last executing test programs: 2.200547551s ago: executing program 3 (id=5977): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x1, 0x12) (async, rerun: 64) write$cgroup_pid(r4, &(0x7f0000000080), 0x12) (async, rerun: 64) setsockopt$sock_attach_bpf(r0, 0x1, 0x2a, &(0x7f0000000000)=r2, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000001850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) sendmsg(r1, 0x0, 0x20004050) (async) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x2) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async, rerun: 32) r8 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (async, rerun: 64) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r8, 0x4008240b, &(0x7f0000000180)={0x5, 0x80, 0x1, 0xf1, 0x7, 0x40, 0x0, 0x7, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x88c}, 0x684, 0x80, 0x1, 0x9, 0xfffffffffffffffb, 0x4, 0x7, 0x0, 0xdf, 0x0, 0x7}) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2.091368817s ago: executing program 3 (id=5979): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x15008}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x12006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x2, 0x6}, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001500)=ANY=[@ANYBLOB="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"/2367], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x1c, 0x60000000, &(0x7f0000000100)="b9ff03076044238cb89e14f0080047e0ffff00004000632177fbac14140cac14140c07029f89052f87e577ca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000}, 0x2c) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@union={0x8, 0x4, 0x0, 0x5, 0x0, 0xffffff01, [{0x8, 0x0, 0x3}, {0x8, 0x1, 0x2888}, {0x9, 0x5, 0x9c}, {0x0, 0x4, 0x3290}]}, @restrict={0xf, 0x0, 0x0, 0xb, 0x4}, @enum={0x5, 0x3, 0x0, 0x6, 0x4, [{0xa, 0x7fff}, {0xf, 0x5}, {0x1, 0xfffffff8}]}]}, {0x0, [0x0]}}, &(0x7f00000002c0)=""/60, 0x87, 0x3c, 0x0, 0x0, 0x10000}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0], 0x0, 0x58, &(0x7f0000000700)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000740), &(0x7f0000000780), 0x8, 0x86, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0xb9, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000040), &(0x7f0000000440)=""/183}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r4, &(0x7f0000000180), &(0x7f0000000680)=""/141}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={r4, &(0x7f0000000040)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r3, 0x58, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@bloom_filter={0x1e, 0x80, 0x800, 0x5, 0x4, r4, 0xfffffffe, '\x00', r5, 0xffffffffffffffff, 0x1, 0x0, 0x2, 0x5}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x14, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4fcbbade}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r7, r6}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x1d}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) 1.790527955s ago: executing program 4 (id=5984): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x10, &(0x7f0000000000)=@raw=[@alu={0x7, 0x1, 0x7, 0xb, 0x9, 0x8}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, @jmp={0x5, 0x0, 0x0, 0xb, 0xe, 0xffffffffffffffe0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x4, 0x93, &(0x7f00000000c0)=""/147, 0x41000, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x5, 0x47a9, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000003c0)={@fallback=0xffffffffffffffff, 0x5, 0x0, 0x7, &(0x7f00000002c0)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0], 0x0}, 0x40) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)=@o_path={&(0x7f0000000440)='./file0\x00', 0x0, 0x4010}, 0x18) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000004c0)={0x8, 0x0}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000400)={@fallback=r3, r0, 0x10, 0x2030, 0x0, @void, @void, @value=r4, @void, r2}, 0x20) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x101, '\x00', 0x0, r1, 0x1, 0x1, 0x4}, 0x50) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000580)={'ip6tnl0\x00', 0x400}) r6 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000640)={0x0, r5}, 0x8) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x2b, 0x4, 0x5, 0x1, 0x14000, r5, 0x2, '\x00', 0x0, r1, 0x0, 0x3, 0x4, 0x0, @void, @value, @value=r6}, 0x50) ioctl$TUNGETVNETLE(r7, 0x800454dd, &(0x7f0000000680)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r7, &(0x7f00000006c0)="49288250b191a370be2eabae8eccde0db754ed26967ef1697371e6d49c9e7340bb3d02f2fd33b6dcf90b884de203bb726e04c6718eede22f4d9a92913ef59020459c89c695ded09dc9a39902421a2b9b823e51fc1cf0925be73c59dc8a8fadafc491a908a7721aa31ecca627217b678bd89edbd09134c462569a584f914eef2abfde38827b497ced3eee89bdf15c4acde13fc8eb80fb5bfcece33568a40d2ae05ab4d56bb34ea3ee77b015a31eb7a228bd653dd45f6044199d33fd5f7f7922647293512b969e2ace922e76e8ace74f2583d0e7e94aa24ea29e939fd4a65d7ae59473498f651df8f5d91f98946d07"}, 0x20) socketpair(0x2b, 0x6, 0xff, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(r1, &(0x7f0000000840)={[{0x2b, 'cpuset'}, {0x6, 'net'}, {0x2b, 'rdma'}, {0x2d, 'cpuacct'}, {0x2b, 'blkio'}, {0x0, 'cpu'}]}, 0x28) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={r5, 0x58, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg(r1, &(0x7f0000000b00)={&(0x7f0000000940)=@nfc, 0x80, &(0x7f0000000a80)=[{&(0x7f00000009c0)="1b42747f01b636c936b3eac05e5a4b08f344a35ae86cbb97a5dd084014284707f01dd562b48bfc5ecde4771ba4ea0dfb5b94baf43a3e59e8c9d10eda4a7b981707fc3133a6c0450125a634a1ba620f66a8a3e6971dcdfc6cdca8e7c8e4c6a26c0b548039f455628aec7fa180be9fd70d3aa466aadbb68f2abe42e6ee8f2f49263fb39829bc648ce179f8f5758489c6dc3bb84426e097fc038fd282aceff160e0759effea07223a79d807", 0xaa}], 0x1, &(0x7f0000000ac0)}, 0x8000) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=@bloom_filter={0x1e, 0x7, 0xd8da, 0x5, 0x42504, r1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x4, 0xc}, 0x50) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r1, 0x0, 0x7, &(0x7f0000000bc0)='{{#\'\\,\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000c40)={r11}, 0x4) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000c80)=0x1) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000d00)=@generic={&(0x7f0000000cc0)='./file0\x00', 0x0, 0x10}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000ec0)={r12, &(0x7f0000000d40)="3d321ec1d65557b6e15f8d4946b7cd54d6c9a264103818c39f02fc6e96e1fe194a19bff20eeb87acd25648bd4ac0f02ef56a90f4b16762759de1ee63d16999a09f14ef19a9e62fd27b6e37b10f7ce6bdcb58ddee0aafd19afd1df723ac3a6db455b2ac77cd53ce85776b3733a7768daef9e66e0f64cfba548fb76562d324f856706804e00e9a3935afb54887decf00d2ec69fb557e93edab6b", &(0x7f0000000e00)=""/171, 0x4}, 0x20) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f0000000f00)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000f40)={@cgroup=r1, r0, 0x19, 0x10, 0x0, @void, @value=r3, @void, @void, r2}, 0x20) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000f80)={'pimreg0\x00'}) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x18, 0x20, &(0x7f0000000fc0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @map_val={0x18, 0x0, 0x2, 0x0, r10, 0x0, 0x0, 0x0, 0x8}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffd}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], &(0x7f00000010c0)='syzkaller\x00', 0xe, 0x9d, &(0x7f0000001100)=""/157, 0x41000, 0x0, '\x00', r9, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000011c0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000001200)={0x1, 0x6, 0x570, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001240)=[r7, r7, r7, r7], 0x0, 0x10, 0x5}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001500)={r1, 0x20, &(0x7f00000014c0)={&(0x7f0000001340)=""/127, 0x7f, 0x0, &(0x7f00000013c0)=""/202, 0xca}}, 0x10) recvmsg(r8, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/102, 0x66}, {&(0x7f00000015c0)=""/6, 0x6}], 0x2, &(0x7f0000001640)=""/76, 0x4c}, 0x102) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002900)={r0, 0x0, 0xc8, 0x89, &(0x7f0000001700)="6891693aa523ca43c316eb405451955aeeaa118424f9f14ac45297677859c834e9f54651bf1375b42e67b768f348307766a9a10d9d79102cf06f2fd02bb9bf142c43b59d00a8ae024cc2e6ee05af46293fc99c39aa478b0813822ef7dc45df32ffaed8a9aedd78216bf96ef9fd4a8427d81dbf080a3c84f47a38a40c1bea4f01d4d773668eae089ca19f6d10cbefaefef359fc71e55e9f9f6c96dfc7f85fac6eaffaea59cc321a8a1ddddb5fab4494f7dccede099a83022dc8bd1a44a86fea2b4c46cadeffdc6c25", &(0x7f0000001800)=""/137, 0x8000, 0x0, 0x0, 0x1000, &(0x7f00000018c0), &(0x7f0000001900)="ce01280b86f501e29a6c6e83860104641ce146168a733c614f8c34f5d5a8d65358e925f00c43826a16ad38cc115920fe4c5513a3edb9b61b47dc5fea149fed6ddc3224d1d8ae4c666aa51468190c227019ab764112c0ff10ad6334fd3c21f6a41122077e3512d6281dfd32f03032197a450e25ac1b11da878c8cf6dbcdaf3dd4db0ef9689d462d7f30646d96de49967e9358c32c33e9478c71681855287f600f7242f3ef9ddf5af03abafa338c46e0e536da8a732fd6c4869e050a74a776af0c67b1270b7cb7e03f5ef146d570817f3a70bfe78c67dcd2816c3ca9d72dd4d0a6f04cdc6d718d20713ae99109941623c7062a5e4b559ac2d5b13be31a2457e519a8bfcefd2318bf68a18d69854c0195ff8acff9219746f9b48706324c0a35b1e596a786c60c8ee3530c09b573765b542bc4fbc2f12cfcb8a8ba82c166eb59cfc6225c8e21adc397fb6ec6280ab505881da40b9af7677c69a99af6d3e74874442d345eab29a852ee058cf89481f8abd73a2c68dbf5c115ce1bbcebde934a31ecd29ebfb90e5329cfa2ef1ef53181f17a8198f1fa39bcefdb886dda75f2bbd83be042e5ef2ba48cb17b7567ae6a153bf4143edafa5be3e510d257e35b07d005560dd5a6095b9ee996d8b2e1bba8744f24b2582a9715102bfe097e288d7f7fb70c874df2eedf69acbb05811b1552850b4df112eabad66abc11484957a89914d19b18413ece6b663fe9c4aa88ae49a9d26082ba482ddfc912c7be5cfb8ada6baaa1356b21afc119f6f3686382f08c193d503c037482e5725123da30dbe8be0ef95e81f38216069a9ce7e4f5014c9f66c8c5f4a84de6694b27eb378e48ea39b6907f561ecd1620ec695f031608795ae84dd8610f7b74369de4b43d92c0ee692aceff30245159e8394480e5c8f4b7efec6a2f3828b263a7c80a45167f4f0809d06f5e56b3bcc3d3e80955452d81438efedd49548cb92701eba49c5fdfa964eb8c0bdf063745592f6eb90d2dcf89d48c39e9809c1bfb52256d79702365a8bd8958b224ffc15293355b3eab2e6eecbf6cc91535a0e0101f21c9b1392d6e9a713dd1e51bc03405da57b6c5ac4c02438a35dff4b6d2f2ccb2fe422ac587c9b5fd56c059dec834e253a997a95126b0a2d0fa5beae511f453ae169dec7860a40c591e61e9e34088e0e1f47392c25dc3c1e57dd531c165ab52cd6ba15c72981fd81c71f64be16eb4774a09820b908dc4f7ce373b4c8f0a2618eead66e61de60a4855848f9a326f08954280c48038c147473464c57ef9c32be64385e4f1ec3b68895aa349bc315295b7d3106a5f05b4dca75abe0e598c03614db32b4f51b2f03b01698b03430a7db237e2d054daa92858742b5c9764450b6f133a1a453dd4c919ae1c1ebe26bc1f5cd409a54f3c1b60415ada3e7ad233bcf1bb8c502436c71809e3de7a4504f67886cf3cc3ad7b2dae941c048678c6f9599a2e61bd3cc69704305e4b5b3b36018c78fc2750e8d8037868845d72a6e40b37f2cbf763d595b3d04e3e2250b268723204e33218c359f1f97bb95fde2aaedbf62b42b64cb085db0bb56c5bf94e704a03a47abe33ab8a201c21ce22c54357cd9cb7e157131b49c9ec884ed23ae2dc82fb2bd5d908a4594e8169fad46ec1dfd636e38b7bb4d1e85b689d2f06425e24ffec4541eddd22cbd5e23db528c16b0fb0da9f7b201f37569694fcc7e1104e8eafabd1786ea094af55c9f8b55b52d8dca41af8276d7fb509173ce946de552a9694695dc8fb745fc6229dbed19e0988ed5fe5d1bf7bd2af94529baf4964abadd929e778b48f74597a7cf49a4c72dd588e598231aed1276849da0c58f808909158cc309ef35ecf774af4678d04eb8445bcd21c87ca2295ca58fb6820250eb524cae4cd8a860153a280c421bc0eaaeb65e80852432304fcc9fc865f93ecf630c3456e10fc06996d115dd1dd4f3fa23aee04433dcf5679005e7111ead11f24e21e221f017e0a8beebd6d70798f59492e24c7ed774edaec77f41cb9f38ec2193558a5205f16c47fef4694461e2982addb741f89ab3f13ad8e3a9464f5ba59261f0c4c7e6551e985a22ac8e35b8ccbfe1c5dde99d5c3bf25d487b2965f114e39eaec0b4bacaf3aa83200edcb5f831daba3d3245abf50a04edf654c018a271974e8c5b93ff49ca5cfe632b5492f43090773043add8b352cdfdec60c6bb8f604d87520620b0cb9137e26011272338083559ff4d7643c43d90ea40d4c140d16aa22a9ab02db2ff1917072d1e5b93dc3fb6488885887d58916d626896999cd059b89f0f05b618f227fe7b177f6ab1b7c98736ff6bd9f093f5dc3d633a961013c9a9bdd71ef90bb3af7a761d961e97a6f2f91cac72a5912cd756e6183703ebfb7b2a9fc9697f9f25a81f2b0d1e61535aceda043e4349c4ca2cd102f74219ffb8b857cfb4cbe222e25fd4659185bb186c3dd1e6977dae83547a8fda1ecf4b56caa5f05e1f8e0d9c5ab9dc8c92ed633ff5ae6bdfbcac3412f372bef7a1b5b56688f896009c8d311a0013d7d71ab3b2e3e4050dadff87693de70bdc5073cc84a46f7241a5601b4e5ae03a3cd748d1bd5646e5156b051c57d043427933430194e5b795ed880368841c1053e4e6d6a2fead2dfb4b4ab970ae7adee6d631f062481688627a61262b13f008a188a30a0065e331a7778e17e4ade923df4a74ffb52020314842905c8c3ee3efc9d2d3b212811ef06281fe099430c18865c8c71bad5ca0aa07de5b594acf7e399cfc810e14791fbcd629e0fe59fe93d155e7dbbad5845a922a31d6489534598523c3a228c46ffef3b2dbf6aff8ffbf2849ffea4cb2a4583a5e7c03c8c97dc6640d396ba0e5c6e44c5f48d2aa8e657289f9715bde6e8c9c2c1741c16a0eb2357f4b71a360e617a80eb3c64d429517e50b3afccb7050f30e9986670e62b76dce5c8f660efd02024d711f64178359b89a86e29785526237ae7b2a83c42bc9d712d3fdc599322fb79d1782402aca490489261541eb4b96cba11eb539c7965d7ff8453be5495d55053c4728e9aab4c3f3c752c69f7513c0bbf5437f2ed99448a5697a6bc1ba8616d85838769241ddd2c0031170a423b873536279a28d1cae27572fea9f6ce5e5773128d0604066d0e1c8181fa6ff552797b15969656538e6a462e0cbcfc10f4b15873c24295121422285c84f616126dccee483c89d60b315a904b36ea2b00d706b4a5b5b336b28866e5a9a9dbae341a2b4d1b26f76ff023c2a2d9b1a99147e6a3fb1d76af62b7014a3c37c52505e68f57ae5d05056737b1934c80a44ef908e512b795f4c6b6d0e7c113ac238ec6974de3858ccf3617d73a580e60344636f3a62c5a22d5cd6fa30706fdcca9582e5675ef7863095bd82eca7fb5304ad0dec5c9efe7abfa61c63294f0f9b6704218c5915e20964ae98ce59c5f31ee4018fadd856c11702da58da33f5ec18e8abf3af04bc2b0c9fee25fea5aa61fed05706577ad6b710715dc4ed469d5ca22616c0d16d582d8db99b4ac16681f4e1c0b9985a09558d7af2f0e0f37d1d848d86b00634c0c47b45c87466b9bdad81066582224513396ddde4e65a9b7a47567a8d192769dbbadd0bf453298ec47345ec94278a4bf1662bd48e988957ed6c2abdfee10274df53ee9a54019cdc641548fd58a015f2773d6579d9833c4d237408e3e04434c9ed30f583b3bdb86f35c7e9d7aedf62481a6a951ca52c4c3428020af37ffcc5bf4d98ef51ce449ea8644f22955c160736465d669f84e45c0ad571cfe06e4f99c96cad920d04361d1ad5e0bccde7e66a20795b183f7a7412a041a37e8d95c69905004a9e7f922d5e1d05fdcd0eece6718cd12463b814223e50c8febefb14e598f1930192583f36878c83940d54e751fc1a2eb25d69d4e284f5762a85cc3497591d6dca1182be622fba87c5b2fe07f281b0cae7acc38e3f16a897807d8417e63645fd969cc05787736749919e86651c761d5f42ebf5ec54a3806fa63b6dfc3b26df638917753de3fdc23e91cf1b79ceb211cff4db1abe7d52ce1e869b114cba014cdf3621e94276f3ef62cc78bc528304423a488b40dee718e0f5a412847559b2b3facf3c577c1c1b4e70422f961e191144197d5ac6ccb4601ecd0812aee7ac64703bc13336ffdb67d7140a39ca254dd0281a9826e1496fa31b96e72b8f06c45fdefeb1b3d532dbf18645d29971d20935c377c5eccbdc79278e8d65da97a47fcbe8dbc8baa44dd1b51b08b441b39812d1e580918c520e4b99b0db932f646908de552010bbb2186da0debb694979cdc43531642ee1145d174c53b073deaba9fb91966cf5e43ca1b42dbc52f97f4ddb2e4da11ca4b71e1e1c64ca04a633c49d35ede3657cc0a59137261a125487fc2794952034f1040a762ed77adfc32f45db800382e63b4a939f1527107b9f9d00a36eff24863d1406df9d026e36b946f5d579fcdffd17548fa40865dd543b80b6bc0fa5a41a1693bae00563f8baab002e87208de0980807aec86980d42416056b4f0d9edbbd914b1cca2c288b4b1cfe2a1e6a07bd69101bda9f01ded8d370beca5e791c6a4993de58f17f10198850d6197ea7b8736c6727ab006b118bddb00b36adbba6123642683f98a9dc8a9cd894bff331dc3e9312ae80881b666fa19851175ad33957b0385036362b0df28239f6df3066c9457bf2ae7341bb3452518d72bb821b8862bad0be086ee014e6ab01f48423741fe0b2bf0ce644a5a8f85e01fb2b1689401c95c2d6a588162cac34a810bc8370a1f2fa5673c27ca5e96f3082c137485d30de6a82fec8d2a5cdbe90e913a4e6d9a4ecbb12fd6b8e53044bffd53fbc025b874c12e90d30e44788c5738fa98cf1d2ef193d218bd1aeedc7a29a79b679ed49324dd56312c62c2b27af6acf274225404a7e11df8a9d83be1b8b57c3d940bd12ac4205f450fac1b7e2d47cf6053424112d072975fb5a651ccd906bb7f6e4229febc1f0b73de46f7079ee93e05ee2d3122bd1e37989580af080e084d6a2ca0dd359e6c6ca03f7f02b36fd56cd2767ebaab23819641d831237a153c52bbbd8e8763a410b68be7aec6949c1c82c25273b5e04643b75850bea140b1daafcc59c96f569a0723f011b31ee56848b8d666433f4ee602d5184ef0338f4e8158e11ee70c8b20621eb7ad0d9c8f999d31f2e6b22d9e3adc45ecfa08d005220b81026fed3248ac19162211b77f31d08e23399cce1f03efcc8e39eae780a51ab29fb8bc1218703240a312c01f08668a765b9cf8209f0cc28791006a1eb533ba34ef7cfcab11474d0ab35e65a2a961c4234aeb9bebab9f2a9595a7404f3278537000dacb133d9c5371dcd30eb5fc915784b6bd67e04a07073ca0865f64de044adf4a94bade071ede9733e865384338bcc0d72f0b1240590b306e294a2f9df040a7e159785d0f814fbdbe7bd1ef2224139a49b353a7090e996a82303bee60df51771c352d2d2d1703ab693a51da5b69e97e64facc8ce7333fcc320cf8926985e081cdc94c1376d5c9ea88d97cb0a113b77121c6d42454a0e3e08c05ebc8c0e1b5b1755dab086bb4cae8e72672e8091e6fd32bc945a72e3053d709e4875b110eb6b1aed5eb056220cd4cf9f8926b494b696434ab81f41c389fd7a8e03a8a7d9e5a93a36e107ef3acf36ab67e8d947a911dc8c62aca69466012fe3a89164bd3ee21c27645acc0a42060592669b584c8bfd08c6a99aae9412e2f258a99edfd9276bafe201e5c3c746ee55e6ecce8221759fbf6d1beb60fe3ae00fc8fdcc1a019fbee38fe6c3bdd3c", 0x0, 0x0, 0x5}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000002980)='ip6tnl0\x00') close(r13) 1.687986701s ago: executing program 4 (id=5986): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x5, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x4, 0x5, 0x0, 0x6}, @alu={0x7, 0x0, 0x9, 0xb, 0x7, 0x0, 0xffffffffffffffff}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x4}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1c, &(0x7f00000000c0)=""/28, 0x41000, 0x19, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x0, 0x1, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x4, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1], &(0x7f00000001c0)=[{0x1, 0x2, 0xe, 0x6}, {0x4, 0x3, 0x3, 0xb}, {0x5, 0x1, 0x8, 0x4}, {0x5, 0x4, 0xb, 0x6}], 0x10, 0x9}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000003c0)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@ifindex=r2, r0, 0x1f, 0x2018, 0x0, @value=r3}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000000440), 0x2, 0x0) (async, rerun: 64) r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x3, 0x80, 0x2, 0x5, 0xdf, 0x2, 0x0, 0x9, 0x8, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000480), 0x2}, 0x200, 0x8, 0xb, 0x4, 0x7, 0x2, 0xc1, 0x0, 0x6ca33f1e, 0x0, 0x80000000}, r4, 0x10, 0xffffffffffffffff, 0x3) (rerun: 64) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000540)='./cgroup/syz0\x00') (async) openat$cgroup_subtree(r4, &(0x7f0000000580), 0x2, 0x0) (async) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000005c0)={0x1b, 0x0, 0x0, 0x50, 0x0, 0xffffffffffffffff, 0x401, '\x00', r2, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x50) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={r1, 0x80000001, 0x4}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000680), &(0x7f00000006c0)=r0}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ac0)={0x6, 0x23, &(0x7f0000000740)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6a}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r8}}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x80}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000880)='GPL\x00', 0x1, 0xbd, &(0x7f00000008c0)=""/189, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000009c0)={0x0, 0x9, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000a40)=[r9], &(0x7f0000000a80)=[{0x3, 0x4, 0x1, 0x1}, {0x2, 0x5, 0xb}], 0x10, 0x8}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r8, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r10}, 0x20) (async) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000cc0)=@generic={&(0x7f0000000c80)='./file0\x00', 0x0, 0x18}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r11, 0xffffffffffffffff}, &(0x7f0000000c40), &(0x7f0000000d00)=r12}, 0x20) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000d80), 0x54000, 0x0) (async) r14 = syz_clone(0x100200, &(0x7f0000000dc0)="0955e440a9a8f57c0a1effb1b676ac8316ebb475e439d5c22cf2741adc53b806788f335c10d50159", 0x28, &(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)="8252cc1e2697f4d316f1eee32e797cfe3dc8da69b68b1a604b9eac7ce580f9cb934b0b14e7b900954417c2c8016bf744d07bd08198b2e7a1e37c372a362ecb65ad49a5ba321a201622671691c22a3d61b8d83627d66b5e54825ce6bd219cec7ee6af1d81245c869197196b587d337f5cc48d1a258310e7dbec84b884a9b124297408b8eeb29be51e7e9006a3feb143ef7eb870d051bc4cc47a527363bec646e62566ef69a4df") syz_open_procfs$namespace(r14, &(0x7f0000000f40)='ns/uts\x00') syz_clone(0x2800000, &(0x7f0000000f80)="8c3f0e66d181bb149278367301e0457c483451f3ba780532edb17f6c466bcb5796c72de080a1f76abac11e7caba81e19e30e0ef2a27a896a722767dc67ab2772f2d6a18af655a70b43ca61984b57867598a38fb32958d18d9650811ca0d9031ac22633692c9e470970aa45c5b27c4472734eefbcdf86a9b6a859afc9ab221131836d45a50c44c8dc08be26add7df63b40cc831fe5f47fe0bb9b0afebc72c58ed2b83ab805575f6886793f80f51ab6bb6307bca5ad3be", 0xb6, &(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)="418a0587932c420ece523b651b094b3ae129f179573a313d98cc5c95b3dbe5f647496b8a4372e7f2ccb29ba71fa3fe723eba11017dc77bd512723a593d73a7196c8aeed339f0a47eff428cc6d596eb778278eb55e644788716e3e396dc9633cd509a0efc109e") r15 = perf_event_open$cgroup(&(0x7f0000001180)={0xc0e52502d0514948, 0x80, 0x1, 0xce, 0x8, 0x9d, 0x0, 0x5, 0x40802, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000001140), 0xd}, 0x10000, 0x6, 0x1, 0x1, 0x1a6, 0x7, 0x1, 0x0, 0x2, 0x0, 0x7fffffffffffffff}, r4, 0x7, r5, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r15, 0x40042409, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001280)={r8, 0x58, &(0x7f0000001200)}, 