last executing test programs: 3.310773998s ago: executing program 0 (id=4771): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="020000000400000008000000010000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000240)={'wg2\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 2.655173838s ago: executing program 1 (id=4778): bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) socketpair(0x11, 0x3, 0x0, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.sched_load_balance\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402000000000000, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000180)='f2fs_map_blocks\x00', 0xffffffffffffffff, 0x0, 0x8000000000000001}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r2}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xd, &(0x7f0000000200)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0xc0001480, 0x0, 0x0, &(0x7f0000000a00), 0x0, 0x0) 2.645793798s ago: executing program 3 (id=4779): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0xfffffff9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x2}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYRES64=r3], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r6}, 0x10) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x10001}, [@ldst={0x1, 0x0, 0x2, 0x2, 0x1, 0x20}]}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xb269}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000cc0)={r10, 0xe0, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000880)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f00000008c0)=[0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xdd, &(0x7f0000000940), 0x0, 0x10, &(0x7f0000000980), &(0x7f00000009c0), 0x8, 0x5c, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000940)) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x17, 0x1000, 0x1, 0x8, 0x10420, r9, 0x6, '\x00', r11, r7, 0x2, 0x1, 0x0, 0x0, @void, @value, @value=r8}, 0x50) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r12, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x8, 0x0}, 0x8) r14 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0xc, &(0x7f00000002c0)=@raw=[@printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x3}, @exit, @alu={0x4, 0x1, 0x4, 0x0, 0x4, 0x20}], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x4, 0x1, 0xd16, 0x1}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000400)=[{0x2, 0x1, 0x3}, {0x4, 0x1, 0x4, 0x2}], 0x10, 0x6}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000580)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000500), &(0x7f0000000540)='%ps \x00'}, 0x20) r16 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x15, 0x0, 0x3, 0xfffffbff, 0x808, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x1a, 0x15, &(0x7f0000000080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x249, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x9c}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000140)='syzkaller\x00', 0x1000, 0x89, &(0x7f0000000180)=""/137, 0x40f00, 0x3d, '\x00', r11, @fallback=0x15, r12, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x3, 0x9, 0xb, 0x4}, 0x10, r13, r14, 0x3, &(0x7f0000000640)=[r15, r16], &(0x7f0000000680)=[{0x3, 0x2, 0x0, 0x9}, {0x4, 0x5, 0xf}, {0x4, 0x2, 0x8, 0x7}], 0x10, 0x10001}, 0x94) sendmsg$unix(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000007c0)='T', 0x1}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="140000"], 0x18}, 0x0) recvmsg$unix(r0, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x40010162) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a00)={&(0x7f00000004c0)='rpc_xdr_alignment\x00', r4, 0x0, 0x4}, 0x18) 2.53411015s ago: executing program 3 (id=4780): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x18) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1842, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00'], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="0700000004000000080200000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000001000000000007003f000000000000000000000000030000cb138f7719897df998668811535d8761e636bf814b6d0602f7237fd4814d3f81ed2866d4f01ca28351cd0c40ae3eebafac158f216cbf79e8"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r3, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000340)=[0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x2d, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0x52, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_tracing={0x1a, 0x20, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000006000000000000000900000000110000e53fe27377cd364088fe5e2e477389d3795d7283dac1f8bbb2b9bc77f741485bc31f9e9611cf7b000000115ab181572818946167a5c7804aad403f75ff86a2268c424466028e258e9e5b0b00cf087bf3e93c967a67d78ae8272e9dca3108c42b48385fb1bdc09c9c32ff94987c27b2788fe366d0e5193c620b84e11db3a2c97ee49e05bcc83bcd4628110b700be1597094ae2bc86ee5bca95b60bbabb83a4c6b4422ab21e49d7e7fa062947f3f7c94f79daf73fedc67ffb5c184cc7359f974b39c", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000b7080000000000007b8af8ff00000000b7080000070000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a500000003520600f8ffffff8520000001000000184b0000ffffffff0000000000000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0xcff4, 0x1000, &(0x7f0000001340)=""/4096, 0x40f00, 0x0, '\x00', r4, 0x18, r3, 0x8, &(0x7f0000000a40)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000a80)={0x1, 0xe, 0x2, 0xbac}, 0x10, 0x3bad, r3, 0x1, &(0x7f0000000ac0)=[r2, r2, r2, 0x1, r1, r1], &(0x7f0000000b00)=[{0x1, 0x2, 0x7, 0x4}], 0x10, 0xc}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext={0x976, 0xbef}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05005bf080030000000000000000000800000005", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r6}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2a, 0x6, 0x3, &(0x7f0000000580)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) 2.441365601s ago: executing program 0 (id=4781): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x84000, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x8, &(0x7f0000000040)=[{0x9, 0x8, 0x7f, 0x516}, {0x6, 0x3, 0x40, 0xffff8000}, {0x1, 0xff, 0x3e, 0x9}, {0x1, 0xff, 0xbe, 0x7ff}, {0x5, 0x0, 0x8, 0x6}, {0x200, 0xa, 0x0, 0x8}, {0x6, 0x7f, 0xfe, 0xb12}, {0x40, 0xf, 0x6d, 0x4}]}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x400}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000140)={'macvlan0\x00', @local}) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='blkio.throttle.read_iops_device\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000001c0)=0x8, 0x12) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)=@id={0x1e, 0x3, 0x3, {0x4e23, 0x4}}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000280)="35b7d5e7c2326c67b7bde2ded444274a4b520f8220435c4b71ca255d275df13b96b30e209f77dc3161a3bdfc4f207205763bea46db2c2587844810271ed324afd7502735472a495a38ff66cb7c9a84e9c8d98d", 0x53}], 0x1, &(0x7f0000000340)="af3d3d508e52b512fa5acd04806720161599c2557fba7358a2ff0fc292c502be74f415cbd2", 0x25, 0x800}, 0x4000005) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{0x1, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0x20, &(0x7f0000000800)={&(0x7f0000000680)=""/116, 0x74, 0x0, &(0x7f0000000700)=""/254, 0xfe}}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000880)='blkio.bfq.io_merged\x00', 0x0, 0x0) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000008c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x50) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000940)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x2}, 0x50) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x2}, 0x50) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a40)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xfffffff9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b40)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000ac0), &(0x7f0000000b00)}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x7, 0xf, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, [@map_idx={0x18, 0x8, 0x5, 0x0, 0xc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @alu={0x4, 0x1, 0x0, 0x5, 0xb, 0xffffffffffffffe0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000500)='syzkaller\x00', 0x6000, 0xe0, &(0x7f0000000540)=""/224, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, r5, 0xffffffffffffffff, 0x2, &(0x7f0000000b80)=[r6, r7, r8, r9, r10, r11], &(0x7f0000000bc0)=[{0x3, 0x1, 0x6, 0x2}, {0x0, 0x2, 0x4}], 0x10, 0x3}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000cc0)=0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001140)={r12, 0xe0, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000e80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000ec0)=[0x0, 0x0, 0x0], &(0x7f0000000f00)=[0x0], 0x0, 0xa2, &(0x7f0000000f40)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000f80), &(0x7f0000000fc0), 0x8, 0x94, 0x8, 0x8, &(0x7f0000001000)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x1a, 0xd, &(0x7f0000000d00)=@raw=[@map_idx_val={0x18, 0x8, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}], &(0x7f0000000d80)='syzkaller\x00', 0x6, 0xbd, &(0x7f0000000dc0)=""/189, 0x40f00, 0x12, '\x00', r13, @fallback=0x1d, r3, 0x8, &(0x7f0000001180)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000011c0)={0x2, 0x5, 0xd8, 0x5}, 0x10, 0x0, r6, 0x1, &(0x7f0000001200)=[r10, r11, r6], &(0x7f0000001240)=[{0x4, 0x2, 0x5, 0x5}]}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000013c0)={{r9, 0xffffffffffffffff}, &(0x7f0000001340), &(0x7f0000001380)='%-010d \x00'}, 0x20) r15 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000015c0)={0xffffffffffffffff, 0x3, 0x18}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001680)={0x11, 0x17, &(0x7f0000001400)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc03}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xc0}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x0, 0x2, 0x0, r14, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f00000014c0)='GPL\x00', 0xa9f4, 0x62, &(0x7f0000001500)=""/98, 0x41000, 0x48, '\x00', 0x0, @fallback=0x20, r6, 0x8, &(0x7f0000001580)={0x3, 0x5}, 0x8, 0x10, 0x0, 0x0, r5, r12, 0x2, &(0x7f0000001600)=[r7, r8, r15, r8, r8, r11, r6, r8, r8], &(0x7f0000001640)=[{0x0, 0x5, 0x7, 0x7}, {0x5, 0x5, 0x7, 0x5}], 0x10, 0x80}, 0x94) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000001780)={0x6, &(0x7f0000001740)=[{0xc3, 0x7, 0x1, 0x6}, {0x80, 0x6, 0x0, 0x7}, {0xfff9, 0xc, 0x6, 0x6}, {0x5, 0x91, 0x83, 0x4}, {0x6dea, 0xf, 0x7, 0x1}, {0xe35, 0x7f, 0x0, 0xd0}]}) r16 = openat$cgroup_subtree(r6, &(0x7f00000017c0), 0x2, 0x0) write$cgroup_subtree(r16, &(0x7f0000001800)={[{0x2d, 'hugetlb'}, {0x2b, 'cpu'}, {0x2d, 'net_cls'}, {0x2b, 'memory'}]}, 0x1f) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001900)={r8, &(0x7f0000001840)="f9ae20e04fdcf37099831a2155c43a748097004fa0226423dda9a11d79a90916e600755427c54ddc79d1ed72a529180dcfdb280799a5c3babdabd98f05f14f0f663f143f63aaac3c36c6669d537fea7ec0e8c41a4169c1ab", &(0x7f00000018c0)=""/48}, 0x20) syz_clone(0x40001100, &(0x7f0000001940)="cbb282c9ccf9998ad877f4318cbb66b0016dcd45608a4cbca30315c15d78bae791494e59e7f4fe3849c3f3343e07c67d963ffd557927241b9e292c90d183e0d2892cb3dc78c6055cc3b705c7bb4bf9e29a7154f2947eb7ff1fedc84499e7408b7bb9e485e10e8920894172b76568e2c1160d56ddb338710a55e7dec7a69c1824a590b38549ab69cf81b313a91fe0f715216227dde581741ce5a102167b271955fedc84cdc72d5182385bbd375d3a37b9b5aed9f055226da3f25cfea2d69011ebea3b8469", 0xc4, &(0x7f0000001a40), &(0x7f0000001a80), &(0x7f0000001ac0)="97b66cdbb48df414a2010da7969d1059e2b825573217f68f1a3c19808c96b41812f2b37713675c4bfbe252a255d4409af4e341e616b70c9298f015f8f3d9c5fa565c58464a71927e3de578ed22d5e1f13e6613ce2ebc992cd1007f099af7acd6c752c6367500f1d0aaebe688b8804359c6676658bca0c6ae7e2f7be8aa2d7a2baaf9a4519a8ac99728c84b58fa15e969156912ad0fab5e20daf13ea0e35d8f17a5b47801d7190d4db74aef45c59f16a28308b49577cf5d36a6") recvmsg(r1, &(0x7f0000001fc0)={&(0x7f0000001b80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001c00)=""/104, 0x68}, {&(0x7f0000001c80)=""/203, 0xcb}, {&(0x7f0000001d80)=""/54, 0x36}, {&(0x7f0000001dc0)=""/113, 0x71}, {&(0x7f0000001e40)=""/73, 0x49}, {&(0x7f0000001ec0)=""/124, 0x7c}], 0x6}, 0x20) 2.416879162s ago: executing program 3 (id=4782): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) (async) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x18, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) write$cgroup_int(r2, &(0x7f00000001c0)=0x60ff20038000, 0xfffffdef) (async) write$cgroup_int(r2, &(0x7f00000001c0)=0x60ff20038000, 0xfffffdef) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="0300000000000000000000000000000000000010"]) 2.367746863s ago: executing program 1 (id=4783): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000400000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'nr0\x00', 0x6132}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfe3a) 2.366173912s ago: executing program 2 (id=4784): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x25, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1e031800dd5c980128854d"], 0xffdd) 2.125031406s ago: executing program 2 (id=4787): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180), 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", &(0x7f0000000900), 0x5, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r6, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000500)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRESDEC=r0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYRES16=r4], 0x48) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000240)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x0, 0xfffff01c}, {0x6, 0x0, 0x2}]}) sendmsg$inet(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000200)="fa82", 0x6802}], 0x1}, 0x20000000) syz_clone(0xc0126080, 0x0, 0x0, &(0x7f0000002100), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000000000000000000000851000000200000020000000000000009500007b00000000850000006300001ea5a2009500000000"], &(0x7f00000000c0)='GPL\x00', 0x6, 0x92, &(0x7f0000000240)=""/146, 0x0, 0x0, '\x00', 0x0, 0x1f00}, 0x80) 2.046630168s ago: executing program 4 (id=4788): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2d, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r4, 0x40047451, &(0x7f0000000180)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001004900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r5, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000540)='ata_tf_load\x00', r7, 0x0, 0xfffffffffffffffb}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@fallback=r8, 0x13, 0x1, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0}, 0x40) r9 = openat$tun(0xffffffffffffff9c, 0x0, 0x1c1842, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xe, 0x9, 0xff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, @perf_config_ext={0x5, 0x100000004}, 0x14, 0xc8, 0xfffffffe, 0x0, 0x20007f, 0xfffffffa, 0x0, 0x0, 0x200d9, 0x0, 0xfffffffffffffffd}, 0x0, 0xd, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x1, 0x80000000, 0x2, 0x20000, r0, 0x200, '\x00', 0x0, r9, 0x2, 0x4, 0x3, 0xe}, 0x50) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340), 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r5, @ANYBLOB="000400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100000002000000000000000000000000000000c888f491"], 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0x20, &(0x7f00000008c0)={&(0x7f0000000840)=""/58, 0x3a, 0x0, &(0x7f0000000880)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000940)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x50) 1.93574355s ago: executing program 4 (id=4789): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x300) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r2, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], 0x0, 0x2d, &(0x7f0000000180)=[{}], 0x8, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0xb0, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) (async) bpf$MAP_CREATE(0xb00000000000000, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d0000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r4}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r5}, 0x10) (async) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r3, 0xffffffffffffffff}, &(0x7f00000002c0), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a518110000", @ANYRES32=r6], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000280)={'wg2\x00'}) 1.722022293s ago: executing program 4 (id=4790): mkdir(&(0x7f0000000580)='./file0\x00', 0xaa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x3, 0x10004, 0x5, 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x50) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000002d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xb, &(0x7f0000000180)=ANY=[@ANYRESDEC=r2, @ANYRESHEX=r4, @ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x1d, &(0x7f00000001c0), 0x4) openat$cgroup_subtree(r0, &(0x7f0000000440), 0x2, 0x0) r7 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000880), 0x12) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ced4fbd44e24eb0d34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3a06d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796efea77aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece72f2090000f44a3210223fdae7ed04935c3c90941576aebc8619d73415cda2130f5011e4845505000001000000004f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c040035cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bf463261135e24d154114df1381b02a0dcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f884cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e1700000000000000000000000000000000000000000000000000000520500002952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9a33c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a62415f78000000005f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c81c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b40824095135861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac00000b0000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e5dd921a5eadd4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293d5c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e602c28ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f257aac5af18d8c6b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e29b10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe8e4cd14dc5c1eb98b63198f6f830745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b51c34a5384f2cf51180c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af243b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380ecf1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734137ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f558982d57c556ca1427b5960b79990565ca2a20996fcba472213744d3a156979651596afde2b0089f023fcfccd072bd6ea8445fc787390d71ec61d5b7b0f05f6931914bf49aa0d66eff294271a93e32f54f281068514a4cd2d0700a43df59e9924e4affdbd22405e675e9d7cdc10546571131831d4dc8c8363077a908d9ae4f27ff095f5b07667f93a3573d3fabfca58ee0a6b6a691102bb3c7be4dc5b816853275e7ae8c13ec341bad15353fad794b46c4fd73e1b4cc78de2156cb158870d5b8446dae9ba5f7f244e6cf8f6791671057347208a313ebbcb72b04706005670f2b0055e440d72c7c3316982c6ebe8675458cf6bb393b007f5cedb7bc411834600000000000000000000000000a20071b07d568a8150ed646b4978d0226d9651647a5999ae7c7c85322a215fcdb1adbad63499518fe0d10145d430422c78367dfa941f74b63f3884565ac89c673da2c2b1172be5f2cd1f3f453ebddd432bd24c73fa773b739e20fcec16a821230654a383ac1868495f67d942c772ca75e09073dbe9307ff5cac7c2c411149a4d989a8a019e068da218d4bc34e4102fd2f97397331e4cd70b4915582b635f07ca87f00dc929f902540f565c20add8675b79e005cf0277d954697317b907b77fa5d6b7feaebaf676a2a37de8aa70748fee4bc198ffd3e2de11eb0eff896fd94de0805ba6b1054a7b3e300d4581e9af62a1ecaee96d2819b3d192e5b9561eb622da25450f586be14017a1cf74f89a1dd18af004decfe266134c3d036ae7996931fe6008a73ed34c35f0da4ffee1fe63bc1af6ef1b4731d50b8ceb582a1e9c6e8d97f8290cc105754f592d16ccdb1df8636d7ca5e372cea97dd0f005cc7092b126dd46758917fb0d94b8483d403bd451429cc1660f0b5a529d8134dc2702f6d8e2f943d98fbe50a3ba653f13f98a00fcbf311f9758ade8e4eb87b4b9fb2d387f5d8c4bdcab2fff9ed8c9de961fd831a070381c8020352fea7c334b2959ddd956701a7ea415e224a81c9fa1ebbabe74f7743e09b6c8b72650b51d5c2000ef3679c039b3604374fc1af7ab354204afbd24f0e701bc08a98452ce2668617e85e0d876f5a8b6d9b777f1c384d8a9883e4262defb6b9aab8d5b76bc91ca50f87966797da2499ca0ac76707c0408a7b6d8708fe7714988babdc11f"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r8, 0x18000000000002a0, 0x26, 0x0, &(0x7f0000000080)="b9ff03076808268cb89e14f089061be0ffff00fe4000632f77fbac141416e000000162079f7d", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x40}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000400)='bcache_alloc\x00', r1, 0x0, 0xfffffffffffffff7}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) 1.595254875s ago: executing program 0 (id=4791): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x34000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2, 0x6}, 0x0, 0xc8, 0xfffffffe, 0x0, 0x9, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={0xffffffffffffffff}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000004c0)='fsi_master_aspeed_opb_read\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000006c0)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000340)}], 0x1, &(0x7f0000000780)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xaaf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}], 0x80}, 0x40) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x3, 0x0, 0x0, 0x8000}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x10, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@call={0x85, 0x0, 0x0, 0x7d}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xc, &(0x7f0000000500)=ANY=[@ANYRESDEC=0x0], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) 1.529383796s ago: executing program 1 (id=4792): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000400000004"], 0x48) close(0xffffffffffffffff) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r9], 0x18, 0x4000800}, 0x8810) sendmsg$unix(r7, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r9], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r9) close(r10) sendmsg$unix(0xffffffffffffffff, 0x0, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) close(r0) 1.528288546s ago: executing program 3 (id=4793): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYRESOCT, @ANYBLOB='_\x00\x00'], 0x48) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdbe30d0b2b4f1a0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@struct={0x7, 0x0, 0x0, 0x4, 0x1, 0x4}]}, {0x0, [0x5f, 0x5f, 0x30, 0x30, 0x0, 0x2e, 0x0, 0x2e]}}, &(0x7f0000002340)=""/4096, 0x2e, 0x1000, 0x0, 0xf1, 0x10000}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)=@generic={0x0, r2}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_freezer_state(r0, &(0x7f0000000080), 0x2, 0x0) write$cgroup_freezer_state(r3, &(0x7f00000001c0)='THAWED\x00', 0x7) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x12}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a80)=@generic={0x0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) 1.489770456s ago: executing program 2 (id=4794): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xb, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000731122000000000016000000000000009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x83, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={@fallback=r0, 0x24, 0x0, 0xfffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='/proc///\x00\x82q\xee\x00!