered promiscuous mode [ 352.011278][T13772] device wg2 left promiscuous mode [ 352.159045][T13793] device sit0 entered promiscuous mode [ 353.666823][T13886] device syzkaller0 left promiscuous mode [ 354.699671][T13912] device wg2 left promiscuous mode [ 354.705943][T13910] device pim6reg1 entered promiscuous mode [ 354.740103][T13915] device syzkaller0 entered promiscuous mode [ 354.866502][T13917] device sit0 entered promiscuous mode [ 356.131795][T14004] device sit0 left promiscuous mode [ 356.730024][T14040] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.737076][T14040] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.744366][T14040] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.751397][T14040] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.759545][T14040] device bridge0 entered promiscuous mode [ 356.775012][T14041] device syzkaller0 left promiscuous mode [ 357.449874][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 357.621269][T14068] device sit0 entered promiscuous mode [ 358.008968][T14084] device veth0_vlan left promiscuous mode [ 358.015448][T14084] device veth0_vlan entered promiscuous mode [ 358.048015][T14089] device syzkaller0 entered promiscuous mode [ 358.077122][T14098] device wg2 entered promiscuous mode [ 358.189464][T14119] device lo entered promiscuous mode [ 358.425483][T14131] device sit0 left promiscuous mode [ 358.619890][T14131] device sit0 entered promiscuous mode [ 359.528960][T14174] device wg2 left promiscuous mode [ 359.565333][T14174] device wg2 entered promiscuous mode [ 360.052798][T14193] device syzkaller0 entered promiscuous mode [ 360.204801][T14203] device sit0 left promiscuous mode [ 360.882334][T14244] device wg2 left promiscuous mode [ 361.027353][T14243] device wg2 entered promiscuous mode [ 361.253824][T14255] device pim6reg1 entered promiscuous mode [ 362.675712][T14338] device veth1_macvtap entered promiscuous mode [ 362.689569][T14338] device macsec0 entered promiscuous mode [ 362.715755][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 362.958998][T14362] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 363.064890][T14362] device syzkaller0 entered promiscuous mode [ 363.575713][T14402] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.589062][T14402] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.769172][T14406] device bridge_slave_1 left promiscuous mode [ 363.799162][T14406] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.806693][T14406] device bridge_slave_0 left promiscuous mode [ 363.813079][T14406] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.450929][T14444] device sit0 entered promiscuous mode [ 364.831821][T14486] syz.4.3844[14486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 364.831892][T14486] syz.4.3844[14486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.572407][T14545] device syzkaller0 entered promiscuous mode [ 367.804895][T14548] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.812625][T14548] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.820162][T14548] device bridge_slave_0 entered promiscuous mode [ 367.827094][T14548] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.849333][T14548] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.859876][T14548] device bridge_slave_1 entered promiscuous mode [ 368.157780][T14548] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.164840][T14548] bridge0: port 2(bridge_slave_1) entered forwarding state [ 368.172109][T14548] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.179130][T14548] bridge0: port 1(bridge_slave_0) entered forwarding state [ 368.201578][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 368.229006][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.329261][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.459429][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 368.501495][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.508546][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 368.519834][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 368.528102][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.535133][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 368.739683][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 