0x10) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000023c0)={r7, &(0x7f00000012c0)="961284937941dce3dd9707ae2bdfdf7e054498d8368383338767d8f0700cbc1e38f0941754022688f3bd86a4b2f7c59f260570bbbbc4a37bf3ac6c6654bb56ad2f5609ce29ed7864f3f1ea77f416ce9600a4080cb54acbbc7152d2b34250a4adad612b503697ddf2d69d9239eb0cb70174a795c98d5ebbe8f0db966bea76c39e6293718ed3e041d5df652fc406d7cdaaab6e57fc6425095ed086684987d33e5f9d281ec8edf76b93c7913c7c08caff40a959af230efbe4a34af3352816e5584c2c26", &(0x7f00000013c0)=""/4096}, 0x20) ioctl$TUNGETVNETBE(r6, 0x800454df, &(0x7f0000002400)=0x1) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002540)={@map=r13, 0x1, 0xd96691da8cda6c3b, 0xd, &(0x7f0000002440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000002480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000024c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002500)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) openat$cgroup_type(r4, &(0x7f0000002580), 0x2, 0x0) (async) r17 = openat$cgroup_ro(r4, &(0x7f00000025c0)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000002600)={@cgroup=r4, r17, 0x2, 0x2020, 0x0, @void, @void, @value, @void, r16}, 0x20) 1.515713631s ago: executing program 3 (id=5988): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xdc}, 0x60, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2d, 'rdma'}, {0x2b, 'freezer'}]}, 0xf) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x101801, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'\x00', 0x2}) ioctl$TUNSETDEBUG(r2, 0x400454c9, 0xffffffffffffffff) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000040)={0x1}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x4, 0xffffffffffffffff, 0x2) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 1.236287547s ago: executing program 4 (id=5991): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000100)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x9, '\x00', 0x0, r1, 0x2, 0x4, 0x3}, 0x50) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001340)={r0, 0x58, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001440)={0x8, 0x13, &(0x7f00000001c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7fffffff}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x480000}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000280)='GPL\x00', 0x8000, 0x1000, &(0x7f00000002c0)=""/4096, 0x40f00, 0x52, '\x00', r4, @cgroup_skb=0x1, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001380)={0x5, 0x1, 0x5, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x2, &(0x7f00000013c0)=[r0, r2, r0], &(0x7f0000001400)=[{0x1, 0x5, 0xf, 0xc}, {0x1, 0x2, 0x9, 0x5}], 0x10, 0x6}, 0x94) r6 = gettid() r7 = perf_event_open(&(0x7f0000001540)={0x4, 0x80, 0x6, 0x7, 0x3, 0xf, 0x0, 0x5, 0xb160, 0x7, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000001500), 0xe}, 0x5, 0x3ff, 0x1000, 0x5, 0x2, 0xffffffff, 0x1ff, 0x0, 0x8, 0x0, 0x8}, r6, 0x1, r3, 0x11) r8 = openat$cgroup_procs(r7, &(0x7f00000015c0)='cgroup.procs\x00', 0x2, 0x0) r9 = getpid() write$cgroup_pid(r8, &(0x7f0000001600)=r9, 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r2, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000019c0)=@bpf_tracing={0x1a, 0x12, &(0x7f0000001640)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @map_idx={0x18, 0x5, 0x5, 0x0, 0x6}, @generic={0x1, 0x3, 0x1, 0x3, 0x8}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x101}}, @alu={0x7, 0x1, 0xc, 0x2, 0x4, 0x50, 0x10}, @jmp={0x5, 0x0, 0x0, 0x9, 0xb, 0x100, 0x8}, @exit], &(0x7f0000001700)='GPL\x00', 0x5, 0x69, &(0x7f0000001740)=""/105, 0x40f00, 0x2, '\x00', r10, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x0, 0x7, 0x80, 0x5}, 0x10, 0x11001, r5, 0x6, &(0x7f0000001900)=[r3], &(0x7f0000001940)=[{0x1, 0x3, 0x4, 0x5}, {0x2, 0x2, 0x8, 0xc}, {0x3, 0x3, 0xc, 0xc}, {0x3, 0x1, 0xd, 0x8}, {0x4, 0x4, 0xe, 0x6}, {0x1, 0x2, 0x6, 0xa}], 0x10, 0x2}, 0x94) syz_clone(0x20000000, &(0x7f0000001a80)="b91e56049a3fcc9c70ff8b2694df996cb801b62a46f49b564adacbeaf79e110df20f6367ce54063143fa3b3018e98baea172bc9ecc63f3dbfa3f76f30f7ddfd61a19064c3e17865d8d99c06456802cf6b437549b3e389d7c77d1569adc051173b905d2f2e71fe7105cd6392c56ba2c5c1bce0b", 0x73, &(0x7f0000001b00), &(0x7f0000001b40), &(0x7f0000001b80)="7fc5a590369c6c111c65298819c2322836ddcb3ad4f13bf5e30894d3bb7baacae90e0962021b8c89343abcbf0681344286e9f87255376693d30a999e9dc476462effa7357307466a6f40c4df43053f46346f1e3729668087b879bd60785adf53f03c4937e7aacded07ca7dd32e2d55b8e2e80a6a43e92a2f5a195cc158d851a7fb57cc432a09960c225b44b414d325d6a65cbe4a23edfb1660cc83c148b8eab5288bd3855e44f3985eecd10747dbb3b87914e15c33b908") r11 = openat$cgroup_subtree(r3, &(0x7f0000001c40), 0x2, 0x0) write$cgroup_subtree(r11, &(0x7f0000001c80)={[{0x2b, 'cpuacct'}, {0x2b, 'freezer'}, {0x7b, 'pids'}, {0x2d, 'io'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}, {0x2b, 'net_cls'}, {0x2b, 'hugetlb'}]}, 0x3c) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001d00)=@o_path={&(0x7f0000001cc0)='./file0\x00', 0x0, 0x4010, r8}, 0x18) openat$cgroup_type(r3, &(0x7f0000001d40), 0x2, 0x0) recvmsg$unix(r3, &(0x7f0000002080)={&(0x7f0000001d80)=@abs, 0x6e, &(0x7f0000002000)=[{&(0x7f0000001e00)=""/15, 0xf}, {&(0x7f0000001e40)=""/67, 0x43}, {&(0x7f0000001ec0)=""/165, 0xa5}, {&(0x7f0000001f80)=""/106, 0x6a}], 0x4, &(0x7f0000002040)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x40000042) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002140)={{r0, 0xffffffffffffffff}, &(0x7f00000020c0), &(0x7f0000002100)=r11}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002380)={r0, 0x58, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r15 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000002440)={0x1b, 0x0, 0x0, 0xa34, 0x0, r3, 0x7, '\x00', r10, r3, 0x0, 0x4}, 0x50) r16 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002500)=@o_path={&(0x7f00000024c0)='./file0\x00', 0x0, 0x18, r0}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002640)=@bpf_ext={0x1c, 0x5, &(0x7f0000002180)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r13}}], &(0x7f00000021c0)='GPL\x00', 0xc293, 0xf4, &(0x7f0000002200)=""/244, 0x40f00, 0x48, '\x00', r14, 0x0, r3, 0x8, &(0x7f00000023c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000002400)={0x3, 0xd, 0x2, 0x6}, 0x10, 0x23d0f, r3, 0x9, &(0x7f0000002540)=[r2, 0xffffffffffffffff, r2, r15, r16, r12, r3, r12, r0], &(0x7f0000002580)=[{0x5, 0x3, 0x0, 0x2}, {0x1, 0x5, 0x8, 0x5}, {0x1, 0x4, 0xa, 0xa}, {0x1, 0x5, 0xb, 0xa}, {0x0, 0x1, 0xd, 0x4}, {0x0, 0x4, 0x8, 0xa}, {0x3, 0x3, 0x2, 0xb}, {0x4, 0x4, 0xd, 0x1}, {0x1, 0x1, 0xd, 0x3}], 0x10, 0x2}, 0x94) r17 = syz_clone(0x4e00100, &(0x7f0000002700)="5245d5adb01754f4a0fd3bc9d08a7a7f47e6f29b2b85f58b8b1db37ad2e495fb3916b31be6c2f6aa724d56c7d8ca004ec90f", 0x32, &(0x7f0000002740), &(0x7f0000002780), &(0x7f00000027c0)="8ba790219a628dc5fc8f7eb2680bd007bc7b88ee8ff658e6787e39661f407399f42768beae38f6") write$cgroup_pid(r8, &(0x7f0000002800)=r17, 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002a40)={r13, 0x58, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000003b80)={r3, 0x20, &(0x7f0000003b40)={&(0x7f0000002b00)=""/4096, 0x1000, 0x0, &(0x7f0000003b00)=""/20, 0x14}}, 0x10) r20 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000003c00)=@generic={&(0x7f0000003bc0)='./file0\x00', 0x0, 0x18}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000003d40)={0x15, 0xf, &(0x7f0000002840)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000028c0)='syzkaller\x00', 0xffffffff, 0x8b, &(0x7f0000002900)=""/139, 0x41000, 0x21, '\x00', r18, @sk_reuseport=0x28, 0xffffffffffffffff, 0x8, &(0x7f0000002a80)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000002ac0)={0x3, 0x1, 0x2, 0x1}, 0x10, r19, r20, 0x3, &(0x7f0000003cc0)=[0x1, r3, r16, 0xffffffffffffffff], &(0x7f0000003d00)=[{0x4, 0x5, 0x2, 0x9}, {0x4, 0x2, 0xf, 0xa}, {0x5, 0x2, 0xb, 0x3}], 0x10, 0x7d3b}, 0x94) 722.783448ms ago: executing program 2 (id=5996): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000005000000850000000800000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xb77, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x50) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r1, r2}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe, 0x0, &(0x7f00000001c0)="29dd4c808f84a1688ccf6f00f805", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 688.264379ms ago: executing program 2 (id=5998): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000640)={r0}, 0xc) (async) r1 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffffff, 0x0, 0xb6, &(0x7f0000000d00)='/ppv4\x00\xe2s/sync_\x00\x13\x00le\xf44C\xab%nN\xd4\xa2\x88\xcc\xd2\xf1d\'\xa5\x11c\x91l,\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdeQX\x8e\x84\xce/HM\xdd\xb6\xcd\xcb\x9dBi\x96e\x85\x95\x00n\xbc\xceR\x8ab\x99$\xcc\x9b\xdc\xed\x1d\xff\t\'\xa4\x84\x0f\x99\xd2\x1e\x16c\xb2\x03\x9c\xd9\xc1\xb8\x8fw\x8a\xcb\x1cl{\xfb\xd7^k6\x80\b*\xde_\xc2\xe9^\xa8\xd8\x03\xd4.&\xce\t\xdf\x98T\xb030\xd4\x94\x80\xbd\xdd\x13\x06\xb9\xff\x1e_\"\x1cs:4]\xaf\xcc`\xaeE\xdaKW\vK\xb5u\xcdz\xba9.~\n\xb07\x1c\xed\x876\xad\xde \x82\xf7'}, 0x30) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0), 0xc) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000500)) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c40)={0x11, 0x2, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0xffffff32) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, 0x0, 0x37}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="8500000800000000070000000000000095000000000300000767672a39668c826a9f7a4aeeb8cffd43634b3188b7311d93b44a2df956f9bfa0f2481b22e488ed335ca7bc8f8b8efbef5da9db69cc5779e1ca2d51bdc61011ffdb232975df5c80c3f94c2e7402702cb37e2d1873a233ed1fb6e64ddc313ed1b60c6206fa18dbb3c0c66fb03269a67f8d3d5627a2277f04f56e501969b2c4a8bc6fa4370b46446216038f262590262bbb5c3ca0f46c091d2de8644c6d8add7aab3902ec352b68fea9873b37ae1dbddce1ff"], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback, r4, 0x9, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000000000000000000000000181100008825170602dc5a1f6dd9c0858c44ebdac496db2099c655e946b5e0fe9004e80e2c6f4d111c52140688518b9abde9ff93f156d9178678114f24bf479bd761c56862ea09ca807a9306c7105d90c3", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffad, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a00), 0x4) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={&(0x7f00000003c0)="f51f559c934242a941825ff2ab27f7a982883cc9f9f8cb8b459a5134f8a3aae2f140754b348d5087ee64e882d928b6969c41c4ae0c47b0e15d8794e9a6a3e420842dff5f16ba1ee0b47fc25ee8b52ee6d6625f58307a28820c338914764b51be3557a841378d88ae4ee1f150332ad6f8510733639b3d14b2e7fd57c5039cf555beed5c9f3ff9992b4a20a3a9af7164cf7f2b11c44b30720dbc5fc49cf88a77b4c6ba9980d891bfbed094974187840e67a3ae54a6f3bbdaa2617e6b1b8a8ca4dc57fb039f48d035928ef07e158a", &(0x7f0000000900)=""/170, &(0x7f0000000c40), &(0x7f0000000a40)="e748551b2d4f9b98b8077e0c7a822411abead558392df0781d1a0b6337211ab609fc68b1890406abd5588fb242ded48f22e7e91a1e23777a2dd34ff9a72c009f569bfae2d7a0d85e392318e3decd7786bb0342ddfed96fec2fbc5bde8b67ddea252fad2d0ed8c6fec4317315962e53e01757de6a7d68ab643790aa1d89b995fc6e24cec854aff12da55e75a7b6dbf0f3504af44c0299e31a5d200bd568baebe6387c68a4c96cb21b92243fbbc3d2997e860b5cef13d323103225087368e1b98f9c4b42fdcf01caff3c26839dee5f6d9c5902a0ba47954effe84cf0683afd10fe5a2989577f897e31d45e5f8bde6b1861d4b7", 0x80000001}, 0x38) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000c00), 0x8) (async) socketpair(0x18, 0x2, 0x1, &(0x7f0000000000)) (async) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002200000085000000050000009500000000000000f65401fd00a4bf7d933ca5ec7695300074067c0d29d2e80b4a0bbee4d71fd158"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x46) 591.821975ms ago: executing program 0 (id=6000): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1, 0xf, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180), 0x4) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x39, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0xf, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x107a654, 0x0, 0x0, 0x0, 0x1}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000600), 0x8) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000700)={'pim6reg0\x00', @remote}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x14, 0x17, &(0x7f0000000080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000140)='syzkaller\x00', 0x41, 0xd4, &(0x7f0000000280)=""/212, 0x0, 0x14, '\x00', 0x0, @fallback=0x22, r2, 0x8, &(0x7f0000000380)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, r5, r1, 0x3, &(0x7f00000003c0)=[r0, r0, r0, r0, r0, r0], &(0x7f0000000400)=[{0x0, 0x4, 0x1, 0x7}, {0x4, 0x3, 0x6, 0x2}, {0x3, 0x2, 0x9, 0xa}], 0x10, 0x7}, 0x94) 591.327025ms ago: executing program 4 (id=6001): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0xcc, 0xc}, 0x50) (async) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r0, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x14, 0x3, 0x6, 0x8, 0x580, r0, 0x101, '\x00', r2, r1, 0x4, 0x0, 0xffffffff}, 0x50) socketpair(0x25, 0x800, 0x3, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000080850000008200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) sendmsg(r4, &(0x7f0000000740)={&(0x7f0000000580)=@l2={0x1f, 0xfff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x7}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="3adbce849b8c412b9567dacd90049ab35651cb8d31b448c31decb33a1409df2203eb2d85b4005494683d8da80839dd2f769625792fa3c653e51c9664db2f12b3c2a1e3182201ccf3c60ca539c97ae5e4b7599bc9f850f5822ae37a6e2bfaf111d384b613916d0e811f8504c3801e37b8e8d734a51204a878e37c1f6364c34f07725acd6dccfb474355d4429702bf6007772b615862f37a72", 0x98}, {&(0x7f00000006c0)="2a22b321a6806446d7db82b7f2a420850daf4ad258b805b817fe6acbcade9a3c5eefded7301349dc591156a7", 0x2c}], 0x2, &(0x7f0000000a40)=[{0x60, 0x1, 0x0, "45be90c41fbbbfd418727b8d270420435ff539a06823b7580b87bb85fb6bed4b62bf710f1493b0af6c5878dbecca320bbf622c6344857ad7143233ba0463a746e73620245fbf5abced737b2094d7d10e"}, {0x1010, 0x0, 0x4, "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"}, {0x50, 0x116, 0x2, "1a04e31b3ff54a17634b76630d5607fa76ca2e52a0946bce15044efa8e335e874c097849d7e93901d41f41deb1d8549c415dd50a6c08f1b14a49fa32"}, {0x60, 0x116, 0x4, "9345259a86702ec0d0f56549cd89e21086a296516e16f165d9ed74359b082cee16121f3cbfef957a30861ceec0f5ac622b151e4c6dbaff4a5e73a2250ff94750425d91d1f043af9d9883573e455a"}], 0x1120}, 0xc0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000000)="15150045259addef658e4cd2a57ce22d3ac381328ab5c8606d9804c9513a7b9d9b3d84c6b7022a0d2a3378ca21ceea11c670af583ae5136497bc54da7fa54c2316082cece0df524a8d74339cdf7d45970f688d2511c85c11fa586a9816b762d41fba18108bf8779e044c493075f4d7c1ebf809d55913165fea889f3c288e25afb6682fd83f74a4f82d954d974e674f22c7dba4571d6da5406c29cc", &(0x7f0000000180)=""/155}, 0x20) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f00000021c0)={r5, 0x0, 0x0}, 0x10) 559.816097ms ago: executing program 3 (id=6004): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000500)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x7) (async, rerun: 64) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'batadv_slave_0\x00'}) (async, rerun: 64) socketpair(0x1d, 0x80000, 0xa, &(0x7f0000000140)) (async) r1 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000080)={'a', ' *:* ', 'w\x00'}, 0x8) close(r0) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) 548.805827ms ago: executing program 0 (id=6005): r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xe0, 0x3, 0x0, 0x0, 0x0, 0x4000000000, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0xffffffffffffffff, 0x400000000000, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000640)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102032908000000000000000000000000ac14140a000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x3d}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x70) 447.978374ms ago: executing program 1 (id=6006): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x2, &(0x7f0000000400)=ANY=[@ANYBLOB="29560100040080009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x3, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x3a, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0xe, &(0x7f0000000000)={0x1000000, 0x80000}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x3}, 0x10}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23ffffff, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x5, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x64b}, 0x200, 0x0, 0x0, 0x0, 0xffff, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r2 = getpid() r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x2}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffd}}, 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x62, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x68) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = perf_event_open(&(0x7f0000000dc0)={0x5, 0x80, 0x4, 0x3, 0x40, 0x6, 0x0, 0x2, 0x84000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000d80), 0xa}, 0x20, 0xb, 0x9, 0x0, 0x8, 0x0, 0x2, 0x0, 0xd, 0x0, 0xab23}, 0x0, 0x9, r0, 0x2) perf_event_open(&(0x7f0000000d00)={0x1, 0x80, 0x3, 0x40, 0xe, 0x6, 0x0, 0x2, 0x8800, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x3, 0x7}, 0x1400, 0x75dc, 0x0, 0x5, 0x0, 0x9, 0xaf, 0x0, 0x81, 0x0, 0x101}, r2, 0xc, r6, 0xb) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001200)=@bpf_ext={0x1c, 0x1b, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x5}, @ldst={0x2, 0x3, 0x4, 0x3, 0x2, 0x2, 0x4}, @call={0x85, 0x0, 0x0, 0x6a}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x6}, @ringbuf_query], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000700)='GPL\x00', 0xec3d, 0x2, &(0x7f0000000780)=""/2, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c40)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000f80)={0x4, 0xb, 0x3c83}, 0x10, 0x2db44, r4, 0x6, &(0x7f00000010c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3], &(0x7f0000001180)=[{0x0, 0x1, 0x6, 0x2}, {0x0, 0x2, 0xc, 0x1}, {0x0, 0x2, 0x3}, {0x0, 0x2, 0x2, 0x8}, {0x4, 0x3, 0xa, 0x8}, {0x5, 0x4, 0xb}], 0x10, 0xff}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000003280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8800}, 0x8050) setsockopt$sock_attach_bpf(r7, 0x1, 0x21, &(0x7f0000000840), 0x4) sendmsg$tipc(r8, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000841}, 0x4014) recvmsg(r7, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) sendmsg$sock(r7, &(0x7f0000001140)={0x0, 0x0, 0x0}, 0x81) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f00000007c0)="fe1676edf766f97d2472ee081a3a203bf3decbd431be384ddd3f383a3e7bdaa363ea1dd43280aa79dbba6eec49e7d68c5db22b8da5bb34b4dbcc716660c25db2ab118cde0820f97314b08624d9a9b7ce4771c44aa1cd34905062ce9d5ac434b5fe6a6d179c200c2834c7d2cd2ded", &(0x7f00000009c0)=""/150}, 0x4b) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0x1, &(0x7f0000000280)="4c129b7793147ab4fbb989a31d3e4f271ef0713cee3946e0b8a83ad60b83382bb085d49c81092a18574db3c02bf9b7df4b73ec152d77e4bdc4fc6fc0c03f4e4592", &(0x7f0000000500)=""/103}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="1864511fe9da6ec71d0000000200000071120800fcff22d195000000000000002823be6091316fdf950834cc4395b71d1f25ad969793e475bb47836df8859ac52438a7ae2754b463682f8f1d29a0fa7fc2"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0x8a, &(0x7f0000000500)=ANY=[], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x28}, 0x94) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="00000000000000000000001241b8949387799200", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r10, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r9) 447.342553ms ago: executing program 2 (id=6007): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8001, 0xc}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 446.910123ms ago: executing program 4 (id=6008): r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x11c03a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) close(r2) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0e000000040000000400000009"], 0x50) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000380)=ANY=[@ANYRES32, @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$inet(r3, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x4, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000dd0a00000000000073019f00000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x10}, 0x10}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x24) r6 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) 446.262293ms ago: executing program 0 (id=6009): bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) sendmsg$inet(0xffffffffffffffff, 0x0, 0x8040) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xa, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x81, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b14, &(0x7f0000000000)={'wlan1\x00', @random="0100"}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f3, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00$\x00'/17], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r4}, {}, {0x3, 0x3, 0x3, 0xa, 0x5}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x14}}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d80)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="76ea090000000000009ba56a88ca", 