\xbd\xc2\x98#YP\xee\x9c2G\xf0\x81x\x97'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/net\x00') mkdirat$cgroup(r1, &(0x7f0000000040)='syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xb, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000731122000000000016000000000000009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) (async) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x83, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={@fallback=r0, 0x24, 0x0, 0xfffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='/proc///\x00\x82q\xee\x00!\xbd\xc2\x98#YP\xee\x9c2G\xf0\x81x\x97'}, 0x30) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/net\x00') (async) mkdirat$cgroup(r1, &(0x7f0000000040)='syz1\x00', 0x1ff) (async) 1.395835658s ago: executing program 0 (id=4795): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0x1, 0x58, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/195, 0xc3}, {&(0x7f00000001c0)}, {&(0x7f0000000340)=""/55, 0x37}, {&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000380)=""/27, 0x1b}], 0x5, &(0x7f0000000440)=[@cred={{0x1c}}], 0x20}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1a00000009000000070000000400330001000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00 \x00'/20, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="02000000030000000100"/28], 0x50) 1.361792708s ago: executing program 3 (id=4796): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000180)=r0, 0x4) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", &(0x7f0000000900), 0x5, r6}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r7, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000500)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRESDEC=r1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYRES16=r5], 0x48) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000240)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x0, 0xfffff01c}, {0x6, 0x0, 0x2}]}) sendmsg$inet(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000200)="fa82", 0x6802}], 0x1}, 0x20000000) syz_clone(0xc0126080, 0x0, 0x0, &(0x7f0000002100), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000000000000000000000851000000200000020000000000000009500007b00000000850000006300001ea5a2009500000000"], &(0x7f00000000c0)='GPL\x00', 0x6, 0x92, &(0x7f0000000240)=""/146, 0x0, 0x0, '\x00', 0x0, 0x1f00}, 0x80) 1.361201348s ago: executing program 2 (id=4797): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='mm_vmscan_lru_shrink_inactive\x00', 0xffffffffffffffff, 0x0, 0x7}, 0x18) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000006500000008"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020703400000000002020"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) close(0xffffffffffffffff) mkdir(&(0x7f00000001c0)='./file0\x00', 0x45) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xe}, 0x8, 0xc8, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedbf790700117df37538e486dd6317ce22800000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781c2"], 0xfdef) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 1.022084354s ago: executing program 1 (id=4798): openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) (async) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) (async) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000a40)}], 0x1, 0x0, 0x0, 0x2044}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) (async) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="000000000001000000ed000000000010444000000cfb18fbf9cbbf216c732686d6cb55927908f569609c25a820b6dff371fd8e84a11391568151a53e39e03044e3510fc1d4485af37a898739590b01f20aec06894bb8ae4c34a54b236fa5dacfe792f05bee5f8f27c6c9ea7f6ce9", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f00000002c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) (async) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001400) (async, rerun: 32) ioctl$TUNSETOFFLOAD(r4, 0x8004745a, 0x2000000c) (async, rerun: 32) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x3}, 0x48) (async) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async, rerun: 32) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (rerun: 32) close(r7) (async) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) (async) r9 = gettid() perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0xf4, 0x0, 0x0, 0x40, 0x0, 0x7fffffff, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x340, 0xc2, 0x0, 0x4, 0xc, 0x0, 0x0, 0x0, 0xfffffffc}, r9, 0xe, 0xffffffffffffffff, 0x0) 985.840084ms ago: executing program 4 (id=4799): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b80)={{}, &(0x7f0000000980), &(0x7f0000000b40)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000001200000000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, 0x0, &(0x7f00000005c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000001c0)={0x2}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x3c56, 0x1, 0x2}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf79d}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280), &(0x7f0000000640), 0xffffffff, r3}, 0x38) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000540)='./file0\x00', 0x0, 0x10}, 0x18) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1f, 0x1, 0x2, &(0x7f00000003c0)) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 930.078685ms ago: executing program 1 (id=4800): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)={'bond_slave_1\x00'}) socketpair(0x3, 0x3, 0xa41, &(0x7f0000000080)={0xffffffffffffffff}) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={0xffffffffffffffff}, 0x4) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="98c5fd124463ffac110c93af35a6e5e0e30d618fec9b58ca688a5c30c3158b9b87ffe82e11469e2a293d3c750b840bebdce4f49d577ce4f24c5374472f13acf90181fb485ab7e5c697a83f8d22b5f499db4a2df5ccb84df499b566ddd19247c6e6a4ef0ac9216271c609b84948b1ec7c9bcc5204678ffd9fcd909c1e66898028ad3a0cfbce0ddb654b7d3c6b22c21233fc25120ca28195fe5744212f1a041ae7e7fe513a70d93ff776021046d7c3fe4554321a03e5c210e6362677b23c316bb3c1c144805dd30851393b3f22be75fb02d2135d23dd85db0ba05a58a3644c5d7d9410530ebd45a7", &(0x7f0000000240)=""/189}, 0x20) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000340)=r0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000380)=r2, 0x4) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000000400)='memory.swap.max\x00', 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r3, 0xffffffffffffffff}, &(0x7f0000000440), &(0x7f0000000480)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x8, 0x8, 0x8, 0x8, 0x400, r3, 0x0, '\x00', 0x0, r3, 0x0, 0x5, 0x4}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='spi_message_done\x00', r3, 0x0, 0xc0d}, 0x18) syz_clone(0x9010800, &(0x7f0000000600)="7d853611bd8d9320820738a3be7e17199f7880940299e49da50754175decb83ff7af1dd656ea9d76c0750cb3f10788b423b3fde28c36941a1db8902de14e27ebd1649ddf03f32ba6c14151ca6382c0eb57fa3b4a931d6495327ee463e97347500bd3f410f54bbda7b3d5953034", 0x6d, &(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)="c04a126a8d1fa4c1ef8315baffa908") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000740)="3dfe9e91d756cb35afc2eef9bb00e2d1f847e621c0d8d2cf1ab3f66b2ac5a1d6075ccbcc51d52269c9c1cb3eaea897fb8a2ed21d58", &(0x7f0000000780)=""/120}, 0x20) r6 = syz_clone(0x1321400, &(0x7f0000000900)="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", 0x1000, &(0x7f0000001900), &(0x7f0000001940), &(0x7f0000001980)="5e32c0d6dd36b606b972d0d32f7b3846d67e8e59268fc788aeb6cc8c61cade52a7d30d1b606cd5ec6b85f77f368f9005c8c78a878aeeb870062bc6e2f967ba128c2dd6648039958b4659ac31a97b") r7 = perf_event_open(&(0x7f0000000880)={0x2, 0x80, 0x7, 0x4f, 0xff, 0xa, 0x0, 0x8, 0x8840, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000840), 0x8}, 0x10008, 0x403d, 0x4, 0x0, 0x0, 0x564, 0x8, 0x0, 0x1, 0x0, 0x8}, r6, 0x5, r3, 0x2) socketpair(0x15, 0x2, 0x983, &(0x7f0000001a00)) write$cgroup_freezer_state(r3, &(0x7f0000001a40)='FROZEN\x00', 0x7) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001b80)={&(0x7f0000001a80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x74, 0x74, 0x4, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5, 0x24}}, @struct={0x9, 0x2, 0x0, 0x4, 0x1, 0x6, [{0x2, 0x5, 0x100a0130}, {0x8, 0x0, 0x9}]}, @restrict={0xf, 0x0, 0x0, 0xb, 0x5}, @var={0xc, 0x0, 0x0, 0xe, 0x2, 0x2}, @var={0xe, 0x0, 0x0, 0xe, 0x5}, @fwd={0x7}]}, {0x0, [0x986d594f03e7307b, 0x2e]}}, &(0x7f0000001b40)=""/46, 0x90, 0x2e, 0x0, 0x40}, 0x28) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001bc0)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x7, '\x00', 0x0, r8, 0x1, 0x5}, 0x50) r10 = openat$cgroup_subtree(r3, &(0x7f0000001c40), 0x2, 0x0) write$cgroup_subtree(r10, &(0x7f0000001c80)={[{0x0, 'rlimit'}, {0x2d, 'cpu'}, {0x2b, 'rlimit'}, {0x2d, 'net'}, {0x2d, 'rdma'}, {0x2b, 'net_cls'}]}, 0x29) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d40)={r2, 0x58, &(0x7f0000001cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x7ff, 0x7fffffff, 0x6e60, 0x20100, r5, 0x5d4, '\x00', r11, 0xffffffffffffffff, 0x1, 0x2, 0x5, 0xc}, 0x50) syz_clone(0x42804800, &(0x7f0000001e00)="e5045716aabb4695e8b6bce029bb0fade448b38dec5baaf50c6ce71f4fb76121bd0a11293519fefe573da9472927c086b90f591b98070296c839eae23b07b7e97f8beee86649e26805a77728fb1a8054f9f80d59443b233f6d29edcbca6c313b2aa5a7a30da1d9893d0fb00e77e4a2cfe298c312b04629cae7daa7d129a812608c5e22119b68061a623d86c02c05a1b69b835430efbeecf58b7be973909aa61804355cd6019caa4b22b87ca370258825231ae8d69f743474d6ad2d6d98a3dcac15124776939c8b3073ebe815e6d56e6b62e4a611a0566a2acecb54b3b505bac842bc07", 0xe3, &(0x7f0000001f00), &(0x7f0000001f40), &(0x7f0000001f80)="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") ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000022c0)={0x11, 0xb, &(0x7f00000020c0)=@raw=[@generic={0x2, 0x4, 0x0, 0x8001, 0x9}, @jmp={0x5, 0x0, 0x1, 0x8, 0xa, 0xffffffffffffffe0, 0x8}, @jmp={0x5, 0x0, 0xd, 0x8, 0x6, 0xfffffffffffffffe, 0xfffffffffffffff8}, @jmp={0x5, 0x1, 0x2, 0x9, 0x9, 0xffffffffffffffc0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r12}}], &(0x7f0000002140)='GPL\x00', 0x8, 0x70, &(0x7f0000002180)=""/112, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000002200)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000002240)={0x3, 0x0, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002280)=[r5, r9], 0x0, 0x10, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002380)={&(0x7f0000002080)='objagg_obj_destroy\x00', r13, 0x0, 0x2}, 0x18) 745.563038ms ago: executing program 1 (id=4801): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000000062875df7bd1ff42082d32d3e0cd7"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0xe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001780)={r4, 0xe0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000400)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6, &(0x7f00000014c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xde, &(0x7f0000001580)=[{}, {}], 0x10, 0x10, &(0x7f00000015c0), &(0x7f0000001600), 0x8, 0x7d, 0x8, 0x8, &(0x7f0000001640)}}, 0x10) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r7}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001ac0)={r4, 0xe0, &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000001800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa, &(0x7f0000001840)=[0x0, 0x0, 0x0], &(0x7f0000001880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8f, &(0x7f00000018c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001900), &(0x7f0000001940), 0x8, 0xf3, 0x8, 0x8, &(0x7f0000001980)}}, 0x10) r9 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001b40)=@o_path={&(0x7f0000001b00)='./file0\x00', 0x0, 0x18, r2}, 0x18) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000400121001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000002000083850000007100000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001c40)={0x1e, 0x11, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5c426202}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@alu={0x7, 0x1, 0x0, 0x6, 0x3, 0x0, 0x10}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0xc7}}}, &(0x7f00000003c0)='GPL\x00', 0x4, 0x1000, &(0x7f00000004c0)=""/4096, 0x41000, 0x11, '\x00', r5, @sk_lookup, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000017c0)={0x4, 0x2, 0x6, 0x1}, 0x10, r8, r9, 0x8, &(0x7f0000001b80)=[r1, r1, r1, r1, r1, r1, r10, r1, r1], &(0x7f0000001bc0)=[{0x4, 0x1, 0xe, 0x4}, {0x0, 0x2, 0x4, 0x1}, {0x0, 0x5, 0x6, 0x6}, {0x4, 0x3, 0x4, 0x9}, {0x3, 0x5, 0x4, 0x5}, {0x0, 0x4, 0xd, 0x6}, {0x0, 0x4, 0x0, 0xb}, {0x0, 0x4, 0x0, 0x4}], 0x10, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000010000004000000020"], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8911, &(0x7f0000000000)={'veth0_vlan\x00', @random="08f272f808af"}) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'veth1_to_batadv\x00', @random="60b653e4357d"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r12}, 0x10) syz_clone(0x42080000, 0x0, 0x0, 0x0, 0x0, 0x0) 615.89268ms ago: executing program 2 (id=4802): r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x9b47, 0x30100, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x7}, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000001240)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcR\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacV\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x80\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96\xb0\xca\xfcq1\x82\x13\xee=l\xaf\xd6\xebU\x0eH\xd3\xbe\xd7&\xfd.\xc4s\xf2\x18\x89\xa1\xb6\xe7\xf6n\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xc6\xb0og\xbb\x84\xf7\xfbJ>.\xf4D@\xc3\xf2\xa1\xd2$\'v\x17\xa1\x04\x87\xdd\x97f\xb3C\x82\x9b\xb7\x03\xe8=<:\xc6\xdeP3\x99T\xf6\x9d\xc5WX\nt{\x8f\x0f#^\xf8 \xe6\xcdF\xd3\xa6\xf3\xf0~\rdN\x92\xb3\x92\xb4\xcf\x1a\xb2\xb4\xc5\xc3!|s\xd4\xfc\xecv\xae\xb6\xff\xd8\xe8\xfd\xeb\xc0\xd8\x02\x17]\x92\\\xe1\x15\x7f1Q\xa0\b\xe4\xd9\xcb\xec\x17t\x8ax,P\x00\x02\x89^~\xb5<\xb1\xd6z\xde\xea\xd1\xca\xa4\xf0:\x86\x19\xbb\"\xc1:\xca\xe1\x1d\xed\x0e^\xeb\x1f\x9a\xa61&\xe9\x8e\xa0\x17\x03\xaaPt\x8d\xc9\f]%\xc3\x9bS\xc3\xfd\x18\x1a\xb5C\xeb\x00s\x9ey\xf3+\x14\xbc\xef\xb72\x83\x8f\x0e\xb74\xed.\'\x15{rz\x10\x87\xc4vM\xf3\x16^68\x1e\v\xac\x00\x00\x00\x00\x00\x00\x00\xab9\n/\xef\xbc\x1b\x19\x15#\x99z)\x1d9\xfcv\xf3I\x0f\x8f\xbeM\xbb\x13\xe9f\xfa\xa9\xfes\x14W\xb1\x1aC\xa5@a\x1d\xc43Sh\xa3\x93n \xb2\x01O^-\x9cj\xb806\xa9\x98\x95_#7\x9a[\xd8\x10\xec\xc0|B\xd9\xba\xd1u\xd3\xb4\xfeZq\x9f\x8eN\xa22(\xdeBa)\xc4\'\xeck\x9aD\f\xf4%\xb0\xf8\xfc\x1di+H\x88TOJ\x87\x01\xd63\x8e\x82\x82\x9a\xf0\v\x9b\xbf\x03t=B\xfe\xd4]\xab(\xd65\xaf\x8c\xe5\xa0\xd3\xfdZX5\x03\x03\x98pI\xb1_\xccr\xa0\xf2u\xd2\xc00\'\x92(\xad4\x9a\n\x84\x95\x18\xf7\x8cw\xd1\xd6\xc8\xd17\x18\xa7\xfb6a\xe9\xa06q.\x8bl\x8f\"\xf2\xe3\xedA\n\x19\x1c\xd9\\\xed\xe1P\x15K\x04\xa6\xc3>\xc8\x1c&\x9c\xa5\xban\x90)Y\xeda\xeep/\xf7\xb0\f\xcf\xdc\xba \x12\xc2\xa1\xc4\xed5W\x13Uv\xd7\x06\xea\xac\x1c\xecb\xb2M\xaa\xb3\xa7\x9a\xf4\xbe\x06\xa1w\xf7\x86\x06\xa7T\xeb\xc6U\x1b\x9f\xa7\x98\xd5}\xa4\xe7s\xe0\xb8\xd5\x88\xde\xc2}\x9dB\xd8\xad\x16\xd6\xc8\"\r\xbf\x0e \xa55Yh\x04_`b\x04\xe9\x8b\x9a\x13\xe2\x9d\x1e\x1d\xb6,j\x8e\xf1+^\x9by.