368.748966][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 368.788715][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 368.810631][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 368.824781][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 368.841191][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 368.859648][T14548] device veth0_vlan entered promiscuous mode [ 368.880122][T14548] device veth1_macvtap entered promiscuous mode [ 368.893881][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 368.902189][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 368.910649][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 368.918269][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 368.928714][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 368.938056][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 368.946618][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 369.804222][T14660] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 369.985358][T14660] device syzkaller0 entered promiscuous mode [ 370.676929][T14698] syz.3.3904[14698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 370.676982][T14698] syz.3.3904[14698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.485666][T14710] device pim6reg1 entered promiscuous mode [ 372.669060][T14711] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.676237][T14711] bridge0: port 1(bridge_slave_0) entered disabled state [ 373.459171][T14782] bridge0: port 2(bridge_slave_1) entered disabled state [ 373.466804][T14782] bridge0: port 1(bridge_slave_0) entered disabled state [ 373.644228][T14789] device syzkaller0 entered promiscuous mode [ 373.699241][T14795] device syzkaller0 entered promiscuous mode [ 374.002273][T14840] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.009366][T14840] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.199926][T14840] device bridge0 left promiscuous mode [ 374.334530][T14849] device syzkaller0 entered promiscuous mode [ 374.992588][T14895] device veth0_vlan left promiscuous mode [ 374.998781][T14895] device veth0_vlan entered promiscuous mode [ 375.037983][T14900] bridge0: port 2(bridge_slave_1) entered blocking state [ 375.045038][T14900] bridge0: port 2(bridge_slave_1) entered forwarding state [ 375.052310][T14900] bridge0: port 1(bridge_slave_0) entered blocking state [ 375.059330][T14900] bridge0: port 1(bridge_slave_0) entered forwarding state [ 375.069072][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 375.128642][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 375.209459][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 376.164487][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 377.602195][T14962] device pim6reg1 entered promiscuous mode [ 379.956537][T15023] bridge0: port 1(bridge_slave_0) entered disabled state [ 380.852110][T15091] device syzkaller0 entered promiscuous mode [ 381.046102][T15102] device pim6reg1 entered promiscuous mode [ 381.204702][T15109] device syzkaller0 entered promiscuous mode [ 381.514506][T15128] device veth0_vlan left promiscuous mode [ 381.610696][T15128] device veth0_vlan entered promiscuous mode [ 381.776811][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 381.796015][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 381.874554][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 382.932966][T15201] device wg2 left promiscuous mode [ 383.686080][T15254] syz.0.4061[15254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 383.695046][T15254] syz.0.4061[15254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 383.883150][T15268] device syzkaller0 entered promiscuous mode [ 384.047750][T15297] device veth0_to_team entered promiscuous mode [ 384.530058][T15322] device veth0_vlan left promiscuous mode [ 384.640337][T15322] device veth0_vlan entered promiscuous mode [ 390.436660][T15415] : renamed from veth0_vlan [ 392.457440][T15503] device syzkaller0 entered promiscuous mode [ 394.031549][T15564] device syzkaller0 entered promiscuous mode [ 396.743078][T15650] device sit0 entered promiscuous mode [ 397.358329][T15666] syz.3.4176[15666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.358371][T15666] syz.3.4176[15666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.900214][T15689] device