0x0, 0x5, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e40)={0x6, 0x5, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000000c80)='syzkaller\x00', 0x1, 0x70, &(0x7f0000000cc0)=""/112, 0x41000, 0x34, '\x00', 0x0, 0x25, r4, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000d40)=[r0], &(0x7f0000000e00)=[{0x5, 0x1, 0x4}, {0x4, 0x2, 0xa, 0xa}, {0x3, 0x4, 0x7, 0x6}, {0x5, 0x3, 0xb, 0x4}], 0x10, 0x400}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x1, 0x2, &(0x7f0000000140)=ANY=[@ANYBLOB="6110a300000000009500000000000000"], &(0x7f0000000200)='GPL\x00'}, 0x80) 444.223284ms ago: executing program 3 (id=6010): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x880, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/73}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000300)}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x51, 0x1, 0x0, 0x0, 0x0, 0xd, 0x14, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x5}, 0xc18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000300)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0xfc, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x8b001, 0x0, 0xfffffffd, 0x6, 0x1ff, 0x100000, 0x3, 0x0, 0x0, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 435.379254ms ago: executing program 2 (id=6011): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x10, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="170100000000b2000500000000000000850000008a00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x1, 0x4, 0x8}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002e00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') (async, rerun: 32) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) (async, rerun: 32) r3 = syz_clone(0x20088000, &(0x7f00000000c0)="1613be81", 0x4, &(0x7f0000000100), &(0x7f0000000480), &(0x7f00000004c0)="8192708d408da4183e123b724cc7e02d80aa0e0ba71e3672ebb40a60820e8922eec33efcca52334f5159f67ad687e7c9821513a29a6b362bf2f638e861b7c810be26756dc6c41fef150bf4915760d5680e40d3dd84f70d1cc81d268e153262b3f6f1d9820463df74644883c29753154824e5797eff4f515c603671e79c8a584481cc026c558b34877658a16c8c9b34cc2b19587d9321f64132144e66942145bab39e4c544bb0c1d51516c02f40729b1d6655e2954922bf05c86b2090efb38388c129e64e1fb829baa21990fc") syz_open_procfs$namespace(r3, &(0x7f00000005c0)='ns/ipc\x00') (async, rerun: 32) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (rerun: 32) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r4}, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) (async) write$cgroup_subtree(r2, 0x0, 0x4) 393.080557ms ago: executing program 2 (id=6012): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e85"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r4 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r3}, 0x8) write$cgroup_int(r4, &(0x7f00000001c0), 0xfffffdef) write$cgroup_pid(r4, &(0x7f0000000180)=r2, 0x12) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000280)=""/73}, 0x20) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x100}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1d, 0x24, &(0x7f00000000c0)=@raw=[@exit, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xa681}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @ldst={0x2, 0x3, 0x6, 0x2, 0x8, 0x6, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3ff}, @alu={0x7, 0x0, 0xd, 0x1, 0xc, 0x30, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0x55, 0x50, &(0x7f0000000200)=""/80, 0x41100, 0x40, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)=[r5, r5, r5, r5, r5, r5, r5, r5, r5, r5], &(0x7f00000003c0)=[{0x5, 0x5, 0xe, 0xa}, {0x8, 0x5, 0x3, 0x1}, {0x1, 0x3, 0x9, 0x9}, {0x3, 0x4, 0xe}, {0x0, 0x2, 0xd, 0x8}, {0x2, 0x5, 0x5}, {0x2, 0x5, 0xc, 0x4}, {0x3, 0x3, 0xb, 0xb}], 0x10, 0x8}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000800)={r7, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000880)="b9ff030768441a8cb89e14f00800", 0x0, 0x4, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000005c0)={@map=r5, 0x3, 0x1, 0x4, &(0x7f0000000300)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xc, 0x30, &(0x7f0000000640)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @alu={0x4, 0x0, 0x1, 0x0, 0x7, 0x20, 0xffffffffffffffff}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @alu={0x7, 0x1, 0x1, 0x4, 0x0, 0xffffffffffffffe0}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x21}], &(0x7f00000007c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000800)=[r5, r5, r5, r5, r5, r5, r5, r5], &(0x7f0000000840)=[{0x4, 0x2, 0x1, 0x1}], 0x10, 0x10000}, 0x94) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xf, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70200001400000007010000000000008500000019000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r0, 0x0, 0x38, 0x19, &(0x7f0000000940)="2016e5ca8fe2fe2d90ad1f2c3b663a6117a3227b217c934b49ca75d2af7163ec474f255d74f7bba436e5cdbdb6fdda7d3a3c69c88eca93ea", &(0x7f0000000980)=""/25, 0xd9, 0x0, 0x1a, 0x2f, &(0x7f00000009c0)="556e6a942d5a3afe45aa8112d5e18b52598245ab51df1a0cc70c", &(0x7f0000000a00)="61b789dbaaf8ede91408fa223bceaba3caafd3d793ea86187c22524eaf13130ae93dc065b244476afffccb9fbe88b1", 0x6, 0x0, 0x10}, 0x50) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000600)={@map=r5, r6, 0x17, 0x5, r7, @void, @value=r9, @void, @void, r8}, 0x20) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x12, 0x17, 0x8, 0x800040, 0xc2, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001d00)={&(0x7f0000001bc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xa, [@volatile={0xc}, @type_tag={0xd, 0x0, 0x0, 0x12, 0x1}]}, {0x0, [0x2e, 0x0, 0x61, 0x61, 0x30, 0x2e, 0x0, 0x2e]}}, &(0x7f0000001c00)=""/206, 0x3a, 0xce, 0x1, 0x7fffffff}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x16, 0x11, &(0x7f0000000ac0)=@raw=[@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}], &(0x7f0000000b80)='GPL\x00', 0x656, 0x1000, &(0x7f0000000bc0)=""/4096, 0x40f00, 0x4, '\x00', 0x0, @flow_dissector=0x11, r13, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x4, 0x7, 0x10, 0x5}, 0x10, 0xffffffffffffffff, r9, 0x0, &(0x7f0000001d80)=[r5, r4, r4, r3, r11, r11, r3, r5, r10, r3], 0x0, 0x10, 0x7fffffff}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8922, &(0x7f0000000080)) 319.831011ms ago: executing program 1 (id=6013): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000600), 0x12) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x81, 0x7602, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x3, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000001600850000000c000000b707000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0x35}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x1, 0x4, 0x8}, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000400000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRESOCT=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r6}, &(0x7f0000000000), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000c6000000000009009500000c00000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f00000000c0)) 319.281671ms ago: executing program 0 (id=6014): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000009b000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002300000095000000000000002f81c461b3fea834ceb0e17d9838c2830ca7ce46e581a192326a3698c79205e02f1561b0a3c595448e9f7024b45fb2006c9917fe2a42fcd2ce278009682dc8f7c867b177ec5bd50b92aedef35b6cd87b56690b4c96f63ab021ee1cf616d8af74911d5e51b76d2c31b8bece7b0f"], &(0x7f0000000080)='GPL\x00'}, 0x65) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x82, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="0300060000000004000000000400000020000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000004340)={0x6, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000540)={r2, 0x8, 0x25, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff27, 0x0, 0x0}, 0x19) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x3, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="850000006c0000000400f7ffffff000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x3, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="850000006c0000000400f7ffffff000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x34, &(0x7f0000000040), 0x4) (async) setsockopt$sock_attach_bpf(r3, 0x1, 0x34, &(0x7f0000000040), 0x4) socketpair(0x1e, 0x1, 0xfe, &(0x7f0000000040)={0x0, 0x0}) 241.179586ms ago: executing program 2 (id=6015): syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000a00)='ns/mnt\x00') socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x410, 0x2000000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x410}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x3) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x2a482, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110c230000) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x4ca80, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001700)='ns/mnt\x00') 220.590927ms ago: executing program 1 (id=6016): sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x2, {0x41, 0x0, 0x4}}, 0x10, &(0x7f0000000340)=[{&(0x7f00000000c0)="967965dace7e4b8c484320df430d9b623c178d45d49239a6aee4e00242e1c9de57d01e492ed1c59f36010a378317c97b6631e89890e71e55011d5bad4c8965b30348ea1e49c96eb455ea169f62ce2244b67780ea9a252153270332fe3e36557d005730ffd67e96c61e0ea08bfb283a0387af7c71584f17d10860c99cb224a51fc14764439038bbdc9473ea30d24eb159b7f6d339252a2e5b175964ba3b81944cf91ae79b66fb03c1f05de3425495f479", 0xb0}, {&(0x7f0000000200)="a07ce0e5f0855acc5362eaac18e6cb40c57c676e92ec4f7d7f8c0ff2ab", 0x1d}, {&(0x7f0000000240)="7053ce0a0c6c68fe5a0c00466f869ba832fd39f4372c5b6ebd84309dd79916391584fe74a9d024dae47bbdbc0c51b7a11cebc6a930fea27cfb416d853063f283df05e9834f0b80ee8229d9f67bd17cc01c7a8f5a989384ca603fa2cacd9bcdf6650853799fe5a31cee8ee6a594b4dd6173620f84562e95a2f6b0ea6db84616d1b478b871a1dad53878ab17e633318b0b452bd0cce396b3cbf72c07689f11df67b6bbaebd5d4702bb089a8a2376db0800b4375ca1651c970292c891af441c99babc124d1bf2dc1a2a13124b991740db6b608b88e65d23edb3da", 0xd9}], 0x3, &(0x7f0000000380)="4f3b49ff9ce2cf182a0e44", 0xb, 0x20008084}, 0x20000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20029, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xf}, 0x806, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x7, 0x4, 0x900, 0x5, 0x28}, 0x50) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8924, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000400)={r2, r0}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000000)="faaea9dec2", &(0x7f0000000180)=""/169}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x12023) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000100ffff0000000000000000850000000e000000850000002300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1500000000"], 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0e000000040000000800000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8a00fe00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8914, 0x0) mkdir(0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x3c}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7}, 0x48) 159.58411ms ago: executing program 3 (id=6017): openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x100, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0xffff}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x13, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}, {}, {0x85, 0x0, 0x0, 0x17}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8923, &(0x7f0000000cc0)='lo:\x96o\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) (async) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="1808000000000000000000000300000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000002f000000b70900000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000280), &(0x7f0000000240)=r5}, 0x20) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r6, 0x4) (async) sendmsg$inet(r2, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_subtree(r7, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) write$cgroup_subtree(r8, &(0x7f0000000040)={[{0x2b, 'cpu'}, {0x2b, 'pids'}]}, 0xb) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8a, &(0x7f0000000140)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) (async, rerun: 64) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2a0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) 131.328852ms ago: executing program 1 (id=6019): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x2000000}, 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1e6, 0x0, &(0x7f0000000980)="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", 0x0, 0x0, 0xe8034000, 0x1c, 0x90, &(0x7f0000000800)="e39a4dbc5eaf68917490f88a3766ad2cc20c299adb4b85621354cc20", &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc, 0x0, 0x30b}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7"], 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r5}, &(0x7f0000000280), &(0x7f0000000240)=r2}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r6, 0x4) sendmsg$inet(r4, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0xc1) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0xc, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x8, 0x2}]}, @var={0x7, 0x0, 0x0, 0xe, 0x3}, @var={0x3, 0x0, 0x0, 0xe, 0x4, 0x2}]}, {0x0, [0x30, 0x6f, 0x2e, 0x0, 0x2e, 0x0, 0x1e, 0x61, 0x30, 0x0]}}, &(0x7f0000000500)=""/250, 0x58, 0xfa}, 0x28) r10 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r10}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x10, &(0x7f0000000c40)=ANY=[@ANYBLOB="180000000f00000000000000010000001811000025ae092c719072e50b62d2ea3a065f6fdfdbbc5fa1e8f8578ae5adb428b295ce01f6c32f4bb36ce2add624e2061168ccacc725373563173e67c060824045dbfd94e174d7922d2f947979a7a493428b37240bd18589be395f564d20a2c95e20087a4691e05779dbd2f9d3e38d2a12bd88b57318927b572a76fdbc8235d656cdb33395503fd9a3e85e3528e67d46bb7ffcc5d06f2774e3929b59ba973b6b3d4ecb62a0f2ec", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000005fa9ffff00000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x9, &(0x7f0000000380)=""/9, 0x41000, 0x10, '\x00', r8, 0x0, r9, 0x8, &(0x7f0000000640)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x0, 0x3, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000006c0)=[r10], &(0x7f0000000700)=[{0x4, 0x3, 0x3, 0xa}, {0x2, 0x5, 0xc, 0x2}, {0x3, 0x3, 0xe, 0x3}], 0x10, 0x7fffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000f900000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r4, @ANYRES32=r12], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x7, '\x00', r8, 0x0, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r16}, &(0x7f0000000280), &(0x7f0000000240)=r13}, 0x20) r17 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES16=r11, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x34, r16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r14, 0x1, 0x32, &(0x7f00000000c0)=r17, 0x4) sendmsg$inet(r15, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000840)={'pimreg\x00', 0x201}) 118.924863ms ago: executing program 4 (id=6020): r0 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x17, 0x4, &(0x7f0000000080)=ANY=[@ANYRES64=r0, @ANYRESHEX=0x0, @ANYRES16=r0], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 71.834956ms ago: executing program 1 (id=6021): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xfdef) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8001, 0xc}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 59.989316ms ago: executing program 1 (id=6022): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="85000000130000005d0000000000000095000000000000000a621cf434b9eaafdc0a00e9bfde908990817b364e51afe9c81a97f0570759f1cae63487ff68ffffffffff"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xa, 0x9, 0x2, 0x9, 0x42}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%-010d \x00'}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x40000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x10000, 0x8, 0x0, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x35}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r3, &(0x7f0000000000), &(0x7f0000000500)=""/64}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000240), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x13, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 0s ago: executing program 0 (id=6023): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0xc, 0x9, 0x0, 0x1, 0x2000000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xc, 0x9, 0x0, 0x0, 0x80ffffff}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0x5}, {0x18, 0x2, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{0x0}], 0x1}, 0x20000011) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.9' (ED25519) to the list of known hosts. [ 49.286466][ T24] audit: type=1400 audit(1771285856.760:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 49.290158][ T267] cgroup: Unknown subsys name 'net' [ 49.310290][ T24] audit: type=1400 audit(1771285856.760:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 49.338634][ T24] audit: type=1400 audit(1771285856.790:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 49.339185][ T267] cgroup: Unknown subsys name 'devices' [ 49.604845][ T267] cgroup: Unknown subsys name 'hugetlb' [ 49.610981][ T267] cgroup: Unknown subsys name 'rlimit' [ 49.841786][ T24] audit: type=1400 audit(1771285857.310:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 49.865950][ T24] audit: type=1400 audit(1771285857.310:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 49.891309][ T24] audit: type=1400 audit(1771285857.320:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 49.909966][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 49.924098][ T24] audit: type=1400 audit(1771285857.400:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 49.950742][ T24] audit: type=1400 audit(1771285857.400:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 49.981202][ T24] audit: type=1400 audit(1771285857.460:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 50.008725][ T24] audit: type=1400 audit(1771285857.460:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 50.008811][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 50.515614][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.522912][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.530741][ T275] device bridge_slave_0 entered promiscuous mode [ 50.548123][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.555605][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.563441][ T275] device bridge_slave_1 entered promiscuous mode [ 50.619595][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.627421][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.634926][ T276] device bridge_slave_0 entered promiscuous mode [ 50.653083][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.660509][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.667974][ T278] device bridge_slave_0 entered promiscuous mode [ 50.678306][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.685696][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.693242][ T278] device bridge_slave_1 entered promiscuous mode [ 50.700031][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.707341][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.715979][ T276] device bridge_slave_1 entered promiscuous mode [ 50.752079][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.759413][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.767393][ T279] device bridge_slave_0 entered promiscuous mode [ 50.777591][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.784993][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.792678][ T279] device bridge_slave_1 entered promiscuous mode [ 50.882779][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.889857][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.897472][ T277] device bridge_slave_0 entered promiscuous mode [ 50.946599][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.954238][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.961788][ T277] device bridge_slave_1 entered promiscuous mode [ 50.988152][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.995356][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.003399][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.010586][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.026160][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.033463][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.041066][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.048241][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.061811][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.069110][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.077205][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.084690][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.104483][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.111835][ T278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.119752][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.127034][ T278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.193266][ T255] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.200997][ T255] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.208956][ T255] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.217129][ T255] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.225928][ T255] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.233557][ T255] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.240855][ T255] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.248626][ T255] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.257492][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.265263][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.287247][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.295564][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.304596][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.313377][ T255] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.320612][ T255] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.329044][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.338657][ T255] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.346082][ T255] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.353909][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.362841][ T255] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.370771][ T255] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.378669][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.387097][ T255] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.394156][ T255] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.401767][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.434816][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.443070][ T255] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.450093][ T255] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.457617][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.466789][ T255] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.474033][ T255] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.481732][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.489336][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.497607][ T255] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.504687][ T255] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.512703][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.521099][ T255] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.528312][ T255] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.535913][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.544052][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.551985][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.560573][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.568681][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.580892][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 51.589493][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.611020][ T278] device veth0_vlan entered promiscuous mode [ 51.628230][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 51.636873][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 51.646272][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 51.655093][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 51.663347][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 51.672050][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 51.681148][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 51.689666][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 51.698129][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 51.706805][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.715162][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 51.723758][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 51.732322][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 51.740142][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.747678][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 51.755642][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.764698][ T275] device veth0_vlan entered promiscuous mode [ 51.774292][ T276] device veth0_vlan entered promiscuous mode [ 51.786157][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 51.794189][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 51.808587][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 51.816843][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.824945][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.833705][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.843378][ T276] device veth1_macvtap entered promiscuous mode [ 51.855287][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 51.864276][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 51.873178][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 51.881011][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 51.890108][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 51.899006][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 51.908111][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 51.919406][ T278] device veth1_macvtap entered promiscuous mode [ 51.932023][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 51.941378][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 51.950512][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 51.959233][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 51.968078][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 51.976887][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.986212][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.994918][ T255] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.002240][ T255] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.010201][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 52.019100][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 52.028125][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.047915][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.058300][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.068296][ T255] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.075818][ T255] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.085282][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 52.094382][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 52.103442][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 52.112075][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 52.123349][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 52.131844][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 52.141389][ T275] device veth1_macvtap entered promiscuous mode [ 52.150747][ T279] device veth0_vlan entered promiscuous mode [ 52.158004][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 52.166237][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 52.174990][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 52.189863][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 52.198735][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 52.207820][ T276] request_module fs-gadgetfs succeeded, but still no fs? [ 52.220026][ T276] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 52.242347][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 52.255544][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.264223][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 52.273294][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.281346][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 52.290170][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 52.321230][ T279] device veth1_macvtap entered promiscuous mode [ 52.328265][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 52.345453][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 52.354710][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 52.363028][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 52.372232][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 52.380942][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 52.389474][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 52.403484][ T277] device veth0_vlan entered promiscuous mode [ 52.423328][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 52.431324][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 52.444353][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 52.453565][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 52.476785][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 52.485648][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 52.496214][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 52.506198][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 52.527831][ T277] device veth1_macvtap entered promiscuous mode [ 52.556909][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 52.565881][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 52.578469][ T311] device syzkaller0 entered promiscuous mode [ 52.591655][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 52.600586][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 52.742388][ C0] hrtimer: interrupt took 24044 ns [ 53.798745][ T363] bY4`Ҙ: renamed from lo [ 54.190856][ T394] cgroup: syz.0.28 (394) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 54.216232][ T394] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 54.296329][ T24] kauditd_printk_skb: 39 callbacks suppressed [ 54.296343][ T24] audit: type=1400 audit(1771285861.770:113): avc: denied { write } for pid=399 comm="syz.4.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 54.803111][ T24] audit: type=1400 audit(1771285862.280:114): avc: denied { cpu } for pid=418 comm="syz.3.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 55.117163][ T24] audit: type=1400 audit(1771285862.590:115): avc: denied { create } for pid=444 comm="syz.0.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 55.218210][ T451] device syzkaller0 entered promiscuous mode [ 55.235709][ T461] tap0: tun_chr_ioctl cmd 1074025675 [ 55.255870][ T461] tap0: persist enabled [ 55.263198][ T24] audit: type=1400 audit(1771285862.740:116): avc: denied { relabelfrom } for pid=449 comm="syz.0.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 55.296817][ T24] audit: type=1400 audit(1771285862.740:117): avc: denied { relabelto } for pid=449 comm="syz.0.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 55.367052][ T461] tap0: tun_chr_ioctl cmd 1074025675 [ 55.384800][ T461] tap0: persist enabled [ 55.404795][ T473] tap0: tun_chr_ioctl cmd 2148553947 [ 55.447765][ T480] ------------[ cut here ]------------ [ 55.462726][ T480] trace type BPF program uses run-time allocation [ 55.470027][ T480] WARNING: CPU: 0 PID: 480 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 55.527220][ T480] Modules linked in: [ 55.533131][ T480] CPU: 1 PID: 480 Comm: syz.0.51 Not tainted syzkaller #0 [ 55.632495][ T480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 55.650066][ T494] device syzkaller0 entered promiscuous mode [ 55.668885][ T480] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 55.688897][ T480] Code: 85 e9 14 fe ff ff e8 a9 d1 ef ff 31 c0 e9 15 fe ff ff e8 9d d1 ef ff c6 05 e4 ae 4b 05 01 48 c7 c7 60 cf 25 85 e8 7a e3 04 03 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 55.782455][ T480] RSP: 0018:ffffc90000d97448 EFLAGS: 00010246 [ 55.789537][ T480] RAX: f251f0835de25200 RBX: 0000000000000001 RCX: ffff888113493b40 [ 55.814555][ T480] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 55.847102][ T480] RBP: ffffc90000d97490 R08: ffff8881f7027453 R09: 1ffff1103ee04e8a [ 55.902510][ T480] R10: dffffc0000000000 R11: ffffed103ee04e8b R12: ffff888113760000 [ 55.942696][ T480] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888113563000 [ 55.982419][ T480] FS: 00007f5c0aaa36c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 55.996593][ T24] audit: type=1400 audit(1771285863.470:118): avc: denied { write } for pid=503 comm="syz.1.58" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 56.036935][ T480] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 56.083426][ T480] CR2: 00002000000029c0 CR3: 0000000111b86000 CR4: 00000000003506b0 [ 56.171908][ T480] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 56.207978][ T480] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 56.263584][ T480] Call Trace: [ 56.267903][ T480] ? __fdget+0x1a1/0x230 [ 56.318905][ T480] resolve_pseudo_ldimm64+0x55e/0x1060 [ 56.342593][ T480] ? bpf_check+0xdb10/0xdb10 [ 56.413629][ T480] ? kvmalloc_node+0x88/0x130 [ 56.452598][ T480] bpf_check+0x9058/0xdb10 [ 56.458343][ T480] ? bpf_get_btf_vmlinux+0x60/0x60 [ 56.472575][ T480] ? is_bpf_text_address+0x177/0x190 [ 56.489562][ T480] ? selinux_bpf_prog_alloc+0x51/0x140 [ 56.507670][ T480] ? __kernel_text_address+0xa0/0x100 [ 56.522298][ T480] ? unwind_get_return_address+0x4d/0x90 [ 56.586576][ T480] ? stack_trace_save+0xf0/0xf0 [ 56.596653][ T480] ? arch_stack_walk+0xee/0x140 [ 56.656723][ T480] ? stack_trace_save+0xa6/0xf0 [ 56.662319][ T480] ? stack_trace_snprint+0xf0/0xf0 [ 56.702529][ T480] ? __kasan_slab_alloc+0x69/0xf0 [ 56.708988][ T480] ? pcpu_block_update+0x3ec/0x900 [ 56.741182][ T480] ? selinux_bpf_prog_alloc+0x51/0x140 [ 56.755566][ T480] ? selinux_bpf_prog_alloc+0x51/0x140 [ 56.768139][ T480] ? __kasan_kmalloc+0xec/0x110 [ 56.789600][ T480] ? __kasan_kmalloc+0xda/0x110 [ 56.799710][ T480] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 56.822586][ T480] ? selinux_bpf_prog_alloc+0x51/0x140 [ 56.829680][ T480] ? security_bpf_prog_alloc+0x62/0x90 [ 56.845405][ T566] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.875340][ T566] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.882973][ T566] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.902502][ T480] ? bpf_prog_load+0x9d8/0x14a0 [ 56.932469][ T480] ? __se_sys_bpf+0x49a/0x740 [ 56.937345][ T480] ? __x64_sys_bpf+0x7b/0x90 [ 56.962153][ T480] ? do_syscall_64+0x31/0x40 [ 56.992515][ T480] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 57.004755][ T24] audit: type=1400 audit(1771285864.480:119): avc: denied { create } for pid=577 comm="syz.1.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 57.030258][ T480] ? memset+0x35/0x40 [ 57.039299][ T480] ? bpf_obj_name_cpy+0x193/0x1e0 [ 57.046169][ T480] bpf_prog_load+0xfca/0x14a0 [ 57.051915][ T480] ? map_freeze+0x320/0x320 [ 57.058057][ T480] ? selinux_bpf+0xc7/0xf0 [ 57.063664][ T480] ? security_bpf+0x82/0xa0 [ 57.069176][ T480] __se_sys_bpf+0x49a/0x740 [ 57.074166][ T480] ? __x64_sys_bpf+0x90/0x90 [ 57.080330][ T480] ? ____fput+0x15/0x20 [ 57.086186][ T480] ? __kasan_check_read+0x11/0x20 [ 57.097060][ T480] __x64_sys_bpf+0x7b/0x90 [ 57.104149][ T480] do_syscall_64+0x31/0x40 [ 57.177403][ T480] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 57.202536][ T480] RIP: 0033:0x7f5c0c047f79 [ 57.207556][ T480] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 57.279578][ T480] RSP: 002b:00007f5c0aaa3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 57.299222][ T24] audit: type=1400 audit(1771285864.770:120): avc: denied { create } for pid=589 comm="syz.2.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 57.328709][ T480] RAX: ffffffffffffffda RBX: 00007f5c0c2c1fa0 RCX: 00007f5c0c047f79 [ 57.379392][ T480] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005 [ 57.401360][ T480] RBP: 00007f5c0c0de7e0 R08: 0000000000000000 R09: 0000000000000000 [ 57.412289][ T480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 57.427900][ T480] R13: 00007f5c0c2c2038 R14: 00007f5c0c2c1fa0 R15: 00007ffe741354f8 [ 57.436339][ T480] ---[ end trace e68a65c9139f5a97 ]--- [ 57.710613][ T615] device syzkaller0 entered promiscuous mode [ 57.900730][ T24] audit: type=1400 audit(1771285865.370:121): avc: denied { create } for pid=632 comm="syz.0.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 57.998444][ T638] device syzkaller0 entered promiscuous mode [ 59.524722][ T765] device syzkaller0 entered promiscuous mode [ 59.651918][ T24] audit: type=1400 audit(1771285867.120:122): avc: denied { create } for pid=768 comm="syz.1.131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 59.787169][ T24] audit: type=1400 audit(1771285867.260:123): avc: denied { create } for pid=786 comm="syz.0.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 59.920325][ T24] audit: type=1400 audit(1771285867.390:124): avc: denied { read } for pid=806 comm="syz.2.141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 63.097215][ T24] audit: type=1400 audit(1771285870.570:125): avc: denied { create } for pid=909 comm="syz.0.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 63.500200][ T923] GPL: port 1(erspan0) entered blocking state [ 63.507027][ T923] GPL: port 1(erspan0) entered disabled state [ 63.514245][ T923] device erspan0 entered promiscuous mode [ 63.522005][ T923] GPL: port 1(erspan0) entered blocking state [ 63.528494][ T923] GPL: port 1(erspan0) entered forwarding state [ 63.788321][ T24] audit: type=1400 audit(1771285871.260:126): avc: denied { create } for pid=926 comm="syz.4.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 63.840963][ T24] audit: type=1400 audit(1771285871.310:127): avc: denied { create } for pid=933 comm="syz.4.175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 63.996041][ T939] device sit0 entered promiscuous mode [ 64.036950][ T24] audit: type=1400 audit(1771285871.510:128): avc: denied { create } for pid=943 comm="syz.3.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 64.238058][ T956] device syzkaller0 entered promiscuous mode [ 64.360088][ T968] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 64.579279][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 64.641827][ T24] audit: type=1400 audit(1771285872.110:129): avc: denied { create } for pid=1000 comm="syz.0.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 64.685144][ T24] audit: type=1400 audit(1771285872.150:130): avc: denied { create } for pid=1001 comm="syz.4.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 64.935792][ T1014] device syzkaller0 entered promiscuous mode [ 65.104288][ T1031] bridge0: port 3(veth0_to_team) entered blocking state [ 65.113830][ T1031] bridge0: port 3(veth0_to_team) entered disabled state [ 65.136157][ T1031] device veth0_to_team entered promiscuous mode [ 65.698574][ T24] audit: type=1400 audit(1771285873.170:131): avc: denied { create } for pid=1090 comm="syz.4.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 65.964126][ T1127] syz.1.229[1127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.964237][ T1127] syz.1.229[1127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.205284][ T1143] device syzkaller0 entered promiscuous mode [ 67.611022][ T1196] device syzkaller0 entered promiscuous mode [ 67.792278][ T1225] device syzkaller0 entered promiscuous mode [ 67.899015][ T1230] device veth0_to_team entered promiscuous mode [ 68.123111][ T1235] : renamed from vlan1 [ 68.189459][ T1240] syz.0.262[1240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.189517][ T1240] syz.0.262[1240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.368453][ T1285] syz.2.270[1285] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.380993][ T1285] syz.2.270[1285] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.903188][ T1296] device syzkaller0 entered promiscuous mode [ 69.932185][ T24] audit: type=1400 audit(1771285877.400:132): avc: denied { create } for pid=1308 comm="syz.1.