\x9c\x14-\x12h\xfb2\x1a\xca\x17r\x11t\x06\n\xae\x1e4\x94:\x1a\x00\xb8\xff9G\xa7\x16\xe3\x13VvD\x113\xeaN\xa2\n\x8b-a\xe31K\xb4s\xb0\xa9\xa8\xf3') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x30000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0xd0a, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r4, &(0x7f00000004c0)=ANY=[], 0xfdef) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 534.562561ms ago: executing program 0 (id=4803): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r2}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000a00)="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", 0x1000}, {&(0x7f00000004c0)="2efc31c880de0517ca97d6811804d522f3e6b9ea7c52d89fc59e2354e442a0c8939d8682979087b9536de3c45203e5201c7a177c7d8b04f5d86759efd5af2c5aab89528f6f6893b0527debf5605e3964dd37da09ce897d4685f4784efde0f33492fa348fa4b3b5d8d3cfe14ec528211b174f46edf0912cc7bca4589a61fb887ecfa74fe50dd7489dc4a1728b1b8dc6f635fd74e7d605c6d69a7f2af9e450fc6c8f3cbcab356f89097c1f083d1a395f9a5097f7d01c39ab397b98a34866760da89b233e4ad47244afd160df540dce5b30239e8acc26d77349364190d5f5ede3a6850e1a1e00a8075e9440af48ed4c9d", 0xef}], 0x2, &(0x7f0000000740)="a7fa682e14dfe0792623be2ade878749a8cb03e60afe9bc6f0d621229959efba6dedce27dd164606de75a991931f3df10577651bee29ec372695d41d8ab10cb169abb9a09ea7c65a007290580069481dbf2a9f554da1c71a47c08a3d0387e2dd3d04ac22ea9b349124c9422af3c41c8c0b2725cf8481c4c84ccd70e44e30e88fc946074699b7220282c227bdb585e9732f6c3d899b62a607ae29c4ecb5f8b5c46647e9f83539d96b10db0e", 0xab, 0x80}, 0x4000080) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8264, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x4, @perf_config_ext={0x1eb, 0x10001}, 0x2010, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x16, 0x18, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70500000800000085000000730000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r8, 0x0, 0x10, 0x38, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r10}, 0x10) close(r5) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r11, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 516.471142ms ago: executing program 2 (id=4804): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000005"], 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.freeze\x00', 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYRES64=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0xce8a, '\x00', 0x0, r1, 0x1, 0x3, 0x2}, 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x20, 0x0, 0x7, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400, 0x0, 0xfffffffd, 0x0, 0x5}, 0xffffffffffffffff, 0x4000000000008, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) 318.609875ms ago: executing program 32 (id=4804): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000005"], 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.freeze\x00', 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYRES64=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0xce8a, '\x00', 0x0, r1, 0x1, 0x3, 0x2}, 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x20, 0x0, 0x7, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400, 0x0, 0xfffffffd, 0x0, 0x5}, 0xffffffffffffffff, 0x4000000000008, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) 285.283815ms ago: executing program 0 (id=4806): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0e00000004000000040000000900000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000400000002add0b"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r3}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) 281.386475ms ago: executing program 33 (id=4806): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0e00000004000000040000000900000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000400000002add0b"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r3}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) 65.617009ms ago: executing program 3 (id=4807): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_GET_PROG(0x7, 0x0, 0x406) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x20141, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaa0d, 0x2}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10000000007}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000007000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYRESHEX=r4], 0x36) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) 64.500399ms ago: executing program 34 (id=4807): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_GET_PROG(0x7, 0x0, 0x406) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x20141, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaa0d, 0x2}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10000000007}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000007000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYRESHEX=r4], 0x36) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) 23.158759ms ago: executing program 4 (id=4808): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000840)=ANY=[@ANYBLOB="1d45420788a4ea10667d3d3377f8fa38df40392dff89ea3840218c58e07d57aa0bacfde9e3046e7b9fa14bca93c5192783051debe058de0bc85536ff81d6dc7f7845e3279f57c2152a33a3406ffe711bbd5635af5f05ac19f059ce71ed2a946d71b01ab791a898d1f29b0a31092fba9b1c2e8cbf1218c21929c06fc8128f81893fb6d5cec75e76b69b25fe3859338ec362b1d60fee9c2d6f06cb0c1df0e43a33928154e38a8f44dc08cc9134513e17e3fae0219ffd7dbd1e209d7e6a73c979ec499db7cc", @ANYRES32, @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r3}, 0x18) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000540), 0x4) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x10) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_netprio_ifpriomap(r5, &(0x7f0000000280)={'pim6reg0', 0x32, 0x35}, 0xb) bpf$PROG_LOAD(0x5, 0x0, 0xfffffdf0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1f, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x3, 0x1, 0x2, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x6, 0x80, 0xb, 0x10040, r0, 0x8, '\x00', 0x0, r5, 0x1, 0x5, 0x3, 0x2, @void, @value, @value=r5}, 0x50) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x920, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x208, 0x20000000, 0x0, 0x9, 0x0, 0xffff0000, 0x0, 0x0, 0x62c0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) 843.56µs ago: executing program 4 (id=4809): bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000001b0018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000800)='kfree_skb\x00', r1}, 0x10) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r2}, 0x10) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (rerun: 64) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0xe, &(0x7f00000020c0)=ANY=[@ANYBLOB], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b07080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289e01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302000000b0eea24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf5af51d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce41fd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41c8c12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f45f90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a9f9b444aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000000000d6d5210d7503000000a87a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e873f8703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd70400000000946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009556237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945ecefa26b8471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b0fdf9743af932cd6db49a47613808bad959710300000000000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d8af9753387e0cd8d718f54a29df6eba3bd4c440e6e2172e3fcc01b8babb757b5c59217b80d0db3ba582814a604e4ef7a803e9ca7c85b35c9b93a9e0885e238b44ae1c2e64cce3b27083b8246829e64056000302bffff15405bd5f2eba20000000000000000000000000000000000009a9823fd8fbc5aa16509945ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1f85ab030e788d38788ee5b5428d4a971cc97db9fd231088e570735ce129e7e77fc2777692664a1488fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b24052137e9637f3efbab71720f88c3c44b3b7486f979e8a3174b531f573fe0e5239c000be2733c49546f6e8a9175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf0155a39f97580e079175426c088a0208040982a0000000000000000000000000051ceaaf0159fe61f2eade7603d0a7a56fb09cd119ac06adb6597155ae47846892bb423c024d8cbe9240b71ec6dc2124d3a19e2d714b273d95d1d3aa737cb04a33615ff2a730e51067d5d675d7122361c37c61a43b5afd865b60d4cae891b73220f17d25985a7f76834995e53a93a1c7b9eef267df691ca983a0b15bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c697724c057d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2df27c0cb8a67ad026bf953e88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9493b963f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7ffa06ca861551189d155bd077a79fe2c7e961352e56824f727d21d41eae78bfec4a2d7a7edbc8ef958c5ea599f7c25bf71c2340558aa12fdd24a88aaad5921aee7dae6a2f3009d9cb43ab4898d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a72e1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8525611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c721b7ea4544bf51c95c86fcac1f434d09d1ee4928aafe23de66fed972e0dddfb33f64e48701b049239e7f552d816441d11c4c2647c014462344359198d97c4b6e9ed31ca18987b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a03b085abf3e8e3efc842a8d328733461f04c99607061c65ed14c61322a5ac2d371a95b8ad867ec92d13a4fa4ae033a09673866cd77f4bcdaaa05207166b19a8758d8855400d8c6a7242dc207251e8797eca24ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a268921738938aa9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e3ad001b072b1a751b588ac4639f35a58e00a50c0270608c7a7f10132b1c25b9ea81232fbef665f6212f875b2a0000000000000000000000000000cf7b6c4ba9bec153d6834bfef080df374703a8ff56a63ec1fe5f2e05a79e3cace7283dd68d41e94420c325fe4dae144fde5ec25a87d625cab20753a77b323fa3783c8b675859b9012647885a242adfee2fe812ecbe5191e0a15142f7349e7627cc39d724e2e34e7a24154f26ae3125b36d0504965295d0453902ac7079b11a3a1e655e482331e3dc35b2e7e4e3ea99064fe5b9c8ae0ca3e5fd653f3286a99d81ce4eba765c38d097391ad4babac38ce5b4344e24a361cd54e5"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r6}, 0x10) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000010700000000", @ANYRESHEX=r4, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000580)={r7, &(0x7f00000001c0)="7c090480d698e99b57b1cee6abfeb75b7a36bdaf3a51f0a4ba8745ebbcecc14c9464524a010c479da03d5a6b47b22c05c7d2b86e893374ede9ce888753225bd32a42a730a97b6a4b591fe71c815dc9fb9551a281734234485d00d381f31960028e4f0f35f364b92d61b8e73489f3a7"}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc0a1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB], 0x48) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYRES8=r7, @ANYRES16=0x0, @ANYRESHEX=r5], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000340)='xprtrdma_marshal\x00', r8}, 0x18) (async, rerun: 64) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000640)) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3fffffc}, 0x94) (async, rerun: 64) perf_event_open(&(0x7f0000000100)={0x8, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64) 0s ago: executing program 35 (id=4809): bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000001b0018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000800)='kfree_skb\x00', r1}, 0x10) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r2}, 0x10) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (rerun: 64) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0xe, &(0x7f00000020c0)=ANY=[@ANYBLOB], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r6}, 0x10) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000010700000000", @ANYRESHEX=r4, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000580)={r7, &(0x7f00000001c0)="7c090480d698e99b57b1cee6abfeb75b7a36bdaf3a51f0a4ba8745ebbcecc14c9464524a010c479da03d5a6b47b22c05c7d2b86e893374ede9ce888753225bd32a42a730a97b6a4b591fe71c815dc9fb9551a281734234485d00d381f31960028e4f0f35f364b92d61b8e73489f3a7"}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc0a1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB], 0x48) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYRES8=r7, @ANYRES16=0x0, @ANYRESHEX=r5], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000340)='xprtrdma_marshal\x00', r8}, 0x18) (async, rerun: 64) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000640)) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3fffffc}, 0x94) (async, rerun: 64) perf_event_open(&(0x7f0000000100)={0x8, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64) kernel console output (not intermixed with test programs): 887][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 87.444644][ T1684] syz.1.345 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 87.458532][ T1684] CPU: 1 PID: 1684 Comm: syz.1.345 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 87.469758][ T1684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 87.479811][ T1684] Call Trace: [ 87.483125][ T1684] __dump_stack+0x21/0x24 [ 87.487465][ T1684] dump_stack_lvl+0x169/0x1d8 [ 87.492142][ T1684] ? show_regs_print_info+0x18/0x18 [ 87.497454][ T1684] ? ___ratelimit+0x3d1/0x560 [ 87.502153][ T1684] ? __kasan_check_write+0x14/0x20 [ 87.507273][ T1684] ? _raw_spin_lock+0x8e/0xe0 [ 87.511968][ T1684] dump_stack+0x15/0x1c [ 87.516128][ T1684] dump_header+0xdd/0x650 [ 87.520455][ T1684] oom_kill_process+0x1fa/0x2c0 [ 87.525309][ T1684] out_of_memory+0x94a/0xd70 [ 87.529896][ T1684] ? unregister_oom_notifier+0x20/0x20 [ 87.535372][ T1684] ? mutex_lock_killable+0x8c/0xe0 [ 87.540517][ T1684] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 87.547024][ T1684] mem_cgroup_out_of_memory+0x260/0x310 [ 87.552567][ T1684] ? mem_cgroup_oom_trylock+0x350/0x350 [ 87.558114][ T1684] ? _raw_spin_lock+0x8e/0xe0 [ 87.562789][ T1684] ? _raw_spin_trylock_bh+0x130/0x130 [ 87.568152][ T1684] ? _raw_spin_unlock+0x4d/0x70 [ 87.572997][ T1684] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 87.578533][ T1684] ? _raw_spin_unlock_irq+0x4e/0x70 [ 87.583725][ T1684] try_charge+0xf61/0x14e0 [ 87.588137][ T1684] ? __memcg_kmem_charge+0x140/0x140 [ 87.593423][ T1684] ? percpu_counter_add_batch+0x13c/0x160 [ 87.599135][ T1684] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 87.604705][ T1684] __mem_cgroup_charge+0x14c/0x6d0 [ 87.609846][ T1684] shmem_add_to_page_cache+0x55e/0xe10 [ 87.615317][ T1684] ? shmem_alloc_page+0x300/0x300 [ 87.620345][ T1684] ? _raw_spin_lock_irqsave+0x110/0x110 [ 87.626023][ T1684] ? find_lock_entry+0x4b/0x200 [ 87.630905][ T1684] ? lru_cache_add+0x164/0x380 [ 87.635683][ T1684] ? shmem_getpage_gfp+0x8f3/0x2110 [ 87.640881][ T1684] shmem_getpage_gfp+0x8e8/0x2110 [ 87.645909][ T1684] shmem_write_begin+0xce/0x1b0 [ 87.650753][ T1684] generic_perform_write+0x2be/0x510 [ 87.656034][ T1684] ? atime_needs_update+0x5b0/0x5b0 [ 87.661229][ T1684] ? grab_cache_page_write_begin+0xb0/0xb0 [ 87.667025][ T1684] ? file_remove_privs+0x580/0x580 [ 87.672129][ T1684] ? __kasan_check_write+0x14/0x20 [ 87.677321][ T1684] ? down_write+0xac/0x110 [ 87.681740][ T1684] __generic_file_write_iter+0x24b/0x480 [ 87.687370][ T1684] ? generic_write_checks+0x3d4/0x480 [ 87.692741][ T1684] generic_file_write_iter+0xa9/0x1d0 [ 87.698135][ T1684] __kernel_write+0x55a/0x910 [ 87.702806][ T1684] ? vfs_read+0xa10/0xa10 [ 87.707148][ T1684] ? populate_vma_page_range+0xf0/0xf0 [ 87.712603][ T1684] ? __kasan_check_write+0x14/0x20 [ 87.717734][ T1684] ? get_dump_page+0x46b/0x5b0 [ 87.722494][ T1684] dump_emit+0x240/0x360 [ 87.726732][ T1684] ? wait_for_dump_helpers+0x390/0x390 [ 87.732189][ T1684] dump_user_range+0x6a/0x1a0 [ 87.736857][ T1684] elf_core_dump+0x278a/0x2bc0 [ 87.741622][ T1684] ? load_elf_binary+0x2890/0x2890 [ 87.746744][ T1684] ? __fsnotify_parent+0x5ff/0x6c0 [ 87.751849][ T1684] ? shmem_unused_huge_scan+0xa0/0xa0 [ 87.757239][ T1684] ? do_truncate+0x1ad/0x210 [ 87.761824][ T1684] ? putname+0xfe/0x150 [ 87.765978][ T1684] ? __kasan_check_read+0x11/0x20 [ 87.771023][ T1684] ? __ia32_sys_unshare+0x40/0x40 [ 87.776048][ T1684] do_coredump+0x1ac9/0x27f0 [ 87.780636][ T1684] ? simple_acl_create+0x1c0/0x1c0 [ 87.785739][ T1684] ? bpf_trace_run2+0xb8/0x200 [ 87.790500][ T1684] ? get_signal+0xb98/0x12e0 [ 87.795083][ T1684] ? ____kasan_slab_free+0x130/0x160 [ 87.800370][ T1684] ? kmem_cache_free+0x2ac/0x2d0 [ 87.805300][ T1684] get_signal+0xf23/0x12e0 [ 87.809717][ T1684] arch_do_signal_or_restart+0xbf/0x10f0 [ 87.815355][ T1684] ? __send_signal+0x8b8/0xb80 [ 87.820128][ T1684] ? send_signal+0x479/0x5b0 [ 87.824714][ T1684] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 87.830350][ T1684] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 87.836151][ T1684] ? force_sig+0xb5/0x100 [ 87.840471][ T1684] ? send_sig+0x70/0x70 [ 87.844625][ T1684] exit_to_user_mode_loop+0xa2/0xe0 [ 87.849817][ T1684] irqentry_exit_to_user_mode+0x4e/0x80 [ 87.855358][ T1684] irqentry_exit+0x12/0x60 [ 87.859765][ T1684] exc_general_protection+0x1ca/0x250 [ 87.865130][ T1684] ? asm_exc_general_protection+0x8/0x30 [ 87.870754][ T1684] asm_exc_general_protection+0x1e/0x30 [ 87.876295][ T1684] RIP: 0033:0x7f137f7ee931 [ 87.880705][ T1684] Code: 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 87.900302][ T1684] RSP: 002b:0000200000000080 EFLAGS: 00010217 [ 87.906370][ T1684] RAX: 0000000000000000 RBX: 00007f137fa15fa0 RCX: 00007f137f7ee929 [ 87.914341][ T1684] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000020000000 [ 87.922312][ T1684] RBP: 00007f137f870b39 R08: 0000000000000000 R09: 0000000000000000 [ 87.930367][ T1684] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 87.938346][ T1684] R13: 0000000000000001 R14: 00007f137fa15fa0 R15: 00007ffe4bea27e8 [ 87.978360][ T1684] memory: usage 307200kB, limit 307200kB, failcnt 22361 [ 87.992395][ T1684] memory+swap: usage 426752kB, limit 9007199254740988kB, failcnt 0 [ 88.213479][ T1684] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 88.392300][ T1684] Memory cgroup stats for /syz1: [ 88.392434][ T1684] anon 270336 [ 88.392434][ T1684] file 308723712 [ 88.392434][ T1684] kernel_stack 0 [ 88.392434][ T1684] percpu 0 [ 88.392434][ T1684] sock 0 [ 88.392434][ T1684] shmem 308723712 [ 88.392434][ T1684] file_mapped 135168 [ 88.392434][ T1684] file_dirty 0 [ 88.392434][ T1684] file_writeback 0 [ 88.392434][ T1684] anon_thp 0 [ 88.392434][ T1684] inactive_anon 311971840 [ 88.392434][ T1684] active_anon 2297856 [ 88.392434][ T1684] inactive_file 90112 [ 88.392434][ T1684] active_file 0 [ 88.392434][ T1684] unevictable 0 [ 88.392434][ T1684] slab_reclaimable 0 [ 88.392434][ T1684] slab_unreclaimable 0 [ 88.392434][ T1684] slab 0 [ 88.392434][ T1684] workingset_refault_anon 33 [ 88.392434][ T1684] workingset_refault_file 594 [ 88.392434][ T1684] workingset_activate_anon 0 [ 88.392434][ T1684] workingset_activate_file 264 [ 88.392434][ T1684] workingset_restore_anon 0 [ 88.392434][ T1684] workingset_restore_file 132 [ 88.496453][ T1684] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz.1.345,pid=1690,uid=0 [ 88.523165][ T1684] Memory cgroup out of memory: Killed process 1690 (syz.1.345) total-vm:90032kB, anon-rss:968kB, file-rss:53440kB, shmem-rss:0kB, UID:0 pgtables:192kB oom_score_adj:1000 [ 88.545962][ T27] oom_reaper: reaped process 1690 (syz.1.345), now anon-rss:0kB, file-rss:53376kB, shmem-rss:0kB [ 88.832053][ T2168] syz-executor invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 89.070050][ T2168] CPU: 0 PID: 2168 Comm: syz-executor Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 89.081657][ T2168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 89.091839][ T2168] Call Trace: [ 89.095152][ T2168] __dump_stack+0x21/0x24 [ 89.099500][ T2168] dump_stack_lvl+0x169/0x1d8 [ 89.104205][ T2168] ? show_regs_print_info+0x18/0x18 [ 89.109428][ T2168] ? ___ratelimit+0x3d1/0x560 [ 89.114127][ T2168] ? _raw_spin_lock+0x8e/0xe0 [ 89.118828][ T2168] dump_stack+0x15/0x1c [ 89.123019][ T2168] dump_header+0xdd/0x650 [ 89.127365][ T2168] oom_kill_process+0x1fa/0x2c0 [ 89.132239][ T2168] out_of_memory+0x94a/0xd70 [ 89.136844][ T2168] ? unregister_oom_notifier+0x20/0x20 [ 89.142316][ T2168] ? mutex_lock_killable+0x8c/0xe0 [ 89.147547][ T2168] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 89.154076][ T2168] mem_cgroup_out_of_memory+0x260/0x310 [ 89.160012][ T2168] ? mem_cgroup_oom_trylock+0x350/0x350 [ 89.165577][ T2168] ? _raw_spin_lock+0x8e/0xe0 [ 89.170279][ T2168] ? _raw_spin_trylock_bh+0x130/0x130 [ 89.175664][ T2168] ? _raw_spin_unlock+0x4d/0x70 [ 89.180610][ T2168] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 89.186181][ T2168] ? _raw_spin_unlock_irq+0x4e/0x70 [ 89.191420][ T2168] try_charge+0xf61/0x14e0 [ 89.195859][ T2168] ? __memcg_kmem_charge+0x140/0x140 [ 89.201345][ T2168] ? __alloc_pages_nodemask+0x268/0x5f0 [ 89.206964][ T2168] ? wp_page_copy+0xf70/0x15d0 [ 89.211756][ T2168] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 89.217348][ T2168] __mem_cgroup_charge+0x14c/0x6d0 [ 89.222489][ T2168] wp_page_copy+0x278/0x15d0 [ 89.227097][ T2168] ? next_uptodate_page+0x9f9/0xa20 [ 89.232316][ T2168] ? trace_spf_pte_lock+0x110/0x110 [ 89.237527][ T2168] ? filemap_map_pages+0xfab/0x1270 [ 89.242753][ T2168] do_wp_page+0x9a6/0xc80 [ 89.247105][ T2168] handle_pte_fault+0xac1/0x3750 [ 89.252236][ T2168] handle_mm_fault+0xf3f/0x16a0 [ 89.257116][ T2168] ? can_reuse_spf_vma+0xe0/0xe0 [ 89.262074][ T2168] ? __kasan_check_write+0x14/0x20 [ 89.267209][ T2168] ? down_read_trylock+0x100/0x150 [ 89.272334][ T2168] ? __init_rwsem+0x1c0/0x1c0 [ 89.277026][ T2168] ? vmacache_update+0xb7/0x120 [ 89.281891][ T2168] ? find_vma+0x13b/0x150 [ 89.286235][ T2168] do_user_addr_fault+0x5a2/0xc80 [ 89.291278][ T2168] ? do_kern_addr_fault+0x80/0x80 [ 89.296321][ T2168] ? debug_smp_processor_id+0x17/0x20 [ 89.301709][ T2168] exc_page_fault+0x5a/0xc0 [ 89.306226][ T2168] ? asm_exc_page_fault+0x8/0x30 [ 89.311185][ T2168] asm_exc_page_fault+0x1e/0x30 [ 89.316047][ T2168] RIP: 0033:0x7f137f7e4e40 [ 89.320478][ T2168] Code: 75 d8 4c 89 e7 e8 60 f7 fb ff 48 8b 80 88 00 00 00 48 c7 00 00 00 00 00 48 c7 40 08 00 00 00 00 eb b8 0f 1f 84 00 00 00 00 00 <48> 83 05 38 79 d6 00 04 48 8b 05 39 88 d6 00 66 0f ef c0 48 c7 05 [ 89.340110][ T2168] RSP: 002b:00007ffe4bea2a70 EFLAGS: 00010246 [ 89.346210][ T2168] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f137f7e51cd [ 89.354207][ T2168] RDX: 0000000000000000 RSI: 0000000000000018 RDI: 00005555912da7e0 [ 89.362564][ T2168] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 [ 89.370549][ T2168] R10: 00005555912da7d0 R11: 0000000000000246 R12: 0000000000000000 [ 89.378646][ T2168] R13: 00000000000927c0 R14: 0000000000014e59 R15: 00007ffe4bea2c00 [ 89.777701][ T2168] memory: usage 291204kB, limit 307200kB, failcnt 23220 [ 89.792318][ T2168] memory+swap: usage 395688kB, limit 9007199254740988kB, failcnt 0 [ 89.831047][ T2168] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 89.838237][ T2168] Memory cgroup stats for /syz1: [ 89.838380][ T2168] anon 270336 [ 89.838380][ T2168] file 286150656 [ 89.838380][ T2168] kernel_stack 0 [ 89.838380][ T2168] percpu 0 [ 89.838380][ T2168] sock 0 [ 89.838380][ T2168] shmem 286150656 [ 89.838380][ T2168] file_mapped 135168 [ 89.838380][ T2168] file_dirty 0 [ 89.838380][ T2168] file_writeback 0 [ 89.838380][ T2168] anon_thp 0 [ 