pim6reg1 entered promiscuous mode [ 398.107203][ T24] audit: type=1400 audit(1763496976.310:171): avc: denied { create } for pid=15690 comm="syz.3.4182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 398.482045][T15705] device wg2 entered promiscuous mode [ 399.055466][T15732] syz.3.4194[15732] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.055519][T15732] syz.3.4194[15732] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.151726][T15724] device syzkaller0 entered promiscuous mode [ 399.272645][T15728] syz.3.4194[15728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.272693][T15728] syz.3.4194[15728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.851722][T15780] device syzkaller0 left promiscuous mode [ 400.577907][T15814] device pim6reg1 entered promiscuous mode [ 402.196514][T15883] device sit0 left promiscuous mode [ 402.299122][T15895] device sit0 entered promiscuous mode [ 402.751981][T15903] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.419580][T15926] device sit0 left promiscuous mode [ 403.599288][T15935] device sit0 entered promiscuous mode [ 403.892820][T15941] device sit0 entered promiscuous mode [ 404.602242][T15959] device syzkaller0 entered promiscuous mode [ 404.884363][T15974] device wg2 left promiscuous mode [ 404.971689][T15982] device wg2 entered promiscuous mode [ 404.979617][T15975] device syzkaller0 left promiscuous mode [ 406.504673][T16005] device veth0_vlan left promiscuous mode [ 406.523862][T16005] device veth0_vlan entered promiscuous mode [ 406.532210][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 406.540488][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 406.547947][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 408.836609][T16047] device veth1_macvtap entered promiscuous mode [ 408.900975][T16047] device macsec0 entered promiscuous mode [ 408.971902][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 409.640597][T16096] syz.4.4295[16096] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.640651][T16096] syz.4.4295[16096] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.286272][T16099] device syzkaller0 entered promiscuous mode [ 412.795472][T16228] device veth1_macvtap left promiscuous mode [ 412.850896][T16228] device macsec0 left promiscuous mode [ 412.859951][T16234] bridge0: port 3(dummy0) entered blocking state [ 412.866279][T16234] bridge0: port 3(dummy0) entered disabled state [ 412.909681][T16234] device dummy0 entered promiscuous mode [ 413.807331][T16281] device veth1_macvtap left promiscuous mode [ 413.819178][T16281] device macsec0 left promiscuous mode [ 413.870612][T16288] device macsec0 entered promiscuous mode [ 414.132577][ T24] audit: type=1400 audit(1763496992.340:172): avc: denied { create } for pid=16301 comm="syz.4.4353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 414.517054][T16331] device veth0_vlan left promiscuous mode [ 414.529999][T16331] device veth0_vlan entered promiscuous mode [ 414.744734][T16335] device veth0_vlan left promiscuous mode [ 414.817353][T16335] device veth0_vlan entered promiscuous mode [ 414.909116][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 414.917341][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 414.945168][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 415.373312][T16372] device pim6reg1 entered promiscuous mode [ 416.647277][T16448] device pim6reg1 entered promiscuous mode [ 417.178876][T16496] device syzkaller0 entered promiscuous mode [ 417.398927][T16507] device veth1_macvtap left promiscuous mode [ 417.449357][T16507] device macsec0 left promiscuous mode [ 418.148315][T16529] device pim6reg1 entered promiscuous mode [ 418.495688][T16571] device wg2 left promiscuous mode [ 418.514537][T16571] device wg2 entered promiscuous mode [ 418.530121][T16573] device pim6reg1 entered promiscuous mode [ 420.797990][T16680] bridge0: port 1(bridge_slave_0) entered blocking state [ 420.839883][T16680] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.849627][T16680] device bridge_slave_0 entered promiscuous mode [ 420.896813][T16680] bridge0: port 2(bridge_slave_1) entered blocking state [ 