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 70.459211][ T1327] device syzkaller0 entered promiscuous mode [ 70.472094][ T24] audit: type=1400 audit(1771285877.940:133): avc: denied { create } for pid=1325 comm="syz.1.284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 70.706452][ T24] audit: type=1400 audit(1771285878.180:134): avc: denied { create } for pid=1364 comm="syz.4.296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 70.895140][ T1390] device syzkaller0 entered promiscuous mode [ 70.938739][ T1390] : port 1(ip6gretap0) entered blocking state [ 70.948824][ T1390] : port 1(ip6gretap0) entered disabled state [ 70.958155][ T1390] device ip6gretap0 entered promiscuous mode [ 70.998739][ T1394] device syzkaller0 entered promiscuous mode [ 71.048168][ T24] audit: type=1400 audit(1771285878.520:135): avc: denied { create } for pid=1402 comm="syz.3.306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 71.100285][ T1404] device ip6gretap0 left promiscuous mode [ 71.106610][ T1404] : port 1(ip6gretap0) entered disabled state [ 71.937458][ T1455] device vlan0 entered promiscuous mode [ 71.951674][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.463963][ T1478] device syzkaller0 entered promiscuous mode [ 72.952636][ T1494] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.960214][ T1494] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.019138][ T1494] device bridge_slave_1 left promiscuous mode [ 73.041503][ T1494] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.067423][ T1494] device bridge_slave_0 left promiscuous mode [ 73.092733][ T1494] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.322312][ T1578] : renamed from bond_slave_0 [ 75.229847][ T1623] device sit0 entered promiscuous mode [ 75.850066][ T1647] device sit0 left promiscuous mode [ 76.435000][ T1662] device syzkaller0 entered promiscuous mode [ 76.530535][ T1662] device veth0_vlan left promiscuous mode [ 76.547510][ T1662] device veth0_vlan entered promiscuous mode [ 76.580390][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 76.590285][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 76.598671][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 76.925531][ T1673] device syzkaller0 entered promiscuous mode [ 77.327556][ T1700] syzkaller1: tun_chr_ioctl cmd 21731 [ 77.334826][ T1700] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 78.213373][ T1738] device xfrm0 entered promiscuous mode [ 78.242391][ T1736] device veth1_macvtap left promiscuous mode [ 78.482405][ T1756] device syzkaller0 entered promiscuous mode [ 79.557293][ T1825] device syzkaller0 entered promiscuous mode [ 79.642855][ T24] audit: type=1400 audit(1771285887.120:136): avc: denied { create } for pid=1851 comm="syz.3.444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 79.644025][ T1847] device pim6reg1 entered promiscuous mode [ 79.852212][ T1867] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 82.787901][ T2032] tap0: tun_chr_ioctl cmd 1074025677 [ 82.850799][ T2032] tap0: linktype set to 780 [ 82.903966][ T2036] tap0: tun_chr_ioctl cmd 1074025675 [ 82.925933][ T2036] tap0: persist enabled [ 82.964643][ T2036] tap0: tun_chr_ioctl cmd 1074025675 [ 82.985799][ T2036] tap0: persist enabled [ 83.456152][ T2058] cgroup: fork rejected by pids controller in /syz2 [ 83.999020][ T2093] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.014339][ T2093] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.041494][ T2093] device bridge_slave_0 entered promiscuous mode [ 84.080305][ T2093] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.104887][ T2093] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.113700][ T2093] device bridge_slave_1 entered promiscuous mode [ 84.244473][ T24] audit: type=1400 audit(1771285891.720:137): avc: denied { create } for pid=2093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 84.269360][ T24] audit: type=1400 audit(1771285891.740:138): avc: denied { write } for pid=2093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 84.291665][ T24] audit: type=1400 audit(1771285891.740:139): avc: denied { read } for pid=2093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 84.373946][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 84.385365][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 84.447903][ T1307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 84.459209][ T1307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 84.467820][ T1307] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.475227][ T1307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 84.482993][ T1307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 84.491956][ T1307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 84.500686][ T1307] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.508210][ T1307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 84.522179][ T1307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 84.568735][ T1307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 84.582119][ T1307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 84.600589][ T1307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 84.633873][ T1307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 84.647787][ T1307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 84.666562][ T1307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 84.696430][ T2093] device veth0_vlan entered promiscuous mode [ 84.768713][ T2093] device veth1_macvtap entered promiscuous mode [ 84.803740][ T1307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 84.855476][ T1307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 84.883025][ T1307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 85.283788][ T9] device bridge_slave_1 left promiscuous mode [ 85.294398][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.313032][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.327639][ T9] device veth0_vlan left promiscuous mode [ 87.077049][ T2269] syz.0.560[2269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.077122][ T2269] syz.0.560[2269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.782093][ T24] audit: type=1400 audit(1771285895.250:140): avc: denied { create } for pid=2286 comm="syz.0.565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 88.139861][ T2308] pimreg1: tun_chr_ioctl cmd 1074025692 [ 90.067070][ T2391] bridge0: port 3(veth0_to_team) entered blocking state [ 90.114117][ T2391] bridge0: port 3(veth0_to_team) entered disabled state [ 90.199624][ T2415] cgroup: fork rejected by pids controller in /syz4 [ 90.305719][ T2414] device pim6reg1 entered promiscuous mode [ 90.313985][ T24] audit: type=1400 audit(1771285897.790:141): avc: denied { create } for pid=2523 comm="syz.3.602" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 90.447953][ T2536] device syzkaller0 entered promiscuous mode [ 90.577125][ T2551] device ip6gretap0 entered promiscuous mode [ 91.013263][ T2570] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.035896][ T2570] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.053114][ T2570] device bridge_slave_0 entered promiscuous mode [ 91.077519][ T2570] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.100197][ T2570] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.131880][ T2570] device bridge_slave_1 entered promiscuous mode [ 91.319178][ T2614] tap1: tun_chr_ioctl cmd 1074025675 [ 91.333759][ T2614] tap1: persist enabled [ 91.464343][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 91.483196][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 91.497314][ T2629] device syzkaller0 entered promiscuous mode [ 91.536491][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 91.552975][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 91.571722][ T2527] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.578925][ T2527] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.599146][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 91.617561][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 91.626487][ T2527] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.633676][ T2527] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.641317][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.682620][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.705539][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.750845][ T2570] device veth0_vlan entered promiscuous mode [ 91.795893][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 91.811915][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 91.825967][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 91.848407][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 91.884213][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 91.905941][ T2570] device veth1_macvtap entered promiscuous mode [ 91.957957][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 91.987061][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 92.578733][ T9] device veth0_to_team left promiscuous mode [ 92.595956][ T9] bridge0: port 3(veth0_to_team) entered disabled state [ 92.669715][ T9] device bridge_slave_1 left promiscuous mode [ 92.696644][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.747596][ T9] device bridge_slave_0 left promiscuous mode [ 92.792628][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.873825][ T9] device veth1_macvtap left promiscuous mode [ 92.879895][ T9] device veth0_vlan left promiscuous mode [ 92.963449][ T24] audit: type=1400 audit(1771285900.440:142): avc: denied { create } for pid=2687 comm="syz.4.642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 93.236659][ T2692] tap1: tun_chr_ioctl cmd 2147767506 [ 93.317357][ T2703] device veth1_macvtap left promiscuous mode [ 93.404008][ T24] audit: type=1400 audit(1771285900.880:143): avc: denied { create } for pid=2702 comm="syz.2.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 94.068489][ T2745] device pim6reg1 entered promiscuous mode [ 96.721468][ T24] audit: type=1400 audit(1771285904.190:144): avc: denied { write } for pid=2902 comm="syz.0.706" name="cgroup.subtree_control" dev="cgroup2" ino=335 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 96.746468][ T24] audit: type=1400 audit(1771285904.190:145): avc: denied { open } for pid=2902 comm="syz.0.706" path="" dev="cgroup2" ino=335 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 97.073677][ T2926] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.081644][ T2926] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.090675][ T2928] device veth1_macvtap left promiscuous mode [ 97.124808][ T2924] bridge0: port 3(veth0_to_team) entered disabled state [ 97.132669][ T2924] device bridge_slave_1 left promiscuous mode [ 97.139053][ T2924] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.153026][ T2924] device bridge_slave_0 left promiscuous mode [ 97.159772][ T2924] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.314302][ T24] audit: type=1400 audit(1771285904.790:146): avc: denied { create } for pid=2948 comm="syz.3.717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 97.347231][ T2956] syz.4.720[2956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.347291][ T2956] syz.4.720[2956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.973803][ T2995] device syzkaller0 entered promiscuous mode [ 98.039661][ T2995] device syzkaller0 left promiscuous mode [ 98.083607][ T2999] syz.4.731[2999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.089181][ T2999] syz.4.731[2999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.993726][ T3046] +: renamed from team_slave_1 [ 99.472126][ T3068] device syzkaller0 entered promiscuous mode [ 99.895783][ T3072] device veth0_to_team entered promiscuous mode [ 100.164119][ T3084] device sit0 left promiscuous mode [ 100.187884][ T3084] device sit0 entered promiscuous mode [ 100.482321][ T3077] device syzkaller0 entered promiscuous mode [ 100.727108][ T24] audit: type=1400 audit(1771285908.200:147): avc: denied { create } for pid=3126 comm="syz.3.770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 101.440615][ T3170] : port 1(dummy0) entered blocking state [ 101.446982][ T3170] : port 1(dummy0) entered disabled state [ 101.456178][ T3170] device dummy0 entered promiscuous mode [ 102.154574][ T3197] tap1: tun_chr_ioctl cmd 1074025692 [ 103.230671][ T24] audit: type=1400 audit(1771285910.700:148): avc: denied { create } for pid=3258 comm="syz.4.808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 103.794908][ T3295] : renamed from vlan0 [ 103.897595][ T3306] : renamed from vlan0 [ 104.533441][ T3343] syz.1.832[3343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.533524][ T3343] syz.1.832[3343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.688087][ T3372] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 104.907382][ T3354] device syzkaller0 entered promiscuous mode [ 106.860521][ T3492] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.868279][ T3492] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.876476][ T3492] device bridge_slave_0 entered promiscuous mode [ 106.883916][ T3492] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.891063][ T3492] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.899366][ T3492] device bridge_slave_1 entered promiscuous mode [ 106.955227][ T3492] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.962907][ T3492] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.970958][ T3492] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.978334][ T3492] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.000343][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 107.008667][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.017081][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.042518][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 107.051782][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 107.060882][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.069179][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.077117][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 107.087161][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 107.096228][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.103755][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.129601][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 107.138643][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 107.162805][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 107.171373][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.186182][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 107.194960][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 107.207781][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 107.216356][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 107.225167][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 107.233263][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 107.242322][ T3492] device veth0_vlan entered promiscuous mode [ 107.269583][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 107.279231][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 107.291472][ T3492] device veth1_macvtap entered promiscuous mode [ 107.314910][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 107.323204][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 107.332033][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 107.341488][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 107.350724][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 107.401999][ T3512] device syzkaller0 entered promiscuous mode [ 107.677322][ T2527] device bridge_slave_1 left promiscuous mode [ 107.695911][ T2527] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.727232][ T2527] device bridge_slave_0 left promiscuous mode [ 107.737517][ T2527] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.610254][ T3569] device syzkaller0 entered promiscuous mode [ 109.366785][ T3639] device veth0_vlan left promiscuous mode [ 109.397987][ T3639] device veth0_vlan entered promiscuous mode [ 109.891854][ T3675] device bridge_slave_0 entered promiscuous mode [ 110.018895][ T3679] device syzkaller0 entered promiscuous mode [ 110.220084][ T3681] device syzkaller0 entered promiscuous mode [ 110.547547][ T3689] device syzkaller0 entered promiscuous mode [ 110.652012][ T3687] device syzkaller0 entered promiscuous mode [ 111.239996][ T24] audit: type=1400 audit(1771285918.710:149): avc: denied { create } for pid=3730 comm="syz.0.946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 111.672516][ T24] audit: type=1400 audit(1771285919.150:150): avc: denied { append } for pid=3775 comm="syz.3.960" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 111.728234][ T24] audit: type=1400 audit(1771285919.200:151): avc: denied { create } for pid=3779 comm="syz.4.962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 112.593409][ T3827] device syzkaller0 entered promiscuous mode [ 113.717718][ T3885] tap0: tun_chr_ioctl cmd 2147767506 [ 114.049159][ T3899] device syzkaller0 entered promiscuous mode [ 114.348009][ T3902] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 114.360412][ T3902] device syzkaller0 entered promiscuous mode [ 114.736765][ T3931] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.779404][ T3931] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.786896][ T3931] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.737605][ T3998] device syzkaller0 entered promiscuous mode [ 115.811227][ T4003] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 116.099150][ T4023] device syzkaller0 entered promiscuous mode [ 116.855884][ T4068] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 117.114012][ T4100] device pim6reg1 entered promiscuous mode [ 117.818516][ T4171] device syzkaller0 entered promiscuous mode [ 118.512546][ T4209] device syzkaller0 entered promiscuous mode [ 120.574120][ T4340] device syzkaller0 entered promiscuous mode [ 121.178308][ T4351] device syzkaller0 entered promiscuous mode [ 121.391068][ T4366] syz.0.1128 (4366) used obsolete PPPIOCDETACH ioctl [ 121.639740][ T24] audit: type=1400 audit(1771285929.110:152): avc: denied { create } for pid=4380 comm="syz.4.1134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 121.914935][ T4410] device syzkaller0 entered promiscuous mode [ 122.413837][ T4433] syzkaller0: tun_chr_ioctl cmd 1074025680 [ 122.445993][ T4433] syzkaller0: tun_chr_ioctl cmd 35108 [ 122.937355][ T4487] device syzkaller0 entered promiscuous mode [ 123.577981][ T4497] device syzkaller0 entered promiscuous mode [ 123.661695][ T24] audit: type=1400 audit(1771285931.120:153): avc: denied { create } for pid=4516 comm="syz.0.1174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 124.226300][ T4534] device veth0_vlan left promiscuous mode [ 124.233650][ T4534] device veth0_vlan entered promiscuous mode [ 124.931596][ T24] audit: type=1400 audit(1771285932.400:154): avc: denied { create } for pid=4580 comm="syz.2.1189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 126.447316][ T4645] syz.3.1207[4645] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.447377][ T4645] syz.3.1207[4645] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.894195][ T4682] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 126.950521][ T4682] syzkaller0: persist disabled [ 127.600373][ T4741] bridge0: port 3(veth0_to_team) entered blocking state [ 127.649649][ T4741] bridge0: port 3(veth0_to_team) entered disabled state [ 128.040237][ T4765] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.047611][ T4765] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.117408][ T4765] bridge0: port 3(veth0_to_team) entered disabled state [ 128.147957][ T4765] device bridge_slave_1 left promiscuous mode [ 128.156934][ T4765] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.167253][ T4765] device bridge_slave_0 left promiscuous mode [ 128.174543][ T4765] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.933781][ T4819] device syzkaller0 entered promiscuous mode [ 130.765237][ T4965] tap2: tun_chr_ioctl cmd 1074025673 [ 130.771025][ T4963] tap2: tun_chr_ioctl cmd 1074025675 [ 130.776967][ T4963] tap2: persist enabled [ 130.781572][ T4964] tap2: tun_chr_ioctl cmd 1074025675 [ 130.787454][ T4964] tap2: persist enabled [ 130.791998][ T4963] tap2: tun_chr_ioctl cmd 1074025675 [ 130.798168][ T4963] tap2: persist enabled [ 130.803755][ T4964] tap2: tun_chr_ioctl cmd 2148553947 [ 130.809795][ T4967] batadv0: tun_chr_ioctl cmd 1074812118 [ 130.817325][ T4967] batadv0: tun_chr_ioctl cmd 2147767521 [ 131.259977][ T4996] : renamed from bond_slave_0 [ 132.758850][ T5073] syz.1.1325[5073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.758939][ T5073] syz.1.1325[5073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.261538][ T5139] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.482799][ T5161] device syzkaller0 entered promiscuous mode [ 136.741683][ T5276] -1: renamed from syzkaller0 [ 136.758611][ T5279] lo: mtu less than device minimum [ 136.798739][ T5266] tap0: tun_chr_ioctl cmd 1074025675 [ 136.806012][ T5266] tap0: persist enabled [ 136.819486][ T5266] tap0: tun_chr_ioctl cmd 1074025675 [ 136.827051][ T5266] tap0: persist enabled [ 136.869112][ T5266] tap0: tun_chr_ioctl cmd 2148553947 [ 138.730610][ T5353] device syzkaller0 entered promiscuous mode [ 139.216039][ T5372] device syzkaller0 entered promiscuous mode [ 139.536183][ T5412] device syzkaller0 entered promiscuous mode [ 139.662634][ T5417] device wg2 entered promiscuous mode [ 139.731307][ T5426] device syzkaller0 entered promiscuous mode [ 140.051403][ T5445] device syzkaller0 entered promiscuous mode [ 140.269869][ T5466] device syzkaller0 entered promiscuous mode [ 140.316514][ T5465] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 140.403863][ T5475] device wg2 entered promiscuous mode [ 140.437859][ T24] audit: type=1400 audit(1771285947.910:155): avc: denied { create } for pid=5478 comm="syz.2.1435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 141.140770][ T24] audit: type=1400 audit(1771285948.610:156): avc: denied { ioctl } for pid=5544 comm="syz.3.1452" path="mnt:[4026532369]" dev="nsfs" ino=4026532369 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 142.651540][ T24] audit: type=1400 audit(1771285950.120:157): avc: denied { create } for pid=5633 comm="syz.1.1482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 142.916109][ T5650] device sit0 left promiscuous mode [ 142.997653][ T5654] device sit0 entered promiscuous mode [ 143.716074][ T5681] device syzkaller0 entered promiscuous mode [ 143.980111][ T5713] sock: sock_set_timeout: `syz.4.1505' (pid 5713) tries to set negative timeout [ 144.302662][ T5739] device syzkaller0 entered promiscuous mode [ 145.059479][ T5760] device syzkaller0 entered promiscuous mode [ 145.263663][ T5769] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.953068][ T5797] batadv0: tun_chr_ioctl cmd 1074025677 [ 145.959268][ T5797] batadv0: linktype set to 776 [ 146.124911][ T5800] batadv0: tun_chr_ioctl cmd 1074025675 [ 146.139243][ T5800] batadv0: persist enabled [ 146.404393][ T5821] device sit0 left promiscuous mode [ 152.445358][ T6168] device syzkaller0 entered promiscuous mode [ 153.243373][ T6201] : renamed from vlan1 [ 153.387921][ T24] audit: type=1400 audit(1771285960.860:158): avc: denied { create } for pid=6216 