89.838380][ T2168] inactive_anon 289128448 [ 89.838380][ T2168] active_anon 2297856 [ 89.838380][ T2168] inactive_file 90112 [ 89.838380][ T2168] active_file 0 [ 89.838380][ T2168] unevictable 0 [ 89.838380][ T2168] slab_reclaimable 0 [ 89.838380][ T2168] slab_unreclaimable 0 [ 89.838380][ T2168] slab 0 [ 89.838380][ T2168] workingset_refault_anon 33 [ 89.838380][ T2168] workingset_refault_file 594 [ 89.838380][ T2168] workingset_activate_anon 0 [ 89.838380][ T2168] workingset_activate_file 264 [ 89.838380][ T2168] workingset_restore_anon 0 [ 89.838380][ T2168] workingset_restore_file 132 [ 89.961088][ T2168] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz.1.345,pid=1683,uid=0 [ 90.011443][ T2168] Memory cgroup out of memory: Killed process 1683 (syz.1.345) total-vm:90032kB, anon-rss:992kB, file-rss:53380kB, shmem-rss:0kB, UID:0 pgtables:192kB oom_score_adj:1000 [ 90.091850][ T27] oom_reaper: reaped process 1683 (syz.1.345), now anon-rss:0kB, file-rss:53316kB, shmem-rss:0kB [ 90.807702][ T2236] device veth0_vlan left promiscuous mode [ 90.860541][ T2236] device veth0_vlan entered promiscuous mode [ 91.043806][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 91.062732][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 91.080303][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 91.594332][ T2258] syz.0.502[2258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.594423][ T2258] syz.0.502[2258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.852562][ T2268] device veth0_vlan left promiscuous mode [ 91.943720][ T2268] device veth0_vlan entered promiscuous mode [ 92.124982][ T2289] device sit0 left promiscuous mode [ 92.307141][ T2290] device sit0 entered promiscuous mode [ 93.463582][ T2302] syz.1.514 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 93.537727][ T2302] CPU: 0 PID: 2302 Comm: syz.1.514 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 93.549113][ T2302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 93.559197][ T2302] Call Trace: [ 93.562514][ T2302] __dump_stack+0x21/0x24 [ 93.566874][ T2302] dump_stack_lvl+0x169/0x1d8 [ 93.571579][ T2302] ? show_regs_print_info+0x18/0x18 [ 93.576803][ T2302] ? ___ratelimit+0x3d1/0x560 [ 93.581517][ T2302] ? __kasan_check_write+0x14/0x20 [ 93.586651][ T2302] ? _raw_spin_lock+0x8e/0xe0 [ 93.591352][ T2302] dump_stack+0x15/0x1c [ 93.595525][ T2302] dump_header+0xdd/0x650 [ 93.599981][ T2302] oom_kill_process+0x1fa/0x2c0 [ 93.604845][ T2302] out_of_memory+0x94a/0xd70 [ 93.609451][ T2302] ? unregister_oom_notifier+0x20/0x20 [ 93.615030][ T2302] ? mutex_lock_killable+0x8c/0xe0 [ 93.620168][ T2302] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 93.627126][ T2302] mem_cgroup_out_of_memory+0x260/0x310 [ 93.632689][ T2302] ? mem_cgroup_oom_trylock+0x350/0x350 [ 93.638252][ T2302] ? _raw_spin_lock+0x8e/0xe0 [ 93.642952][ T2302] ? _raw_spin_trylock_bh+0x130/0x130 [ 93.648818][ T2302] ? _raw_spin_unlock+0x4d/0x70 [ 93.654240][ T2302] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 93.660100][ T2302] ? _raw_spin_unlock_irq+0x4e/0x70 [ 93.665322][ T2302] try_charge+0xf61/0x14e0 [ 93.669866][ T2302] ? __memcg_kmem_charge+0x140/0x140 [ 93.675177][ T2302] ? percpu_counter_add_batch+0x13c/0x160 [ 93.680932][ T2302] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 93.686589][ T2302] __mem_cgroup_charge+0x14c/0x6d0 [ 93.691847][ T2302] shmem_add_to_page_cache+0x55e/0xe10 [ 93.697340][ T2302] ? shmem_alloc_page+0x300/0x300 [ 93.702387][ T2302] ? _raw_spin_lock_irqsave+0x110/0x110 [ 93.707965][ T2302] ? find_lock_entry+0x4b/0x200 [ 93.712843][ T2302] ? lru_cache_add+0x164/0x380 [ 93.717629][ T2302] ? shmem_getpage_gfp+0x8f3/0x2110 [ 93.722852][ T2302] shmem_getpage_gfp+0x8e8/0x2110 [ 93.727912][ T2302] shmem_write_begin+0xce/0x1b0 [ 93.732791][ T2302] generic_perform_write+0x2be/0x510 [ 93.738118][ T2302] ? atime_needs_update+0x5b0/0x5b0 [ 93.743330][ T2302] ? grab_cache_page_write_begin+0xb0/0xb0 [ 93.749132][ T2302] ? file_remove_privs+0x580/0x580 [ 93.754271][ T2302] ? __kasan_check_write+0x14/0x20 [ 93.759412][ T2302] ? down_write+0xac/0x110 [ 93.763835][ T2302] __generic_file_write_iter+0x24b/0x480 [ 93.769484][ T2302] ? generic_write_checks+0x3d4/0x480 [ 93.774855][ T2302] generic_file_write_iter+0xa9/0x1d0 [ 93.780233][ T2302] __kernel_write+0x55a/0x910 [ 93.785058][ T2302] ? vfs_read+0xa10/0xa10 [ 93.789395][ T2302] ? populate_vma_page_range+0xf0/0xf0 [ 93.794881][ T2302] ? __kasan_check_write+0x14/0x20 [ 93.800003][ T2302] ? get_dump_page+0x46b/0x5b0 [ 93.804776][ T2302] dump_emit+0x240/0x360 [ 93.809024][ T2302] ? wait_for_dump_helpers+0x390/0x390 [ 93.814503][ T2302] dump_user_range+0x6a/0x1a0 [ 93.819178][ T2302] elf_core_dump+0x278a/0x2bc0 [ 93.823970][ T2302] ? load_elf_binary+0x2890/0x2890 [ 93.829267][ T2302] ? __fsnotify_parent+0x5ff/0x6c0 [ 93.834392][ T2302] ? shmem_unused_huge_scan+0xa0/0xa0 [ 93.839800][ T2302] ? do_truncate+0x1ad/0x210 [ 93.844394][ T2302] ? putname+0xfe/0x150 [ 93.848553][ T2302] ? __kasan_check_read+0x11/0x20 [ 93.853574][ T2302] ? __ia32_sys_unshare+0x40/0x40 [ 93.858598][ T2302] do_coredump+0x1ac9/0x27f0 [ 93.863187][ T2302] ? simple_acl_create+0x1c0/0x1c0 [ 93.868293][ T2302] ? debug_smp_processor_id+0x17/0x20 [ 93.873693][ T2302] ? kmem_cache_free+0x100/0x2d0 [ 93.878634][ T2302] ? ____kasan_slab_free+0x130/0x160 [ 93.883919][ T2302] ? get_signal+0xb98/0x12e0 [ 93.888502][ T2302] ? kmem_cache_free+0x100/0x2d0 [ 93.893450][ T2302] get_signal+0xf23/0x12e0 [ 93.897879][ T2302] arch_do_signal_or_restart+0xbf/0x10f0 [ 93.903517][ T2302] ? __send_signal+0x8b8/0xb80 [ 93.908287][ T2302] ? send_signal+0x479/0x5b0 [ 93.912880][ T2302] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 93.918506][ T2302] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 93.924307][ T2302] ? force_sig+0xb5/0x100 [ 93.928630][ T2302] ? send_sig+0x70/0x70 [ 93.932790][ T2302] exit_to_user_mode_loop+0xa2/0xe0 [ 93.937983][ T2302] irqentry_exit_to_user_mode+0x4e/0x80 [ 93.943525][ T2302] irqentry_exit+0x12/0x60 [ 93.947935][ T2302] exc_general_protection+0x1ca/0x250 [ 93.953304][ T2302] ? asm_exc_general_protection+0x8/0x30 [ 93.958932][ T2302] asm_exc_general_protection+0x1e/0x30 [ 93.964471][ T2302] RIP: 0033:0x7f137f7ee931 [ 93.968882][ T2302] Code: 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 93.988481][ T2302] RSP: 002b:00002000000001c0 EFLAGS: 00010217 [ 93.994649][ T2302] RAX: 0000000000000000 RBX: 00007f137fa15fa0 RCX: 00007f137f7ee929 [ 94.002624][ T2302] RDX: 0000200000000200 RSI: 00002000000001c0 RDI: 00000000002aa000 [ 94.010593][ T2302] RBP: 00007f137f870b39 R08: 0000200000000280 R09: 0000200000000280 [ 94.018561][ T2302] R10: 0000200000000240 R11: 0000000000000206 R12: 0000000000000000 [ 94.026530][ T2302] R13: 0000000000000000 R14: 00007f137fa15fa0 R15: 00007ffe4bea27e8 [ 94.046253][ T2302] memory: usage 307200kB, limit 307200kB, failcnt 26821 [ 94.053354][ T2302] memory+swap: usage 429844kB, limit 9007199254740988kB, failcnt 0 [ 94.061406][ T2302] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 94.068267][ T2302] Memory cgroup stats for /syz1: [ 94.068405][ T2302] anon 405504 [ 94.068405][ T2302] file 311697408 [ 94.068405][ T2302] kernel_stack 0 [ 94.068405][ T2302] percpu 0 [ 94.068405][ T2302] sock 0 [ 94.068405][ T2302] shmem 311697408 [ 94.068405][ T2302] file_mapped 135168 [ 94.068405][ T2302] file_dirty 0 [ 94.068405][ T2302] file_writeback 0 [ 94.068405][ T2302] anon_thp 0 [ 94.068405][ T2302] inactive_anon 312274944 [ 94.068405][ T2302] active_anon 2027520 [ 94.068405][ T2302] inactive_file 0 [ 94.068405][ T2302] active_file 0 [ 94.068405][ T2302] unevictable 0 [ 94.068405][ T2302] slab_reclaimable 0 [ 94.068405][ T2302] slab_unreclaimable 0 [ 94.068405][ T2302] slab 0 [ 94.068405][ T2302] workingset_refault_anon 33 [ 94.068405][ T2302] workingset_refault_file 1155 [ 94.068405][ T2302] workingset_activate_anon 0 [ 94.068405][ T2302] workingset_activate_file 660 [ 94.068405][ T2302] workingset_restore_anon 0 [ 94.068405][ T2302] workingset_restore_file 132 [ 94.171830][ T2302] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz.1.345,pid=1682,uid=0 [ 94.198543][ T2302] Memory cgroup out of memory: Killed process 1682 (syz.1.345) total-vm:90032kB, anon-rss:984kB, file-rss:53056kB, shmem-rss:0kB, UID:0 pgtables:196kB oom_score_adj:1000 [ 94.222658][ T1672] syz.1.345 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 94.234289][ T2365] device wg2 left promiscuous mode [ 94.251321][ T1672] CPU: 0 PID: 1672 Comm: syz.1.345 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 94.262555][ T1672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 94.272619][ T1672] Call Trace: [ 94.275920][ T1672] __dump_stack+0x21/0x24 [ 94.280270][ T1672] dump_stack_lvl+0x169/0x1d8 [ 94.285125][ T1672] ? show_regs_print_info+0x18/0x18 [ 94.290328][ T1672] ? ___ratelimit+0x3d1/0x560 [ 94.295115][ T1672] ? _raw_spin_lock+0x8e/0xe0 [ 94.299988][ T1672] dump_stack+0x15/0x1c [ 94.304156][ T1672] dump_header+0xdd/0x650 [ 94.308501][ T1672] oom_kill_process+0x1fa/0x2c0 [ 94.313505][ T1672] out_of_memory+0x94a/0xd70 [ 94.318103][ T1672] ? unregister_oom_notifier+0x20/0x20 [ 94.323556][ T1672] ? mutex_lock_killable+0xd3/0xe0 [ 94.328664][ T1672] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 94.335161][ T1672] mem_cgroup_out_of_memory+0x260/0x310 [ 94.340701][ T1672] ? mem_cgroup_oom_trylock+0x350/0x350 [ 94.346239][ T1672] ? _raw_spin_lock+0x8e/0xe0 [ 94.350940][ T1672] ? _raw_spin_trylock_bh+0x130/0x130 [ 94.356405][ T1672] ? _raw_spin_unlock+0x4d/0x70 [ 94.361270][ T1672] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 94.366828][ T1672] ? _raw_spin_unlock_irq+0x4e/0x70 [ 94.372033][ T1672] try_charge+0xf61/0x14e0 [ 94.376551][ T1672] ? __memcg_kmem_charge+0x140/0x140 [ 94.381833][ T1672] ? percpu_counter_add_batch+0x13c/0x160 [ 94.387555][ T1672] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 94.393095][ T1672] __mem_cgroup_charge+0x14c/0x6d0 [ 94.398229][ T1672] shmem_add_to_page_cache+0x55e/0xe10 [ 94.403700][ T1672] ? shmem_alloc_page+0x300/0x300 [ 94.408865][ T1672] ? _raw_spin_lock_irqsave+0x110/0x110 [ 94.414469][ T1672] ? find_lock_entry+0x4b/0x200 [ 94.419329][ T1672] ? lru_cache_add+0x164/0x380 [ 94.424091][ T1672] ? shmem_getpage_gfp+0x8f3/0x2110 [ 94.429282][ T1672] shmem_getpage_gfp+0x8e8/0x2110 [ 94.434316][ T1672] shmem_write_begin+0xce/0x1b0 [ 94.439161][ T1672] generic_perform_write+0x2be/0x510 [ 94.444443][ T1672] ? preempt_count_add+0x90/0x1b0 [ 94.449491][ T1672] ? grab_cache_page_write_begin+0xb0/0xb0 [ 94.455334][ T1672] ? file_remove_privs+0x580/0x580 [ 94.460472][ T1672] ? __kasan_check_write+0x14/0x20 [ 94.465586][ T1672] ? down_write+0xac/0x110 [ 94.470119][ T1672] __generic_file_write_iter+0x24b/0x480 [ 94.475769][ T1672] ? generic_write_checks+0x3d4/0x480 [ 94.481149][ T1672] generic_file_write_iter+0xa9/0x1d0 [ 94.486514][ T1672] __kernel_write+0x55a/0x910 [ 94.491191][ T1672] ? vfs_read+0xa10/0xa10 [ 94.495525][ T1672] ? populate_vma_page_range+0xf0/0xf0 [ 94.500980][ T1672] ? __kasan_check_write+0x14/0x20 [ 94.506085][ T1672] ? get_dump_page+0x46b/0x5b0 [ 94.510842][ T1672] dump_emit+0x240/0x360 [ 94.515083][ T1672] ? wait_for_dump_helpers+0x390/0x390 [ 94.520656][ T1672] ? dump_user_range+0xea/0x1a0 [ 94.525527][ T1672] dump_user_range+0x6a/0x1a0 [ 94.530210][ T1672] elf_core_dump+0x278a/0x2bc0 [ 94.535007][ T1672] ? load_elf_binary+0x2890/0x2890 [ 94.540149][ T1672] ? __fsnotify_parent+0x5ff/0x6c0 [ 94.545270][ T1672] ? shmem_unused_huge_scan+0xa0/0xa0 [ 94.550648][ T1672] ? do_truncate+0x1ad/0x210 [ 94.555234][ T1672] ? putname+0xfe/0x150 [ 94.559387][ T1672] ? __kasan_check_read+0x11/0x20 [ 94.564407][ T1672] ? __ia32_sys_unshare+0x40/0x40 [ 94.569451][ T1672] do_coredump+0x1ac9/0x27f0 [ 94.574050][ T1672] ? simple_acl_create+0x1c0/0x1c0 [ 94.579262][ T1672] ? bpf_trace_run2+0xb8/0x200 [ 94.584039][ T1672] ? get_signal+0xb98/0x12e0 [ 94.588628][ T1672] ? ____kasan_slab_free+0x130/0x160 [ 94.593912][ T1672] ? kmem_cache_free+0x2ac/0x2d0 [ 94.598847][ T1672] get_signal+0xf23/0x12e0 [ 94.603264][ T1672] arch_do_signal_or_restart+0xbf/0x10f0 [ 94.608889][ T1672] ? __send_signal+0x8b8/0xb80 [ 94.613646][ T1672] ? send_signal+0x479/0x5b0 [ 94.618228][ T1672] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 94.623855][ T1672] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 94.629657][ T1672] ? force_sig+0xb5/0x100 [ 94.633977][ T1672] ? send_sig+0x70/0x70 [ 94.638146][ T1672] exit_to_user_mode_loop+0xa2/0xe0 [ 94.643361][ T1672] irqentry_exit_to_user_mode+0x4e/0x80 [ 94.648909][ T1672] irqentry_exit+0x12/0x60 [ 94.653322][ T1672] exc_general_protection+0x1ca/0x250 [ 94.658944][ T1672] ? asm_exc_general_protection+0x8/0x30 [ 94.664584][ T1672] asm_exc_general_protection+0x1e/0x30 [ 94.670495][ T1672] RIP: 0033:0x7f137f7ee931 [ 94.674916][ T1672] Code: 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 94.694519][ T1672] RSP: 002b:0000200000000080 EFLAGS: 00010217 [ 94.700599][ T1672] RAX: 0000000000000000 RBX: 00007f137fa15fa0 RCX: 00007f137f7ee929 [ 94.708744][ T1672] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000020000000 [ 94.716715][ T1672] RBP: 00007f137f870b39 R08: 0000000000000000 R09: 0000000000000000 [ 94.724872][ T1672] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 94.732974][ T1672] R13: 0000000000000001 R14: 00007f137fa15fa0 R15: 00007ffe4bea27e8 [ 94.746523][ T1672] memory: usage 307200kB, limit 307200kB, failcnt 26894 [ 94.753974][ T1672] memory+swap: usage 429844kB, limit 9007199254740988kB, failcnt 0 [ 94.762555][ T1672] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 94.769531][ T1672] Memory cgroup stats for /syz1: [ 94.769671][ T1672] anon 405504 [ 94.769671][ T1672] file 311697408 [ 94.769671][ T1672] kernel_stack 0 [ 94.769671][ T1672] percpu 0 [ 94.769671][ T1672] sock 0 [ 94.769671][ T1672] shmem 311697408 [ 94.769671][ T1672] file_mapped 135168 [ 94.769671][ T1672] file_dirty 0 [ 94.769671][ T1672] file_writeback 0 [ 94.769671][ T1672] anon_thp 0 [ 94.769671][ T1672] inactive_anon 312274944 [ 94.769671][ T1672] active_anon 2027520 [ 94.769671][ T1672] inactive_file 0 [ 94.769671][ T1672] active_file 0 [ 94.769671][ T1672] unevictable 0 [ 94.769671][ T1672] slab_reclaimable 0 [ 94.769671][ T1672] slab_unreclaimable 0 [ 94.769671][ T1672] slab 0 [ 94.769671][ T1672] workingset_refault_anon 33 [ 94.769671][ T1672] workingset_refault_file 1155 [ 94.769671][ T1672] workingset_activate_anon 0 [ 94.769671][ T1672] workingset_activate_file 660 [ 94.769671][ T1672] workingset_restore_anon 0 [ 94.769671][ T1672] workingset_restore_file 132 [ 94.863769][ T1672] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz.1.345,pid=1687,uid=0 [ 94.880517][ T1672] Memory cgroup out of memory: Killed process 1687 (syz.1.345) total-vm:90032kB, anon-rss:984kB, file-rss:52264kB, shmem-rss:0kB, UID:0 pgtables:196kB oom_score_adj:1000 [ 95.701409][ T2406] syz.0.543 uses obsolete (PF_INET,SOCK_PACKET) [ 97.915502][ T2452] device sit0 entered promiscuous mode [ 100.468036][ T2506] syz.3.572[2506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.468097][ T2506] syz.3.572[2506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.840592][ T2534] syz.1.579[2534] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.964530][ T2537] device pim6reg1 entered promiscuous mode [ 101.886451][ T2586] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.895769][ T2586] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.989280][ T2587] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.996512][ T2587] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.004087][ T2587] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.011157][ T2587] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.020856][ T2587] device bridge0 entered promiscuous mode [ 103.617722][ T2674] device syzkaller0 entered promiscuous mode [ 104.326568][ T2714] device sit0 entered promiscuous mode [ 104.793467][ T2742] device pim6reg1 entered promiscuous mode [ 105.042260][ T2774] cgroup: fork rejected by pids controller in /syz4 [ 106.167896][ T2787] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.238484][ T2787] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.295068][ T2787] device bridge_slave_0 entered promiscuous mode [ 106.529317][ T2787] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.540534][ T2787] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.549262][ T2787] device bridge_slave_1 entered promiscuous mode [ 106.694878][ T9] device bridge_slave_1 left promiscuous mode [ 106.701239][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.708905][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.717919][ T9] device veth1_macvtap left promiscuous mode [ 106.821088][ T9] device veth0_vlan left promiscuous mode [ 107.832914][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 107.854980][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 107.951544][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 107.968077][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 107.990038][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.997452][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.015261][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 108.023988][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 108.032620][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.039722][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.049206][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 108.064438][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 108.078735][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 108.092503][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 108.134627][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 108.158019][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 108.196464][ T2787] device veth0_vlan entered promiscuous mode [ 108.205410][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 108.217988][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 108.291488][ T2787] device veth1_macvtap entered promiscuous mode [ 108.326758][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 108.350282][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 108.373009][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 108.400499][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 108.421808][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 108.504643][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 108.545196][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 108.595959][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 108.611837][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 108.819607][ T2900] bridge0: port 3(veth1) entered blocking state [ 108.861065][ T2900] bridge0: port 3(veth1) entered disabled state [ 108.885857][ T2900] device veth1 entered promiscuous mode [ 108.900227][ T2900] bridge0: port 3(veth1) entered blocking state [ 108.906873][ T2900] bridge0: port 3(veth1) entered forwarding state [ 109.203705][ T2914] device veth0_vlan left promiscuous mode [ 109.221430][ T2914] device veth0_vlan entered promiscuous mode [ 109.228751][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 109.261727][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 109.321325][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 109.394539][ T2928] device syzkaller0 entered promiscuous mode [ 109.659846][ T24] audit: type=1400 audit(1750989378.130:150): avc: denied { create } for pid=2951 comm="syz.0.692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 109.906656][ T2961] ref_ctr_offset mismatch. inode: 0x2f8 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 110.030058][ T2961] GPL: port 1(erspan0) entered blocking state [ 110.037697][ T2961] GPL: port 1(erspan0) entered disabled state [ 110.054441][ T2961] device erspan0 entered promiscuous mode [ 110.232570][ T2993] device syzkaller0 entered promiscuous mode [ 110.303123][ T3000] syz.2.709[3000] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.303183][ T3000] syz.2.709[3000] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.689510][ T3005] device veth0_vlan left promiscuous mode [ 110.710781][ T3005] device veth0_vlan entered promiscuous mode [ 112.477096][ T24] audit: type=1400 audit(1750989380.950:151): avc: denied { create } for pid=3076 comm="syz.3.729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 114.559758][ T3158] device veth0_vlan left promiscuous mode [ 114.566292][ T3158] device veth0_vlan entered promiscuous mode [ 114.603952][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 114.621816][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 