420.918869][T16680] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.952830][T16680] device bridge_slave_1 entered promiscuous mode [ 421.135954][T16680] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.143017][T16680] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.150295][T16680] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.157306][T16680] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.255388][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 421.281710][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.339328][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.465783][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 421.476624][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.483669][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.528354][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 421.624857][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.631929][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.817349][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 421.897525][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 421.989135][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 422.040261][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 422.073935][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 422.091617][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 422.153676][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 422.177240][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 422.228747][T16680] device veth0_vlan entered promiscuous mode [ 422.248644][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 422.282585][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 422.337547][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 422.386347][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 422.428563][T16680] device veth1_macvtap entered promiscuous mode [ 422.438578][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 422.446519][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 422.460172][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 422.488449][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 422.551672][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 423.009380][ T112] device dummy0 left promiscuous mode [ 423.042406][ T112] bridge0: port 3(dummy0) entered disabled state [ 423.096213][ T112] device bridge_slave_1 left promiscuous mode [ 423.134525][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.192591][ T112] device bridge_slave_0 left promiscuous mode [ 423.217700][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.256260][ T112] device veth1_macvtap left promiscuous mode [ 423.265070][ T112] device veth0_vlan left promiscuous mode [ 423.454149][T16778] device syzkaller0 entered promiscuous mode [ 423.947985][T16824] device dummy0 entered promiscuous mode [ 424.910183][T16840] device syzkaller0 entered promiscuous mode [ 425.674746][T16888] device sit0 left promiscuous mode [ 425.797471][ T24] audit: type=1400 audit(1763497004.000:173): avc: denied { create } for pid=16889 comm="syz.1.4518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 433.670907][T16981] syz.3.4545[16981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 433.670978][T16981] syz.3.4545[16981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.988163][T17020] device syzkaller0 entered promiscuous mode [ 436.407281][T17137] device syzkaller0 entered promiscuous mode [ 437.363152][T17184] device sit0 entered promiscuous mode [ 440.122816][T17315] device sit0 left promiscuous mode [ 440.796625][T17336] syz.3.4644[17336] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 440.796706][T17336] syz.3.4644[17336] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 441.294349][T17372] device syzkaller0 entered promiscuous mode [ 442.211317][T17417] device syzkaller0 entered promiscuous mode [ 443.025286][T17474] ±: renamed from pim6reg1 [ 444.127753][T17547] device syzkaller0 entered promiscuous mode [ 444.988752][T17591] ÿÿÿÿÿÿ: renamed from vlan1 [ 446.541455][T17669] device syzkaller0 entered promiscuous mode [ 446.953958][T17690] device syzkaller0 entered promiscuous mode [ 446.978986][T17695] device wg2 left promiscuous mode [ 