comm="syz.2.1663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 153.792120][ T6243] device wg2 entered promiscuous mode [ 154.019285][ T6256] : renamed from bond_slave_0 [ 154.051136][ T6257] device syzkaller0 entered promiscuous mode [ 155.553179][ T24] audit: type=1400 audit(1771285963.030:159): avc: denied { read } for pid=6313 comm="syz.0.1694" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 155.636410][ T24] audit: type=1400 audit(1771285963.050:160): avc: denied { open } for pid=6313 comm="syz.0.1694" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 158.372208][ T6397] device bridge_slave_1 left promiscuous mode [ 158.408790][ T6397] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.438828][ T6397] device bridge_slave_0 left promiscuous mode [ 158.464774][ T6397] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.903196][ T6413] device sit0 entered promiscuous mode [ 159.174207][ T6441] : renamed from vlan1 [ 159.259719][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 159.710868][ T6498] device syzkaller0 entered promiscuous mode [ 165.616252][ T6772] device syzkaller0 entered promiscuous mode [ 167.180391][ T6837] device syzkaller0 entered promiscuous mode [ 168.537133][ T6867] device lo entered promiscuous mode [ 168.661035][ T6865] device syzkaller0 entered promiscuous mode [ 169.849575][ T6899] pimreg1: tun_chr_ioctl cmd 1074025692 [ 169.863923][ T6899] pimreg1: tun_chr_ioctl cmd 1074025676 [ 169.879759][ T6899] pimreg1: owner set to 772 [ 169.966443][ T6917] : renamed from veth0_vlan [ 172.173101][ T24] audit: type=1400 audit(1771285979.650:161): avc: denied { create } for pid=7008 comm="syz.2.1897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 172.385407][ T7013] device syzkaller0 entered promiscuous mode [ 173.003968][ T7065] device syzkaller0 entered promiscuous mode [ 173.043430][ T7065] device syzkaller0 left promiscuous mode [ 174.555910][ T7186] device sit0 entered promiscuous mode [ 175.361453][ T7229] device veth1_macvtap left promiscuous mode [ 175.524607][ T7234] device veth1_macvtap entered promiscuous mode [ 175.608878][ T7234] device macsec0 entered promiscuous mode [ 175.830078][ T7241] device syzkaller0 entered promiscuous mode [ 175.916709][ T24] audit: type=1400 audit(1771285983.390:162): avc: denied { create } for pid=7250 comm="syz.2.1968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 176.040748][ T7239] device syzkaller0 entered promiscuous mode [ 176.254848][ T7280] syz.4.1975[7280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.254943][ T7280] syz.4.1975[7280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.330465][ T7288] tap1: tun_chr_ioctl cmd 1074025692 [ 176.500269][ T7296] device syzkaller0 entered promiscuous mode [ 177.014526][ T7336] device syzkaller0 entered promiscuous mode [ 177.128975][ T7354] device wg2 left promiscuous mode [ 177.416384][ T7361] device syzkaller0 entered promiscuous mode [ 177.849758][ T7409] nr0: port 1(macsec0) entered blocking state [ 177.873578][ T7409] nr0: port 1(macsec0) entered disabled state [ 177.960930][ T7422] syzkaller1: tun_chr_ioctl cmd 1074025694 [ 177.968120][ T7422] syzkaller1: tun_chr_ioctl cmd 35108 [ 179.048406][ T7497] device syzkaller0 entered promiscuous mode [ 179.699066][ T7540] -1: renamed from syzkaller0 [ 180.754198][ T7582] device syzkaller0 entered promiscuous mode [ 180.907181][ T7588] device syzkaller0 entered promiscuous mode [ 182.146663][ T7671] device syzkaller0 entered promiscuous mode [ 182.848382][ T7729] device veth1_macvtap entered promiscuous mode [ 182.863262][ T7729] device macsec0 entered promiscuous mode [ 182.913205][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 183.142275][ T7740] device syzkaller0 entered promiscuous mode [ 185.088919][ T7857] device vlan1 entered promiscuous mode [ 185.297110][ T24] audit: type=1400 audit(1771285992.770:163): avc: denied { create } for pid=7874 comm="syz.2.2150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 185.487727][ T7892] device pim6reg1 entered promiscuous mode [ 186.014476][ T7949] device syzkaller0 entered promiscuous mode [ 186.391314][ T7975] device syzkaller0 entered promiscuous mode [ 186.740860][ T8022] device syzkaller0 entered promiscuous mode [ 188.433543][ T8137] device syzkaller0 entered promiscuous mode [ 188.758275][ T8147] device syzkaller0 entered promiscuous mode [ 188.782106][ T8147] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 190.108676][ T8176] device syzkaller0 entered promiscuous mode [ 190.909056][ T8284] device syzkaller0 entered promiscuous mode [ 192.137860][ T8334] device veth1_macvtap left promiscuous mode [ 192.262713][ T8347] device syzkaller0 entered promiscuous mode [ 192.316315][ T8334] device veth1_macvtap entered promiscuous mode [ 192.350826][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 194.870771][ T8507] device wg2 left promiscuous mode [ 195.501164][ T8533] : renamed from team_slave_1 [ 197.633418][ T8681] tap3: tun_chr_ioctl cmd 2147767506 [ 198.180444][ T8713] device syzkaller0 entered promiscuous mode [ 198.278016][ T8713] ip6tnl0: mtu less than device minimum [ 199.732538][ T8781] device syzkaller0 entered promiscuous mode [ 200.255150][ T8810] tap3: tun_chr_ioctl cmd 1074812118 [ 200.309816][ T8810] tap3: tun_chr_ioctl cmd 1074025675 [ 200.345057][ T8810] tap3: persist enabled [ 200.372867][ T8816] tap3: tun_chr_ioctl cmd 1074025675 [ 200.378409][ T8816] tap3: persist disabled [ 200.460664][ T8810] tap3: tun_chr_ioctl cmd 35108 [ 202.148015][ T8886] device syzkaller0 entered promiscuous mode [ 203.243938][ T24] audit: type=1400 audit(1771286010.720:164): avc: denied { create } for pid=8979 comm="syz.1.2487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 203.416105][ T8985] device veth1_macvtap left promiscuous mode [ 203.449585][ T8985] device macsec0 entered promiscuous mode [ 203.892264][ T9033] device syzkaller0 entered promiscuous mode [ 204.034869][ T9024] device syzkaller0 entered promiscuous mode [ 204.106861][ T24] audit: type=1400 audit(1771286011.580:165): avc: denied { ioctl } for pid=9038 comm="syz.1.2502" path="pid:[4026532319]" dev="nsfs" ino=4026532319 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 204.550588][ T9090] device syzkaller0 entered promiscuous mode [ 206.436667][ T9221] device syzkaller0 entered promiscuous mode [ 206.478523][ T9228] : port 1(ip6gretap0) entered blocking state [ 206.486846][ T9228] : port 1(ip6gretap0) entered disabled state [ 206.503702][ T9228] device ip6gretap0 entered promiscuous mode [ 208.060270][ T9294] device macsec0 left promiscuous mode [ 208.084511][ T9294] device veth1_macvtap entered promiscuous mode [ 208.111730][ T9294] device macsec0 entered promiscuous mode [ 208.132500][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 208.818740][ T9314] device syzkaller0 entered promiscuous mode [ 209.334354][ T9334] device veth0_vlan left promiscuous mode [ 209.418672][ T9334] device veth0_vlan entered promiscuous mode [ 209.497248][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 209.506031][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 209.514071][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 212.362177][ T9531] cgroup: fork rejected by pids controller in /syz1 [ 212.459585][ T9539] device ip6gretap0 left promiscuous mode [ 212.480937][ T9539] : port 1(ip6gretap0) entered disabled state [ 213.124280][ T9544] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.140381][ T9544] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.169121][ T9544] device bridge_slave_0 entered promiscuous mode [ 213.190779][ T9544] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.220213][ T9544] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.261151][ T9544] device bridge_slave_1 entered promiscuous mode [ 213.400511][ T9559] : port 1() entered blocking state [ 213.412404][ T9559] : port 1() entered disabled state [ 213.423405][ T9559] device entered promiscuous mode [ 213.579351][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.588534][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.613376][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.632853][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.656723][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.663836][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.691049][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.708829][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.723926][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.731010][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.738951][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.747888][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.756431][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 213.764859][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.773220][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.789843][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 213.808553][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 213.824870][ T9544] device veth0_vlan entered promiscuous mode [ 213.846467][ T9544] device veth1_macvtap entered promiscuous mode [ 213.912395][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 213.952719][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 213.967814][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 213.976354][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 213.984696][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 213.992608][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 214.001235][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 214.010254][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 214.019029][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 214.027672][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 214.035949][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 214.561259][ T9615] : port 1(vlan1) entered blocking state [ 214.567437][ T9615] : port 1(vlan1) entered disabled state [ 214.577686][ T9615] device vlan1 entered promiscuous mode [ 214.781502][ T9624] device syzkaller0 entered promiscuous mode [ 215.550553][ T9674] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.559407][ T9674] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.567907][ T9674] device bridge_slave_0 entered promiscuous mode [ 215.575340][ T9674] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.582869][ T9674] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.590370][ T9674] device bridge_slave_1 entered promiscuous mode [ 215.736096][ T9698] device syzkaller0 entered promiscuous mode [ 215.888956][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.896895][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.915155][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.934533][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.944248][ T255] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.952224][ T255] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.960303][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.969628][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.978649][ T255] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.986980][ T255] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.998201][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.048876][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.066100][ T9719] device syzkaller0 entered promiscuous mode [ 216.080687][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.112151][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 216.137990][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 216.154746][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 216.172118][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 216.187247][ T9674] device veth0_vlan entered promiscuous mode [ 216.212418][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 216.247689][ T9674] device veth1_macvtap entered promiscuous mode [ 216.418046][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 216.445967][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 216.483908][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 216.541842][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 217.336157][ T9768] device syzkaller0 entered promiscuous mode [ 217.476087][ T9782] device veth0_vlan left promiscuous mode [ 217.503818][ T9782] device veth0_vlan entered promiscuous mode [ 217.724691][ T7] GPL: port 1(erspan0) entered disabled state [ 217.739316][ T7] device erspan0 left promiscuous mode [ 217.755198][ T7] GPL: port 1(erspan0) entered disabled state [ 218.222296][ T9850] -: renamed from syzkaller0 [ 218.294248][ T7] device vlan1 left promiscuous mode [ 218.301273][ T7] : port 1(vlan1) entered disabled state [ 218.312813][ T7] device dummy0 left promiscuous mode [ 218.322446][ T7] : port 1(dummy0) entered disabled state [ 218.337025][ T7] device veth1_macvtap left promiscuous mode [ 218.704212][ T9872] tun0: tun_chr_ioctl cmd 1074025676 [ 218.722427][ T9872] tun0: owner set to 0 [ 221.271899][ T9983] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.279715][ T9983] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.336389][ T9984] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.344322][ T9984] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.352495][ T9984] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.360459][ T9984] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.431093][ T9984] device bridge0 entered promiscuous mode [ 221.698415][ T9997] device pim6reg1 entered promiscuous mode [ 223.320941][T10099] device sit0 entered promiscuous mode [ 225.178015][T10156] : renamed from vlan1 [ 226.395834][T10194] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.431144][T10194] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.438992][T10194] device bridge_slave_0 entered promiscuous mode [ 226.470916][T10194] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.479483][T10194] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.527956][T10194] device bridge_slave_1 entered promiscuous mode [ 227.096537][T10194] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.104010][T10194] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.111486][T10194] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.118850][T10194] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.304235][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.323490][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.443709][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.456508][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.512622][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.541300][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.564157][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.571504][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.579227][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.588027][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.596492][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.603744][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.647282][T10280] device syzkaller0 entered promiscuous mode [ 227.680835][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 227.691193][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 227.699734][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 227.709310][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 227.748527][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 227.761336][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 227.771257][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 227.781738][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 227.801952][T10194] device veth0_vlan entered promiscuous mode [ 227.913455][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 227.921383][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 227.981352][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 227.990943][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 228.000052][T10283] device syzkaller0 entered promiscuous mode [ 228.009676][T10194] device veth1_macvtap entered promiscuous mode [ 228.078527][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 228.087314][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 228.096417][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 228.106205][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 228.115550][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 229.167075][T10368] device syzkaller0 entered promiscuous mode [ 229.230638][ T7] device veth1_macvtap left promiscuous mode [ 229.510355][T10488] : renamed from bond_slave_0 [ 229.955559][T10544] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.962938][T10544] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.971022][T10544] device bridge_slave_0 entered promiscuous mode [ 229.980719][T10544] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.988356][T10544] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.996059][T10544] device bridge_slave_1 entered promiscuous mode [ 230.128698][T10544] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.135999][T10544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.143806][T10544] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.151287][T10544] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.245722][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.256819][ T255] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.273623][ T255] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.323220][T10570] device syzkaller0 entered promiscuous mode [ 230.350467][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.358817][ T255] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.366596][ T255] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.374120][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.382836][ T255] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.390063][ T255] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.413597][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 230.430112][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 230.453804][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 230.538024][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 230.602799][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 230.805169][T10544] device veth0_vlan entered promiscuous mode [ 230.834005][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 230.841721][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 230.920967][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 230.972890][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 231.037825][T10544] device veth1_macvtap entered promiscuous mode [ 231.148786][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 231.163435][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 231.215268][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 231.230649][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 231.302843][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 231.473341][T10622] syz.2.2919[10622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.473399][T10622] syz.2.2919[10622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.739207][ T7] device bridge_slave_1 left promiscuous mode [ 231.781697][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.790253][ T7] device bridge_slave_0 left promiscuous mode [ 231.796972][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.805783][ T7] device veth1_macvtap left promiscuous mode [ 231.812075][ T7] device veth0_vlan left promiscuous mode [ 232.181067][T10648] device wg2 entered promiscuous mode [ 232.221345][T10673] device syzkaller0 entered promiscuous mode [ 232.753630][T10706] device veth1_macvtap left promiscuous mode [ 232.828217][T10707] device veth1_macvtap entered promiscuous mode [ 232.836309][T10707] device macsec0 entered promiscuous mode [ 232.842985][T10707] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 232.875548][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 233.308515][T10734] device syzkaller0 entered promiscuous mode [ 234.287313][T10792] device syzkaller0 entered promiscuous mode [ 236.093767][T10862] bY4`Ҙ: renamed from lo [ 237.588306][T10937] device syzkaller0 entered promiscuous mode [ 238.255229][T10978] bridge0: port 3(veth1) entered blocking state [ 238.282337][T10978] bridge0: port 3(veth1) entered disabled state [ 238.293021][T10978] device veth1 entered promiscuous mode [ 238.316565][T10978] bridge0: port 3(veth1) entered blocking state [ 238.323093][T10978] bridge0: port 3(veth1) entered listening state [ 239.291157][T11025] device xfrm0 entered promiscuous mode [ 240.021944][T11057] device syzkaller0 entered promiscuous mode [ 240.112166][T11077] device syzkaller0 entered promiscuous mode [ 240.307212][T11102] device xfrm0 entered promiscuous mode [ 240.733152][T11111] device sit0 entered promiscuous mode [ 240.916560][T11133] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 241.033525][T11137] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 241.085899][T11137] device syzkaller0 entered promiscuous mode [ 243.031059][T11249] -: renamed from syzkaller0 [ 243.266914][T11279] batadv0: tun_chr_ioctl cmd 1074025684 [ 243.425672][ T24] audit: type=1400 audit(1771286050.900:166): avc: denied { create } for pid=11294 comm="syz.2.3115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 244.519507][T11370] device syzkaller0 entered promiscuous mode [ 245.147331][T11407] device syzkaller0 entered promiscuous mode [ 245.162013][T11423] syz.4.3145 uses obsolete (PF_INET,SOCK_PACKET) [ 245.265599][T11422] device syzkaller0 entered promiscuous mode [ 245.308569][T11432] : renamed from bond_slave_0 [ 245.385865][T11444] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 245.394129][T11444] device syzkaller0 entered promiscuous mode [ 245.500606][T11463] device pim6reg1 entered promiscuous mode [ 246.061222][T11513] tap0: tun_chr_ioctl cmd 2147767506 [ 246.267646][T11545] : port 1(ip6gretap0) entered blocking state [ 246.274040][T11545] : port 1(ip6gretap0) entered disabled state [ 246.280998][T11545] device ip6gretap0 entered promiscuous mode [ 246.418665][T11558] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 246.425766][T11558] syzkaller0: persist disabled [ 246.435123][T11556] bridge0: port 3(veth1) entered blocking state [ 246.472442][T11556] bridge0: port 3(veth1) entered disabled state [ 246.507325][T11556] device veth1 entered promiscuous mode [ 246.513547][T11556] bridge0: port 3(veth1) entered blocking state [ 246.519859][T11556] bridge0: port 3(veth1) entered forwarding state [ 246.895758][T11596] ref_ctr_offset mismatch. inode: 0x1ad offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 247.768870][T11664] syz.4.3223[11664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.768935][T11664] syz.4.3223[11664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.864971][T11671] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.884024][T11671] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.983498][T11680] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 248.123849][T11680] device syzkaller0 entered promiscuous mode [ 248.271035][T11696] device dummy0 entered promiscuous mode [ 248.803497][T11729] device sit0 entered promiscuous mode [ 249.018048][T11752] device syzkaller0 entered promiscuous mode [ 249.470808][T11780] device veth1_macvtap left promiscuous mode [ 250.611712][T11851] device syzkaller0 entered promiscuous mode [ 251.770982][T11909] device syzkaller0 entered promiscuous mode [ 253.341719][T11987] nr0: port 1(macsec0) entered blocking state [ 253.383018][T11987] nr0: port 1(macsec0) entered disabled state [ 253.389699][T11987] device macsec0 entered promiscuous mode [ 253.484549][T11990] device bridge_slave_1 left promiscuous mode [ 253.507788][T11990] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.532326][ C1] bridge0: port 3(veth1) entered learning state [ 253.549174][T11990] device bridge_slave_0 left promiscuous mode [ 253.569353][T11990] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.095958][T12023] device sit0 left promiscuous mode [ 254.116503][T12023] device sit0 entered promiscuous mode [ 254.556022][T12031] device syzkaller0 entered promiscuous mode [ 255.747318][T12077] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 256.138746][T12105] device syzkaller0 entered promiscuous mode [ 257.067385][T12189] device syzkaller0 entered promiscuous mode [ 259.315481][T12352] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 259.530409][T12381] syz.2.3432[12381] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.530477][T12381] syz.2.3432[12381] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.637711][T12381] device syzkaller0 entered promiscuous mode [ 259.741035][T12383] device syzkaller0 entered promiscuous mode [ 260.039804][T12390] device veth0_vlan left promiscuous mode [ 260.064630][T12390] device veth0_vlan entered promiscuous mode [ 260.111299][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.133434][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 260.170445][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 260.453490][T12418] device syzkaller0 entered promiscuous mode [ 261.268707][T12467] device syzkaller0 entered promiscuous mode [ 261.492550][T12486] device sit0 left promiscuous mode [ 261.694457][T12510] bridge0: port 4(syz_tun) entered blocking state [ 261.701792][T12510] bridge0: port 4(syz_tun) entered disabled state [ 261.709247][T12510] device syz_tun entered promiscuous mode [ 261.715970][T12510] bridge0: port 4(syz_tun) entered blocking state [ 261.722475][T12510] bridge0: port 4(syz_tun) entered forwarding state [ 262.506296][T12561] device syzkaller0 entered promiscuous mode [ 262.686909][T12589] device syzkaller0 entered promiscuous mode [ 262.720408][T12592] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.728639][T12592] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.741419][T12592] device bridge0 left promiscuous mode [ 263.004126][T12619] +: renamed from team_slave_1 [ 264.133216][T12666] bridge0: port 4(gretap0) entered blocking state [ 264.139745][T12666] bridge0: port 4(gretap0) entered disabled state [ 264.158505][T12666] device gretap0 entered promiscuous mode [ 264.167684][T12666] bridge0: port 4(gretap0) entered blocking state [ 264.174189][T12666] bridge0: port 4(gretap0) entered listening state [ 266.949173][T12811] device syzkaller0 entered promiscuous mode [ 266.976478][T12811] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 267.608061][T12887] device pim6reg1 entered promiscuous mode [ 268.468276][T12922] device syzkaller0 entered promiscuous mode [ 268.892316][ C1] bridge0: port 3(veth1) entered forwarding state [ 268.898818][ C1] bridge0: topology change detected, propagating [ 271.033986][T13099] device lo entered promiscuous mode [ 272.485832][T13151] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.493277][T13151] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.502571][T13151] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.509936][T13151] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.715655][T13151] device bridge0 entered promiscuous mode [ 273.144755][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 273.403356][T13182] device syzkaller0 entered promiscuous mode [ 274.702232][T13241] device syzkaller0 entered promiscuous mode [ 275.340185][T13281] device wg2 entered promiscuous mode [ 275.488670][T13280] device syzkaller0 entered promiscuous mode [ 277.145537][T13358] bridge0: port 4(syz_tun) entered disabled state [ 277.152196][T13358] bridge0: port 3(veth1) entered disabled state [ 277.158688][T13358] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.166009][T13358] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.177446][T13359] bridge0: port 4(syz_tun) entered blocking state [ 277.184245][T13359] bridge0: port 4(syz_tun) entered forwarding state [ 277.192775][T13359] bridge0: port 3(veth1) entered blocking state [ 277.199566][T13359] bridge0: port 3(veth1) entered forwarding state [ 277.207777][T13359] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.215059][T13359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.223299][T13359] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.230694][T13359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.248492][T13359] device bridge0 entered promiscuous mode [ 277.372729][ T24] audit: type=1400 audit(1771286084.850:167): avc: denied { read } for pid=13360 comm="syz.0.3722" name="cgroup.subtree_control" dev="cgroup2" ino=335 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 279.333368][T13436] -: renamed from syzkaller0 [ 279.772349][ C1] bridge0: port 4(gretap0) entered learning state [ 280.085311][T13478] 7B: renamed from syzkaller0 [ 282.155581][T13568] device pim6reg1 entered promiscuous mode [ 283.891688][T13643] device syzkaller0 entered promiscuous mode [ 284.025294][T13650] bY4`Ҙ: renamed from lo [ 284.241672][T13642] syzkaller0: delete flow: hash 1992413081 index 1 [ 284.403031][T13648] device sit0 left promiscuous mode [ 285.253317][T13681] device syzkaller0 entered promiscuous mode [ 285.311151][T13693] device syzkaller0 entered promiscuous mode [ 286.384544][T13725] device syzkaller0 entered promiscuous mode [ 286.850116][T13766] device sit0 entered promiscuous mode [ 288.008527][T13838] ref_ctr_offset mismatch. inode: 0x5b2 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 288.301412][T13857] device syzkaller0 entered promiscuous mode [ 288.464102][T13870] device sit0 left promiscuous mode [ 288.590861][T13871] device sit0 entered promiscuous mode [ 288.761883][T13883] : renamed from team_slave_1 [ 289.904292][T13966] bridge0: port 4(gretap0) entered disabled state [ 289.912093][T13966] bridge0: port 3(veth1) entered disabled state [ 289.918703][T13966] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.928264][T13966] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.995449][T13971] device gretap0 left promiscuous mode [ 290.002795][T13971] bridge0: port 4(gretap0) entered disabled state [ 290.018347][T13971] device veth1 left promiscuous mode [ 290.028313][T13971] bridge0: port 3(veth1) entered disabled state [ 290.040307][T13971] device bridge_slave_1 left promiscuous mode [ 290.051237][T13971] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.066807][T13971] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.596054][T14001] device lo entered promiscuous mode [ 290.601494][T14001] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 290.670740][T14002] cgroup: fork rejected by pids controller in /syz0 [ 290.847769][T14069] device syzkaller0 entered promiscuous mode [ 291.416361][ T24] audit: type=1400 audit(1771286098.890:168): avc: denied { mounton } for pid=14135 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 291.485219][T14138] device syzkaller0 entered promiscuous mode [ 291.586561][T14135] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.602856][T14135] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.631806][T14135] device bridge_slave_0 entered promiscuous mode [ 291.639162][T14135] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.646239][T14135] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.653771][T14135] device bridge_slave_1 entered promiscuous mode [ 291.888957][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 291.908566][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 291.972734][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 292.006500][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 292.086890][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.094048][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.173003][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 292.215365][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 292.260528][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.267699][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 292.307772][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 292.332792][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 292.376196][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 292.404866][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 292.506366][T14182] device bond_slave_1 entered promiscuous mode [ 292.531412][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 292.549687][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 292.569571][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 292.589250][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 292.603384][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 292.639288][T14135] device veth0_vlan entered promiscuous mode [ 292.649299][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 292.659956][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 292.696574][T14135] device veth1_macvtap entered promiscuous mode [ 292.759979][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 292.770136][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 292.781105][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 292.872188][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 292.886641][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 292.896399][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 292.905381][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 292.959002][ T24] audit: type=1400 audit(1771286100.430:169): avc: denied { unmount } for pid=14135 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 293.022192][ T7] device macsec0 left promiscuous mode [ 293.028099][ T7] nr0: port 1(macsec0) entered disabled state [ 293.037577][ T7] device bridge_slave_1 left promiscuous mode [ 293.043945][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.051654][ T7] device bridge_slave_0 left promiscuous mode [ 293.058200][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.066566][ T7] device veth1_macvtap left promiscuous mode [ 293.093168][ T24] audit: type=1400 audit(1771286100.570:170): avc: denied { create } for pid=14215 comm="syz.0.3918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 293.310153][T14226] device ip6gretap0 left promiscuous mode [ 293.316236][T14226] : port 1(ip6gretap0) entered disabled state [ 294.034684][ T24] audit: type=1400 audit(1771286101.510:171): avc: denied { associate } for pid=14279 comm="syz.1.3966" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 294.120210][T14292] device syzkaller0 entered promiscuous mode [ 294.467953][T14311] device syzkaller0 entered promiscuous mode [ 294.944432][T14312] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.951754][T14312] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.959710][T14312] device bridge_slave_0 entered promiscuous mode [ 294.997714][T14312] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.053659][T14312] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.075140][T14312] device bridge_slave_1 entered promiscuous mode [ 295.790337][T14312] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.797447][T14312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.804875][T14312] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.812094][T14312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.317886][ T2527] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.330051][ T2527] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.553398][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 296.561540][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 296.623854][T14382] device syzkaller0 entered promiscuous mode [ 296.675436][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 296.684495][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 296.692998][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.700100][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.709000][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 296.718284][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 296.727098][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.734375][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.741948][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 296.754397][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 296.762765][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 296.771823][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 296.831285][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 296.840626][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 296.857234][T14312] device veth0_vlan entered promiscuous mode [ 296.873413][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 296.881644][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 296.890102][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 296.898362][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 296.933154][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 296.942066][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 296.953379][T14312] device veth1_macvtap entered promiscuous mode [ 296.978680][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 296.986738][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 296.995667][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 297.005584][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 297.014045][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 297.059703][T14402] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.066949][T14402] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.130811][T14405] device pim6reg1 entered promiscuous mode [ 297.569162][ T7] device veth1_macvtap left promiscuous mode [ 301.017669][T14611] device syzkaller0 entered promiscuous mode [ 301.272838][T14637] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 301.291101][T14637] device syzkaller0 entered promiscuous mode [ 304.221369][T14839] device syzkaller0 entered promiscuous mode [ 307.320620][T15018] device veth1_macvtap left promiscuous mode [ 308.140759][T15049] device syzkaller0 entered promiscuous mode [ 308.585437][T15106] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 308.594997][T15106] device syzkaller0 entered promiscuous mode [ 309.620662][T15173] erspan0: refused to change device tx_queue_len [ 310.394002][T15204] device veth1_macvtap left promiscuous mode [ 310.444109][T15216] device veth1_macvtap entered promiscuous mode [ 310.450552][T15216] device macsec0 entered promiscuous mode [ 312.304715][T15296] device syzkaller0 entered promiscuous mode [ 312.652540][T15308] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 313.748874][T15363] device syzkaller0 entered promiscuous mode [ 313.858626][T15365] device syzkaller0 entered promiscuous mode [ 313.946451][T15387] device vlan0 entered promiscuous mode [ 314.256787][T15402] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 314.266004][T15402] device syzkaller0 entered promiscuous mode [ 314.325221][T15429] ref_ctr_offset mismatch. inode: 0x50f offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 315.377535][T15462] device syzkaller0 entered promiscuous mode [ 315.534342][T15481] device sit0 entered promiscuous mode [ 315.720441][T15484] device veth0_vlan left promiscuous mode [ 315.728719][T15484] device veth0_vlan entered promiscuous mode [ 315.807021][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 315.816695][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 315.825963][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 316.337200][T15536] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.356273][T15536] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.396462][T15536] device bridge_slave_0 entered promiscuous mode [ 316.422255][T15536] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.437512][T15536] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.449542][T15536] device bridge_slave_1 entered promiscuous mode [ 316.579425][T15536] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.586762][T15536] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.594207][T15536] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.601468][T15536] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.688379][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 316.705654][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.724247][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.767282][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 316.786774][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.794139][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.809760][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 316.828582][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.836945][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.916910][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 316.975011][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 317.017816][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 317.057773][T15536] device veth0_vlan entered promiscuous mode [ 317.113935][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 317.131799][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 317.186899][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 317.437065][T15587] device syzkaller0 entered promiscuous mode [ 317.460079][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 317.471903][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 317.490533][T15536] device veth1_macvtap entered promiscuous mode [ 317.564507][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 317.572966][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 317.587026][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 317.675829][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 317.702632][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 318.754398][ T7] device left promiscuous mode [ 318.760333][ T7] : port 1() entered disabled state [ 318.787497][ T7] nr0: port 1(macsec0) entered disabled state [ 318.804319][ T7] device veth1_macvtap left promiscuous mode [ 319.218659][T15649] device syzkaller0 entered promiscuous mode [ 319.793196][T15674] : renamed from team_slave_1 [ 319.961201][T15689] device sit0 left promiscuous mode [ 321.605616][T15810] device syzkaller0 entered promiscuous mode [ 323.405279][T15892] device pim6reg1 entered promiscuous mode [ 325.194129][T16015] device syzkaller0 entered promiscuous mode [ 325.291444][T16022] device syzkaller0 entered promiscuous mode [ 