114.643953][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 114.827982][ T3178] device syzkaller0 entered promiscuous mode [ 114.929606][ T3176] device veth0_vlan left promiscuous mode [ 114.935487][ T3176] device veth0_vlan entered promiscuous mode [ 115.706913][ T3236] device veth1_macvtap entered promiscuous mode [ 115.731948][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 119.681157][ T3350] device syzkaller0 entered promiscuous mode [ 119.994138][ T3362] device pim6reg1 entered promiscuous mode [ 120.482567][ T3376] device syzkaller0 entered promiscuous mode [ 121.799217][ T3427] device pim6reg1 entered promiscuous mode [ 122.134076][ T3450] device sit0 entered promiscuous mode [ 122.257480][ T24] audit: type=1400 audit(1750989390.700:152): avc: denied { setattr } for pid=3442 comm="syz.1.831" path="pipe:[13854]" dev="pipefs" ino=13854 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 124.113032][ T3493] device sit0 left promiscuous mode [ 124.178562][ T3493] device sit0 entered promiscuous mode [ 124.439021][ T3505] device syzkaller0 entered promiscuous mode [ 124.464264][ T3509] ÿ: renamed from bond_slave_0 [ 124.481581][ T3509] syz.2.851[3509] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.639548][ T3527] device pim6reg1 entered promiscuous mode [ 125.220113][ T3555] device veth0_vlan left promiscuous mode [ 125.258523][ T3555] device veth0_vlan entered promiscuous mode [ 125.334720][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.372993][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 125.437850][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 127.366482][ T3607] ±ÿ: renamed from team_slave_1 [ 127.573023][ T24] audit: type=1400 audit(1750989396.050:153): avc: denied { ioctl } for pid=3612 comm="syz.4.883" path="" dev="cgroup2" ino=353 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 128.120861][ T3650] device veth1_macvtap left promiscuous mode [ 128.178847][ T3656] device veth1_macvtap entered promiscuous mode [ 129.152990][ T3700] device syzkaller0 entered promiscuous mode [ 130.968111][ T3768] device wg2 entered promiscuous mode [ 132.342805][ T3814] pim6reg0: tun_chr_ioctl cmd 3221517374 [ 132.817688][ T3818] syz.1.934[3818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.817754][ T3818] syz.1.934[3818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.356546][ T3838] ÿÿÿÿÿÿ: renamed from vlan1 [ 135.395050][ T3907] device syzkaller0 entered promiscuous mode [ 136.119959][ T3919] device sit0 left promiscuous mode [ 136.561917][ T3925] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.075133][ T3963] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.238805][ T3975] device veth1_macvtap left promiscuous mode [ 138.245816][ T3975] device macsec0 entered promiscuous mode [ 139.168830][ T4014] device veth0_vlan left promiscuous mode [ 139.194968][ T4014] device veth0_vlan entered promiscuous mode [ 139.227473][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 139.254827][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 139.263463][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 139.459562][ T4030] device syzkaller0 entered promiscuous mode [ 140.306841][ T4060] device sit0 left promiscuous mode [ 140.935351][ T4072] device pim6reg1 entered promiscuous mode [ 141.520796][ T4108] device sit0 left promiscuous mode [ 143.113473][ T4172] device syzkaller0 entered promiscuous mode [ 143.683551][ T4210] device syzkaller0 entered promiscuous mode [ 143.854859][ T4236] device pim6reg1 entered promiscuous mode [ 146.210727][ T4326] device veth0_vlan left promiscuous mode [ 146.257212][ T4326] device veth0_vlan entered promiscuous mode [ 146.351316][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 146.391525][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 146.464522][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 147.821416][ T24] audit: type=1400 audit(1750989416.300:154): avc: denied { create } for pid=4365 comm="syz.0.1082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 150.070233][ T4416] device syzkaller0 entered promiscuous mode [ 150.099932][ T4420] device veth1_macvtap left promiscuous mode [ 150.117931][ T4420] device macsec0 left promiscuous mode [ 150.272797][ T4440] device sit0 entered promiscuous mode [ 150.762364][ T4458] device wg2 left promiscuous mode [ 151.601167][ T4484] device veth0_vlan left promiscuous mode [ 151.607300][ T4484] device veth0_vlan entered promiscuous mode [ 151.722565][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 151.749540][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 151.759461][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 153.444371][ T4553] device pim6reg1 entered promiscuous mode [ 154.853361][ T24] audit: type=1400 audit(1750989423.330:155): avc: denied { create } for pid=4587 comm="syz.0.1139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 155.230056][ T4597] device syzkaller0 entered promiscuous mode [ 157.113132][ T4614] device wg2 entered promiscuous mode [ 158.852472][ T4638] device pim6reg1 entered promiscuous mode [ 159.087150][ T4654] syz.1.1159[4654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.087200][ T4654] syz.1.1159[4654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.742903][ T4689] syz.1.1172[4689] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.809629][ T4689] syz.1.1172[4689] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.840667][ T4693] device sit0 left promiscuous mode [ 160.036525][ T4693] device sit0 entered promiscuous mode [ 160.714577][ T4723] device syzkaller0 entered promiscuous mode [ 160.860830][ T4726] device pim6reg1 entered promiscuous mode [ 161.290289][ T4758] device wg2 entered promiscuous mode [ 161.329745][ T4767] syz.0.1193[4767] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.329875][ T4767] syz.0.1193[4767] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.018987][ T4790] device pim6reg1 entered promiscuous mode [ 162.072888][ T4793] syz.2.1201[4793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.072979][ T4793] syz.2.1201[4793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.085840][ T4793] syz.2.1201[4793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.097761][ T4793] syz.2.1201[4793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.228397][ T4800] device wg2 left promiscuous mode [ 163.944431][ T4859] device sit0 left promiscuous mode [ 163.973196][ T4859] device sit0 entered promiscuous mode [ 164.365844][ T4883] device syzkaller0 entered promiscuous mode [ 164.409426][ T4882] device wg2 entered promiscuous mode [ 164.630688][ T4882] device syzkaller0 entered promiscuous mode [ 165.139755][ T4942] device pim6reg1 entered promiscuous mode [ 165.433967][ T4949] device syzkaller0 entered promiscuous mode [ 165.919768][ T4968] device veth0_vlan left promiscuous mode [ 165.960451][ T4968] device veth0_vlan entered promiscuous mode [ 166.099227][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.116690][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.139674][ T4975] syz.1.1253[4975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.139735][ T4975] syz.1.1253[4975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.168520][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 167.846961][ T5040] device syzkaller0 entered promiscuous mode [ 168.026748][ T5043] device wg2 entered promiscuous mode [ 170.335771][ T5150] device syzkaller0 entered promiscuous mode [ 171.069379][ T5210] device syzkaller0 entered promiscuous mode [ 173.261598][ T5302] device wg2 left promiscuous mode [ 173.282005][ T5300] device wg2 entered promiscuous mode [ 173.695256][ T5313] device veth0_vlan left promiscuous mode [ 173.722772][ T5313] device veth0_vlan entered promiscuous mode [ 173.837333][ T24] audit: type=1400 audit(1750989442.310:156): avc: denied { create } for pid=5318 comm="syz.0.1345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 173.886102][ T5323] syz.3.1347[5323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.886165][ T5323] syz.3.1347[5323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.908725][ T5355] device pim6reg1 entered promiscuous mode [ 175.187265][ T5384] device sit0 left promiscuous mode [ 176.111981][ T5439] syz.3.1380[5439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.112078][ T5439] syz.3.1380[5439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.206200][ T5444] device pim6reg1 entered promiscuous mode [ 178.665479][ T5562] device wg2 left promiscuous mode [ 178.721915][ T5562] device wg2 entered promiscuous mode [ 178.866420][ T5564] device veth0_vlan left promiscuous mode [ 178.925013][ T5564] device veth0_vlan entered promiscuous mode [ 179.935359][ T5588] device sit0 entered promiscuous mode [ 180.942453][ T5616] device syzkaller0 entered promiscuous mode [ 181.039179][ T5627] device pim6reg1 entered promiscuous mode [ 181.249778][ T5647] device syzkaller0 entered promiscuous mode [ 184.287662][ T5728] device pim6reg1 entered promiscuous mode [ 184.859849][ T5732] device syzkaller0 entered promiscuous mode [ 185.066396][ T5739] device syzkaller0 entered promiscuous mode [ 186.045502][ T5760] bridge0: port 3(veth0) entered blocking state [ 186.061510][ T5760] bridge0: port 3(veth0) entered disabled state [ 186.080003][ T5760] device veth0 entered promiscuous mode [ 186.088225][ T5760] bridge0: port 3(veth0) entered blocking state [ 186.094753][ T5760] bridge0: port 3(veth0) entered forwarding state [ 186.852585][ T5788] device pim6reg1 entered promiscuous mode [ 187.131833][ T5800] device wg2 left promiscuous mode [ 187.213820][ T5800] device wg2 entered promiscuous mode [ 187.313579][ T5802] device pim6reg1 entered promiscuous mode [ 188.860019][ T5886] device syzkaller0 entered promiscuous mode [ 189.250020][ T5907] device syzkaller0 entered promiscuous mode [ 191.350708][ T5945] device sit0 entered promiscuous mode [ 192.121080][ T5985] -1: renamed from syzkaller0 [ 192.574055][ T6004] device macsec0 entered promiscuous mode [ 192.692531][ T6016] device veth0_vlan left promiscuous mode [ 192.733434][ T6016] device veth0_vlan entered promiscuous mode [ 192.887518][ T6022] syz.1.1544[6022] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.887578][ T6022] syz.1.1544[6022] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.722054][ T6042] device pim6reg1 entered promiscuous mode [ 194.218849][ T6068] syz.3.1557[6068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.218903][ T6068] syz.3.1557[6068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.569858][ T6063] device syzkaller0 entered promiscuous mode [ 195.912086][ T24] audit: type=1400 audit(1750989464.380:157): avc: denied { create } for pid=6112 comm="syz.4.1571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 197.690660][ T24] audit: type=1400 audit(1750989466.150:158): avc: denied { create } for pid=6191 comm="syz.4.1592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 199.345999][ T24] audit: type=1400 audit(1750989467.820:159): avc: denied { setattr } for pid=6243 comm="syz.4.1605" path="/dev/net/tun" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 200.422077][ T24] audit: type=1400 audit(1750989468.890:160): avc: denied { read } for pid=6275 comm="syz.2.1616" dev="nsfs" ino=4026532928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 200.452034][ T24] audit: type=1400 audit(1750989468.920:161): avc: denied { open } for pid=6275 comm="syz.2.1616" path="mnt:[4026532928]" dev="nsfs" ino=4026532928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 200.656622][ T6279] device wg2 entered promiscuous mode [ 201.256702][ T6298] device pim6reg1 entered promiscuous mode [ 201.707377][ T6320] device pim6reg1 entered promiscuous mode [ 202.017530][ T6344] device sit0 left promiscuous mode [ 202.031614][ T6345] device sit0 entered promiscuous mode [ 202.492447][ T6361] syz.2.1640[6361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.492540][ T6361] syz.2.1640[6361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.600754][ T6361] device macsec0 entered promiscuous mode [ 202.739044][ T6361] device veth1_macvtap entered promiscuous mode [ 202.789099][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 203.416659][ T6426] syz.0.1656[6426] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.416718][ T6426] syz.0.1656[6426] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.702230][ T6437] device syzkaller0 entered promiscuous mode [ 206.381223][ T24] audit: type=1400 audit(1750989474.860:162): avc: denied { ioctl } for pid=6509 comm="syz.0.1678" path="pid:[4026532282]" dev="nsfs" ino=4026532282 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 206.825910][ T6523] device sit0 left promiscuous mode [ 206.943341][ T6526] device pim6reg1 entered promiscuous mode [ 207.235289][ T6541] device pim6reg1 entered promiscuous mode [ 207.376176][ T6549] bridge0: port 3(veth1) entered disabled state [ 207.384054][ T6549] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.393826][ T6549] device bridge0 left promiscuous mode [ 207.497250][ T6551] device veth1 left promiscuous mode [ 207.502864][ T6551] bridge0: port 3(veth1) entered disabled state [ 207.511675][ T6551] device bridge_slave_1 left promiscuous mode [ 207.517861][ T6551] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.525641][ T6551] device bridge_slave_0 left promiscuous mode [ 207.533208][ T6551] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.365302][ T6575] device syzkaller0 entered promiscuous mode [ 208.694841][ T24] audit: type=1400 audit(1750989477.170:163): avc: denied { create } for pid=6588 comm="syz.2.1700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 209.103274][ T6608] device veth1_macvtap left promiscuous mode [ 209.202740][ T6612] device veth1_macvtap entered promiscuous mode [ 209.211033][ T6612] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 209.277814][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 209.588227][ T6626] device caif0 entered promiscuous mode [ 209.915666][ T6666] cgroup: fork rejected by pids controller in /syz0 [ 209.929785][ T6664] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.128031][ T6700] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.140394][ T6700] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.148390][ T6700] device bridge_slave_0 entered promiscuous mode [ 211.165839][ T6700] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.178584][ T6700] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.187293][ T6700] device bridge_slave_1 entered promiscuous mode [ 211.335403][ T6700] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.342534][ T6700] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.349859][ T6700] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.356967][ T6700] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.544309][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.575476][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.605796][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.746708][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.759271][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.766434][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.774126][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.783153][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.790213][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.799162][ T6754] device veth1_macvtap left promiscuous mode [ 211.805382][ T6754] device macsec0 left promiscuous mode [ 212.059017][ T6786] ±ÿ: renamed from team_slave_1 [ 212.089557][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 212.109354][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 212.119304][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 212.127764][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 212.188141][ T6700] device veth0_vlan entered promiscuous mode [ 212.201255][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 212.215604][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 212.224191][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 212.232341][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 212.240874][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 212.249138][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 212.257662][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 212.265447][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 212.282264][ T6700] device veth1_macvtap entered promiscuous mode [ 212.291498][ T6793] ªªªªªª: renamed from vlan0 [ 212.332539][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 212.411341][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 212.471161][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 212.531149][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 212.589780][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 213.008462][ T49] device veth1_macvtap left promiscuous mode [ 213.017423][ T49] device veth0_vlan left promiscuous mode [ 213.452284][ T6839] device sit0 left promiscuous mode [ 213.745193][ T6846] syz.0.1766[6846] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.745295][ T6846] syz.0.1766[6846] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.928726][ T6846] device veth1_macvtap left promiscuous mode [ 214.061228][ T6846] device macsec0 entered promiscuous mode [ 214.189618][ T6855] device veth1_macvtap entered promiscuous mode [ 214.821189][ T6902] syz.4.1782[6902] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.821285][ T6902] syz.4.1782[6902] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.948262][ T6902] device veth1_macvtap left promiscuous mode [ 215.107618][ T6902] device macsec0 entered promiscuous mode [ 215.228955][ T6909] device veth1_macvtap entered promiscuous mode [ 215.800178][ T6953] device veth0_vlan left promiscuous mode [ 215.824531][ T6953] device veth0_vlan entered promiscuous mode [ 215.897431][ T6967] syz.2.1798[6967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.897602][ T6967] syz.2.1798[6967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.935053][ T6967] device macsec0 entered promiscuous mode [ 216.030900][ T6967] device veth1_macvtap entered promiscuous mode [ 216.064125][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 217.509418][ T7041] syz.4.1819[7041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.511616][ T7041] syz.4.1819[7041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.835835][ T7111] device syzkaller0 entered promiscuous mode [ 219.374402][ T7135] device syzkaller0 entered promiscuous mode [ 219.546241][ T7160] bridge0: port 3(veth0) entered disabled state [ 219.553960][ T7160] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.653504][ T7161] device veth0 left promiscuous mode [ 219.658950][ T7161] bridge0: port 3(veth0) entered disabled state [ 219.672338][ T7161] device bridge_slave_1 left promiscuous mode [ 219.688748][ T7161] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.699618][ T7161] device bridge_slave_0 left promiscuous mode [ 219.712677][ T7161] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.806251][ T7171] device syzkaller0 entered promiscuous mode [ 221.565838][ T7242] device ip6gretap0 entered promiscuous mode [ 221.584207][ T7242] device sit0 entered promiscuous mode [ 221.921333][ T7244] device pim6reg1 entered promiscuous mode [ 222.342561][ T24] audit: type=1400 audit(1750989490.820:164): avc: denied { create } for pid=7276 comm="syz.2.1887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 223.206081][ T7330] device pim6reg1 entered promiscuous mode [ 223.456363][ T7339] device pim6reg1 entered promiscuous mode [ 223.629265][ T7353] device sit0 left promiscuous mode [ 225.540747][ T7476] device wg2 left promiscuous mode [ 225.636153][ T7476] device wg2 entered promiscuous mode [ 226.302378][ T7499] device sit0 left promiscuous mode [ 226.476690][ T7499] device sit0 entered promiscuous mode [ 226.839425][ T7522] 7B’ç÷ï: renamed from syzkaller0 [ 226.882314][ T7522] device sit0 entered promiscuous mode [ 227.487275][ T7553] syz.0.1963[7553] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.487337][ T7553] syz.0.1963[7553] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.653487][ T7553] device veth1_macvtap left promiscuous mode [ 227.732188][ T7558] device veth0_vlan left promiscuous mode [ 227.747734][ T7558] device veth0_vlan entered promiscuous mode [ 227.755746][ T7559] device veth1_macvtap entered promiscuous mode [ 228.585997][ T7616] syz.0.1983[7616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 228.586090][ T7616] syz.0.1983[7616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 228.712505][ T7622] device veth1_macvtap left promiscuous mode [ 228.743574][ T7623] syz.4.1984[7623] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 228.743670][ T7623] syz.4.1984[7623] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.002169][ T7623] device veth1_macvtap left promiscuous mode [ 229.424684][ T7629] device syzkaller0 entered promiscuous mode [ 229.434323][ T7625] device veth1_macvtap entered promiscuous mode [ 229.737352][ T7644] device syzkaller0 entered promiscuous mode [ 230.034071][ T7668] syz.1.1995[7668] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.034160][ T7668] syz.1.1995[7668] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.933648][ T7709] device wg2 left promiscuous mode [ 231.040082][ T7706] device wg2 entered promiscuous mode [ 231.331986][ T7724] syz.0.2011[7724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.332085][ T7724] syz.0.2011[7724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.575458][ T7732] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.480994][ T7808] device wg2 left promiscuous mode [ 233.574578][ T7808] device wg2 entered promiscuous mode [ 233.724930][ T7823] bpf_get_probe_write_proto: 2 callbacks suppressed [ 233.724942][ T7823] syz.0.2038[7823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.751821][ T7823] syz.0.2038[7823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.125961][ T7845] ÿÿÿÿÿÿ: renamed from vlan1 [ 234.193319][ T7855] device pim6reg1 entered promiscuous mode [ 234.265665][ T7858] device syzkaller0 entered promiscuous mode [ 234.298837][ T7858] device syzkaller0 left promiscuous mode [ 234.315323][ T7862] device wg2 left promiscuous mode [ 234.485567][ T7862] device pim6reg1 entered promiscuous mode [ 234.626481][ T7867] syz.2.2051[7867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.626658][ T7867] syz.2.2051[7867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.669886][ T7867] device veth1_macvtap left promiscuous mode [ 235.130156][ T7884] device veth1_macvtap entered promiscuous mode [ 235.269890][ T7908] device sit0 left promiscuous mode [ 235.304366][ T7916] syz.2.2065[7916] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.304532][ T7916] syz.2.2065[7916] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.368751][ T7917] device sit0 entered promiscuous mode [ 235.643469][ T7916] device veth1_macvtap left promiscuous mode [ 236.030261][ T7953] device syzkaller0 entered promiscuous mode [ 236.050583][ T7957] syz.1.2076[7957] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.050689][ T7957] syz.1.2076[7957] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.006368][ T8002] device sit0 left promiscuous mode [ 237.225288][ T8013] !