447.004408][T17696] syz.2.4743[17696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 447.004455][T17696] syz.2.4743[17696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 447.007190][T17697] syz.2.4743[17697] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 447.715523][T17722] device syzkaller0 entered promiscuous mode [ 447.989161][T17732] device veth0_vlan left promiscuous mode [ 448.060262][T17732] device veth0_vlan entered promiscuous mode [ 448.153548][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 448.170196][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 448.189355][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 448.209385][T17743] device pim6reg1 entered promiscuous mode [ 451.445593][T17872] device syzkaller0 entered promiscuous mode [ 451.469700][T17872] device syzkaller0 left promiscuous mode [ 451.824544][T17881] device pim6reg1 entered promiscuous mode [ 452.341932][T17909] device pim6reg1 entered promiscuous mode [ 453.442229][T17932] device veth0_vlan left promiscuous mode [ 453.448953][T17932] device veth0_vlan entered promiscuous mode [ 453.457678][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 453.468153][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 453.475927][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 453.965882][T17983] device veth0_vlan left promiscuous mode [ 454.045076][T17983] device veth0_vlan entered promiscuous mode [ 455.063642][T18031] device pim6reg1 entered promiscuous mode [ 455.495746][T18048] device veth0_vlan left promiscuous mode [ 455.560910][T18048] device veth0_vlan entered promiscuous mode [ 455.834956][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 455.889431][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 455.898629][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 457.653315][T18108] device syzkaller0 entered promiscuous mode [ 459.755670][T18157] p: renamed from pim6reg1 [ 460.441623][T18168] device syzkaller0 entered promiscuous mode [ 462.706546][T18226] device pim6reg1 entered promiscuous mode [ 464.227780][T18287] syz.0.4919[18287] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 464.227835][T18287] syz.0.4919[18287] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 464.498583][T18291] device pim6reg1 entered promiscuous mode [ 466.691661][T18441] FAULT_INJECTION: forcing a failure. [ 466.691661][T18441] name failslab, interval 1, probability 0, space 0, times 1 [ 466.717425][T18441] CPU: 0 PID: 18441 Comm: syz.1.4958 Tainted: G W syzkaller #0 [ 466.726273][T18441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 466.736320][T18441] Call Trace: [ 466.739604][T18441] __dump_stack+0x21/0x24 [ 466.743919][T18441] dump_stack_lvl+0x169/0x1d8 [ 466.748574][T18441] ? thaw_kernel_threads+0x220/0x220 [ 466.753841][T18441] ? show_regs_print_info+0x18/0x18 [ 466.759024][T18441] dump_stack+0x15/0x1c [ 466.763165][T18441] should_fail+0x3c1/0x510 [ 466.767564][T18441] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 466.773007][T18441] __should_failslab+0xa4/0xe0 [ 466.777752][T18441] should_failslab+0x9/0x20 [ 466.782240][T18441] __kmalloc_track_caller+0x5f/0x320 [ 466.787508][T18441] ? kmem_cache_alloc+0x165/0x2e0 [ 466.792537][T18441] ? __alloc_skb+0x9e/0x520 [ 466.797023][T18441] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 466.802463][T18441] __alloc_skb+0xdc/0x520 [ 466.806776][T18441] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 466.812047][T18441] rtnetlink_event+0xd2/0x1a0 [ 466.816706][T18441] raw_notifier_call_chain+0x90/0x100 [ 466.822058][T18441] dev_set_mac_address+0x318/0x420 [ 466.827152][T18441] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 466.832941][T18441] dev_set_mac_address_user+0x31/0x50 [ 466.838296][T18441] dev_ifsioc+0x65c/0xa50 [ 466.842608][T18441] ? dev_ioctl+0xb80/0xb80 [ 466.847007][T18441] dev_ioctl+0x550/0xb80 [ 466.851228][T18441] sock_do_ioctl+0x235/0x330 [ 466.855800][T18441] ? __kasan_slab_free+0x11/0x20 [ 466.860716][T18441] ? sock_show_fdinfo+0xa0/0xa0 [ 466.865556][T18441] ? selinux_file_ioctl+0x377/0x480 [ 466.870741][T18441] ? mutex_trylock+0xa0/0xa0 [ 466.875309][T18441] ? __fget_files+0x2c4/0x320 [ 466.879966][T18441] sock_ioctl+0x504/0x710 [ 