327.208193][T16151] syz.3.4516[16151] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.208254][T16151] syz.3.4516[16151] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.290036][T16296] device syzkaller0 entered promiscuous mode [ 329.511813][T16323] device syzkaller0 entered promiscuous mode [ 330.065429][T16401] device syzkaller0 entered promiscuous mode [ 331.070597][T16480] device syzkaller0 entered promiscuous mode [ 331.135463][T16499] device syzkaller0 entered promiscuous mode [ 331.458705][T16530] 0: renamed from pim6reg1 [ 332.152234][T16563] device syzkaller0 entered promiscuous mode [ 333.034522][T16617] device syzkaller0 entered promiscuous mode [ 333.754239][T16648] device xfrm0 entered promiscuous mode [ 334.073004][ T24] audit: type=1400 audit(1771286141.550:172): avc: denied { create } for pid=16660 comm="syz.3.4680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 334.251985][T16674] bridge0: port 3(veth0_to_team) entered blocking state [ 334.387039][T16674] bridge0: port 3(veth0_to_team) entered disabled state [ 334.396163][T16674] device veth0_to_team entered promiscuous mode [ 334.977936][T16691] device syzkaller0 entered promiscuous mode [ 335.384266][T16758] device syzkaller0 entered promiscuous mode [ 336.834920][T16844] tap0: tun_chr_ioctl cmd 1074025677 [ 336.893212][T16844] tap0: linktype set to 778 [ 337.428334][T16868] device syzkaller0 left promiscuous mode [ 337.909304][T16888] device veth1_macvtap left promiscuous mode [ 338.340231][T16922] device syzkaller0 entered promiscuous mode [ 338.506900][T16936] device syzkaller0 left promiscuous mode [ 339.580202][T16978] device syzkaller0 entered promiscuous mode [ 339.629122][T16982] device syzkaller0 entered promiscuous mode [ 339.662936][T16982] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 341.082048][T17080] syz.2.4812[17080] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.082144][T17080] syz.2.4812[17080] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.807377][T10544] bridge0: port 4(syz_tun) entered disabled state [ 341.833024][T10544] device syz_tun left promiscuous mode [ 341.850622][T10544] bridge0: port 4(syz_tun) entered disabled state [ 342.195682][T17154] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.208618][T17154] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.216580][T17154] device bridge_slave_0 entered promiscuous mode [ 342.224300][T17154] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.231734][T17154] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.239578][T17154] device bridge_slave_1 entered promiscuous mode [ 342.312761][T17154] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.319895][T17154] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.327314][T17154] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.334681][T17154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.387599][T17169] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 342.433180][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 342.444765][ T2527] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.456326][ T2527] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.532650][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 342.546557][ T2527] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.553687][ T2527] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.571274][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 342.586180][ T2527] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.593356][ T2527] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.651759][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 342.666746][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 342.738337][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 342.755785][ T731] syzkaller0: tun_net_xmit 76 [ 342.760578][ T731] syzkaller0: tun_net_xmit 48 [ 342.769571][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 342.778053][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 342.782603][ C1] syzkaller0: tun_net_xmit 76 [ 342.787878][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 342.809240][T17154] device veth0_vlan entered promiscuous mode [ 342.827226][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 342.840111][T17154] device veth1_macvtap entered promiscuous mode [ 342.852245][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 342.938026][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 343.644115][ T255] device veth1 left promiscuous mode [ 343.650755][ T255] bridge0: port 3(veth1) entered disabled state [ 343.660997][ T255] device bridge_slave_1 left promiscuous mode [ 343.669868][ T255] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.682152][ T255] device bridge_slave_0 left promiscuous mode [ 343.689937][ T255] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.704699][ T255] device veth1_macvtap left promiscuous mode [ 343.711098][ T255] device veth0_vlan left promiscuous mode [ 344.023984][T17291] device syzkaller0 entered promiscuous mode [ 344.769909][T17339] device syzkaller0 entered promiscuous mode [ 345.033271][T17360] +: renamed from team_slave_1 [ 345.642604][T17392] device syzkaller0 entered promiscuous mode [ 345.964159][T17419] device syzkaller0 entered promiscuous mode [ 346.467751][T17434] device syzkaller0 entered promiscuous mode [ 348.099640][T17510] device syzkaller0 entered promiscuous mode [ 348.727950][T17556] device sit0 entered promiscuous mode [ 349.721512][T17594] device syzkaller0 entered promiscuous mode [ 351.821423][T17689] device syzkaller0 entered promiscuous mode [ 352.320638][T17719] device macsec0 entered promiscuous mode [ 352.562203][ T24] audit: type=1400 audit(1771286160.030:173): avc: denied { create } for pid=17735 comm="syz.4.5005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 353.352141][T17765] device pim6reg1 entered promiscuous mode [ 353.525492][T17775] : port 1(ip6gretap0) entered blocking state [ 353.561760][T17775] : port 1(ip6gretap0) entered disabled state [ 353.583256][T17775] device ip6gretap0 entered promiscuous mode [ 353.609229][T17790] device ip6gretap0 left promiscuous mode [ 353.625790][T17790] : port 1(ip6gretap0) entered disabled state [ 353.784272][T17800] device syzkaller0 entered promiscuous mode [ 354.229844][T17840] device syzkaller0 entered promiscuous mode [ 354.265757][T17840] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 354.726922][T17876] device macsec0 left promiscuous mode [ 354.955576][T17900] device syzkaller0 entered promiscuous mode [ 355.436353][T17928] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 355.455886][T17928] device syzkaller0 entered promiscuous mode [ 356.697806][ T24] audit: type=1400 audit(1771286164.170:174): avc: denied { attach_queue } for pid=18012 comm="syz.1.5082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 356.730635][T18013] device syzkaller0 entered promiscuous mode [ 356.795091][T18021] : renamed from vlan1 [ 357.151934][T18035] bridge0: port 3(veth0_to_team) entered blocking state [ 357.209717][T18035] bridge0: port 3(veth0_to_team) entered disabled state [ 357.250824][T18035] device veth0_to_team entered promiscuous mode [ 358.815763][T18125] tap0: tun_chr_ioctl cmd 1074025673 [ 358.845848][T18126] tap0: tun_chr_ioctl cmd 1074025677 [ 358.857115][T18126] tap0: linktype set to 780 [ 359.065504][T18129] device syzkaller0 entered promiscuous mode [ 359.655334][T18194] device xfrm0 entered promiscuous mode [ 361.011603][T18255] device syzkaller0 entered promiscuous mode [ 361.036119][T18255] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 361.080155][ T8841] syzkaller0: tun_net_xmit 48 [ 361.182763][T18274] device syzkaller0 entered promiscuous mode [ 361.536682][T18304] device syzkaller0 entered promiscuous mode [ 361.768565][T18314] syz.3.5167[18314] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 361.768789][T18314] syz.3.5167[18314] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.186888][T18371] @0: renamed from bond_slave_1 [ 363.775483][T18398] device syzkaller0 entered promiscuous mode [ 368.229081][T18512] device syzkaller0 entered promiscuous mode [ 368.878102][T18549] device veth1_macvtap left promiscuous mode [ 371.678160][T18648] IPv6: pim6reg1: Disabled Multicast RS [ 371.714914][T18653] syz.3.5266[18653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.714999][T18653] syz.3.5266[18653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.091876][T18690] device syzkaller0 entered promiscuous mode [ 373.109460][T18731] bridge0: port 2(bridge_slave_1) entered disabled state [ 373.116726][T18731] bridge0: port 1(bridge_slave_0) entered disabled state [ 373.142531][T18731] device team_slave_0 entered promiscuous mode [ 373.151519][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 373.163691][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 373.235441][T18733] bridge0: port 3(veth0_to_team) entered blocking state [ 373.242640][T18733] bridge0: port 3(veth0_to_team) entered forwarding state [ 373.249905][T18733] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.256990][T18733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 373.264304][T18733] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.271529][T18733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 373.280059][T18733] device bridge0 entered promiscuous mode [ 374.123821][T18784] device veth0_vlan left promiscuous mode [ 374.148208][T18784] device veth0_vlan entered promiscuous mode [ 374.208357][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 374.227954][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 374.246525][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 374.330205][T18792] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.337610][T18792] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.366039][T18792] device bridge_slave_1 left promiscuous mode [ 374.380987][T18792] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.408896][T18792] device bridge_slave_0 left promiscuous mode [ 374.418814][T18792] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.245232][T18936] device syzkaller0 entered promiscuous mode [ 377.998723][ T24] audit: type=1400 audit(1771286185.470:175): avc: denied { create } for pid=18981 comm="syz.4.5368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 378.217797][T18995] device syzkaller0 entered promiscuous mode [ 378.336132][T19001] nr0: port 1(macsec0) entered blocking state [ 378.342389][T19001] nr0: port 1(macsec0) entered disabled state [ 378.404695][T19008] device pim6reg1 entered promiscuous mode [ 378.414915][T19010] device pim6reg1 entered promiscuous mode [ 378.528226][T19017] device syzkaller0 entered promiscuous mode [ 378.870982][T19037] GPL: port 1(erspan0) entered blocking state [ 378.885050][T19037] GPL: port 1(erspan0) entered disabled state [ 378.923728][T19037] device erspan0 entered promiscuous mode [ 380.367042][T19116] device wg2 left promiscuous mode [ 381.168157][T19161] device syzkaller0 entered promiscuous mode [ 381.499453][T19187] device syzkaller0 entered promiscuous mode [ 381.881504][T19194] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 383.207689][T19253] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 383.225125][T19253] syzkaller0: linktype set to 773 [ 385.050187][T19327] device veth0_vlan left promiscuous mode [ 385.063535][T19327] device veth0_vlan entered promiscuous mode [ 385.093802][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 385.110282][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 385.151727][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 385.869503][T19377] device syzkaller0 entered promiscuous mode [ 388.602393][T19527] device syzkaller0 entered promiscuous mode [ 389.350465][T19586] device syzkaller0 entered promiscuous mode [ 389.566433][T19611] tap0: tun_chr_ioctl cmd 1074025677 [ 389.578378][T19611] tap0: linktype set to 778 [ 389.826785][T19628] device syzkaller0 entered promiscuous mode [ 390.378162][T19665] GPL: port 1(erspan0) entered blocking state [ 390.410073][T19665] GPL: port 1(erspan0) entered disabled state [ 390.444445][T19665] device erspan0 entered promiscuous mode [ 390.451824][T19661] GPL: port 1(erspan0) entered blocking state [ 390.458301][T19661] GPL: port 1(erspan0) entered forwarding state [ 391.735636][T19712] device syzkaller0 entered promiscuous mode [ 391.979864][T19739] tap0: tun_chr_ioctl cmd 1074025675 [ 391.985920][T19739] tap0: persist enabled [ 391.991834][T19738] tap0: tun_chr_ioctl cmd 1074025675 [ 391.997569][T19738] tap0: persist enabled [ 392.127822][T19752] device syzkaller0 entered promiscuous mode [ 392.161460][ T618] syzkaller0: tun_net_xmit 48 [ 392.176724][T19752] syzkaller0: create flow: hash 4006055298 index 0 [ 392.353180][T19752] syzkaller0 (unregistered): delete flow: hash 4006055298 index 0 [ 392.439331][T19775] device wg2 entered promiscuous mode [ 392.675690][T19796] : port 1(ip6gretap0) entered blocking state [ 392.681934][T19796] : port 1(ip6gretap0) entered disabled state [ 392.716496][T19796] device ip6gretap0 entered promiscuous mode [ 392.825378][T19796] device ip6gretap0 left promiscuous mode [ 392.863120][T19796] : port 1(ip6gretap0) entered disabled state [ 393.449352][T19798] device veth0_vlan left promiscuous mode [ 393.696500][T19798] device veth0_vlan entered promiscuous mode [ 393.768517][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 393.777665][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 393.791628][ T2527] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 394.037210][T19852] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.052789][T19852] bridge0: port 1(bridge_slave_0) entered disabled state [ 394.070485][T19852] device bridge_slave_0 entered promiscuous mode [ 394.099186][T19852] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.108517][T19852] bridge0: port 2(bridge_slave_1) entered disabled state [ 394.119971][T19852] device bridge_slave_1 entered promiscuous mode [ 394.447331][T19867] device syzkaller0 entered promiscuous mode [ 394.577117][T19852] device veth0_vlan entered promiscuous mode [ 394.618892][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 394.645082][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 394.663806][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 394.672885][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 394.682746][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 394.692783][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 394.703009][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 394.712684][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 394.720378][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 394.728970][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 394.737532][ T255] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.744701][ T255] bridge0: port 1(bridge_slave_0) entered forwarding state [ 394.752730][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 394.761408][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 394.769859][ T255] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.777036][ T255] bridge0: port 2(bridge_slave_1) entered forwarding state [ 394.785183][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 394.909781][T19852] device veth1_macvtap entered promiscuous mode [ 394.921908][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 394.934470][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 394.946421][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 395.006449][ T255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 395.134519][T19885] -1: renamed from syzkaller0 [ 395.436724][T19907] device syzkaller0 entered promiscuous mode [ 395.587048][T19915] bridge0: port 3(gretap0) entered blocking state [ 395.594661][T19915] bridge0: port 3(gretap0) entered disabled state [ 395.601709][T19915] device gretap0 entered promiscuous mode [ 395.608138][T19915] bridge0: port 3(gretap0) entered blocking state [ 395.614701][T19915] bridge0: port 3(gretap0) entered forwarding state [ 396.838948][T19967] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 398.220978][T20040] syz.2.5674[20040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.221038][T20040] syz.2.5674[20040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.860054][T20086] device syzkaller0 entered promiscuous mode [ 402.454660][T20233] device syzkaller0 entered promiscuous mode [ 403.480517][T20275] device syzkaller0 entered promiscuous mode [ 403.754088][T20279] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.509645][T20302] device syzkaller0 entered promiscuous mode [ 405.886536][T20385] device syzkaller0 entered promiscuous mode [ 406.428507][T20412] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 406.526454][T20412] device syzkaller0 entered promiscuous mode [ 408.354573][T20487] device sit0 entered promiscuous mode [ 412.787214][T20720] device syzkaller0 entered promiscuous mode [ 414.808336][T20881] device syzkaller0 entered promiscuous mode [ 415.865829][T20948] ref_ctr_offset mismatch. inode: 0x53d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 417.844747][T21052] tap0: tun_chr_ioctl cmd 1074025681 [ 417.892919][T21055] device macsec0 entered promiscuous mode [ 418.721482][T21105] syz.2.5998[21105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.721544][T21105] syz.2.5998[21105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.733358][T21103] syz.2.5998[21103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.352736][ T1450] ------------[ cut here ]------------ [ 419.375882][ T1450] kernel BUG at kernel/bpf/arraymap.c:993! [ 419.395161][ T1450] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 419.401379][ T1450] CPU: 1 PID: 1450 Comm: kworker/1:17 Tainted: G W syzkaller #0 [ 419.410421][ T1450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 419.420681][ T1450] Workqueue: events prog_array_map_clear_deferred [ 419.427129][ T1450] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 419.433454][ T1450] Code: 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 38 63 e9 ff 0f 0b e9 78 f9 ff ff e8 2c 63 e9 ff 0f 0b e8 25 63 e9 ff <0f> 0b e8 1e 63 e9 ff 0f 0b e8 17 63 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 419.453663][ T1450] RSP: 0018:ffffc90000d47c18 EFLAGS: 00010293 [ 419.459767][ T1450] RAX: ffffffff817b532b RBX: ffff88811d312050 RCX: ffff888116efe2c0 [ 419.467761][ T1450] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 419.475750][ T1450] RBP: ffffc90000d47c98 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 419.483866][ T1450] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: 00000000fffffff0 [ 419.491860][ T1450] R13: ffff888116ee4e80 R14: 0000000000000001 R15: ffff888116ee4e00 [ 419.499866][ T1450] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 419.509237][ T1450] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 419.515845][ T1450] CR2: 0000000100000000 CR3: 0000000122256000 CR4: 00000000003506a0 [ 419.523932][ T1450] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000200000000300 [ 419.531925][ T1450] DR3: 0000200000000300 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 419.539912][ T1450] Call Trace: [ 419.543227][ T1450] ? bpf_prog_ed7de65212269bc2+0xb/0x1d8 [ 419.548879][ T1450] fd_array_map_delete_elem+0x14c/0x250 [ 419.554452][ T1450] prog_array_map_clear_deferred+0x9e/0x140 [ 419.560374][ T1450] process_one_work+0x6e1/0xba0 [ 419.565260][ T1450] worker_thread+0xa6a/0x13c0 [ 419.570131][ T1450] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 419.575624][ T1450] ? __kasan_check_read+0x11/0x20 [ 419.580675][ T1450] kthread+0x346/0x3d0 [ 419.584766][ T1450] ? worker_clr_flags+0x190/0x190 [ 419.589812][ T1450] ? kthread_blkcg+0xd0/0xd0 [ 419.594425][ T1450] ret_from_fork+0x1f/0x30 [ 419.598961][ T1450] Modules linked in: [ 419.634465][T21170] bY4`Ҙ: renamed from lo [ 419.842342][ T1450] ---[ end trace e68a65c9139f5a98 ]--- [ 419.847876][ T1450] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 419.854363][ T1450] Code: 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 38 63 e9 ff 0f 0b e9 78 f9 ff ff e8 2c 63 e9 ff 0f 0b e8 25 63 e9 ff <0f> 0b e8 1e 63 e9 ff 0f 0b e8 17 63 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 419.874199][ T1450] RSP: 0018:ffffc90000d47c18 EFLAGS: 00010293 [ 419.880299][ T1450] RAX: ffffffff817b532b RBX: ffff88811d312050 RCX: ffff888116efe2c0 [ 419.888580][ T1450] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 419.897080][ T1450] RBP: ffffc90000d47c98 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 419.905286][ T1450] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: 00000000fffffff0 [ 419.913545][ T1450] R13: ffff888116ee4e80 R14: 0000000000000001 R15: ffff888116ee4e00 [ 419.921727][ T1450] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 419.930941][ T1450] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 419.937849][ T1450] CR2: 000055558fb424e8 CR3: 000000010d500000 CR4: 00000000003506a0 [ 419.946607][ T1450] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000200000000300 [ 419.954818][ T1450] DR3: 0000200000000300 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 419.963091][ T1450] Kernel panic - not syncing: Fatal exception [ 419.969468][ T1450] Kernel Offset: disabled [ 419.973978][ T1450] Rebooting in 86400 seconds..