€ÿ: renamed from bond_slave_0 [ 237.530738][ T8027] syz.1.2096 (8027) used obsolete PPPIOCDETACH ioctl [ 237.652874][ T8041] syz.4.2100[8041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.652975][ T8041] syz.4.2100[8041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.684085][ T8034] device veth0_vlan left promiscuous mode [ 237.727018][ T8034] device veth0_vlan entered promiscuous mode [ 237.738177][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 237.752407][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 237.766010][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 237.800463][ T8041] device veth1_macvtap left promiscuous mode [ 238.267909][ T8066] device syzkaller0 entered promiscuous mode [ 239.031176][ T24] audit: type=1400 audit(1750989507.500:165): avc: denied { attach_queue } for pid=8116 comm="syz.2.2123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 239.421718][ T8144] bpf_get_probe_write_proto: 6 callbacks suppressed [ 239.421729][ T8144] syz.2.2131[8144] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.448488][ T8144] syz.2.2131[8144] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.477705][ T8145] device sit0 left promiscuous mode [ 239.522375][ T8144] syz.2.2131[8144] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.525670][ T8144] syz.2.2131[8144] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.617048][ T8136] device sit0 entered promiscuous mode [ 240.414576][ T8186] device veth0_to_team entered promiscuous mode [ 240.553229][ T8192] syz.2.2143[8192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.553340][ T8192] syz.2.2143[8192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.668253][ T8192] syz.2.2143[8192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.707833][ T8192] syz.2.2143[8192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.522014][ T8236] syz.4.2156[8236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.541141][ T8236] syz.4.2156[8236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.312849][ T8279] device wg2 left promiscuous mode [ 242.382541][ T24] audit: type=1400 audit(1750989510.860:166): avc: denied { create } for pid=8280 comm="syz.2.2171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 242.567617][ T8285] device syzkaller0 entered promiscuous mode [ 242.749667][ T8291] device veth0_vlan left promiscuous mode [ 242.756089][ T8291] device veth0_vlan entered promiscuous mode [ 242.778517][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 242.791778][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 242.822191][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.274496][ T8316] device pim6reg1 entered promiscuous mode [ 243.357367][ T8321] ÿÿÿÿÿÿ: renamed from vlan1 [ 245.295180][ T8375] bpf_get_probe_write_proto: 14 callbacks suppressed [ 245.295190][ T8375] syz.4.2202[8375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.311273][ T8375] syz.4.2202[8375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.352520][ T8375] syz.4.2202[8375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.381162][ T8375] syz.4.2202[8375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.855765][ T8384] device syzkaller0 entered promiscuous mode [ 246.458075][ T8392] device veth0_vlan left promiscuous mode [ 246.503182][ T8392] device veth0_vlan entered promiscuous mode [ 246.583877][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.605180][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 246.722616][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 247.032205][ T8413] syz.0.2214[8413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.032298][ T8413] syz.0.2214[8413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.045462][ T8413] syz.0.2214[8413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.057533][ T8413] syz.0.2214[8413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.633483][ T24] audit: type=1400 audit(1750989516.110:167): avc: denied { create } for pid=8434 comm="syz.0.2221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 247.901207][ T8444] device veth0_vlan left promiscuous mode [ 247.941639][ T8444] device veth0_vlan entered promiscuous mode [ 248.023362][ T8452] syz.4.2226[8452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.023448][ T8452] syz.4.2226[8452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.386659][ T8456] device syzkaller0 entered promiscuous mode [ 250.360331][ T8517] device syzkaller0 entered promiscuous mode [ 250.596763][ T8565] device pim6reg1 entered promiscuous mode [ 250.663647][ T8572] device sit0 entered promiscuous mode [ 251.505550][ T8603] device sit0 left promiscuous mode [ 252.054690][ T8623] device syzkaller0 entered promiscuous mode [ 252.321353][ T8642] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 252.574387][ T8639] device syzkaller0 entered promiscuous mode [ 252.806887][ T8654] device syzkaller0 entered promiscuous mode [ 252.824784][ T8656] device syzkaller0 left promiscuous mode [ 254.331900][ T8710] device pim6reg1 entered promiscuous mode [ 254.725983][ T8727] device pim6reg1 entered promiscuous mode [ 254.883735][ T8752] device sit0 entered promiscuous mode [ 255.134018][ T8758] device syzkaller0 entered promiscuous mode [ 255.251171][ T8761] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.568881][ T8764] device bridge_slave_1 left promiscuous mode [ 255.576377][ T8764] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.608259][ T8764] device bridge_slave_0 left promiscuous mode [ 255.635226][ T8764] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.952038][ T8812] tun0: tun_chr_ioctl cmd 1074025692 [ 257.356582][ T8842] device veth0_vlan left promiscuous mode [ 257.364737][ T8842] device veth0_vlan entered promiscuous mode [ 257.372091][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 257.380338][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 257.389240][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 258.307767][ T8869] bpf_get_probe_write_proto: 10 callbacks suppressed [ 258.307778][ T8869] syz.1.2340[8869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.352148][ T8869] syz.1.2340[8869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.399639][ T8869] syz.1.2340[8869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.421017][ T8869] syz.1.2340[8869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.462579][ T8872] syz.1.2340[8872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.501103][ T8872] syz.1.2340[8872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.970165][ T8904] device sit0 entered promiscuous mode [ 259.339374][ T8923] syz.3.2355[8923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.357374][ T8923] syz.3.2355[8923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.205273][ T8984] device veth0_vlan left promiscuous mode [ 261.244590][ T8984] device veth0_vlan entered promiscuous mode [ 261.335456][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 261.361857][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 261.371395][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 261.417878][ T8987] device wg2 left promiscuous mode [ 261.490338][ T8987] device wg2 entered promiscuous mode [ 264.204262][ T9057] device pim6reg1 entered promiscuous mode [ 265.426554][ T9107] device syzkaller0 entered promiscuous mode [ 265.962809][ T9132] device sit0 left promiscuous mode [ 269.416937][ T9231] device syzkaller0 entered promiscuous mode [ 270.611094][ T9290] device pim6reg1 entered promiscuous mode [ 270.810331][ T9305] ±ÿ: renamed from team_slave_1 [ 270.979803][ T9317] device syzkaller0 entered promiscuous mode [ 271.059964][ T9320] device pim6reg1 entered promiscuous mode [ 272.908452][ T9412] GPL: port 1(erspan0) entered blocking state [ 272.914709][ T9412] GPL: port 1(erspan0) entered disabled state [ 272.921547][ T9412] device erspan0 entered promiscuous mode [ 272.990663][ T9408] GPL: port 1(erspan0) entered blocking state [ 272.997012][ T9408] GPL: port 1(erspan0) entered forwarding state [ 273.230968][ T9424] device wg2 entered promiscuous mode [ 274.226659][ T24] audit: type=1400 audit(1750989542.700:168): avc: denied { create } for pid=9439 comm="syz.0.2501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 274.507339][ T9442] device sit0 entered promiscuous mode [ 277.183633][ T9501] device syzkaller0 entered promiscuous mode [ 278.121965][ T9551] device pim6reg1 entered promiscuous mode [ 278.138896][ T9557] ÿÿÿÿÿÿ: renamed from vlan1 [ 279.109675][ T9587] Â: renamed from pim6reg1 [ 279.201118][ T9599] device pim6reg1 entered promiscuous mode [ 279.311657][ T9610] device sit0 left promiscuous mode [ 279.518449][ T9610] device sit0 entered promiscuous mode [ 281.184745][ T9674] device syzkaller0 entered promiscuous mode [ 281.481099][ T9686] device pim6reg1 entered promiscuous mode [ 281.851138][ T9695] GPL: port 1(erspan0) entered blocking state [ 281.948131][ T9695] GPL: port 1(erspan0) entered disabled state [ 282.049225][ T9695] device erspan0 entered promiscuous mode [ 282.083736][ T9700] GPL: port 1(erspan0) entered blocking state [ 282.089915][ T9700] GPL: port 1(erspan0) entered forwarding state [ 282.278374][ T9709] device sit0 left promiscuous mode [ 282.705189][ T9730] syz.1.2592[9730] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.705291][ T9730] syz.1.2592[9730] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.256312][ T9757] device pim6reg1 entered promiscuous mode [ 283.335445][ T9758] device syzkaller0 entered promiscuous mode [ 283.505828][ T9760] device pim6reg1 entered promiscuous mode [ 283.822852][ T9776] device pim6reg1 entered promiscuous mode [ 284.363168][ T9800] device syzkaller0 entered promiscuous mode [ 284.424165][ T9806] geneve1: tun_chr_ioctl cmd 1074025672 [ 284.439282][ T9806] geneve1: ignored: set checksum enabled [ 284.551681][ T9815] device wg2 entered promiscuous mode [ 285.610563][ T9829] device pim6reg1 entered promiscuous mode [ 286.653356][ T9864] syz.0.2633[9864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.655078][ T9864] syz.0.2633[9864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.799010][ T9867] device pim6reg1 left promiscuous mode [ 288.501900][ T9904] device syzkaller0 entered promiscuous mode [ 288.543710][ T9906] device pim6reg1 entered promiscuous mode [ 289.908713][ T9976] device pim6reg1 entered promiscuous mode [ 291.919998][T10053] device syzkaller0 entered promiscuous mode [ 292.853437][T10083] device veth1_macvtap entered promiscuous mode [ 292.950835][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 294.619792][T10172] device syzkaller0 entered promiscuous mode [ 294.674456][T10171] device sit0 entered promiscuous mode [ 295.017164][T10194] syz.1.2722[10194] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.017255][T10194] syz.1.2722[10194] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.286005][T10204] device veth0_vlan left promiscuous mode [ 295.343412][T10204] device veth0_vlan entered promiscuous mode [ 296.051373][T10239] device wg2 left promiscuous mode [ 296.423804][T10246] device sit0 left promiscuous mode [ 296.579260][T10249] device sit0 entered promiscuous mode [ 296.889494][T10267] device sit0 left promiscuous mode [ 296.992712][T10268] device sit0 entered promiscuous mode [ 297.635109][T10288] device sit0 left promiscuous mode [ 297.780847][T10288] device sit0 entered promiscuous mode [ 299.375743][T10362] device pim6reg1 entered promiscuous mode [ 299.814574][T10386] device syzkaller0 entered promiscuous mode [ 299.833575][T10382] device wg2 left promiscuous mode [ 299.923556][T10391] device wg2 entered promiscuous mode [ 300.804954][T10421] device sit0 entered promiscuous mode [ 301.860531][T10451] syz.3.2793[10451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.860588][T10451] syz.3.2793[10451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.206243][T10485] device syzkaller0 entered promiscuous mode [ 304.719130][T10510] device veth1_macvtap left promiscuous mode [ 304.733742][T10497] device pim6reg1 entered promiscuous mode [ 304.938250][T10532] device pim6reg1 entered promiscuous mode [ 305.848388][T10570] device syzkaller0 entered promiscuous mode [ 306.061898][T10583] device sit0 left promiscuous mode [ 306.081724][T10584] device sit0 entered promiscuous mode [ 306.219034][T10596] device pim6reg1 entered promiscuous mode [ 306.348707][T10611] device pim6reg1 entered promiscuous mode [ 306.685068][T10624] device sit0 left promiscuous mode [ 307.010374][T10646] device syzkaller0 entered promiscuous mode [ 308.727204][T10724] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.734488][T10724] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.944804][T10724] device bridge_slave_1 left promiscuous mode [ 308.970101][T10724] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.061276][T10724] device bridge_slave_0 left promiscuous mode [ 309.113012][T10724] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.301828][T10735] device sit0 entered promiscuous mode [ 309.800546][T10769] device pim6reg1 entered promiscuous mode [ 310.233552][T10794] syz.1.2897[10794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.233616][T10794] syz.1.2897[10794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.963739][T10832] ªªªªªª: renamed from vlan0 [ 311.180970][T10841] device sit0 left promiscuous mode [ 311.638140][T10845] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.645512][T10845] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.653222][T10845] device bridge_slave_0 entered promiscuous mode [ 311.660394][T10845] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.667629][T10845] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.701512][T10845] device bridge_slave_1 entered promiscuous mode [ 312.091886][T10845] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.099005][T10845] bridge0: port 2(bridge_slave_1) entered forwarding state [ 312.106346][T10845] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.113411][T10845] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.217953][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.240971][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.296802][T10864] device syzkaller0 entered promiscuous mode [ 312.411991][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 312.431138][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 312.500683][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 312.516146][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 312.528758][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.535886][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.584587][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 312.601482][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 312.612330][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.619420][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 312.631036][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 312.639187][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 312.806291][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 312.816393][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 312.901402][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 312.938533][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 312.949708][T10845] device veth0_vlan entered promiscuous mode [ 313.003161][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 313.051702][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 313.082929][T10898] syz.0.2927[10898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.082992][T10898] syz.0.2927[10898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.109142][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 313.137063][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 313.176454][T10845] device veth1_macvtap entered promiscuous mode [ 313.183299][ T24] audit: type=1400 audit(1750989581.660:169): avc: denied { associate } for pid=10895 comm="syz.4.2926" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 313.263398][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 313.281644][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 313.290010][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 313.379071][ T9] device erspan0 left promiscuous mode [ 313.384737][ T9] GPL: port 1(erspan0) entered disabled state [ 313.427800][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 313.451298][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 313.462897][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 313.472037][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 313.701071][ T9] device bridge_slave_1 left promiscuous mode [ 313.707257][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.761257][ T9] device bridge_slave_0 left promiscuous mode [ 313.870319][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.932311][ T9] device veth0_vlan left promiscuous mode [ 316.333402][T10968] device wg2 left promiscuous mode [ 316.409892][T10969] device pim6reg1 entered promiscuous mode [ 317.305802][T10997] device syzkaller0 entered promiscuous mode [ 318.091212][T11030] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.100660][T11030] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.208189][T11033] device bridge_slave_1 left promiscuous mode [ 318.215695][T11033] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.216428][ T24] audit: type=1400 audit(1750989586.690:170): avc: denied { create } for pid=11031 comm="syz.4.2964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 318.243762][T11033] device bridge_slave_0 left promiscuous mode [ 318.250043][T11033] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.307017][T11034] device sit0 entered promiscuous mode [ 318.997315][T11046] tap0: tun_chr_ioctl cmd 2147767511 [ 320.408684][T11090] device veth0_vlan left promiscuous mode [ 320.417266][T11090] device veth0_vlan entered promiscuous mode [ 324.522079][T11201] device