466.884276][T18441] ? sock_poll+0x360/0x360 [ 466.888673][T18441] ? __fget_files+0x2c4/0x320 [ 466.893335][T18441] ? security_file_ioctl+0x84/0xa0 [ 466.898428][T18441] ? sock_poll+0x360/0x360 [ 466.902823][T18441] __se_sys_ioctl+0x121/0x1a0 [ 466.907478][T18441] __x64_sys_ioctl+0x7b/0x90 [ 466.912046][T18441] do_syscall_64+0x31/0x40 [ 466.916442][T18441] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 466.922322][T18441] RIP: 0033:0x7f13d28486c9 [ 466.926727][T18441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 466.946310][T18441] RSP: 002b:00007f13d12b0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 466.954704][T18441] RAX: ffffffffffffffda RBX: 00007f13d2a9efa0 RCX: 00007f13d28486c9 [ 466.962655][T18441] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 000000000000000a [ 466.970606][T18441] RBP: 00007f13d12b0090 R08: 0000000000000000 R09: 0000000000000000 [ 466.978560][T18441] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 466.986510][T18441] R13: 00007f13d2a9f038 R14: 00007f13d2a9efa0 R15: 00007fff83302728 [ 467.740223][T18484] FAULT_INJECTION: forcing a failure. [ 467.740223][T18484] name failslab, interval 1, probability 0, space 0, times 0 [ 467.927756][T18484] CPU: 1 PID: 18484 Comm: syz.4.4973 Tainted: G W syzkaller #0 [ 467.936602][T18484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 467.946635][T18484] Call Trace: [ 467.949908][T18484] __dump_stack+0x21/0x24 [ 467.954226][T18484] dump_stack_lvl+0x169/0x1d8 [ 467.958891][T18484] ? show_regs_print_info+0x18/0x18 [ 467.964072][T18484] ? nla_put+0x142/0x1f0 [ 467.968294][T18484] ? skb_trim+0x8d/0x1a0 [ 467.972521][T18484] dump_stack+0x15/0x1c [ 467.976657][T18484] should_fail+0x3c1/0x510 [ 467.981051][T18484] ? netlink_trim+0x193/0x230 [ 467.985708][T18484] __should_failslab+0xa4/0xe0 [ 467.990444][T18484] should_failslab+0x9/0x20 [ 467.994918][T18484] __kmalloc_track_caller+0x5f/0x320 [ 468.000174][T18484] ? netlink_trim+0x193/0x230 [ 468.004821][T18484] pskb_expand_head+0x123/0x1110 [ 468.009733][T18484] netlink_trim+0x193/0x230 [ 468.014206][T18484] netlink_broadcast_filtered+0x78/0x1270 [ 468.019896][T18484] ? __kmalloc_track_caller+0x181/0x320 [ 468.025412][T18484] ? kasan_unpoison+0x67/0x90 [ 468.030057][T18484] ? __kasan_check_write+0x14/0x20 [ 468.035138][T18484] ? rtmsg_ifinfo_build_skb+0xd8/0x180 [ 468.040565][T18484] nlmsg_notify+0xed/0x1b0 [ 468.044952][T18484] rtnetlink_event+0x13a/0x1a0 [ 468.049686][T18484] raw_notifier_call_chain+0x90/0x100 [ 468.055027][T18484] dev_set_mac_address+0x318/0x420 [ 468.060112][T18484] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 468.065890][T18484] dev_set_mac_address_user+0x31/0x50 [ 468.071231][T18484] dev_ifsioc+0x65c/0xa50 [ 468.075528][T18484] ? dev_ioctl+0xb80/0xb80 [ 468.079918][T18484] dev_ioctl+0x550/0xb80 [ 468.084131][T18484] sock_do_ioctl+0x235/0x330 [ 468.088689][T18484] ? sock_show_fdinfo+0xa0/0xa0 [ 468.093511][T18484] ? irq_work_queue+0xc1/0x150 [ 468.098250][T18484] ? selinux_file_ioctl+0x377/0x480 [ 468.103427][T18484] ? mutex_trylock+0xa0/0xa0 [ 468.107985][T18484] ? __fget_files+0x2c4/0x320 [ 468.112630][T18484] sock_ioctl+0x504/0x710 [ 468.116928][T18484] ? sock_poll+0x360/0x360 [ 468.121312][T18484] ? __fget_files+0x2c4/0x320 [ 468.125961][T18484] ? security_file_ioctl+0x84/0xa0 [ 468.131043][T18484] ? sock_poll+0x360/0x360 [ 468.135427][T18484] __se_sys_ioctl+0x121/0x1a0 [ 468.140073][T18484] __x64_sys_ioctl+0x7b/0x90 [ 468.144634][T18484] do_syscall_64+0x31/0x40 [ 468.149021][T18484] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 468.154883][T18484] RIP: 0033:0x7f560e7546c9 [ 468.159272][T18484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 468.178846][T18484] RSP: 002b:00007f560d1bc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 468.187227][T18484] RAX: ffffffffffffffda RBX: 00007f560e9aafa0 RCX: 00007f560e7546c9 [ 468.195169][T18484] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 000000000000000a [ 468.203110][T18484] RBP: 00007f560d1bc090 R08: 0000000000000000 R09: 0000000000000000 [ 468.211055][T18484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 468.218997][T18484] R13: 00007f560e9ab038 R14: 00007f560e9aafa0 R15: 00007ffd1ba7dbe8 [ 468.315136][T18497] ------------[ cut here ]------------ [ 468.348656][T18497] kernel BUG at kernel/bpf/arraymap.c:980! [ 468.403634][T18497] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 468.409715][T18497] CPU: 0 PID: 18497 Comm: syz.0.4977 Tainted: G W syzkaller #0 [ 468.418541][T18497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 468.428597][T18497] RIP: 0010:prog_array_map_poke_run+0x6f4/0x710 [ 468.434823][T18497] Code: 96 e9 ff eb 05 e8 1c 96 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 08 96 e9 ff 0f 0b e9 78 f9 ff ff e8 fc 95 e9 ff <0f> 0b e8 f5 95 e9 ff 0f 0b e8 ee 95 e9 ff 0f 0b e8 e7 95 e9 ff 0f [ 468.454415][T18497] RSP: 0018:ffffc90000e87c30 EFLAGS: 00010293 [ 468.460473][T18497] RAX: ffffffff817a0fa4 RBX: ffff888110de8810 RCX: ffff888129e062c0 [ 468.468432][T18497] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 468.476396][T18497] RBP: ffffc90000e87cb0 R08: dffffc0000000000 R09: fffffbfff0c5d4d1 [ 468.484359][T18497] R10: fffffbfff0c5d4d1 R11: 1ffffffff0c5d4d0 R12: ffffffffa0098100 [ 468.492318][T18497] R13: ffff888115665900 R14: 0000000000000001 R15: 00000000fffffff0 [ 468.500282][T18497] FS: 00007f0e808136c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 468.509196][T18497] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 468.515771][T18497] CR2: 0000000100000002 CR3: 0000000120fc0000 CR4: 00000000003506b0 [ 468.523727][T18497] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 468.531680][T18497] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 468.539621][T18497] Call Trace: [ 468.542884][T18497] ? bpf_prog_4b8b081278bac347+0xb/0xe64 [ 468.548498][T18497] bpf_fd_array_map_update_elem+0x21f/0x330 [ 468.554365][T18497] bpf_map_update_value+0xb4/0x430 [ 468.559450][T18497] map_update_elem+0x4a1/0x5e0 [ 468.564184][T18497] __se_sys_bpf+0x398/0x680 [ 468.568666][T18497] ? __x64_sys_bpf+0x90/0x90 [ 468.573242][T18497] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 468.579382][T18497] ? __kasan_check_read+0x11/0x20 [ 468.584398][T18497] __x64_sys_bpf+0x7b/0x90 [ 468.588798][T18497] do_syscall_64+0x31/0x40 [ 468.593204][T18497] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 468.599079][T18497] RIP: 0033:0x7f0e81dcc6c9 [ 468.603486][T18497] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 468.623074][T18497] RSP: 002b:00007f0e80813038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 468.631459][T18497] RAX: ffffffffffffffda RBX: 00007f0e82023090 RCX: 00007f0e81dcc6c9 [ 468.639413][T18497] RDX: 0000000000000020 RSI: 0000200000000100 RDI: 0000000000000002 [ 468.647361][T18497] RBP: 00007f0e81e4ef91 R08: 0000000000000000 R09: 0000000000000000 [ 468.655301][T18497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 468.663250][T18497] R13: 00007f0e82023128 R14: 00007f0e82023090 R15: 00007ffeb7f0a488 [ 468.671223][T18497] Modules linked in: [ 468.678765][T18497] ---[ end trace d54cb3a177aeacba ]--- [ 468.684349][T18497] RIP: 0010:prog_array_map_poke_run+0x6f4/0x710 [ 468.693443][T18497] Code: 96 e9 ff eb 05 e8 1c 96 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 08 96 e9 ff 0f 0b e9 78 f9 ff ff e8 fc 95 e9 ff <0f> 0b e8 f5 95 e9 ff 0f 0b e8 ee 95 e9 ff 0f 0b e8 e7 95 e9 ff 0f [ 468.713630][T18497] RSP: 0018:ffffc90000e87c30 EFLAGS: 00010293 [ 468.738835][T18497] RAX: ffffffff817a0fa4 RBX: ffff888110de8810 RCX: ffff888129e062c0 [ 468.747638][T18497] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 468.755834][T18497] RBP: ffffc90000e87cb0 R08: dffffc0000000000 R09: fffffbfff0c5d4d1 [ 468.766952][T18497] R10: fffffbfff0c5d4d1 R11: 1ffffffff0c5d4d0 R12: ffffffffa0098100 [ 468.775633][T18497] R13: ffff888115665900 R14: 0000000000000001 R15: 00000000fffffff0 [ 468.788343][T18497] FS: 00007f0e808136c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 468.817005][T18497] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 468.823859][T18497] CR2: 000000110e22fff6 CR3: 0000000120fc0000 CR4: 00000000003506b0 [ 468.832011][T18497] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 468.840419][T18497] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 468.848431][T18497] Kernel panic - not syncing: Fatal exception [ 468.854662][T18497] Kernel Offset: disabled [ 468.858972][T18497] Rebooting in 86400 seconds..