syzkaller0 entered promiscuous mode [ 331.803095][ T24] audit: type=1400 audit(1750989600.280:171): avc: denied { mounton } for pid=11355 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 331.875599][T11355] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.980966][T11355] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.131372][T11355] device bridge_slave_0 entered promiscuous mode [ 332.138729][T11355] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.145879][T11355] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.153481][T11355] device bridge_slave_1 entered promiscuous mode [ 332.682264][T11375] device wg2 entered promiscuous mode [ 332.733555][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 332.752353][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 332.780112][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 332.801313][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 332.827760][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.834902][ T306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.911477][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 332.941103][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 332.949475][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.956581][ T306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.998843][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 333.033817][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 333.047700][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 333.072025][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 333.080519][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 333.120611][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 333.131900][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 333.146700][T11355] device veth0_vlan entered promiscuous mode [ 333.203124][ T9] GPL: port 1(erspan0) entered disabled state [ 333.217292][ T9] device erspan0 left promiscuous mode [ 333.255975][ T9] GPL: port 1(erspan0) entered disabled state [ 333.334463][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 333.363696][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 333.391364][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 333.399003][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 333.406826][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 333.416020][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 333.430149][T11355] device veth1_macvtap entered promiscuous mode [ 333.466574][ T24] audit: type=1400 audit(1750989601.940:172): avc: denied { unmount } for pid=11355 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 333.520279][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 333.535230][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 333.570617][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 333.593423][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 333.609392][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 334.314978][T11461] device wg2 entered promiscuous mode [ 334.356572][T11463] device sit0 left promiscuous mode [ 334.538802][T11475] device sit0 entered promiscuous mode [ 335.004813][T11507] ip6erspan0: tun_chr_ioctl cmd 1074025677 [ 335.033155][T11507] ip6erspan0: linktype set to 805 [ 335.897948][T11546] device pim6reg1 entered promiscuous mode [ 336.447378][T11571] device veth0_vlan left promiscuous mode [ 336.511921][T11571] device veth0_vlan entered promiscuous mode [ 336.771009][T11575] device wg2 left promiscuous mode [ 336.813213][T11575] device wg2 entered promiscuous mode [ 337.175264][T11591] bridge0: port 3(veth0) entered blocking state [ 337.182817][T11591] bridge0: port 3(veth0) entered disabled state [ 337.210367][T11591] device veth0 entered promiscuous mode [ 337.219158][T11591] bridge0: port 3(veth0) entered blocking state [ 337.225893][T11591] bridge0: port 3(veth0) entered forwarding state [ 337.929360][T11621] device syzkaller0 entered promiscuous mode [ 338.210511][T11635] device sit0 left promiscuous mode [ 338.295259][T11635] device sit0 entered promiscuous mode [ 339.272716][T11653] device pim6reg1 entered promiscuous mode [ 339.793935][T11686] device wg2 left promiscuous mode [ 339.951710][T11686] device wg2 entered promiscuous mode [ 340.766971][T11712] device pim6reg1 entered promiscuous mode [ 340.955388][T11717] device pim6reg1 entered promiscuous mode [ 341.481459][T11740] device syzkaller0 entered promiscuous mode [ 343.209724][T11801] device veth0_vlan left promiscuous mode [ 343.241527][T11801] device veth0_vlan entered promiscuous mode [ 343.636199][T11814] device syzkaller0 entered promiscuous mode [ 344.073640][T11835] syz.4.3193[11835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.073706][T11835] syz.4.3193[11835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.110575][T11835] syz.4.3193[11835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.123828][T11835] syz.4.3193[11835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.192402][T11838] syz.4.3193[11838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.266245][T11839] device veth0_vlan left promiscuous mode [ 344.291525][T11838] syz.4.3193[11838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.366231][T11839] device veth0_vlan entered promiscuous mode [ 344.535321][T11841] device syzkaller0 entered promiscuous mode [ 344.569759][T11841] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 346.767892][T11950] device syzkaller0 entered promiscuous mode [ 347.332655][T11981] €Â0: renamed from pim6reg1 [ 349.278976][T12043] syz.1.3253[12043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.282435][T12043] syz.1.3253[12043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.782645][T12059] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.890088][T12059] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.897689][T12059] device bridge_slave_0 entered promiscuous mode [ 349.906494][T12059] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.914108][T12059] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.922166][T12059] device bridge_slave_1 entered promiscuous mode [ 350.336505][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 350.349322][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 350.483453][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 350.499772][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 350.512386][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.519630][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.584983][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 350.605654][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 350.686701][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 350.730131][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.737280][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.875372][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 350.884231][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 350.892805][T12098] device sit0 left promiscuous mode [ 350.905996][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 350.920088][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 351.094484][T12099] device sit0 entered promiscuous mode [ 351.198778][T12059] device veth0_vlan entered promiscuous mode [ 351.256104][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 351.264716][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 351.273540][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 351.281810][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 351.384928][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 351.392692][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 351.410241][T12059] device veth1_macvtap entered promiscuous mode [ 351.452939][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 351.461452][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 351.470348][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 351.553597][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 351.563866][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 351.572579][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 351.581479][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 352.891637][T12141] device syzkaller0 entered promiscuous mode [ 352.961143][ T306] device veth0_vlan left promiscuous mode [ 353.224107][T12156] device syzkaller0 entered promiscuous mode [ 353.240409][T12160] device pim6reg1 entered promiscuous mode [ 353.720044][T12176] device pim6reg entered promiscuous mode [ 354.156934][T12186] device pim6reg1 entered promiscuous mode [ 354.583431][T12214] device syzkaller0 entered promiscuous mode [ 354.796141][T12221] device veth1_macvtap left promiscuous mode [ 355.697933][T12249] device syzkaller0 entered promiscuous mode [ 355.778742][T12254] syz.4.3317[12254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.778835][T12254] syz.4.3317[12254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.042478][T12266] syz.4.3321[12266] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.171598][T12266] syz.4.3321[12266] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.357222][T12301] device syzkaller0 entered promiscuous mode [ 357.483554][T12309] syz.1.3332[12309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.483646][T12309] syz.1.3332[12309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 358.095151][T12337] device macsec0 left promiscuous mode [ 358.251931][T12333] device veth1_macvtap entered promiscuous mode [ 358.258280][T12333] device macsec0 entered promiscuous mode [ 358.272261][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 358.488492][T12346] syz.2.3343[12346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 358.488580][T12346] syz.2.3343[12346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 358.789102][T12378] device veth0_vlan left promiscuous mode [ 358.834606][T12378] device veth0_vlan entered promiscuous mode [ 358.953313][T12382] device wg2 entered promiscuous mode [ 359.000935][T12391] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 359.010913][T12391] pim6reg0: linktype set to 530 [ 359.273709][T12402] syz.0.3357[12402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 359.273800][T12402] syz.0.3357[12402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 359.313505][ T306] bridge0: port 3(veth0) entered disabled state [ 359.623070][T12398] device syzkaller0 entered promiscuous mode [ 360.800089][T12494] device sit0 left promiscuous mode [ 361.818476][T12528] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.825769][T12528] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.096557][T12533] device veth0 left promiscuous mode [ 362.112465][T12533] bridge0: port 3(veth0) entered disabled state [ 362.143099][T12533] device bridge_slave_1 left promiscuous mode [ 362.173045][T12533] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.205125][T12533] device bridge_slave_0 left promiscuous mode [ 362.214879][T12533] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.642897][T12556] device veth0_vlan left promiscuous mode [ 362.654989][T12556] device veth0_vlan entered promiscuous mode [ 364.125870][T12573] ÿÿÿÿÿÿnce: renamed from vlan1 [ 365.285877][T12644] bpf_get_probe_write_proto: 6 callbacks suppressed [ 365.285888][T12644] syz.3.3423[12644] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.307546][T12644] syz.3.3423[12644] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.780261][T12695] syz.4.3437[12695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.801298][T12695] syz.4.3437[12695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.885394][T12701] syz.4.3437[12701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.955084][T12701] syz.4.3437[12701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.426399][T12718] device pim6reg1 entered promiscuous mode [ 366.970288][T12743] device syzkaller0 entered promiscuous mode [ 366.992040][T12745] syz.1.3449[12745] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.992140][T12745] syz.1.3449[12745] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.186203][T12754] syz.1.3449[12754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.264327][T12754] syz.1.3449[12754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.965447][T12817] device pim6reg1 entered promiscuous mode [ 368.470736][T12827] device syzkaller0 entered promiscuous mode [ 368.622600][T12863] device syzkaller0 entered promiscuous mode [ 368.828462][T12875] device syzkaller0 entered promiscuous mode [ 368.931302][T12874] device macsec0 entered promiscuous mode [ 368.970346][T12882] device pim6reg1 entered promiscuous mode [ 369.091644][T12885] device syzkaller0 entered promiscuous mode [ 369.344156][T12907] cgroup: fork rejected by pids controller in /syz1 [ 369.917363][T12917] device sit0 entered promiscuous mode [ 371.045919][T12941] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.158150][T12941] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.176923][T12941] device bridge_slave_0 entered promiscuous mode [ 371.211209][T12941] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.243025][T12941] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.257719][T12941] device bridge_slave_1 entered promiscuous mode [ 371.418756][ T7] device bridge_slave_1 left promiscuous mode [ 371.427221][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.440535][ T7] device bridge_slave_0 left promiscuous mode [ 371.476040][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.548943][ T7] device veth1_macvtap left promiscuous mode [ 371.763519][T12966] device pim6reg1 entered promiscuous mode [ 371.800316][T12974] @ÿ: renamed from bond_slave_0 [ 372.004306][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 372.023786][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 372.120027][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 372.138635][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 372.167502][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.174730][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 372.201111][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 372.221848][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 372.240271][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 372.247399][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 372.263573][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 372.283225][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 372.291265][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 372.342255][T13014] device syzkaller0 entered promiscuous mode [ 372.365407][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 372.385789][T12941] device veth0_vlan entered promiscuous mode [ 372.410308][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 372.419131][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 372.452422][T12941] device veth1_macvtap entered promiscuous mode [ 372.469505][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 372.481222][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 372.498419][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 372.527281][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 372.587416][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 372.759161][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 372.785046][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 372.849749][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 372.904471][T13034] bpf_get_probe_write_proto: 12 callbacks suppressed [ 372.904484][T13034] syz.1.3505[13034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.936961][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 372.990231][T13034] syz.1.3505[13034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.014934][T13039] syz.1.3505[13039] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.073060][T13039] syz.1.3505[13039] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.278703][T13047] device syzkaller0 entered promiscuous mode [ 373.827488][T13086] syz.0.3549[13086] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.827600][T13086] syz.0.3549[13086] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.826152][T13138] device syzkaller0 entered promiscuous mode [ 377.219966][T13207] device syzkaller0 entered promiscuous mode [ 377.617070][T13228] device syzkaller0 entered promiscuous mode [ 378.392290][T13272] syz.4.3598[13272] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 378.392384][T13272] syz.4.3598[13272] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.331383][T13297] device wg2 left promiscuous mode [ 379.443350][T13297] device wg2 entered promiscuous mode [ 380.400132][T13331] device wg2 left promiscuous mode [ 380.545077][T13333] device wg2 entered promiscuous mode [ 381.977991][T13397] device syzkaller0 entered promiscuous mode [ 382.634875][T13429] device pim6reg1 entered promiscuous mode [ 382.821171][T13452] syz.0.3651[13452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.821251][T13452] syz.0.3651[13452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.875937][T13452] syz.0.3651[13452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.948826][T13452] syz.0.3651[13452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 384.085142][T13507] syz.1.3665[13507] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 384.202927][T13507] syz.1.3665[13507] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 384.203958][T13508] syz.1.3665[13508] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 384.272636][T13508] syz.1.3665[13508] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.602417][T13531] device syzkaller0 entered promiscuous mode [ 387.575022][T13553] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.592231][T13553] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.599827][T13553] device bridge_slave_0 entered promiscuous mode [ 387.648385][T13553] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.655838][T13553] bridge0: port 2(bridge_slave_1) entered disabled state [ 387.664442][T13553] device bridge_slave_1 entered promiscuous mode [ 388.283044][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 388.315277][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 388.661546][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 388.674816][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 388.705394][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.712726][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 388.746449][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 388.801395][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 388.854109][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.861242][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 388.875963][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 388.884347][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 388.893003][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 388.935981][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 388.957731][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 388.984716][T13553] device veth0_vlan entered promiscuous mode [ 388.992696][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 389.002891][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 389.077995][T13553] device veth1_macvtap entered promiscuous mode [ 389.090502][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 389.099314][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 389.107204][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 389.122207][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 389.131589][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 389.180486][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 389.193172][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 389.202383][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 389.211343][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 389.254180][T13600] syz.4.3677[13600] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 389.254279][T13600] syz.4.3677[13600] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 389.267720][T13600] syz.4.3677[13600] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 389.279730][T13600] syz.4.3677[13600] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 390.033782][T13627] device sit0 entered promiscuous mode [ 390.089161][T13634] syz.4.3702[13634] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 390.089342][T13634] syz.4.3702[13634] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 390.104231][T13634] syz.4.3702[13634] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 390.128398][T13634] syz.4.3702[13634] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 390.454339][T13640] device syzkaller0 entered promiscuous mode [ 390.497582][T13645] device pim6reg1 entered promiscuous mode [ 391.617565][T13688] syz.3.3718[13688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.617660][T13688] syz.3.3718[13688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.943343][T13718] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.962031][T13718] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.113466][T13717] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.120564][T13717] bridge0: port 2(bridge_slave_1) entered forwarding state [ 392.127923][T13717] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.134993][T13717] bridge0: port 1(bridge_slave_0) entered forwarding state [ 392.186082][T13717] device bridge0 entered promiscuous mode [ 393.202447][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 393.613128][T13803] device wg2 left promiscuous mode [ 395.473214][T13832] device syzkaller0 entered promiscuous mode [ 395.575858][T13832] device pim6reg1 entered promiscuous mode [ 396.700605][T13888] device syzkaller0 entered promiscuous mode [ 397.446050][T13924] device wg2 left promiscuous mode [ 397.575391][T13931] device wg2 entered promiscuous mode [ 399.779480][T13996] device syzkaller0 entered promiscuous mode [ 401.262619][T14065] bpf_get_probe_write_proto: 4 callbacks suppressed [ 401.262631][T14065] syz.1.3829[14065] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 401.269345][T14065] syz.1.3829[14065] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 404.058393][T14121] syz.3.3846[14121] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 404.190968][T14121] syz.3.3846[14121] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 405.539716][T14170] device veth0_vlan left promiscuous mode [ 405.616510][T14170] device veth0_vlan entered promiscuous mode [ 405.669669][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 405.681750][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 405.719263][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 406.084373][T14225] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.105817][T14225] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.118362][T14225] device bridge_slave_0 entered promiscuous mode [ 406.127050][T14239] device veth1 entered promiscuous mode [ 406.172846][T14225] bridge0: port 2(bridge_slave_1) entered blocking state [ 406.185962][T14225] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.193934][T14225] device bridge_slave_1 entered promiscuous mode [ 406.200545][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 406.332108][T14225] bridge0: port 2(bridge_slave_1) entered blocking state [ 406.339222][T14225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 406.346564][T14225] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.353650][T14225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 406.381009][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 406.391506][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.399950][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.413100][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 406.421876][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.428986][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 406.444209][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 406.452827][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 406.459972][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 407.161910][ T7] device bridge_slave_1 left promiscuous mode [ 407.168414][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.221600][ T7] device bridge_slave_0 left promiscuous mode [ 407.228153][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.281976][ T7] device veth1_macvtap left promiscuous mode [ 407.288233][ T7] device veth0_vlan left promiscuous mode [ 409.104247][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 409.115686][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 409.132471][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 409.141276][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 409.166112][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 409.189880][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 409.199067][T14264] device pim6reg1 entered promiscuous mode [ 409.273822][T14225] device veth0_vlan entered promiscuous mode [ 409.280144][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 409.336192][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 409.509808][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 409.529603][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 409.550076][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 409.558984][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 409.569023][T14225] device veth1_macvtap entered promiscuous mode [ 409.649314][T14287] device veth0_vlan left promiscuous mode [ 409.671318][T14287] device veth0_vlan entered promiscuous mode [ 409.702720][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 409.716268][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 409.736099][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 409.754250][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 409.769230][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 409.781424][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 409.791637][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 409.802505][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 411.217568][T14341] bridge0: port 3(veth0) entered blocking state [ 411.230999][T14341] bridge0: port 3(veth0) entered disabled state [ 411.255541][T14341] device veth0 entered promiscuous mode [ 411.288964][T14341] bridge0: port 3(veth0) entered blocking state [ 411.295364][T14341] bridge0: port 3(veth0) entered forwarding state [ 411.302796][T14348] syz.1.3908[14348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 411.302899][T14348] syz.1.3908[14348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 413.091897][T14445] device sit0 entered promiscuous mode [ 413.396237][T14456] device veth0_vlan left promiscuous mode [ 413.425168][T14456] device veth0_vlan entered promiscuous mode [ 413.545000][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 413.573251][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 413.603511][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 413.996914][T14472] bridge0: port 3(veth0) entered disabled state [ 414.003469][T14472] bridge0: port 2(bridge_slave_1) entered disabled state [ 414.011531][T14472] bridge0: port 1(bridge_slave_0) entered disabled state [ 414.193711][T14485] bond_slave_1: mtu less than device minimum [ 416.034527][T14533] device syzkaller0 entered promiscuous mode [ 418.620252][T14569] syz.2.3962[14569] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.620718][T14569] syz.2.3962[14569] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.509268][ T24] audit: type=1400 audit(1750989687.980:173): avc: denied { create } for pid=14613 comm="syz.4.3976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 420.405034][T14662] device sit0 left promiscuous mode [ 420.972010][T14681] device veth0_vlan left promiscuous mode [ 420.979675][T14681] device veth0_vlan entered promiscuous mode [ 420.996935][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 421.005464][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 421.013563][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 421.194763][T14684] device wg2 entered promiscuous mode [ 421.520671][T14691] device syzkaller0 entered promiscuous mode [ 421.640451][T14701] device wg2 entered promiscuous mode [ 421.738205][T14703] device veth1 left promiscuous mode [ 421.841864][T14718] syz.0.4007[14718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.841995][T14718] syz.0.4007[14718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.993623][T14732] syz.1.4011[14732] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 422.010471][T14732] syz.1.4011[14732] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 422.060632][T14729] device pim6reg1 entered promiscuous mode [ 422.190588][T14732] device pim6reg1 entered promiscuous mode [ 424.965938][T14796] device pim6reg1 entered promiscuous mode [ 425.713466][T14818] syz.3.4037[14818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.713862][T14818] syz.3.4037[14818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.782407][T14818] syz.3.4037[14818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.087423][T14826] device veth1_macvtap left promiscuous mode [ 426.107016][T14826] device veth1_macvtap entered promiscuous mode [ 426.113406][T14826] device macsec0 entered promiscuous mode [ 426.533108][T14848] device wg2 left promiscuous mode [ 428.952831][T14929] device syzkaller0 entered promiscuous mode [ 435.441296][T15139] device sit0 entered promiscuous mode [ 436.020254][T15162] device pim6reg1 entered promiscuous mode [ 436.226291][T15164] syz.3.4132[15164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 436.226386][T15164] syz.3.4132[15164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 436.840301][T15203] device sit0 left promiscuous mode [ 437.004030][T15205] device macsec0 entered promiscuous mode [ 437.651090][T15232] syz.0.4151[15232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 437.651180][T15232] syz.0.4151[15232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.042720][T15319] syz.2.4174[15319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.082232][T15319] syz.2.4174[15319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.057820][T15556] device syzkaller0 entered promiscuous mode [ 445.476962][T15636] device veth1_macvtap left promiscuous mode [ 446.845364][T15695] syz.1.4281[15695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 446.845454][T15695] syz.1.4281[15695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 447.138284][T15709] device syzkaller0 entered promiscuous mode [ 447.275054][T15716] device syzkaller0 entered promiscuous mode [ 447.359888][T15716] ip6erspan0: tun_chr_ioctl cmd 1074025677 [ 447.375714][T15716] ip6erspan0: linktype set to 805 [ 450.401534][T15811] device veth0_vlan left promiscuous mode [ 450.421467][T15811] device veth0_vlan entered promiscuous mode [ 455.541285][T15938] device syzkaller0 entered promiscuous mode [ 458.576390][T16077] device veth1_macvtap left promiscuous mode [ 458.590063][T16077] device macsec0 entered promiscuous mode [ 458.612048][T16077] device veth1_macvtap entered promiscuous mode [ 459.229619][T16128] device syzkaller0 entered promiscuous mode [ 459.438260][T16128] device sit0 left promiscuous mode [ 460.224543][T16173] device syzkaller0 entered promiscuous mode [ 461.036723][T16219] device syzkaller0 left promiscuous mode [ 461.803939][T16240] device syzkaller0 entered promiscuous mode [ 462.598380][T16282] device syzkaller0 entered promiscuous mode [ 463.017357][T16289] device sit0 entered promiscuous mode [ 463.075614][T16280] bridge0: port 1(bridge_slave_0) entered blocking state [ 463.083000][T16280] bridge0: port 1(bridge_slave_0) entered disabled state [ 463.101519][T16280] device bridge_slave_0 entered promiscuous mode [ 463.239690][T16280] bridge0: port 2(bridge_slave_1) entered blocking state [ 463.250336][T16280] bridge0: port 2(bridge_slave_1) entered disabled state [ 463.260712][T16280] device bridge_slave_1 entered promiscuous mode [ 463.611745][T16301] device pim6reg1 entered promiscuous mode [ 463.707466][T16305] device pim6reg1 entered promiscuous mode [ 463.757882][T16280] bridge0: port 2(bridge_slave_1) entered blocking state [ 463.764955][T16280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 463.772269][T16280] bridge0: port 1(bridge_slave_0) entered blocking state [ 463.779303][T16280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 463.813825][ T49] GPL: port 1(erspan0) entered disabled state [ 463.856753][ T49] device erspan0 left promiscuous mode [ 463.867548][ T49] GPL: port 1(erspan0) entered disabled state [ 463.891670][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 463.921318][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 463.930556][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 463.939406][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 463.947121][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 464.051167][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 464.059420][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 464.068109][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 464.076696][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 464.085846][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 464.095293][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 464.106518][T16280] device veth0_vlan entered promiscuous mode [ 464.113230][T16320] device sit0 left promiscuous mode [ 464.129838][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 464.137435][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 464.503262][ T49] device veth1_macvtap left promiscuous mode [ 464.733404][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 464.741727][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 464.773401][T16280] device veth1_macvtap entered promiscuous mode [ 464.792043][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 464.800243][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 464.809225][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 464.818603][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 464.827652][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 465.231056][T16358] device wg2 left promiscuous mode [ 465.610986][T16352] device pim6reg1 entered promiscuous mode [ 466.362667][T16390] device syzkaller0 entered promiscuous mode [ 466.760107][T16438] device sit0 entered promiscuous mode [ 467.943250][T16465] Â: renamed from pim6reg1 [ 468.240670][T16487] syz.2.4501[16487] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.240729][T16487] syz.2.4501[16487] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.827684][T16504] device syzkaller0 entered promiscuous mode [ 468.937313][T16525] device pim6reg1 entered promiscuous mode [ 469.200097][T16544] device syzkaller0 entered promiscuous mode [ 469.534438][T16557] device syzkaller0 entered promiscuous mode [ 471.520617][T16645] bridge0: port 1(bridge_slave_0) entered blocking state [ 471.531224][T16645] bridge0: port 1(bridge_slave_0) entered disabled state [ 471.543136][T16645] device bridge_slave_0 entered promiscuous mode [ 471.549960][T16662] device sit0 entered promiscuous mode [ 471.567640][T16645] bridge0: port 2(bridge_slave_1) entered blocking state [ 471.576492][T16645] bridge0: port 2(bridge_slave_1) entered disabled state [ 471.584453][T16645] device bridge_slave_1 entered promiscuous mode [ 471.840578][T16645] bridge0: port 2(bridge_slave_1) entered blocking state [ 471.847693][T16645] bridge0: port 2(bridge_slave_1) entered forwarding state [ 471.855031][T16645] bridge0: port 1(bridge_slave_0) entered blocking state [ 471.862115][T16645] bridge0: port 1(bridge_slave_0) entered forwarding state [ 472.010845][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 472.018516][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 472.028623][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 472.036498][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 472.055731][T16674] device pim6reg1 entered promiscuous mode [ 472.161577][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 472.220617][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 472.227714][ T306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 472.356488][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 472.364948][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 472.372036][ T306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 472.411725][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 472.419764][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 472.573826][T16645] device veth0_vlan entered promiscuous mode [ 472.580148][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 472.596807][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 472.605886][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 472.614911][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 472.636058][T16645] device veth1_macvtap entered promiscuous mode [ 472.704428][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 472.721834][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 472.778333][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 472.836045][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 472.892582][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 472.900419][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 472.908793][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 472.917472][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 472.926332][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 473.113995][ T49] device veth1_macvtap left promiscuous mode [ 474.276023][T16752] device veth0_vlan left promiscuous mode [ 474.348638][T16752] device veth0_vlan entered promiscuous mode [ 474.621188][T16759] device syzkaller0 entered promiscuous mode [ 474.955923][T16779] bridge0: port 3(veth0) entered blocking state [ 474.969016][T16779] bridge0: port 3(veth0) entered disabled state [ 475.019482][T16779] device veth0 entered promiscuous mode [ 475.113593][T16779] bridge0: port 3(veth0) entered blocking state [ 475.120169][T16779] bridge0: port 3(veth0) entered forwarding state [ 475.250423][T16802] device wg2 entered promiscuous mode [ 475.739116][T16829] device pim6reg1 entered promiscuous mode [ 476.817778][T16859] device syzkaller0 entered promiscuous mode [ 477.885023][T16946] device sit0 entered promiscuous mode [ 478.822260][T16971] device wg2 left promiscuous mode [ 479.252827][T16983] device syzkaller0 entered promiscuous mode [ 479.941618][T16998] device sit0 entered promiscuous mode [ 486.338832][T17198] device macsec0 left promiscuous mode [ 490.550814][T17340] device veth0_vlan left promiscuous mode [ 490.558669][T17340] device veth0_vlan entered promiscuous mode [ 490.584485][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 490.593331][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 490.602273][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 490.651056][T17341] device syzkaller0 entered promiscuous mode [ 490.947705][T17353] device pim6reg1 entered promiscuous mode [ 491.873513][T17373] device pim6reg1 entered promiscuous mode [ 492.154192][T17383] device wg2 entered promiscuous mode [ 492.179066][T17385] ÿ: renamed from bond_slave_0 [ 492.784438][T17402] device veth0_vlan left promiscuous mode [ 492.817339][T17402] device veth0_vlan entered promiscuous mode [ 493.124675][T17422] device wg2 left promiscuous mode [ 493.502199][T17435] device pim6reg1 entered promiscuous mode [ 493.533288][T17426] Â: renamed from pim6reg1 [ 493.874201][T17446] device sit0 left promiscuous mode [ 495.276253][T17503] device sit0 entered promiscuous mode SYZFAIL: repeatedly failed to execute the program proc=6 req=4815 state=1 status=7 (errno 9: Bad file descriptor) [ 496.454044][ T24] audit: type=1400 audit(1750989764.930:174): avc: denied { write } for pid=267 comm="syz-executor" path="pipe:[998]" dev="pipefs" ino=998 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 497.231830][ T49] device veth0 left promiscuous mode [ 497.237184][ T49] bridge0: port 3(veth0) entered disabled state [ 497.243882][ T49] device bridge_slave_1 left promiscuous mode [ 497.250002][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 497.257784][ T49] device bridge_slave_0 left promiscuous mode [ 497.264020][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 497.272021][ T49] device bridge_slave_1 left promiscuous mode [ 497.278161][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 497.285667][ T49] device bridge_slave_0 left promiscuous mode [ 497.291914][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 497.299908][ T49] device veth1_macvtap left promiscuous mode [ 497.306022][ T49] device veth0_vlan left promiscuous mode [ 497.312976][ T49] device veth1_macvtap left promiscuous mode [ 497.318996][ T49] device veth0_vlan left promiscuous mode [ 499.191640][ T49] device bridge_slave_1 left promiscuous mode [ 499.197771][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 499.205240][ T49] device bridge_slave_0 left promiscuous mode [ 499.211390][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 499.220373][ T49] device veth0_vlan left promiscuous mode